September 30, 2011

New DND guidelines: 7 things to know

From 27 September, 850 million phone subscribers across the country may finally get some relief from unsolicited commercial calls and messages.



Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com



The last attempt, in 2007, to curb telemarketers by setting up a Do Not Call (DNC) Registry failed miserably. But the National Consumer Preference Registry, the latest effort that has missed many launch deadlines, raises hope for putting an end to pesky calls and messages.

TRAI has strengthened the DNC guidelines and revamped registration norms for the telemarketers. Here's how the new set of guidelines will work.

New number for telemarketers
Telemarketers to be assigned a distinct series beginning with 140.

Penalty imposed
The minimum penalty for violations has been set at Rs 25,000 against Rs 500 at present. As the penalties will progressively increase, the sixth violation will attract Rs 2.5 lakh fine.

Blacklisting
Telemarketers can also be blacklisted for two years after the sixth violation. Service providers will be barred from providing any telecom resource to blacklisted telemarketers.

Restriction on number of SMSes
The number of text messages or SMSes that can be sent will be restricted to 100 a day for prepaid and 3,000 a month for post-paid telephone numbers.

Barred timings
No calls and messages are permitted between 9 pm and 9 am.

How to register for DND
Dial or send an SMS to 1909 to register with NCPR or register at www.nccptrai.gov.in
Choose categories of commercial messages/ calls to be blocked. Those already registered with National Do Not Call Registry (NDNC), need not re-register.

Blocked categories
* Banking & financial products
* Communication & entertainment
* Tourism or leisure
* Consumer goods
* Automobiles
* Real estate
* Education
* Health

September 28, 2011

TR: The 10 Best IT Certifications 2010

Here’s a list of the 10 accreditations with the greatest potential for technology support professionals, administrators, and managers seeking employment within consulting firms or small and midsize organizations.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com



By Erik Eckel

Just as with many popular arguments — Red Sox v. Yankees, Chelsea v. Manchester United, Ford v. Chevy — IT certifications are popular fodder for debate. Except that certifications, in an IT professional’s microcosm of a world, have a bigger impact on the future. Just which certifications hold the most value today? Here’s my list of the 10 accreditations with the greatest potential for technology support professionals, administrators, and managers seeking employment within consulting firms or small and midsize organizations.

1: MCITP

This best certification list could be built using 10 Microsoft certifications, many of which would be MCITP accreditations. The world runs on Microsoft. Those professionals earning Microsoft Certified IT Professional (MCITP) certification give employers and clients confidence that they’ve developed the knowledge and skills necessary to plan, deploy, support, maintain, and optimize Windows technologies. Specifically, the Enterprise Desktop Administrator 7 and Server Administrator tracks hold great appeal, as will Enterprise Messaging Administrator 2010, as older Exchange servers are retired in favor of the newer platform.

2: MCTS

With operating systems (Windows 2000, 2003, 2008, etc.) cycling through every several years, many IT professionals simply aren’t going to invest the effort to earn MCITP or MCSE accreditation on every version. That’s understandable. But mastering a single exam, especially when available examinations help IT pros demonstrate expertise with such popular platforms as Windows Server 2008, Windows 7, and Microsoft SQL Server 2008, is more than reasonable. That’s why the Microsoft Certified Technology Specialist (MCTS) accreditation earns a spot on the list; it provides the opportunity for IT pros to demonstrate expertise on a specific technology that an organization may require right here, right now.

3: Network+

There’s simply no denying that IT professionals must know and understand the network principles and concepts that power everything within an organization’s IT infrastructure, whether running Windows, Linux, Apple, or other technologies. Instead of dismissing CompTIA’s Network+ as a baseline accreditation, every IT professional should add it to their resume.

4: A+

Just as with CompTIA’s Network+ certification, the A+ accreditation is another cert that all IT professionals should have on their resume. Proving baseline knowledge and expertise with the hardware components that power today’s computers should be required of all technicians. I’m amazed at the number of smart, intelligent, and seasoned IT pros who aren’t sure how to crack the case of a Sony Vaio or diagnose failed capacitors with a simple glance. The more industry staff can learn about the fundamental hardware components, the better.

5: CSSA

SonicWALLs power countless SMB VPNs. The company’s network devices also provide firewall and routing services, while extending gateway and perimeter security protections to organizations of all sizes. By gaining Certified SonicWALL Security Administrator (CSSA) certification, engineers can demonstrate their mastery of network security essentials, secure remote access, or secure wireless administration. There’s an immediate need for engineers with the knowledge and expertise required to configure and troubleshoot SonicWALL devices providing security services.

6: CCNA

Although SonicWALL has eaten some of Cisco’s lunch, the demand for Cisco skills remains strong. Adding Cisco Certified Network Associate (CCNA) expertise to your resume does no harm and helps convince larger organizations, in particular, that you have the knowledge and skills necessary to deploy and troubleshoot Cisco routing and switching hardware.

7: ACTC

Here’s where the debate really begins. Increasingly, my office is being asked to deploy and administer Mac OS X networks. In the real world, divorced from IT-industry rhetoric, we’re being asked to replace older Windows networks with Mac OS X client-server environments. We’re particularly seeing Apple traction within nonprofit environments. We’ve found the best bet is to get up to speed on the technologies clients are requesting, so it stands to reason that earning Apple Certified Technical Coordinator (ACTC) 10.6 accreditation won’t hurt. In fact, developing mastery over Mac OS X Snow Leopard Server will help provide confidence needed to actually begin pursuing Apple projects, instead of reactively responding to client requests to deploy and maintain Apple infrastructure.

8: ACSP

Apple Certified Support Professional (ACSP) 10.6 accreditation helps IT professionals demonstrate expertise supporting Mac OS X client workstations. If you work for a single organization, and that firm doesn’t use Macs, you won’t need this certification. But larger organizations adding Macs due to demand within different departments or consultants working with a wide client base will do well to ensure they have Snow Leopard client skills. The ACSP is the perfect way to prove mastery.

9: CISSP

Unchanged from the last 10 best certifications list, ISC2’s security accreditation for industry professionals with at least five years of full-time experience is internationally recognized for its value and validity. The Certified Information Systems Security Professional (CISSP) title demonstrates expertise with operations and network security, subjects that will only increase in importance as legal compliance, privacy, and risk mitigation continue commanding larger organizations’ attention.

10: PMP

I fear organizations begin cutting project managers first when times get tough. Management roles and responsibilities often get passed to technical staff when layoffs occur. Even in challenging economic times, though, IT departments require staff familiar with planning, scheduling, budgeting, and project management. That’s why the Project Management Institute’s (PMI) Project Management Professional (PMP) accreditation makes the list. The cert measures candidates’ expertise in managing and planning projects, budgeting expenses, and keeping initiatives on track. While there’s an argument to place CompTIA’s Project+ certification in this slot, PMI is a respected organization that exists solely to further professional project management and, as such, deserves the nod.

Honorable mentions: MCSE, ITIL, RHCP, Linux+, VCP, ACE, QuickBooks, Security+

In the previous version of this article, readers asked where NetWare certification stands. It’s not on the list. That’s not a mistake. It’s gone the way of BNC connectors, in my opinion. Microsoft owns the market. MCSEs have more value.

ITIL has its place, particularly in larger environments. RHCP (or Linux+) and VCP have roles within enterprises dependent upon Red Hat/Linux and VMware virtualization technologies certainly, but those organizations remain hit or miss.

Acronis’ ACE deserves a look. With some 3 million systems being backed up now by Acronis image software, it would behoove technology professionals to learn how to properly use the software. I think it’s fair to say there’s still some confusion as to the software’s tremendous potential.

SMBs are also demonstrating a surge of interest in QuickBooks technologies. From QuickBooks Point-of-Sale to QuickBooks Enterprise platforms, there’s strong, growing demand for QuickBooks expertise in the field. The company’s growth is impressive. There’s no other way to describe it. In a crappy economy, Intuit’s growing.

Security+, really, is a no brainer, but I’ll get lit up if I include nothing but CompTIA certifications in the top 10 list. However, my advice for anyone entering the industry or even veterans seeking their first accreditations would be to load up on CompTIA certs. How can you go wrong with the manufacturer-independent certifications that demonstrate mastery of fundamentals across a range of topics, including project management, hardware, networking, security, and voice networks? You could do much worse.

A word on the methodology

There’s no double-blind statistically valid data analysis run through a Bayesian probability calculus formula here. I’ve worked in IT long enough, however, and with enough different SMBs, to know what skills we need when the firm I co-own hires engineers and sends technicians onsite to deploy new systems or troubleshoot issues.

Sure, I could have thrown in ITIL to satisfy enterprise professionals, included RHCP to sate the rabid open source crowd, and added VCP to look hip modernizing the list with a virtualization element. But I’m just not seeing the demand for those skills in companies with up to several hundred employees. My firm’s been asked to deploy exactly one Linux server in almost seven years. And we’ve virtualized maybe a dozen systems. Therefore, I feel it would be a disservice to readers to include such accreditations when I see, on a daily basis, vastly greater demand for these other skill sets.

Erik Eckel is president of two privately held technology consulting companies. He previously served as executive editor at TechRepublic. Read his full bio and profile.

Mark Zuckerberg Killed a Bison

Keeping with his commitment to only eat what he kills, Facebook CEO Mark Zuckerberg shot and killed a bison for food.



Best Microsoft MCTS Training – Microsoft MCITP Training
at Certkingdom.com


Questions about Zuckerberg killing a bison began to surface during his f8 keynote last week. During his presentation, one box on his Timeline profile displayed that he was cooking bison burgers. This naturally raised a question with many audience members: did Zuckerberg kill a bison?

The answer is apparently yes, he did kill a bison. According to Fortune, Zuckerberg recently obtained a hunting license and killed the bison now featured on his Facebook Timeline.

“Yeah, he killed a bison,” one of our sources told us, confirming Fortune‘s report.

Let’s be clear, though: Zuckerberg isn’t killing bison and other animals for sport. He’s doing it in order to be healthier and be responsible about the food he eats. We in the media may make jokes about Zuckerberg killing bison, but the truth is that his new dietary commitment is built on good intentions.

Besides, how many of us can say we’ve killed a bison? I certainly can’t.

September 26, 2011

Facebook to launch iPad app at iPhone 5 event next week (rumor)

Facebook will finally launch its iPad app at Apple’s iPhone 5 event next week, according to a new rumor.

MCTS Certification, MCITP Certification
Best Comptia A+ Training | Comptia A+ Certification 2000+ Exams at Examkingdom.com



Rumor has it Facebook will finally launch its iPad app at Apple’s iPhone 5 launch event on October 4. Facebook will also reportedly release a revamped version of its iPhone app with design and speed improvements similar to the iPad app, according to two sources familiar with the situation cited by Mashable.

This new information follows just hours after we learned Facebook engineer Jeff Verkoeyen quit the company to take a job on Google’s mobile team, which he worked at for a few months in 2007. Verkoeyen said he made the move out of frustration over Facebook’s failure to release its iPad app, which he led development for and says has been feature-complete for five months.

A possible reason for the constant delays is Facebook’s strained relationship with Apple. Facebook did not allow Apple to use Facebook Connect in Ping because Cupertino didn’t give Palo Alto any warning about the feature, which would have cost a lot of bandwidth for Facebook. Facebook was also supposed to be integrated into iOS, but instead Apple went with Twitter in iOS 5.

The relationship between the two technology giants is starting to turn around, however, since they both share a mutual enemy: Google. Facebook doesn’t have a mobile platform and Apple doesn’t have a social network. If this really is true, the Facebook apps for iOS could be just the beginning of much bigger things to come.

The original Apple iPad was released 17 months ago: in April 2010. An iPad version of the Facebook app has been expected since pretty much day one. Facebook is the most popular app on almost every mobile platform, if not all of them. Since there’s no official version for Apple’s tablet, there are countless third-party Facebook iPad apps that are very popular, even though most of them suck.

Apple isn’t to blame here though – Facebook is. While Microsoft develops the Facebook app for Windows Phone, and Research In Motion develops the Facebook app for the BlackBerry OS, the social networking giant develops the dedicated Facebook app for iOS and Android.

In fact, RIM actually beat Facebook to the punch and released the first dedicated tablet app for the social network. If RIM can quickly release a decent Facebook app for its BlackBerry PlayBook, Facebook not doing the same for the Apple iPad is clearly not due to technical reasons.

Earlier this month, Facebook for iOS version 3.5 was released. In the new version, Facebook removed the unofficial iPad version that was discovered inside the app a few months ago.

This led to the latest rumor, which suggested we might finally see the official app at Facebook’s 2011 f8 developer conference. Unfortunately, it didn’t make the cut, again. Now, everyone is looking to next week as the next possible release date.

See also:

Facebook’s iPad app was done in May, developer defects to Google
Facebook acquires interactive iPad book maker Push Pop Press
Is Facebook finally ready to launch an iPad app?
Facebook confirms it now has 350 million mobile users
Rumor: Facebook Credits to work on Apple’s iTunes platform
Facebook’s minor role in the iPad 2

640-816 Exam



QUESTION 1

Which three options can a network administrator utilize by using PPP Layer 2 encapsulation?

(Choose three.)


A. authentication

B. VLAN support

C. compression

D. multilink support


Answer: A,C,D






QUESTION 2

A network administrator is troubleshooting the OSPF configuration of routers R1 and R2. The

routers cannot establish an adjacency relationship on their common Ethernet link. The graphic

shows the output of the show ip ospf interface e0 command for routers R1 and R2. Based on the

information in the graphic, what is the cause of this problem?





A. The hello and dead timers are not configured properly.

B. The OSPF process ID numbers must match.

C. A backup designated router needs to be added to the network

D. The cost on R1 should be set higher.


Answer: A


Explanation:

As can be seen above, the hello interval for R1 has been set to 5 seconds, while it is set to 10 for

R2. Also, the dead interval on R1 is set at 20 seconds while on router CKD2 it is set to 40 seconds.

In order for two routers to establish an OSPF neigh adjacency, the hello and dead timers must

match.





QUESTION 3

Refer to the exhibit. How should the FastEthernet0/1 ports on the 2950 model switches that are

shown in the exhibit be configured to allow connectivity between all devices?





A. The ports only need to be connected by a crossover cable.

B. SwitchX (config)# interface fastethernet 0/1

SwitchX (config-if)# switchport mode access

SwitchX (config-if)# switchport access vlan 1

C. SwitchX (config)# interface fastethernet 0/1

SwitchX (config-if)# switchport mode trunk

SwitchX (config-if)# switchport trunk vlan 1

SwitchX (config-if)# switchport trunk vlan 10

SwitchX (config-if)# switchport trunk vlan 20

D. SwitchX(config)# interface fastethernet 0/1

SwitchX(config-if)# switchport mode trunk


Answer: D






QUESTION 4

Refer to the exhibit. The following commands are executed on interface fa0/1 of 2950Switch.

2950Switch(config-if)# switchport port-security

2950Switch(config-if)# switchport port-security mac-address sticky

2950Switch(config-if)# switchport port-security maximum 1

The Ethernet frame that is shown arrives on interface fa0/1. What two functions will occur when

this frame is received by 2950Switch? (Choose two.)





A. The MAC address table will now have an additional entry of fa0/1 FFFF.FFFF.FFFF.

B. This frame will be discarded when it is received by2950Switch.

C. Only host A will be allowed to transmit frames on fa0/1.

D. All frames arriving on2950Switch with a destination of 0000.00aa.aaaa will be forwarded out

fa0/1.


Answer: C,D


Explanation:

The configuration shown here is an example of port security, specifically port security using sticky

addresses. You can use port security with dynamically learned and static MAC addresses to

restrict a port's ingress traffic by limiting the MAC addresses that are allowed to send traffic into

the port. When you assign secure MAC addresses to a secure port, the port does not forward

ingress traffic that has source addresses outside the group of defined addresses. If you limit the

number of secure MAC addresses to one and assign a single secure MAC address, the device

attached to that port has the full bandwidth of the port.

Port security with sticky MAC addresses provides many of the same benefits as port security with

static MAC addresses, but sticky MAC addresses can be learned dynamically. Port security with

sticky MAC addresses retains dynamically learned MAC addresses during a link-down condition.

If you enter a write memory or copy running- config startup- config command, then port security

with sticky MAC addresses saves dynamically learned MAC addresses in the startup- config file

and the port does not have to learn addresses from ingress traffic after bootup or a restart.

Since the maximum number of MAC addresses has been configured to 1, only host A will be able

to send frames on interface fa 0/1, making choice C correct.






QUESTION 5

A university has a small campus in which 25 faculty members are located. The faculty offices and

student computers are currently on the same network. The faculty are concerned about students

being able to capture packets going across the network and obtain sensitive material. In order to

protect faculty network traffic from student connections ,which action will you take?


A. Remove the student computers from the network and put them on a peer-to-peer network.

B. Put the faculty computers in a separate VLAN.

C. Power down the switches that connect to faculty computers when they are not in use.

D. Install anti-virus software on the student computers.


Answer: B






QUESTION 6

Running both IPv4 and IPv6 on a router simultaneously is known as dual-stack routing.


A. False

B. True


Answer: B






QUESTION 7

You are a network administrator. You configure a workgroup switch with all ports assigned to

VLAN 2. And you configure all ports as full-duplex FastEthernet. What is the effect of adding

switch ports to a new VLAN on this switch?


A. The additions will create more collisions domains.

B. IP address utilization will be more efficient.

C. The possibility that switching loops will occur will increase dramatically.

D. An additional broadcast domain will be created.


Answer: D


Explanation:

A VLAN is a group of hosts with a common set of requirements that communicate as if they were

attached to the same wire, regardless of their physical location. A VLAN has the same attributes

as a physical LAN, but it allows for end stations to be grouped together even if they are not located

on the same LAN segment.

Networks that use the campus-wide or end-to-end VLANs logically segment a switched network

based on the functions of an organization, project teams, or applications rather than on a physical

or geographical basis. For example, all workstations and servers used by a particular workgroup

can be connected to the same VLAN, regardless of their physical network connections or

interaction with other workgroups. Network reconfiguration can be done through software instead

of physically relocating devices.

Cisco recommends the use of local or geographic VLANs that segment the network based on IP

subnets. Each wiring closet switch is on its own VLAN or subnet and traffic between each switch is

routed by the router. The reasons for the Distribution Layer 3 switch and examples of a larger

network using both the campus-wide and local VLAN models will be discussed later.

A VLAN can be thought of as a broadcast domain that exists within a defined set of switches.

Ports on a switch can be grouped into VLANs in order to limit unicast , multicast, and broadcast

traffic flooding. Flooded traffic originating from a particular VLAN is only flooded out ports

belonging to that VLAN, including trunk ports, so a switch that connects to another switch will

normally introduce an additional broadcast domain.






QUESTION 8

Which technology helps prevent frames from looping continuously through this switched network?





A. EIGRP

B. VTP

C. STP

D. ARP


Answer: C






QUESTION 9

What ports on Sw-AC3 are operating as trunks?(Choose three)




Sw-AC3#show int trunk





A. Fa0/1

B. Fa0/9

C. Fa0/12

D. Fa0/3


Answer: B,C,D




QUESTION 10

You are a network administrator. You want to add a line to an access list that will block only Telnet

access by the hosts on subnet 192.168.1.128/28 to the server at 192.168.1.5. To accomplish this

task, what command should be used?


A. access-list 101 denyip 192.168.1.128 0.0.0.15 192.168.1.5 0.0.0.0 eq 23

access-list 101 permit ip any any

B. access-list 1 denytcp 192.168.1.128 0.0.0.15 host 192.168.1.5 eq 23

access-list 1 permit ip any any

C. access-list 1 denytcp 192.168.1.128 0.0.0.255 192.168.1.5 0.0.0.0 eq 21

access-list 1 permit ip any any

D. access-list 101 denytcp 192.168.1.128 0.0.0.15 192.168.1.5 0.0.0.0 eq 23

access-list 101 permit ip any any


Answer: D


Explanation:

Only choice specifies the correct TCT port and wildcard mask, and uses a valid access list
number.



Incorrect Answers:

A: IP is specified as the protocol, when it should be TCP.

B: Access list 1 is used for these choices, which is a standard access list. In this example, an

extended access list is required. Choice C also specifies port 21, which is used by FTP not Telnet.

C: Access list 1 is used for these choices, which is a standard access list. In this example, an

extended access list is required. Choice C also specifies port 21, which is used by FTP not Telnet.






QUESTION 11

Refer to the exhibit. What will be the result of issuing the following commands?

Switch1(config)# interface fastethernet 0/5

Switch1(config-if)# switchport mode access

Switch1(config-if)# switchport access vlan 30





A. The VLAN will not be added to the database, but the VLAN 30 information will be passed on as

a VLAN to theSwitch2 VLAN database.

B. The VLAN will not be added to the database, nor will the VLAN 30 information be passed on as

a VLAN to theSwitch2 VLAN database.

C. The VLAN will be added to the database and VLAN 30 will be passed on as a VLAN to add to

theSwitch2 VLAN database.

D. The VLAN will be added to the database, but the VLAN information will not be passed on to

theSwitch2 VLAN database.


Answer: D


Explanation:

The three VTP modes are described below:

Server: This is the default for all Catalyst switches. You need at least one server in your VTP

domain to propagate VLAN information throughout the domain. The switch must be in server

mode to be able to create, add, or delete VLANs in a VTP domain. You must also change VTP

information in server mode, and any change you make to a switch in server mode will be

advertised to the entire VTP domain.

Client: In client mode, switches receive information from VTP servers; they also send and receive

updates, but they can't make any changes. Plus, none of the ports on a client switch can be added

to a new VLAN before the VTP server notifies the client switch of the new VLAN. Here's a hint: if

you want a switch to become a server, first make it a client so that it receives all the correct VLAN

information, then change it to a server-much easier!

Transparent: Switches in transparent mode don't participate in the VTP domain, but they'll still

forward VTP advertisements through any configured trunk links. These switches can't add and

delete VLANs because they keep their own database-one they do not share with other switches.

Transparent mode is really only considered locally significant.

In our example, the switch is configured for transparent mode. In transparent mode the local

VLAN information can be created but that VLAN information will not be advertised to the other

switch.






QUESTION 12

S0/0 on R1 is configured as a multipoint interface to communicate with R2 and R3 in the hub-andspoke

Frame Relay topology shown in the exhibit. Originally, static routes were configured

between these routers to successfully route traffic between the attached networks. What will need

to be done in order to use RIP v2 in place of the static routes?







A. Change the 172.16.2.0/25 and 172.16.2.128/25subnetworks so that at least two bits are

borrowed from the last octet.

B. Configure the noip subnet-zero command on R1, R2, and R3.

C. Configure the s0/0 interface on R1 as two sub interfaces and configure point-to-point links toR2
and R3.

D. Dynamic routing protocols such as RIP v2 cannot be used across Frame Relay networks.


Answer: C






QUESTION 13

An access list has been designed to prevent HTTP traffic from the Accounting Department from

reaching the HR server attached to the Holyoke router. Which of the following access lists will

accomplish this task when grouped with the e0 interface on the Chicopee router?








A. denytcp 172.16.16.0 0.0.0.255 172.17.17.252 0.0.0.0 eq 80 permit ip any any

B. permitip any any deny tcp 172.16.16.0 0.0.0.255 172.17.17.252 0.0.0.0 eq 80

C. permitip any any deny tcp 172.17.17.252 0.0.0.0 172.16.16.0 0.0.0.255 eq 80

D. denytcp 172.17.17.252 0.0.0.0 172.16.16.0 0.0.0.255 eq 80 permit ip any any


Answer: A






QUESTION 14

Which three benefits are of VLANs? (Choose three.)


A. They can enhance network security.

B. They allow logical grouping of users by function.

C. They simplify switch administration.

D. They increase the number of broadcast domains while decreasing the size of the broadcast

domains.


Answer: A,B,D


Explanation:

VLANs are used to segment a LAN into multiple, smaller LANs. This can be used to enhance

security as local traffic from one VLAN will not be passed to users in other VLANS.






QUESTION 15

A network administrator would configure port security on a switch, why?


A. to prevent unauthorized Telnet from accessing to a switch port

B. to protect the IP and MAC address of the switch and associated ports

C. to prevent unauthorized hosts from accessing the LAN

D. to block unauthorized access to the switch management interfaces over common TCP ports


Answer: C


Explanation:

You can use the port security feature to restrict input to an interface by limiting and identifying

MAC addresses of the stations allowed to access the port. When you assign secure MAC

addresses to a secure port, the port does not forward packets with source addresses outside the

group of defined addresses. If you limit the number of secure MAC addresses to one and assign a

single secure MAC address, the workstation attached to that port is assured the full bandwidth of

the port.

If a port is configured as a secure port and the maximum number of secure MAC addresses is

reached, when the MAC address of a station attempting to access the port is different from any of

the identified secure MAC addresses, a security violation occurs. Also, if a station with a secure

MAC address configured or learned on one secure port attempts to access another secure port, a

violation is flagged.

Reference:

http://www.cisco.com/en/US/products/hw/switches/ps628/products_configuration_guide_chapter09186a00800d6a38.html#86378





September 23, 2011

70-640 Exam

QUESTION 1
You work as the network administrator at ABC.com. The ABC.com network has a domain named
ABC.com. All servers on the ABC.com network run Windows Server 2008.
Only one Active-Directory integrated zone has been configured in the ABC.com domain. ABC.com
has requested that you configure DNS zone to automatically remove DNS records that are
outdated.
What action should you consider?

A. You should consider running the netsh /Reset DNS command from the Command prompt.
B. You should consider enabling Scavenging in the DNS zone properties page.
C. You should consider reducing the TTL of the SOA record in the DNS zone properties page.
D. You should consider disabling updates in the DNS zone properties page.

Answer: B

Explanation: In the scenario you should enable scavenging through the zone properties because
scavenging removes the outdated DNS records from the DNS zone automatically. You should
additionally note that patience would be required when enabling scavenging as there are some
safety valves built into scavenging which takes long to pop.

Reference: http://www.gilham.org/Blog/Lists/Posts/Post.aspx?List=aab85845-88d2-4091-8088-
a6bbce0a4304&ID=211


Best Microsoft MCTS Training – Microsoft MCITP Training
at Certkingdom.com



QUESTION 2
You work as the network administrator at ABC.com. The ABC.com network has a domain named
ABC.com. All servers on the ABC.com network run Windows Server 2008.
The ABC.com network has a server named ABC-SR15. You install the Active Directory
Lightweight Directory Services (AD LDS) on ABC-SR15.
Which of the following options can be used for the creation of new Organizational Units (OU’s) in
the application directory partition of the AD LDS?

A. You should run the net start command on ABC-SR15.
B. You should open the ADSI Edit Microsoft Management Console on ABC-SR15.
C. You should run the repadmin /dsaguid command on ABC-SR15.
D. You should open the Active Directory Users and Computers Console on ABC-SR15.

Answer: B

Explanation: You need to use the ADSI Edit snap-in to create new OUs in the AD LDS
application directory partition. You also need to add the snap-in in the Microsoft Management
Console (MMC).


QUESTION 3
You work as the network administrator at ABC.com. The ABC.com network has a domain named
ABC.com. All servers on the ABC.com network run Windows Server 2008.
The ABC.com network has two domain controllers ABC-DC01 and ABC-DC02. ABC-DC01 suffers
a catastrophic failure but it is causing problems because it was configured to have Schema Master
Operations role. You log on to the ABC.com domain as a domain administrator but your attempts
to transfer the Schema Master Operations role to ABC-DC02 are unsuccessful.
What action should you take to transfer the Schema Master Operations role to ABC-DC02?

A. Your best option would be to have the dcpromo /adv command executed on ABC-DC02.
B. Your best option would be to have the Schema Master role seized to ABC-DC02.
C. Your best option would be to have Schmmgmt.dll registered on ABC-DC02.
D. Your best option would be to add your user account to the Schema Administrators group.

Answer: B

Explanation: To ensure that ABC-DC02 holds the Schema Master role you need to seize the
Schema Master role on ABC-DC02. Seizing the schema master role is a drastic step that should
be considered only if the current operations master will never be available again. So to transfer the
schema master operations role, you have to seize it on ABC-DC02.
Reference: http://technet2.microsoft.com/windowsserver/en/library/d4301a14-dd18-4b3c-a3ccec9a773f7ffb1033.
mspx?mfr=true


QUESTION 4
You work as the network administrator at ABC.com. The ABC.com network has a single forest.
The forest functional level is set at Windows Server 2008.
The ABC.com network has a Microsoft SQL Server 2005 database server named ABC-DB04 that
hosts the Active Directory Rights Management Service (AD RMS).
You try to access the Active Directory Rights Management Services administration website but
received an error message stating:
“SQL Server does not exist or access is denied.”
How can you access the AD RMS administration website?

A. You need to restart the Internet Information Server (IIS) service and the MSSQLSVC service on
ABC-DB04.
B. You need to install the Active Directory Lightweight Directory Services (AD LDS) on ABC-DB04.
C. You need to reinstall the AD RMS instance on ABC-DB04.
D. You need to reinstall the SQL Server 2005 instance on ABC-DB04.
E. You need to run the DCPRO command on ABC-SR04

Answer: A

Explanation: You need to restart the internet information server (IIS) to correct the problem. The
starting of the MSSQULSVC service will allow you to access the database from AD RMS
administration website.


QUESTION 5
You work as an enterprise administrator at ABC.com. The ABC.com network has a domain named
ABC.com. The ABC.com network has a Windows Server 2008 computer named ABC-SR03 that
functions as an Enterprise Root certificate authority (CA).
A new ABC.com security policy requires that revoked certificate information should be available for
examination at all times.
What action should you take adhere to the new policy?

A. This can be accomplished by having a list of trusted certificate authorities published to the
ABC.com domain.
B. This can be accomplished by having the Online Certificate Status Protocol (OCSP) responder
implemented.
C. This can be accomplished by having the OCSP Response Signing certificate imported.
D. This can be accomplished by having the Startup Type of the Certificate Propagation service set
to Automatic.
E. This can be accomplished by having the computer account of ABC-SR03 added to the
PGCertificates group.

Answer: B

Explanation: You should use the network load balancing and publish an OCSP responder. This
will ensure that the revoked certificate information will be available at all times. You do not need to
download the entire CRL to check for revocation of a certificate; the OCSP is an online responder
that can receive a request to check for revocation of a certificate. This will also speed up certificate
revocation checking as well as reducing network bandwidth tremendously.


QUESTION 6
You work as the network administrator at ABC.com. The ABC.com network has a domain named
ABC.com. All servers on the ABC.com network run Windows Server 2008.
You are responsible for managing two servers ABC-SR01 and ABC-SR02. They are setup with
the following configuration.
ABC-SR01 running Enterprise Root certificate authority (CA)
ABC-SR02 running Online Responder role service
Which of the steps must you perform for configuring the Online Responder to be supported on
ABC-SR01?

A. You should enable the Dual Certificate List extension on ABC-SR01.
B. You should ensure that ABC-SR01 is a member of the CertPublishers group.
C. You should import the OCSP Response Signing certificate to ABC-SR01.
D. You should enable the Authority Information Access (AIA) extension on ABC-SR01.
E. You should run the CERTSRV command on ABC-SR01.

Answer: D

Explanation: In order to configure the online responder role service on ABC-SR01 you need to
configure the AIA extension. The authority information access extension will indicate how to
access CA information and services for the issuer of the certificate in which the extension appears.
Information and services may include on-line validation services and CA policy data. This
extension may be included in subject or CA certificates, and it MUST be non-critical


QUESTION 7
You work as the network administrator at ABC.com. The ABC.com network has a domain named
ABC.com. All servers on the ABC.com network run Windows Server 2008 and all client computers
run Windows Vista.
The ABC.com network has a client computer named ABC-WS640 that was last used six months
ago. During the course of the day you attempt to log on to ABC-WS640 but you are unable to
authenticate during the logon process.
What action should you consider in order to log on to ABC-WS640?

A. You should consider opening the command prompt on ABC-WS640 and running the netsh set
machine command.
B. You should consider opening the command prompt on ABC-WS640 and running the repadmin
command.
C. You should consider removing ABC-WS640 from the domain and then rejoining it.
D. You should consider deleting the computer account for ABC-WS640 in Active Directory Users
and Computers, and then recreate the computer account.

Answer: C

Explanation: In the scenario you should have the computer disjoined from the domain and
rejoined to the domain whilst having the computer account reset as well. You should additionally
note that the long inactivity caused the computer to stop responding to the authentication query
using the Active Directory records. You should note by disjoining and rejoining with the account
being reset would refresh the computer account passwords.


QUESTION 8
You work as an enterprise administrator at ABC.com. The ABC.com network has a forest with a
domain named ABC.com.
The ABC.com network has a Windows Server 2008 domain controller named ABC-DC01 that
hosts the Directory Services Recovery Mode (DSRM) role.
What would be the best option to take to have the DSRM password reset?

A. The best option is to open the Active Directory Security for Computers snap-in.
B. The best option is to run the ntdsutil command.
C. The best option is to run the Netsh command.
D. The best option is to open the Domain Controller security snap-in.

Answer: B

Explanation: You should use the ntdsutil utility to reset the DSRM password. You can use
Ntdsutil.exe to reset this password for the server on which you are working, or for another domain
controller in the domain. Type ntdsutil and at the ntdsutil command prompt, type set dsrm
password.
Reference: http://support.microsoft.com/kb/322672


QUESTION 9
You work as an enterprise administrator at ABC.com. The ABC.com network has a domain named
ABC.com. All servers on the ABC.com network run Windows Server 2008. ABC.com has two
offices Chicago and Dallas.
The network has the following setup.
Chicago Office – Domain Controller named ABC-DC01
Dallas Office – Read-Only Domain Controller named ABC-DC02
How can you make sure that Dallas Office users use only ABC-DC02 for authentication?

A. You should consider having ABC-DC02 configured as a bridehead server in the Dallas office.
B. You should consider installing and configuring the Password Replication Policy on ABC-DC02.
C. You should consider having ABC-DC01 configured as a bridehead server in the Chicago office.
D. You should consider installing and configuring the Password Replication Policy on ABC-DC01.
E. You should consider having the Global Catalog installed on ABC-DC01.

Answer: B

Explanation: You should use the Password Replication Policy on the RODC. This will allow the
users at the Dallas office to log on to the domain with RODC. RODCs don’t cache any user or
machine passwords.


QUESTION 10
You work as the network administrator at ABC.com. The ABC.com network has a domain named
intl.ABC.com. All servers on the ABC.com network run Windows Server 2008. The domain
controllers on the ABC.com domain are configured to function as DNS servers.
What action should you take to ensure that computers that are not part of the intl.ABC.com
domain are not able to dynamically register their DNS registration information in the intl.ABC.com zone?

A. You should consider removing the .(root) zone from the intl.ABC.com zone.
B. You should consider running the dnscmd /AgeAllRecords command.
C. You should consider configuring Secure Only dynamic updates.
D. You should consider configuring the intl.ABC.com zone as an Active Directory integrated zone.

Answer: C

Explanation: In order to ensure that only domain members are able to register their DNS records
dynamically you need to set the option Secure only for Dynamic updates. This will only allow the
domain members to register their DNS records dynamically.
Reference:
www.microsoft.com/technet/prodtechnol/windows2000serv/reskit/cnet/cncf_imp_afpf.mspx



Best Microsoft MCTS Training – Microsoft MCITP Training
at Certkingdom.com

September 22, 2011

Adobe adding security, privacy goodies to Flash Player 11

Adobe’s new Flash Player 11 will include support for 64-bit exploit migitation and support for SSL socket connections.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


Battling to cope with the hacker bullseye on its back, Adobe plans to add new security and privacy features to the next iteration of its ubiquitous Flash Player, including support for SSL socket connections and the introduction of 64-bit ASLR (Address Space Layout Randomization).

Adobe said the new Flash Player 11, expected in early October, will include the SSL socket connection support to make it easier for developers to protect the data they stream over the Flash Player raw socket connections.

[ Adobe to rush out Flash Player patch to thwart zero-day attacks ]

Flash Player 11 will also include a secure random number generator.follow Ryan Naraine on twitter

Adobe’s Platform Security Strategist Peleus Uhley explains:

Flash Player previously provided a basic, random number generator through Math.random. This was good enough for games and other lighter-weight use cases, but it didn’t meet the complete cryptographic standards for random number generation. The new random number generator API hooks the cryptographic provider of the host device, such as the CryptGenRandom function in Microsoft CAPI on Windows, for generating the random number. The native OS cryptographic providers have better sources of entropy and have been peer reviewed by industry experts.

[ Adobe admits to 80 'code changes' in Flash Player patch ]

The company is also adding 64-bit support in Flash Player 11, a move that Uhley says will bring some security side-benefits.

If you are using a 64-bit browser that supports address space layout randomization (ASLR) in conjunction with the 64-bit version of Flash Player, you will be protected by 64-bit ASLR. Traditional 32-bit ASLR only has a small number of bits available in the memory address for randomizing locations. Memory addresses based on 64-bit registers have a wider range of free bits for randomization, increasing the effectiveness of ASLR.

On the privacy side, Adobe is adding a private browsing mode to allow users to stay incognito while viewing Flash files. A mobile control panel is also being added to Android devices to easier for users to manage their Flash Player privacy settings on their Android devices.

September 19, 2011

Architect certification increasingly impacts professionalization of IT in the cloud era

The primary driver here that we’re hearing from members and customers is that they need to get more out of the investments that they’re making — their payroll for their IT staff. They need to get more productivity. And that has a number of consequences.

Best CCNA Training and CCNA Certification and more Cisco exams log in to Certkingdom.com



We’ve assembled a panel in conjunction with the recent Open Group Conference in Austin, Texas, to explore the impact and role of certifications for IT professionals. Examine here how certification for enterprise architects, business architects, and such industry initiatives as ArchiMate are proving instrumental as IT organizations seek to reinvent themselves.

There are now a lot of shifts in skills and a lot of movement about how organizations should properly staff themselves. There have been cost pressures and certification issues for regulation and the adoption of new technologies. We’re going to look at how all these are impacting the role of certification out in the field.

Here to help better understand how an organization like The Open Group is alleviating the impact and supporting the importance of finding verified IT skills is Steve Philp, Marketing Director for Professional Certification at The Open Group; Andrew Josey, Director of Standards at The Open Group, and James de Raeve, Vice President of Certification at The Open Group. The discussion is moderated by Dana Gardner, Principal Analyst at Interarbor Solutions. [Disclosure: The Open Group is a Sponsor of BriefingsDirect podcasts.]

Here are some excerpts:

de Raeve: The primary driver here that we’re hearing from members and customers is that they need to get more out of the investments that they’re making — their payroll for their IT staff. They need to get more productivity. And that has a number of consequences.

Realizing talent

They want to ensure that the people they are employing and that they’re staffing their teams with are effective. They want to be sure that they’re not bringing in external experts when they don’t need to. So there is a need to realize the talent that they’ve actually got in their internal IT community and to develop that talent, nurture it, and exploit it for the benefit of the organization.

And professionalism, professionalization, and profession frameworks are all tools that can be used in identifying, measuring, and developing the talents and capabilities of your people. That seems to be the major driver.

Philp: Something I have noticed since joining The Open Group is that we’ve got some skills and experience-based certifications. They seem to be the things that people are particularly interested in, because it’s not just a test of your knowledge about a particular vendor or product, but how you have applied your skills and experience out there in the marketplace. They have proven to be very successful in helping people assess where they are and in working towards developing a career path.

That’s one of the areas of certification that things are going to move more towards — more skills and experience-based certification programs in organizations.

Looking at certification in general, you still have areas like Microsoft MCSE, Microsoft technical specialist, application development, and project management that are in demand, and things like CCNA from Cisco. But I’ve also noticed a lot more in the security field. CISSP and CCSA seem to be the ones that are always getting a lot of attention. In terms of security, the trends in mobile computing, cloud computing, means that security certification is a big growth area.

We’re just about to put a security track into our Certified IT Specialist Program at The Open Group, so there will be a skills and experience-based track for security practitioners soon.

de Raeve: There is a whole world out there of technology and product-related certifications that are fulfilling a very important function in helping people establish and demonstrate their knowledge of those particular products and technologies.

But there is a need for people too in the building of teams and in the delivering of results to nurture and grow their people to be team players and team participants and to be able to work with them to function within the organization as, for want of a better term, “t-shaped people,” where there are a number of soft and people-related skills and potentially architecture related skills for the IT specialists, and skills and capabilities enable people to be rounded professionals within an organization.

T-shaped people

It’s that aspect that differentiates the professionalization and the profession-oriented certification programs that we’re operating here at The Open Group — The Open Certified Architect, The Open Certified IT Specialist. Those are t-shaped people and we think that makes a huge difference. It’s what’s going to enable organizations to be more effective by developing their people to have that more rounded t-shaped capability.

Josey: We see the certification as being the ultimate drive in the uptake of the standards, and so we’re able to go from not just having a standard on the shelf to actually seeing it being deployed in the field and used. We’ve actually got some people certification programs, such as TOGAF, and we’ve got some over 20,000 practitioners now.

We’ve gone through the certification program and we’ve been using and evangelizing, TOGAF as a standard in the field and then feeding that back to our members and, through the association, the feedback improvements to the standards. So it’s very much part of the end-to-end ecosystem — developing a standard for deploying it, and getting people on it, and then getting the feedback in the right way.

Philp: It’s very much an important part of the process now. TOGAF and IT Architect Certification (ITAC) have appeared in a number of RFPs for government and for major manufacturing organizations. So it’s important that the suppliers and the buyers recognize these programs.

Similarly with recruitment, you find that things like TOGAF will appear in most recruitment ads for architects. Certainly, people want knowledge of it, but more and more you’ll see TOGAF certification is required as well.

ITAC, which is now Open CA, has also appeared in a number of recruitment ads for members like Logica, Capgemini, Shell. More recently, organizations like the CBS, EADS, ADGA Group, Direct Energy have requested it. And the list goes on. It’s a measure of how important the awareness is for these certifications and that’s something we will continue to drive at The Open Group.

In development

Josey: ArchiMate certification is something new that we’re developing right now. We haven’t deployed a certification program as yet. The previous certification program was under the ArchiMate Foundation, which was the body that developed ArchiMate, before it transferred into The Open Group.

We’re currently working on the new program which will be similar to some aspects of our TOGAF program, and it’ll be knowledge base certification with an assessment by exam and a practical assessment in which the candidate can actually do modeling. So this will be people certification and there will also be accredited training course certification.

And then also what we’re going to do there is actually to provide certification for tools. There will be certifications there.

That’s pretty much what we’re doing in ArchiMate, so we don’t have a firm timeline. So it will not be available it looks like, probably towards the end of the year would be the earliest, but possibly early next year.

ArchiMate is a modeling language for enterprise architecture (EA) in general and specifically it’s a good fit for TOGAF. It’s a way of communicating and developing models for TOGAF EA. Originally it was developed by the Telematica Instituut and funded, I think, by the EU and a number of commercial companies in the Netherlands. It was actually brought into The Open Group in 2008 by the ArchiMate Foundation and is now managed by the ArchiMate Forum within The Open Group.

The latest version of TOGAF is TOGAF 9 for certification. As we mentioned earlier, there are two types of certification programs, skills and knowledge based. TOGAF falls into the knowledge based camp. We have two levels. TOGAF 9 Foundation, which is our level one, is for individuals to assess that they know the terminology and basic concepts of EA in TOGAF.

Level two, which is a superset of level one, in addition assesses analysis and comprehension. The idea is that some people who are interested in just getting familiar with TOGAF and those people who work around enterprise architects can go into TOGAF Foundation. And these enterprise architects themselves should initially start with the TOGAF Certified, the level two, and then perhaps move on later to Open CA. That will be helpful.

For TOGAF 9 Certification, we introduced that by midyear 2009. We launched TOGAF 9 in February, and it took a couple of months to just roll out all these certifications through all the exam channels.

Since then, we’ve gone through 8,000 certifications. We’ve seen that two-thirds of those were at the higher level, level two, for EA practitioners and one-third of those are currently at the foundation level.

A new area

Philp: Business architecture is a new area that we’ve been working on. Let me just to go back to what we did on the branding, because it ties in with that. We launched The Open Group’s new website recently and we used that as the opportunity to re-brand ITAC as The Open Group Certified Architect (Open CA) program. The IT Specialist Certification (ITSC) has now become The Open Group Certified IT Specialist or Open CITS Program.

We did the rebranding at that time, because we wanted to be it associated with the word “open.” We wanted to give the skills and experience-based certification a closer linkage to The Open Group. That’s why we changed from ITAC to Open CA. But, we’ve not changed the actual program itself. Candidates still have to create a certification package and be interviewed by three board members, and there are still three levels of certification: Certified, Master, and Distinguished.

However, what we’re intending to do is have some core requirements that architects need to meet, and then add some specific specializations for different types of architects. The one that we’ve been working on the most recently is the Business Architecture Certification. This came about from an initiative about 18 months ago.

We formed something called the Business Forum with a number of platinum members who got involved with it –companies like IBM, HP, SAP, Oracle and Capgemini. We’ve been defining the conformance requirements for the business architecture certification. It’s going through the development process and hopefully will be launched sometime later this year or early next year.

de Raeve: There’s a very good example [of the importance of staffing issues in IT] …, and they’ve done a presentation about this in one of our conferences. It’s Philips, and they used to have an IT workforce that was divided among the business units. The different businesses had their own IT function.

They changed that and went to a single IT function across the organization, providing services to the businesses. In doing so, they needed to rationalize things like grades, titles, job descriptions, and they were looking around for a framework within which they could do this and they evaluated a number of them.

They were working with a partner who wass helping them do this. The partner was an Open Group member and suggested they look at the Open Group’s IT Specialist Certification, the CITS Certification Program, as it provides a set of definitions for the capabilities and skills required for IT professionals. They picked it up and used it, because it covered the areas they were interested in.

This was sufficient and complete enough to be useful to them, and it was vendor neutral, and an industry best practice. So they could pick this up and use it with confidence. And that has been very successful. They initially benchmarked their entire 900 strong IT workforce against The Open Group definition, so they could get to calibrate themselves, where their people were on their journey through development as professionals.

They’ve started to embrace the certification programs as a method of not only measuring their people, but also rewarding them. It’s had a very significant impact in terms of not only enabling them to get a handle upon their people, but also in terms of their employee engagement. In the engagement surveys that they do with their staff, some of the comments they got back after they started doing this process were, “For the first time we feel like management is paying attention to us.”

It was very positive feedback, and the net result is that they are well on their way to meeting their goal of no longer having automatically to bring in an external service provider whenever they were dealing with a new project or a new topic. They know that they’ve got people with sufficient expertise in-house on their own payroll now. They’ve been able to recognize that capability, and the use of it has had a very positive effect. So it’s a very strong good story.

I think that the slides will be available to our members in the conference’s proceedings from the London conference in April. That will be worth something to look at.

Philp: If you go to the Open Group website, www.opengroup.org/certifications, all of the people based certifications are there, along with the benefits for individuals, benefits for organizations and various links to the appropriate literature. There’s also a lot of other useful things, like self-assessment tests, previous webinars, sample packages, etc. That will give you more of an idea of what’s required for certification along with the conformance requirements and other program documentation.

Ballmer: Windows 8 will be 'dawning' for Microsoft slates

Also, Windows 7 shifts 400m licences
Microsoft CEO Steve Ballmer says that the Windows 8 operating system will bring about a new dawn for PCs and Windows-powered tablets 70-640 Training .


Best Microsoft MCTS Training – Microsoft MCITP Training
at Certkingdom.com


Speaking at the Microsoft Worldwide Partner Conference (WPC) in Los Angeles, the big man also revealed that Windows 7 has become the fastest selling OS of all time.

He said: “Windows 8 really does represent a true re-imagining of Windows PCs and the dawning of Windows slates.”

Windows CFO Tami Reller added: “We see a future with a heterogeneous enterprise environment of Windows 8 devices and apps alongside Windows 7 PCs and apps.

“At the heart of our ability to deliver Windows 8 is the flexibility Windows has consistently shown; its ability to adapt over time is what ensures Windows will continue to be highly relevant in the future.”

The next Windows 8 announcement will come at Microsoft’s BUILD conference in September this year.

Windows 7 record

Ballmer and Reller were speaking as Microsoft announced that it has sold a whopping 400m Windows 7 licenses, making it the fastest selling OS ever.

The record comes less than two years after Microsoft launched the Windows 7 OS in October 2009, and represents an astonishing comeback for the company following the disaster that was Windows Vista.

On its first birthday in October 2010, Microsoft revealed that 240m licenses had been sold, and that number has continued to rise proportionately by reaching the 400m mark Microsoft Free MCTS Training and MCTS Online Training.

September 17, 2011

Microsoft in the black after posting strong results

Exceeds expectations but there may be trouble ahead

Microsoft has posted its quarterly financial report, revealing that it made record revenues of $17.4 billion (£10.6 billion) in the three months ending in June 70-640 Training.

The strong results are largely thanks to robust Office and Xbox sales, with profits for the company up by 4 per cent to $6.2 billion (£3.8 billion).


Best Microsoft MCTS Training – Microsoft MCITP Training
at Certkingdom.com

There was particularly good news from the Xbox and Windows Phone wielding entertainment and devices division, which made nearly $32 million in profit – a far rosier picture than a year ago when it posted massive losses of $172 million.

Party hats all round?

While the champagne corks may be popping at Redmond for now, there could be a bumpy road ahead; the seemingly healthy entertainment and devices department is actually in its second quarter of decline.

Meanwhile, Microsoft’s shares have also fallen over fears that demand for the Windows operating system and associated software is low.

Although the worldwide PC market has grown by nearly 2%, the Windows division’s revenues are down by 1% compared to the same time last year – however, with Windows 8 just around the corner, the situation could be reversed within a year.

Another problem area for Microsoft seems to be the online services department, which includes search engine Bing and all its cloud-based products, where it made a big loss Microsoft Free MCTS Training and MCTS Online Training.

Comparisons to the once-underdog Apple are inevitable; Jobs and co posted net profits of $7.31 billion (£4.53 billion) for the same quarter; not only is that higher than Microsoft’s record report, but Apple’s revenues were a 125 per cent improvement, while Microsoft’s are up only 8 per cent.

September 14, 2011

The top 10 geek sins that will get your geek card revoked

Here are 10 of the worst transgressions for any geek. Doing any one of these will put your geek credentials at risk. Do two of them and your geek card immediately gets revoked.

TechRepublic has previously talked about some of the things you can do to increase your geek cred. Naturally, there are also some things that can hurt your geek cred. In fact, we’ve put together a list of 10 of the worst transgressions for any geek. Doing any one of these will put your geek credentials at risk. Do two of them and your geek card immediately gets revoked.

MCTS Certification, MCITP Certification
Cisco CCNA Training, Cisco CCNA Certification 2000+ Exams at Examkingdom.com





10. Admitting that you like iTunes

Sure, it’s convenient for buying music and media in one place and syncing it to an iPod or iPhone, but iTunes has a draconian DRM system (still in place for media), makes it difficult to manage your library on multiple systems, and it started out as one of the worst pieces of bloatware ever built. And, it hasn’t gotten much better.

9. Not knowing the difference between binary and hexadecimal

Binary is the basis of all computing and is simply composed of zeros and ones. Hexadecimal is a 16-digit numeric system — based on numbers 0-9 and letters A-F — that represents binary in a more friendly way. Know the difference.

8. Not knowing what MMORPG stands for

Even if you don’t play games (or rarely play) you should know that an MMORPG is a “massively multiplayer online role-playing game,” also known as the alternate reality for geeks. The biggest one is World of Warcraft (WoW), a cultural phenomenon with over 12 million subscribers.

7. Loving your cable or telecom company

Geeks built the Internet. Geeks live on the Internet. Geeks love the Internet. However, the companies that bring us the Internet to our homes and offices — the telecoms and cable companies — are doing everything they can to wall it off, manipulate it for their own financial gain, and stop geeks from using it so much. For as long as they do that, they will remain at war with the geekosphere.

6. Not knowing the name of the book that Blade Runner was based on

Blade Runner is one of the greatest sci-fi movies of all time. If you’re a true geek, you’ve seen it multiple times. But, not only that, you also know that it’s based on Philip K. Dick’s “Do Androids Dream of Electric Sheep?” which is one of the best-titled stories in all of literature and an absolute classic in science fiction.

5. Confusing Star Wars and Star Trek

If someone mentions a Wookie and a Klingon and you’re not sure which one was part of the Star Wars universe and which one belongs to the Star Trek milieu, you are definitely not a geek.

4. Believing the “free” in open source refers to price

Repeat after me, “Open source does not mean it doesn’t cost anything.” Sure, some open source software is freely available to download at no cost. But, that’s not a requirement of open source. There is plenty of open source software that requires a fee. When open source talks about “free” software, they are referring to “free” as in “freedom.” It is freedom from overreaching licensing agreements. You’ll also hear this concept referred to as “Gratis verses Libre.”

3. Defending Facebook for its privacy transgressions

Look, Facebook is lucky the entire geekosphere hasn’t dropped it like a bad habit after all of the crap they’ve pulled in changing and violating their own lackluster privacy policies. Leo Laporte nearly led a geek revolt out of Facebook in May 2010. The only thing that prevented it was lack of a viable alternative.

2. Taking something into Geek Squad to get fixed

Best Buy’s Geek Squad has a few legitimate geeks on staff; however, too many of their technicians are completely clueless and can do more harm than good to your equipment. Besides, if you’re geek, just geek-up, open up the case, and fix it yourself. (Exception: It’s acceptable to go to the Geek Squad counter to exchange a DOA device that is still under warranty. Just don’t let us catch you asking for advice.)

1. Buying a paper computer book at Barnes & Noble

In 1999, if you wanted to quickly learn more about HTML or Exchange 5.5 or Apache or how to earn CCNA certification, you’d typically make a quick trip to your nearest book superstore like Barnes & Noble or Borders and comb through the huge selection of computer books. However, this is 2010. Any computer book you find at a bookstore is at least six months out of date. Almost everything you need to know is available on the web for free or in ebook format that you can quickly download to your laptop or tablet. Buying a dead-tree tome about a new technology is an immediate tip-off that your geek credentials are in question.

September 13, 2011

How to Get Mysql Certification?

Just about every job and occupation requires some sort of education and training. This is becuase you will need thte knowlege and hands on training to do the job and adequately. Whether an individual wants to become a physician, attorney, engineer, accountant or computer programmer, they will need to complete an education and training regimen in order to get into the occupation and begin a career in the field 70-640 Training .




Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com


When it comes to the computer and information technology field, there are quite a few certifications that make job applicants more marketable in this field. One of the certifications that helps people get an edge in the technology field is MYSQL certification.

MYSQL is a form of database managment software program that is very vital to most organizations. The MYSQL databases are very and highly specialized so getting certification is of untmost importance. The certification grants people in certain categories such as associate, developer and DBA.
In order to get certified you need to first determine what level you want to be in. This is either associate or developer. The associate level requires passage of only one exam and the developer and DBA require passage of two exams. In the next step to becoming certified it is very helpful to take a practice test in order to determine what parts you need to study more and master.

This is great for an initial assesment and to see what the test willl be like. In the third step, you need to register for the exam through Person Vue which is an exam administrator. The administrator collects fees and provides test material. It is best to select a time and place that is most convenient for you.

When preparing for the exam, it is beneficial to ask your employer if they will reimburse you for the testing fees and costs. If they do then make sure you qualify for reimbursement. While preparing for the exam form a study group to get additional feedback and have others help you understand the material. When taking the exam make sure you answer all of the questions because an incomplete question will be marked wrong. Also review your answers too Microsoft Free MCTS Training and MCTS Online Training.

The process of getting MYSQL certified can be a challenging process but with the proper steps you can be on your way to gaining more skills and therefore make yourself more marketable to employers to advance your career.

September 10, 2011

Apple tops smartphone competitors in customer satisfaction

Apple continues to dominate in the smartphone market, especially thanks to customer satisfaction according to a new report.

Apple has yet another piece of news to be happy about. The Cupertino, Calif.-based company has once again garnered the top spot among smartphone manufacturers in when it comes to customer satisfaction, according to the latest survey from J.D. Power and Associates.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


This is Apple’s sixth consecutive win in the J.D. Power and Associates survey.

The 2011 U.S. Wireless Smartphone Customer Satisfaction Study—Volume 2 comprises responses from 6,898 smartphone owners fielded between January and June 2011.

Key factors for measuring smartphone satisfaction were performance, ease of operation, features and physical design.

Based on a 1,000-point scale, Apple scored 838, while HTC came in a close second with a score of 801. The divide was even closer between Samsung and Motorola, which scored 777 and 775 respectively.

However, Samsung still did quite well for itself in the feature phone category by claiming the top spot with a score of 718. LG, Sanyo, and Sony Ericsson all came in behind by incredibly close numbers at 717, 716 and 709 respectively.

Strikingly, the survey found that customers who own 4G-capable devices are happy with them for the most part. Maybe the rapid speed and performance really does outweigh poor battery life concerns?

That would appear to be the case as satisfaction among customers using 4G-capable phones averaged 819, compared with 786 among customers using 3G phones.

Another survey from London-based brand valuation consultancy firm Brand Finance named Apple as the second most valuable brand on the planet after its value rose by 33 percent — overtaking Microsoft for the first time.

Related:

September 9, 2011

Cisco, Plantronics team on SMB communications bundle

First joint solution in a new program from Plantronics pairs a Cisco IP phone with a unified communications-capable headset.

Plantronics is trying to build up its credentials with SMB customers through a series of technology alliances. One of the relationships within that program, an alliance with networking and unified communications company Cisco, has resulted in a joint solution from the two companies.

MCTS Certification, MCITP Certification
Cisco CCNA Training, Cisco CCNA Certification 2000+ Exams at Examkingdom.com



The bundled solution includes a Cisco SPA525G2 five-line IP phone with a Plantronics Voyager PRO UC Bluetooth headset. The headset can be used with IP softphone applications and it supports multidevice connectivity. What that means is this: if you are on your mobile phone, you arrive at your office and you want to switch the call over to the “office” phone, you should be able to do that. Alternatively, you should be able to wear a single headset that lets you take incoming calls from either a mobile phone, a computer or an IP phone that supports Bluetooth connections. That’s useful for those trying to pare down the gadgets in their life.

The bundle is so new that I wasn’t able to find pricing on it yet. However, the suggested pricing for the headset alone is just under $200 and this phone lists for about $550 on the CDW online site.

Based on my past experience with “bundled” solutions that have a specific market focus — people tend to feel boxed in by them — I need some proof that smaller companies really want this approach. But I appreciate the fact that Cisco is realizing that hands-free talking will be an important component of unified communications and collaboration solutions.

Google+ Tips: 4 Tools to Boost Your Social Networking Experience

Getting the hang of Google+ and looking for more? Check out these four Google+ tools that let you easily upload photos in bulk, find new people to follow, translate posts and more.

CIO — While rumors continue to swirl about when the Google+ API will be released to developers, that's not stopping some people from getting in on the Google+ action.




Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com


Whether you're just starting out on Google+ or consider yourself an advanced user, more and more Google+ enhancements and add-ons are popping up across the Web.

Here's a look at four new ones that do everything from streamlining bulk photo-uploading to helping you increase your network reach.

1. Google+ Photo Importer for iPhone
If you store your photos on multiple sites such as Facebook, Flickr, Instagram or Photobucket, there's a new download available in the Apple App Store that lets you upload 100 photos in less than a minute to your Google+ account. This tool is especially handy if you plan on shifting your social networking focus to Google+.

The Google Plus Photo Importer by Dropico costs 99 cents, and while uploads I tested generally took longer than the advertised 60 seconds, it was still impressively fast.

10 Google+ tips for Beginners
Google+ Privacy: 5 Settings You Need to Know

2. Find People on Google+
Looking for more connections on Google+? While its own search feature only lets you find people by name, you can dig a bit deeper to find groups of people with certain characteristics at FindPeopleOnPlus.

Here, you can not only search for people by name, but you can also search by profession, location, relationship status, gender, education, employer, occupation and more, which makes growing your network and tailoring it to your needs a lot easier.

You can also choose to add yourself to its directory. This will keep your FindPeopleOnPlus profile updated and in-synch with your Google+ profile.

3. PlusClout
Akin to Klout.com, a site that measures your social media influence, PlusClout measures the influence a user has on Google+ and rates it from 0 to 100.

When you visit the site, PlusClout will ask you to insert your Google+ ID in order to generate your score. Your ID is the string of numbers that appear in the URL of your profile page.

PlusClout says that while its formula is still evolving, right now it calculates your number based on 15 million public Google+ profiles and items shared, such as posts, comments, +1s, the number of followers you have and the frequency and volume of information sharing.

You can also browse people with the highest PlusClout in categories such as bloggers, designers, entrepreneurs and the most-followed users on Google+. Click on any of these names and you will see their current PlusClout score, a graph of their score over the last five days, and websites associated with that person.
4. Google Translate for Google+

If you want to connect with people from around the world but find that language is a barrier, this is a must-download Google Chrome extension.

Google Translate for Google+ is a powerful tool that inserts a button into your Google+ streams, letting you quickly interpret a chunk of foreign text.

September 8, 2011

Cloud computing employed at one-third of small and medium businesses: study

Survey confirms that small businesses are the most natural place for public cloud adoption.

When talking about public cloud and Software as a Service, the most natural market is small to medium-size businesses. (Defined as companies with fewer than 500 employees). Larger organizations are more likely to have bigger IT departments, and many of their own resources.



Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com




Sure enough, a new survey finds that cloud adoption among SMBs is pretty fast and furious.

Nearly one-third of small to medium-size businesses have adopted cloud computing technology, with medium-sized businesses (42%) showing the highest utilization, a new study from the CompTIA industry trade group finds. Another 35% of all SMBs plan to use the cloud in some form in the next year.

Presumably, they’re talking about accessing public cloud solutions from third party suppliers.

The CompTIA survey found that storage and backup solutions are the most heavily used cloud applications, with 71% of SMBs using the cloud in this way. Email (62%), document management (59%), collaboration (56%) and customer relationship management (53%) are other popular options.

Among SMBs now using cloud computing, 92% of firms say their experience has been “positive or very positive”; and 97% report that their move to the cloud “has produced the desired result, with cost and flexibility most frequently cited as the benefits of a cloud solution.”

In addition, seven out of ten of the SMBs surveyed said they expect to increase their technology spending over the next 12 months, and one-third of the companies surveyed expect to increase their IT budget by 10 percent or more.

Intel Joins the Windows 8 Developer Push

IDF takes place at the same time as BUILD, and the Wintel alliance (for now) is linking arms to reach out to developers Microsoft 70-640 Training .”.

If you’re going to Intel’s Developer Forum next week and want to know what’s up with Windows 8, good news: you don’t have to jet down to Anaheim, Microsoft has got you covered at IDF, too.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


As we all know, the Microsoft BUILD conference takes place next week in Anaheim, California (just across the street from Disneyland). BUILD is a rollup of PDC and WinHEC, so it’s the show for developers to attend. At the same time, Intel is hosting the Intel Developer Forum (IDF) in San Francisco.

This may present a quandary for some people, but thankfully, Microsoft and Intel are coordinating this rather well. For those of you attending IDF, you can get yourself at least some info on Windows 8. As for a beta, well, we still don’t know if one will come out at BUILD (although I’d be shocked if it didn’t happen). The most likely scenario is that you can register to get the beta while at IDF.

The information comes courtesy of Intel’s IDF site, which lists a few notable sessions involving Microsoft (click on the Technical Session Catalog and search for Microsoft). The biggest one comes on Wednesday, where Microsoft will deliver a session on Windows 8 called “Microsoft Windows 8 on Intel Architecture.” This session will be the look at Windows 8 and discuss “the work both companies are undertaking to deliver this new compute experience.”

Most of the sessions are reserved for Thursday, the last day of IDF. I’ve seen how attendance falls off on day 3 of IDF and question whether that’s a good idea, but maybe it was all they had Microsoft Free MCTS Training and MCTS Online Training.

The two companies will host a session called “Hot Topic Q&A: Intel and Microsoft – Windows 8.” Microsoft will have three representatives, Intel will have two engineers.

Another session on Thursday will be “Microsoft Windows Platform Evolution and UEFI Requirements.” UEFI stands for Unified Extensible Firmware Interface and will finally replace the creaky old BIOS firmware that has been in PCs for more than 30 years. The session will talk about the latest Windows 8 platform requirements including UEFI boot and security features.

The final session on Thursday will be “Integrating Intel Platform Capabilities on Microsoft Windows Security Architecture.” Intel will detail improvements in the Windows security architecture and how Intel hardware will work with the next-generation of Windows.

Sure sounds like a beta is coming, doesn’t it?
Bookmark and Share