Friday, December 25, 2015

Tech's greatest wins and most epic comebacks of 2015

Drawing the battle lines
While 2014’s greatest tech achievements were largely about steady iteration to existing products, this year’s highlights bring a greater sense of urgency. It seems every company in tech has suddenly awoken to the rapid expansion the next few years will bring, and is now trying to mark as much territory as possible. Here are the best, most successful examples of how that shook out in 2015.

Microsoft's Surface Book nails the high-end laptop
PC makers were understandably miffed when Microsoft announced the Surface Book. While the company’s previous Surfaces were aimed more at the tablet market, the Surface Book was a direct assault on the laptop establishment, with a proper keyboard base, optional discrete graphics, and a detachable tablet display. Although Microsoft’s hardware has suffered some problems out of the gate, in the long run it’s likely to snap the PC makers out of their daze and compel them to try a little harder.

Net neutrality prevails at the FCC
Around the middle of last year, the Federal Communications Commission seemed to have little interest in ensuring a level playing field on the Internet. Rather than attempt tough regulations, the agency backed the idea of “fast lanes,” in which Internet companies could pay a toll to providers like Comcast for preferential treatment. Maybe it was the consumer outcry, but the FCC eventually reversed its stance, and in February decided that Internet providers should be treated like utilities, with no paid prioritization allowed. The classification is still subject to lawsuits and congressional attacks, but has already made an impact as ISPs avoid policies that would run afoul of the rules.

Nvidia stuffs a desktop GPU into a laptop
Gaming laptops have always been about compromise, but Nvidia is looking to change that with the GeForce GTX 980, the first laptop graphics card that truly mirrors the performance of its desktop counterpart. Of course, GTX 980 laptops are still going to be hulking, expensive monstrosities, but the achievement is still a major milestone for serious gaming on the go.

USB-C paves the way for hassle-free connections
For too long, the simple act of plugging a USB cable into a phone or PC was needlessly frustrating, as the connector had a near-magical tendency to face the wrong way on the first attempt. Relief is coming with USB-C, a fully-reversible cable that can also transfer more power—enough to charge a full-blown laptop—and drive external displays. Some laptops and phones started supporting the standard in 2015, paving the way for widespread adoption next year.

Cutting cable TV gets a lot easier
2015 was a huge year for cord-cutting, as the TV industry scrambled to make up for a declining cable subscriber base through online video. Premium networks HBO and Showtime both launched standalone streaming services, Dish Network launched the first “skinny bundle” of streaming cable channels with Sling TV, and Hulu finally launched an ad-free version. Streaming hardware also got a competitive boost with new devices from Roku, Apple, Amazon, and Google. Ditching cable TV still isn’t for everyone, but it’s becoming less of a challenge as the bloated bundle crumbles.

Apple establishes the smartwatch market
Officially, Apple doesn’t disclose sales figures for the Apple Watch, but a recent third-party estimate put sales at 7 million after six months, while traditional watches have seen their biggest year-over-year drop since 2008. The Apple Watch is far from perfect, and remains a barely detectable blip in Apple’s earnings, but it’s already managed to get on consumers’ radars in a way that

Fitbit doesn't sweat the smartwatch threat
Before the Apple Watch actually launched, pundits predicted that it would wipe out the dedicated fitness tracker market. But Fitbit is doing better than ever, with 4.8 million sales last quarter, and 168 percent year-over-year revenue growth. Although smartwatches could still prevail in the long run, plenty of people see more value in a cheaper device that’s laser-focused on personal health.

Facebook rules the planet
Three years after Facebook logged 1 billion active monthly users, the social network behemoth set another record with 1 billion logins in a day, and 1.5 billion monthly active users. One out of every seven people on earth sign in every day, and that doesn’t even count Facebook-owned services like Instagram and Whatsapp. People have been insisting that Facebook has lost its cool for years now, but the numbers show that users are more hooked than ever.

The mid-range phone gets great
Now’s a fine time to buy a phone if you don’t want to spend upwards of $650 off-contract.

Between the Nexus 5X ($379), Nexus 6P ($499), OnePlus 2 ($389), Moto X Pure Edition ($400, pictured), and Alcatel OneTouch Idol 3 ($250), buyers have more options than ever for solid, unlocked Android phones. And now that U.S. carriers offer cheaper service with unsubsidized handsets, buying one of these phones actually makes sense.

Driverless cars get real
While Google’s self-driving cars get all the attention—and hit a milestone with the first custom prototypes hitting public roads this year—the launch of Tesla’s Autopilot feature (pictured) was just as significant. The feature allows Model X SUVs and newer Model S sedans to steer, brake, and accelerate by themselves on highways, alerting drivers only when human intervention becomes necessary.

We’re still a long way from fully autonomous cars—even Autopilot suggests eyes on the road—but 2015 brought some major steps forward.

Friday, December 11, 2015

70-697 Practice Test - Windows 10 Devices in 2016

Welcome to the free practice test for 70-697 - Configuring Windows Devices. This simulated multiple-choice test was handwritten for the benefit of other IT professionals including engineers, helpdesk and managers. It contains 15 random questions selected from a wide range of Windows 10 topics - all relevant to the 70-697 subject material.

The questions will help to compliment your study material, providing the opportunity to test what you’ve learnt and improve your chance of passing the exam first time. Remember, if you enjoy the questions and answers then please share this page with friends and work colleagues.

Background
The 70-697 Specialist exam was introduced in 2015 for the Windows 10 MCSE certification path. Unlike exams from the Windows 8 series which tended to focus on a core principle the 70-697 exam covers a wider range of topics.

Candidates should bear this in mind when studying for the exam as it will test your experience across a wider spectrum of subjects including cloud based Intune management, virtualization and apps.

Topics you need to know
The exam is an even split between each of the following high level topics:
Windows Store and cloud apps
Desktop and device deployment
Intune device management
Networking
Storage
Data access and protection
Remote access
Updates and Recovery

● Exam 70-697 Configuring Windows Devices is near completion, and should soon be available. Passing this exam will confer a Microsoft Specialist certification, and it serves as the “recommended prerequisite” for the MCSE: Enterprise Devices and Apps certification (in lieu of exams 70-687 Configuring Windows 8.1 and 70-688 Supporting Windows 8.1). - See more at: http://www.certkingdom.com/Exam-70-697.php

You should be comfortable answering questions around the Windows Store and cloud apps, with an understanding of Microsoft Office 365 and the inner workings of Intune for sideloading apps to devices.

Several authentication mechanisms are available in Windows 10; certificates, Microsoft Passport, virtual smartcards, picture password, biometrics etc. You should be comfortable answering questions for each of these authentication types and any corresponding authorisation processes.

Many of the classic Windows configuration questions reappear, such as profiles and roaming with a focus on virtualization (Hyper-V) and mobile options such as Windows To Go and Wi-Fi Direct.

Networking and storage have their own subject areas which focus on classic networking principles such as name resolution and network adapters. On the storage side expect BitLocker to make an appearance in addition to classic questions on NTFS and data recovery.

Buzz Topics
Intune - provides mobile device management, mobile application management, and PC management capabilities from the cloud.
Hyper-V - software infrastructure and basic management tools that you can use to create and manage a virtualized computing environment.
BitLocker - a full disk encryption feature designed to protect data by providing encryption for entire volumes.
Windows To Go - boot and run from USB mass storage devices such as USB flash drives and external hard disk drives

Azure RemoteApp - brings the functionality of the on-premises Microsoft RemoteApp program, backed by Remote Desktop Services, to Azure. Azure RemoteApp helps you provide secure, remote access to applications from many different user devices.

Important
After reading this article, if your preparing for career change and looking for MCITP Online Training Certkingdom.com is the best online training provider that provide the all the and complete MCITP certification exams training in just one package, certkingdom self study training kits, save your money on bootcamps, training institutes, It’s also save your traveling and time. All training materials are “Guaranteed” to pass your exams and get you certified on the fist attempt, due to best training CertKingdom become no1 site.

Monday, November 30, 2015

Exam 77-419 Microsoft SharePoint 2013

Exam 77-419 Microsoft SharePoint 2013

Published: June 28, 2014
Languages: English
Audiences: Information workers
Technology: Microsoft Office 2013 suites
Credit toward certification: MOS

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

Create and format content (25–30%)
Navigate the SharePoint hierarchy
Use Quick Launch, use All Site Content, use breadcrumb trails, add content to Quick Launch, use Content and Structure for navigation
Manage lists and libraries
Create lists or libraries, edit properties for new items, enable email notifications on lists or libraries, provide shortcuts to a mobile site URL, manage document templates, manage list views, create alerts on lists or libraries, use ratings, add columns, add content validation, manage column properties
Manage list items
Create new list items, edit content, delete list items or documents, version list items, publish assets, manage existing workflows, upload documents, create and manage announcements, collaborate with Microsoft Office assets (calendars, spreadsheets, web apps)
Manage document sets
Add documents to document sets, create document sets, activate and deactivate document sets

Preparation resources
Manage lists and libraries with many items
Introduction to document sets

Manage SharePoint sites (30–35%)
Manage pages
Create new site pages, use templates, edit and delete existing site pages
Perform administrative tasks on sites and workspaces
Create new sites or workspaces using templates, configure site or workspace structures, configure the Content Organizer, display a list of all user alerts, modify Look and Feel, recover assets (lists, libraries, documents, list items), use document and meeting workspaces, view site web analytics, view detailed reports
Manage Web Parts on a page
Add Web Parts, configure Web Parts, hide or remove Web Parts, export or import Web Parts
Manage content types
Associate content types to lists, extend the columns of content types, create custom content types
Manage users and groups
Create groups, manage groups, manage user access, manage group permissions

Preparation resources
How to: Create a page layout in SharePoint 2013
Configure and deploy Web Parts in SharePoint 2013
Determine permission levels and groups in SharePoint 2013

Participate in user communities (15–20%)
Configure My Site
Add keywords, add colleagues, select themes, configure the Colleague Tracker Web Part, configure RSS feeds, configure My Profile
Collaborate through My Site
Update profile status, share pictures in My Site, manage personal documents, share documents in My Site, browse the organization hierarchy, add Web Parts to My Site
Add tags and notes to content
Add notes to the Note Board for lists or libraries, add tags for lists or libraries, rate items, use tag clouds, review tags on My Site

Preparation resources
Configure My Sites in SharePoint Server 2013
Social and collaboration features in SharePoint 2013

Configure and consume site search results (15–20%)
Perform search administration at the site level
Configure searchable columns, configure list searches, configure site search visibility
View search results
Browse search results, use Best Bet results, use the Refinement Panel, use alerts and RSS feeds with search results, preview documents
Perform advanced searches
Use Boolean operators in searches, use wild cards in searches, use property searches, use phonetic searches, use People Search, use advanced searches

Preparation resources
Manage the search schema in SharePoint Server 2013
Search in SharePoint Server 2013
Plan to transform queries and order results in SharePoint 2013

Who should take this exam?
Candidates for the Microsoft SharePoint 2013 exam should have a sound understanding of the SharePoint environment and the ability to perform all site-level tasks. They should know and demonstrate the correct application of the principle site, library, and list features of SharePoint 2013. Candidates should be able to optimize and customize SharePoint sites to provide structure, solve problems, facilitate collaboration, and enhance productivity. Examples of application include managing list permissions, adding content to Quick Launch, creating team sites, and modifying library views. Candidate roles might include technical support staff, project managers, team leads, department heads, and others.

Monday, November 23, 2015

74-409 Server Virtualization with Windows Server Hyper-V and System Center


QUESTION 1
Your role as Network Administrator at ABC.com includes the management of the company’s
virtual infrastructure.
A Windows Server 2012 R2 server named ABC-HV1 runs the Hyper-V role and hosts virtual
machines for users in the Finance department.
You need to configure a new virtual machine (VM) to host a new Finance application named App1.
You create a new VM named ABC-App1VM on ABC-HV1. You configure ABC-App1VM with two
virtual network adapters.
You need to configure the VM to ensure that the App1 remains available to Finance users in the
event of a failure of one of the virtual network adapters.
Which of the following PowerShell cmdlets should you run to configure the VM?

A. Add-VMNetworkAdapter
B. Set-VMNetworkAdapter
C. Enable-VMMigration
D. Enable-VMSwitchExtension
E. Set-VMNetworkAdapterVlan

Answer: B

Explanation:


QUESTION 2
You work as a network administrator at ABC.com. The network consists of a single Windows
Server 2012 Active Directory Domain Services (AD DS) domain.
The network includes a virtual infrastructure that includes host servers running Microsoft Hyper-V
2012 R2.
A virtual machine (VM) named ABC-AppVM1 runs an application used by users in the company’s
production department. The VM has a data partition that hosts a large database for the
application.
You need to install an application update on ABC-AppVM1. You need to ensure that you can
restore ABC-AppVM1 to its previous state in the event of a problem with the update.
Which of the following solutions would enable you to restore the VM to its previous state while
minimizing the disk space used on ABC-AppVM1?

A. You should export the VM before applying the update.
B. You should run the Copy-VMFile PowerShell cmdlet before applying the update.
C. You should configure VM replication before applying the update.
D. You should create a checkpoint of the VM before applying the update.

Answer: D

Explanation:


QUESTION 3
Your role as Network Administrator at ABC.com includes the management of the company’s
virtual infrastructure.
The virtual infrastructure consists of 100 virtual machines (VMs) running on Windows Server 2012
R2 Hyper-V host servers. Some Hyper-V host servers have locally attached storage and some
Hyper-V host servers connect to a Fiber Channel SAN.
Some VMs are Generation 1 VMs and some are Generation 2 VMs. The VMs run either Windows
Server 2008 R2 or Windows Server 2012 R2. The virtual hard disks are a mix of VHD format or
VHDX format.
You need to ensure that all VMs support online virtual hard disk resizing.
How can you ensure that all VMs support online virtual hard disk resizing?

A. By upgrading all Windows Server 2008 R2 VMs to Windows Server 2012 R2.
B. By converting all VHD format disks to VHDX format disks.
C. By converting all Generation 1 VMs to Generation 2 VMs.
D. By connecting all Hyper-V host servers that have locally attached storage to the Fiber Channel
SAN.

Answer: B

Explanation:


QUESTION 4
Your role as Network Administrator at ABC.com includes the management of the company’s
virtual infrastructure.
The physical network contains two switches named Switch1 and Switch2.
You are configuring a new Windows Server 2012 R2 server named ABC-HV10 as a Hyper-V host
server.
ABC-HV10 has four physical network adapters named NIC1, NIC2, NIC3 and NIC4. You connect
NIC1 and NIC2 to Switch1 and NIC3 and NIC4 to Switch2.
ABC-HV10 will host a virtual machine (VM) named ABC-AppVM1. The VM will run a custom lineof-
business (LOB) application named CorpApp1.
You need to ensure that CorpApp1 remains available to users in the event of a failure of one of the
physical network adapters on ABC-HV10 or a failure of one of the network switches.
You also want to increase the network bandwidth available to the VM without modifying the
configuration of the network switches.
Which two of the following actions should you perform to configure ABC-HV10 before creating the
VM? (Choose two).

A. Configure NIC1 and NIC2 as a NIC team.
B. Configure NIC1 and NIC3 as a NIC team.
C. Configure the NIC team to use Static Teaming (Switch Dependent) mode.
D. Configure the NIC team to use LACP (Switch Dependent) mode.
E. Configure the NIC team to use Switch Independent mode.

Answer: B,E

Explanation:


QUESTION 5
You work as a network administrator at ABC.com. The network consists of a single Windows
Server 2012 Active Directory Domain Services (AD DS) domain.
The company has a Development department. You want to configure four virtual machines (VMs)
to be used by users in the Development department for testing applications.
Two of the VMs will run Windows Server 2012 R2 and the other two will run Windows Server 2008 R2.
You install a new Windows Server 2012 R2 Hyper-V server named ABC-DevHV1 to host the VMs
for the Development department. ABC-DevHV1 has locally attached disk storage with a limited capacity.
You need to maximize the disk performance of the VMs.
What should you do?

A. You should configure dynamically expanding virtual disks for all four VMs.
B. You should configure pass-through virtual disks for all four VMs.
C. You should configure fixed virtual disks for all four VMs.
D. You should configure dynamically expanding virtual disks for the Windows Server 2008 R2 VMs
and fixed virtual disks for the Windows Server 2012 R2 VMs.
E. You should configure differencing disks for all four VMs.

Answer: C

Explanation:

Tuesday, November 10, 2015

98-361 Software Development Fundamentals


QUESTION 1
You are employed as a developer at ABC.com. You make use of C# and ASP.NET for
development purposes.
You have been asked to create a new program for ABC.com. Prior to creating the new program,
you plan to create an algorithm to fully comprehend how the processes of the program must run.
The algorithm will list the required actions for completing a process in the appropriate sequence.
You are informed that your method for creating the algorithm should be as simple, and clear as
possible.
What option should you use?

A. You should consider making use of the flowchart method.
B. You should consider making use of the pivotchart method.
C. You should consider making use of the data table method.
D. You should consider making use of the XML method.

Answer: A

Explanation:


QUESTION 2
You are employed as a developer at ABC.com. You are creating a .NET Framework application.
You have been instructed to make sure that you make use of Common Intermediate Language
(CLI) for programming the application.
What options are TRUE with regards to CLI? (Choose all that apply.)

A. CIL is the highest-level human-readable programming language defined by the Common
Language Infrastructure specification.
B. CIL is the highest-level human-readable programming language defined by the Common
Language Infrastructure specification.
C. CIL is an object-oriented assembly language, and is entirely stack-based.
D. CIL is an object-oriented assembly language, but is not stack-based.

Answer: A,C

Explanation:


QUESTION 3
You are employed as a developer at ABC.com. You make use of Visual Basic .Net for
development purposes.
You have written the code shown below for declaring an array of a new application:
Dim myArray as String = { apples, pears, plums, grapes, oranges, bananas}
You want to return the third item in your array.
What code would you employ?

A. myArray[1]
B. myArray[2]
C. myArray[3]
D. myArray[4]
E. myArray[5]
F. myArray[6]

Answer: B

Explanation:


QUESTION 4
You are employed as a developer at ABC.com. You are in the process of creating code for a
method that does not retrieve a value for the calling code.
You want to make sure that this is reflected when declaring the method.
What option should you use?

A. You should consider making use of the void keyword in the method declaration.
B. You should consider making use of the sealed C# statement in the method declaration.
C. You should consider making use of the internal C# statement in the method declaration.
D. You should consider making use of the public C# statement in the method declaration.
E. You should consider making use of the protected C# statement in the method declaration.

Answer: A

Explanation:


QUESTION 5
You are employed as a developer at ABC.com. You make use of C# and ASP.NET for
development purposes.
You have received instructions to create a new program for ABC.com using C#. You are informed
that the new program should allow for intricate multi-way branching. Furthermore, the code used
must not be difficult to make sense of.
What is the option you should use?

A. You should consider making use of the foreach C# statement.
B. You should consider making use of the while C# statement.
C. You should consider making use of the protected C# statement.
D. You should consider making use of the switch C# statement.

Answer: D

Explanation:




Monday, October 19, 2015

70-336 Core Solutions of Microsoft Lync Server 2013


QUESTION 1
When Web conferencing with users from a partner company the users must be able to download
the Web conference content.
How would you enable this?

A. By configuring a Conferencing Policy.
B. By configuring a Group Policy Object.
C. By modifying the meeting configuration.
D. By configuring a Client Policy.

Answer: A

Explanation:


QUESTION 2
When Web conferencing with users from a partner company the users must be able to record the
Web conference.
How would you enable this?

A. By configuring a Conferencing Policy.
B. By configuring a Group Policy Object.
C. By modifying the meeting configuration.
D. By configuring a Client Policy.

Answer: C

Explanation:


QUESTION 3
You need to troubleshoot the error message received by the test users. The Centralized Logging
Service (CLS) is running with its default settings.
You plan to use ClsController.exe to help you use the logs to troubleshoot the issue.
In which order should you run the commands?

A. ClsController – start, ClsController – flush, ClsController – search, ClsController –stop.
B. ClsController – start, ClsController – stop, ClsController – flush, ClsController –search.
C. ClsController – flush, ClsController – start, ClsController – stop, ClsController –search.
D. ClsController – search, ClsController – flush, ClsController – start, ClsController –stop.

Answer: B

Explanation:


QUESTION 4
You need to request a certificate for the additional Front End Server.
Which of the following should you use as the common name in the certificate?

A. lyncfe2.westbridgeind.com
B. webext.westbridgeind.com
C. fepool1.westbridgeind.com
D. lyncfe1.westbridgeind.com
E. lyncdiscover.westbridgeind.com

Answer: C

Explanation:


QUESTION 5
You need to resolve the audio streaming problems reported for conferences between users in the
New York and Atlanta offices.
Which of the following solutions would resolve the issue?

A. A Lync Server Location Policy.
B. Separate Active Directory Sites for each office.
C. A faster WAN link between the offices.
D. A domain controller in the Atlanta office.

Answer: C

Explanation:


Monday, September 28, 2015

Facebook goes down and Twitter lights up

Social network crashes during lunch break; users turn to Twitter to vent

Facebook crashed for at least 10 minutes today and then struggled to fully come back online.

When users tried to open or refresh their Facebook pages a little after 12:30 p.m. ET today, they were greeted not with their news feed but with a largely blank screen that simply said, "Sorry, something went wrong. We're working on it and we'll get it fixed as soon as we can."

The site began to come back online around 12:50 p.m., though some users reported still having trouble loading the site until about 1 p.m.
MORE ON NETWORK WORLD: 26 crazy and scary things the TSA has found on travelers

Facebook did not return a request for information on what caused the problem.

The web site Downrightnow.com reported that Facebook, the world's largest social network, with 1.49 billion monthly active users, was likely suffering a service disruption.

Frustrated users quickly turned to Twitter to complain about the crash, during what would be lunch break time on the East Coast.

At least Little Caesars was quick to take advantage of the situation, tweeting, "With #facebookdown, make sure to KEEP CALM & STAY CHEESY and then step out and grab a $5 HOT-AND-READY LUNCH COMBO. ;-)"

And others just took the opportunity to have fun with it.

"Is everybody ok? Did something happen? Are the zombies attacking? I'm scared!!! #facebookdown," tweeted @MootePoints.

And UK Banter tweeted, "How am I meant to judge the people I went to school with now? #FacebookDown."

Wednesday, September 23, 2015

The six pillars of Next Generation Endpoint Protection

Taken together, these core functions can detect the most advanced attack methods at every stage of their lifecycle

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach

Advancements in attack evasion techniques are making new threats extremely difficult to detect. The recent Duqu 2.0 malware, which was used to hack the Iranian nuclear pact discussions, Kaspersky Lab, and an ICS/SCADA hardware vendor, is a prime example. To keep up, a new security model that uses a different approach to the traditional “evidence of compromise” process is needed.

This Next Generation Endpoint Protection (NGEPP) model needs to address six core pillars that, when taken together, can detect the most advanced attack methods at every stage of their lifecycle:

* Prevention. NGEPP must leverage proven techniques to stop known threats in-the-wild. A layer of preemptive protection can block existing threats before they can execute on endpoints. Instead of relying only on one vendor’s intelligence, it’s now possible to collectively tap more than 40 reputation services via cloud services to proactively block threats. This approach also uses a lightweight method to index files for passive scanning or selective scanning, instead of performing resource-intensive system scans.

* Dynamic Exploit Detection. Using exploits to take advantage of code level vulnerabilities is a sophisticated technique used by attackers to breach systems and execute malware. Drive-by downloads are a common threat vector for carrying out exploit attacks. NGEPP should provide anti-exploit capabilities to protect against both application and memory-based attacks. This should be achieved by detecting the actual techniques used by exploit attacks -- for example: heap spraying, stack pivots, ROP attacks and memory permission modifications -- not by using methods that are dependent on static measures, like shellcode scanning. This approach is much more reliable, since the exploitation techniques themselves are not as easy to change or modify as the shellcode, encoder, dropper and payload components used in malware.

* Dynamic Malware Detection. Detecting and blocking zero-day and targeted attacks is a core NGEPP requirement. This involves real-time monitoring and analysis of application and process behavior based on low-level instrumentation of OS activities and operations, including memory, disk, registry, network and more. Since many attacks hook into system processes and benign applications to mask their activity, the ability to inspect execution and assemble its true execution context is key. To protect against a variety of attacks and scenarios this detection capability is most effective when performed on the device. For example, even if an endpoint is offline, it can be protected against USB stick attacks.

While many vendors now offer endpoint visibility, which is a leap forward, it cannot detect zero day attacks which do not exhibit any static indicators of compromise. Dynamic behavioral analysis that does not rely on prior knowledge of a specific indicator to detect an attack, is required when dealing with true zero threats.

* Mitigation. Detecting threats is necessary, but insufficient. The ability to perform mitigation must be an integral part of NGEPP. Mitigation options should be policy-based and flexible enough to cover a wide range of use cases, such as quarantining a file, killing a specific process, disconnecting the infected machine from the network, or even completely shutting it down. In addition, mitigation should be automated and timely. Quick mitigation during inception stages of the malware lifecycle will minimize damage and speed remediation.

* Remediation. During execution malware often creates, modifies, or deletes system file and registry settings and changes configuration settings. These changes, or remnants that are left behind, can cause system malfunction or instability. NGEPP must be able to restore an endpoint to its pre-malware, trusted state, while logging what changed and what was successfully remediated.

* Forensics. Since no security technology will ever be 100% effective, the ability to provide real-time endpoint forensics and visibility is a must for NGEPP. Clear and timely visibility into malicious activity that has taken place on endpoints across an organization is essential to quickly assess the scope of an attack and take appropriate responses. This requires a clear, real time audit trail of what happened on an endpoint during an attack and the ability to search for indicators of compromise across all endpoints.

To completely replace the protection capabilities of existing legacy, static-based endpoint protection technologies, NGEEP needs to be able to stand on its own to secure endpoints against both legacy and advanced threats throughout various stages of the malware lifecycle. The six pillars described above provide the 360 degrees of protection required for the Cloud generation, where the endpoint has become the new security perimeter.


Tuesday, September 1, 2015

Millennials will move, take less money for IT jobs

A new survey suggests millennials seeking IT jobs are willing to accept less money and relocate in exchange for positions they're passionate about, but they also aren't afraid to quickly move on if they are dissatisfied with current employers.

Millennials who want to work in IT say they would consider accepting less money and relocating if they find jobs they are passionate about, according to a new Progressive Insurance survey of 1,000 U.S. millennials interested in IT positions. The report, conducted by Wakefield Research, found that 30 percent of the millennial respondents are "very likely," and 51 percent are "somewhat likely," to accept smaller salaries in exchange for work they feel strongly about.

"It's clear from the survey that millennials in IT are more interested in a job that allows them the flexibility to be creative and experimental rather than one that simply offers good compensation," says Lynley Williams, recruiting director at Progressive Insurance.

More than half (58 percent) of the respondents said they would rather have jobs with more flexible arrangements, such as the option to work remotely, than higher pay. Many of the respondents are also willing to relocate for a new position; 26 percent said they would move as far as 25 miles away for a new job, 20 percent would move 26 to 99 miles, 18 percent would move 100 to 499 miles, and 19 percent would move more than 500 miles away. However, 18 percent of millennials said they are not willing to move for a job.

For some respondents, interest in the IT field comes from a lack of growth opportunities at their current companies. The survey found that 42 percent "agreed somewhat" and 29 percent "agreed strongly" that the prospects of growth at their employers were not up to par. Williams says this dissatisfaction should be a warning sign to hiring managers. "The most important finding for IT executives who are doing the hiring is that this generation is not afraid to move on from their current job if they aren't happy," she says. "They know they have options."
Generation Y strikes fast and furiously

When millennials are ready to find new jobs, they'll do so quickly and actively, according to the report. Nearly half (47 percent) check job boards five or more times a week, and 41 percent would consider applying for another position after only two to six months at a new job. The most popular places to look for jobs include online job boards and company websites (54 percent), online IT or coding communities (53 percent), personal connections (50 percent) and social media (46 percent), such as LinkedIn. Millennials also aren't doing all of the work themselves; 52 percent say they receive five or more messages from recruiters each week.

In terms of the specific IT jobs in demand, respondents were most attracted to large, regulated industries, such as finance and banking (61 percent), healthcare (47 percent) and insurance (42 percent).

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Friday, August 21, 2015

Office 365 tops Salesforce as most popular enterprise service

A new report from Okta shows businesses picking up Microsoft's office suite

Microsoft's Office 365 has passed Salesforce.com as the most popular service among companies that use Okta's device and identity management products, according to a new report released Thursday.

From November 2013 to June 2015, Microsoft went from being the fourth most popular service to passing Google Apps, Box and recently Salesforce.com to become the most-used app among the more than 2,500 companies that rely on Okta's services. Those businesses range from large enterprises like Intel to smaller firms with fewer than 250 people.

Unsurprisingly, 74 percent of large businesses with more than 4,000 employees run only Office 365, while just 50 percent of businesses with fewer than 250 employees subscribe only to Microsoft's office suite. It's most popular in the U.S., Canada and Western Europe.
Office 365 vs. Google Apps
Okta

Percentage of businesses using Office 365 vs. Google Apps

The massive adoption of Microsoft's new Office services has been driven by companies that want to use Exchange Online, according to Okta Chief Product Officer Eric Berg.

"I would say my street knowledge tells me that predominantly people are buying Office 365 for hosted Exchange," he said.

In addition, Berg said that Microsoft has an advantage over other services like Google Apps because they don't have to retrain employees who are already familiar with using Office for tasks like sending and receiving email through Outlook.

He went on to say that businesses implementing Office 365 will likely be rolling it out to many more users than something like Salesforce, since it includes applications and services like email that are applicable to most if not all of the users in an enterprise compared to something like Salesforce that's tailored for one part of the organization.

While Office 365 is ascendant, those gains didn't translate into user growth for Yammer, the enterprise social networking service that Microsoft bundles with many editions of its office suite. That service's user growth flatlined over the past few months, even as other applications exploded in popularity.

Berg, a former director of product management at Microsoft, said that the company has added Yammer as a feature of many of its Office 365 plans to encourage adoption.

"I think what you see happening here in the data is that Yammer, as an entity, as a product, as a business has lost a lot of focus independently in pushing [itself]," Berg said. "And what they've been focused on is integrating into Office 365, and their bet is just as that hockey stick curve is going up on Office 365, that's at least going to get everybody who buys that exposure to Yammer. Whether or not they actually use it, that's another question."

While Yammer isn't showing massive gains, its quasi-competitor Slack has seen major adoption among Okta's users, with its customer base growing 50 percent between April 2015 and June 2015 alone. Customers who want to use Okta's tools with Slack have to pay for the service, to boot -- there could be an even larger population of companies out there who are choosing to just use its free tier and not integrate it with Okta.

Overall, Berg said that the potential for new companies to come in and release a product that takes the business world by storm depends on what market they plan on entering. The enterprise collaboration world is still open to new entrants, but it's going to be more difficult for other companies to shake Microsoft's dominance with Office 365.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Monday, August 17, 2015

Top 10 technology schools

Interested in going to one of the best colleges or universities to study technology? Here are the top 10 schools known for their computer science and engineering programs.

Top technology schools
Every year, Money releases its rankings of every college and university in the U.S., and not surprisingly, a number of those top schools are leaders in the tech space. Here are the top 10 technology schools, according to Money's most recent survey of the best colleges in America.

Stanford University
First on the list for not only technology colleges, but all colleges, Stanford University has an impressive 96 percent graduation rate. The average price for a degree is $178,731 and students earn, on average, $64,400 per year upon graduation. Stanford's global engineering program allows its 4,850 students to travel around the globe while studying engineering. There are nine departments in the engineering program: aeronautics and astronautics, bioengineering, chemical engineering, civil and environmental engineering, computer science, electrical engineering, management science and engineering, materials science and engineering, and mechanical engineering.

Massachusetts Institute of Technology
The Massachusetts Institute of Technology, located in Cambridge, Mass., is the second best technology school in the country, with a 93 percent graduation rate. The average net price of a degree comes in at a $166,855, but students can expect an average starting salary of $72,500 per year after graduating. As one of the top engineering schools, it's ranked number 1 for chemical, aerospace/aeronautical, computer and electrical engineering. The top employers for the 57 percent of graduates that enter the workforce immediately include companies like Google, Amazon, Goldman Sachs and ExxonMobil. Another 32 percent of students, however, go on to pursue a higher degree.

California Institute of Technology
Located in Pasadena, Calif, the California Institute of Technology has a graduation rate of 93 percent. The average cost of a degree is $186,122, and students earn an average starting salary of $72,300. CalTech, as it's often called, has departments in aerospace, applied physics and materials studies, computing and mathematical sciences, electrical engineering, environmental science and engineering, mechanical and civil engineering, and medical engineering. The prestigious college is also home to 31 recipients of the Nobel Peace Prize.

Harvey Mudd College
Harvey Mudd College in Claremont, Calif., has a strong technology program, putting it at number 4 on the list of top technology schools. The cost of tuition is also one of the highest on this list, at $196,551 for a degree. Graduates of Harvey Mudd earn an average of $76,400 early on in their careers and the graduation rate is 91 percent. The engineering program at Harvey Mudd College focuses on helping students apply their skills to real world situations. Students can get professional experience and help solve design problems outside of the classroom through an engineering clinic.

Harvard University
Harvard University, located in Cambridge, Mass., technically ties with Harvey Mudd for top technology schools, and top overall colleges. The graduation rate is 97 percent and the average price of a degree is $187, 763 while graduates earn an average annual salary of $60,000 when starting their careers. In the Jon A. Paulson School of Engineering and Applied Sciences at Harvard, which goes back as far as 1847, undergraduate students can study applied mathematics, biomedical engineering, computer science, electrical engineering, engineering sciences and mechanical engineering.

University of California at Berkeley
The University of California at Berkeley has a graduation rate of 91 percent, and students can get a degree for around $133,549. After graduation, the average salary for students starting out their careers is $58,300 per year. The electrical engineering and computer science division of the University of California at Berkeley has around 2,000 undergraduate students and is the largest department within the university.

University of Pennsylvania
University of Pennsylvania, located in Philadelphia, Penn., has a graduation rate of 96 percent and the average cost of a degree is $194,148. Students graduating from Penn and starting out their careers earn an average annual starting salary of $59,200. The Penn engineering department focuses on computer and information science. Students can study computer science, computer engineering, digital media design, networked and social systems engineering, computer science, computational biology as well as computer and cognitive science.

Rice University
Located in Houston, Rice University has a graduation rate of 91 percent and the average cost of a degree is $157,824. Upon graduation, the average starting salary for students comes in at $61,200 per year. Rice University has a Department of Computer Science where students can work in faculty research programs and describes the perfect computer science student as a "mathematician seeking adventure," a quote from system architect Bob Barton. In the electrical and computer engineering department, students can prepare for a career in oil and gas, wearables, entertainment, renewable energy, gaming, healthcare, space industry, security and aviation.

Brigham Young University-Provo
Brigham Young University-Provo, located in Provo, Utah, has a graduation rate of 78 percent, but students won't have as many loans as other colleges on this list. The average price of a degree is a moderate $80,988 and the average starting salary for graduates is around $51,600 per year. Brigham Young University-Provo offers degrees in electrical engineering, computer engineering and computer science. With a wide array of programs to choose from in each degree, Brigham Young University-Provo boasts a rigorous course load with an emphasis on gaining practical skills for the workforce.

Texas A&M University
College Station, Texas, is home to Texas A&M University where 79 percent of students graduate and the average cost of a degree is $84,732. Students can expect to earn an average starting salary of $54,000 per year after graduation. The Texas A&M computer science and engineering programs boasts an "open, accepting, and compassionate community that encourages the exploration of ideas." Students should expect to leave the program prepared to help solve real-world challenges in the technology industry through applied research.


for more info on CCNA Training and CCNA Certification and more Cisco exams log in to Certkingdom.com

Monday, August 10, 2015

How to uninstall Windows 10 and go back to Windows 7 or 8

Did you upgrade to Windows 10 and regret it? You can go back to your older operating system in a few clicks.

You’ve had Windows 10 for more than a week now, but try as you might the new operating system’s just not working out for you. Maybe a mission critical program doesn’t work properly, maybe you hate the new Start menu, or maybe Cortana is giving you the creeps.

If that sounds like you, it might be time to downgrade back to your past operating system and try again later.

To make life easier on Windows 7 and 8.1 converts, Microsoft will allow you to rollback your Windows 10 installation to the previous operating system for 30 days post-upgrade. Don’t worry—if you want to come back later, you can still take advantage of the free Windows 10 upgrade for the next year.

Keep in mind that downgrading to your older OS requires that you still have your Windows.old folder at C:\Windows.old. If you typically delete that after upgrading, or you’ve done a post-upgrade clean install of Windows 10, you’re out of luck.

Getting ready for the rollback
Before you use the rollback option, take the time to set a few things set up. First of all, make sure all your data is backed up on an external hard drive, or with a cloud-based back-up service like Backblaze or Carbonite.

You might also want to make sure you have your old Windows 7 or 8 product keys handy just in case. You shouldn’t need them, but it can’t hurt to have them on hand if you want to be careful. Don’t worry about saving your Windows 10 product keys—those are handled differently than in previous versions of the OS.

The keys for your previous operating should either be on a sticker on the back of your PC (under the battery if you’re on a laptop), or included with the system discs that came with your PC.

Once you’ve got all of that organized, it’s time to get with the rollback. Open the Start menu, select the Settings app, and go to Update & Security > Recovery.

windows 10 rollback
If you're eligible to downgrade you should see an option that says Go back to Windows 8.1 or Go back to Windows 7. If you see it, click Get started and follow along with the wizard.

Once you’ve returned to your previous version of Windows, you need to tinker with it to perfect your setup once again. Older programs may need to be reinstalled, and if you had a different password on the older system than you did with Windows 10, you’ll have to sign-in with that one.

Getting to this tutorial after the 30-day grace period has passed? If you need to downgrade to your past operating system and Windows 10's rollback option is gone, you’ll either need recovery discs generated from your original Windows 7 or 8 machine to do a clean install of your old system, or have a system image backup stashed somewhere.

If that doesn’t work, your last option is to install Windows 7 or 8.1 in a virtual machine on your Windows 10 system—if you can get your hands on a product key and the older system discs. It’s a pain, but a VM will work surprisingly well for those times when only Windows 7 or 8.1 will do.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Monday, August 3, 2015

Symantec: Well-heeled hacking group Black Vine behind Anthem breach

A group has been singled out as the attacker behind the recently disclosed hack against Anthem, believed to be the largest waged against a health care company.

It was Black Vine that broke into the health insurer's systems and stole more than 80 million patients records, Symantec said Tuesday in a report.

For Black Vine, it was the latest in a long line of hacks that began in 2012. Black Vine has gone after other businesses that deal with sensitive and critical data, including organizations in the aerospace, technology and finance industries, according to Symantec. The majority of the attacks (82 percent) were waged against U.S. businesses.

Black Vine has deep pockets, giving the group the resources to customize malware, and uses zero-day vulnerabilities in Microsoft Internet Explorer to launch watering-hole attacks. The IE exploits were used to install malware that gave Black Vine remote access to a victim's computer. To evade detection, Black Vine frequently updates its malware, according to Symantec.

The three modified malware strains Black Vine uses are Sakurel and Hurix, which are detected as Backdoor.Mivast, and Mivast, which is detected as Trojan.Sakurel.

Symantec claimed some Black Vine members have ties to Topsec, a Chinese IT security company, and the group has access to the Edlerwood framework, a platform for distributing new zero-day vulnerabilities. During its research, Symantec discovered Black Vine began using exploits around the same time as other hacking groups. Each group delivered different malware and went after certain organizations, but the fact that they used the same exploit suggests the attackers relied on the same distribution network.

One of the group's first attacks came in December 2012 against gas turbine manufacturer Capstone Turbine, Symantec said. That hack used the IE exploit CVE-2012-4792 and delivered the Sakurel malware. Symantec noted that the malware was signed with a digital certificate attributed to a company called Micro Digital, fooling Windows into believing the program was legitimate.

That same month, another unnamed turbine power manufacturer was attacked using Sakurel, leading Symantec to believe Black Vine was going after businesses in the energy industry.

In 2013 and 2014, Black Vine targeted companies in the aviation and aerospace industries. One third-party blog cited by Symantec noted that in 2013 specific employees at a global airline were sent spear phishing emails containing a URL that instructed them to download Hurix.

Black Vine compromised the website of a European aerospace company in 2014, accessing the company's domain and using it to attack the site's visitors. To carry out this attack, Black Vine used the IE vulnerability CVE-2014-0322 and installed an updated version of Sakurel on a victim's computer.

The Black Vine malware Mivast was used in the Anthem breach, according to Symantec. Anthem said the hack likely began in May 2014, but that it didn't realize its systems had been comprised until January. The company, which is one of the largest health insurance providers in the U.S., disclosed the breach in February. Hackers made off with personal data including names, birth dates, member ID numbers and Social Security numbers. Like the Capstone Turbine attack, the Mivast malware was signed with a fake digital certificate.

Symantec reckons spear phishing emails were used to deliver the malware since evidence of a watering hole attack wasn't reported. Anthem's IT staff was probably the attack's intended target, given that the malware was concealed as software related to technology like VPNs, said the security research company.

Anthem didn't immediately respond to a request for comment.
Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Monday, July 27, 2015

Windows revenue takes another bad beating

Third consecutive quarter of double-digit declines, but CEO is confident Windows 10 will 'restore growth'

Microsoft on Tuesday said that Windows revenue again declined by double digits, the third straight such quarter, with sales of licenses to computer makers down 22% from the same period last year.

For the June quarter, Windows revenue from OEMs (original equipment manufacturers) was off $683 million relative to the same three-month span in 2014, making the decline for the fiscal year -- Microsoft's ended on June 30 -- approximately $1.9 billion.

The bulk of Windows' revenue comes from sales to OEMs, which pre-load the operating system on PCs, 2-in-1s, tablets and a few smartphone models. In the past, Microsoft has said 65% to 72% of Windows revenue stemmed from OEM sales.

Second quarter revenue from OEMs was down 27% for what Microsoft calls the "non-Pro" category and off 21% for the "Pro" class. The terms refer to the kind of Windows license, with non-Pro indicating the OS for consumer PCs and tablets, and Pro for devices targeting businesses. In Windows 10, for instance, the former will be Windows 10 Home while the latter will be Windows 10 Pro.

The declines of both non-Pro and Pro were both slightly larger than for the first quarter of 2015.
Microsoft blamed the consumer licensing downturn on slack in the sales channel as OEMs prepared devices for Windows 10, a 180-degree turn from the prior quarter, when it said the channel was still stuffed with PCs left over from the holidays.

"OEMs tightly managed PC inventory ahead of the Windows 10 launch, particularly in developed markets," said CFO Amy Hood in prepared remarks during the front end of an earnings call with Wall Street Tuesday. "In our view, this is a healthy state for the channel as we head into a transformational launch that starts next week," she added, referring to the July 29 debut of Windows 10.

Hood returned to the scaled-back OEM inventories when she responded to a question about whether Windows 10 would make up some of its second-quarter declines caused by the emptying retail sales channel. "Before every launch, we tend to have a tightening in the channel as they prepare and run reasonably lean," Hood answered. "This is a healthy state. It's within the range of normal."

Meanwhile, Hood said Pro license revenue was still hamstrung by the tough comparisons in 2014 when sales of business PCs jumped as companies purged Windows XP -- which was retired in April of that year -- from their organizations. Microsoft has used XP as the whipping boy for the last several reporting periods, and gave the 2001 OS a few more licks Tuesday.

Also in play, although not stressed much by Microsoft, perhaps because it's a broken record: The underlying problems of the PC industry, which continued a 14-quarters-and-counting contraction, and seems destined to be almost entirely a replacement market, with little signs of any meaningful growth down the line.

Both Hood and CEO Satya Nadella, who was also on the call, spun the Windows declines as less about the loss of revenue in the quarter just past and more about the opportunities ahead with Windows 10.

"With Windows 10, we expect momentum to build throughout the year, as we and our partners bring new devices, applications, and services to market," said Hood. "We expect this to benefit our business results in the second half of the fiscal year." Microsoft's fiscal year runs from July to the following June, so Hood was referring to the first half of 2016.

Nadella pitched in as well. "Our aspiration with Windows 10 is to move people from meeting to choosing to loving Windows," he said, repeating remarks he made earlier this year.

Not surprising -- because it's part of every CEO's job description, no matter what industry or under what circumstances -- Nadella was confident Windows 10 would turn around the company's OS fortunes, if not in direct licensing revenue then in sales of after-market services and software, and advertising opportunities in its Bing search site.

"While the PC ecosystem has been under pressure recently, I do believe that Windows 10 will broaden our economic opportunity and return Windows to growth," Nadella said. He touted the large number of devices and configurations in the testing process for Windows 10 certification, most of which won't be available until later this year, as well as some revenue and gross margin growth possibilities from Microsoft's own hardware, primarily the Surface Pro portfolio.

"Third, we will grow monetization opportunities across the commercial and consumer space," Nadella pledged. "For consumers, Windows 10 creates monetization opportunities with store, search, and gaming."

The three money-makers Nadella ticked off were the same ones Hood outlined to financial analysts in May, when she fleshed out the firm's "Windows as a service" monetization strategy. Microsoft intends to shift revenue generation from its decades-long practice of licensing Windows to one more reliant on revenue from search ads within Bing results, gaming and apps sold through the Windows Store.

That strategy has led Microsoft to a number of radical decisions, including giving away Windows licenses to smartphone and small tablet makers -- a move that hasn't done much for the OS's share in those categories -- subsidizing Windows to makers of cut-rate notebooks, and most importantly for Windows 10, giving away upgrades to the new OS from Windows 7 and Windows 8.1.

The biggest contributor to that money-making strategy in the June quarter was clearly Bing. In a filing with the U.S. Securities and Exchange Commission (SEC), Microsoft said that Bing search advertising revenue had increased 21%, or $160 million, in the second quarter compared to the same period the year prior. Adding Cortana, Microsoft's digital assistant and prognosticator, to Windows 10 was also part of the plan to increase Bing's importance to the OS -- which features strong links to the search engine in multiple components, including the new Edge browser -- and use Windows 10 to drive the search service's revenues.

While the growth in Bing ad revenue was less than a fourth of the decline in Windows revenue during the quarter, it was something.
Microsoft said nothing in the SEC filing about app revenue -- perhaps because it remains minuscule -- but it did boast of a $205 million increase, representing a 58% boost, from Xbox Live, its subscription-based multi-player network. Xbox Live is baked into Windows 10, and Microsoft has pinned significant revenue hope on the OS and Xbox Live reinvigorating the company's PC gaming business, with the monetization angle coming from the ties between the two platforms -- console and PC -- and sales of and on the former since the service will be free on PCs and tablets running Windows 10.

"Gaming is an important scenario for Windows 10, and our success with Xbox this quarter gives us a strong starting position heading into launch," said Nadella Tuesday.

And he remained glass-half-full. "We are confident that these are the right levers to revitalize Windows and restore growth," Nadella said.

In general, Microsoft's second quarter was a mess because of $8.4 billion in charges and layoffs in its phone division, resulting in the biggest-ever single-quarter loss and the first since 2012.

Microsoft took a $3.2 billion net loss for the quarter, compared to a $4.6 billion net profit for the second quarter of 2014, a $7.8 billion flip.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Thursday, July 16, 2015

Top 10 job boards on Twitter

Top 10 job boards on Twitter

Celebrities, politicians and companies all have a Twitter account today, so why not job boards? Here are 10 job boards that are using Twitter better than the competition.

Top job boards on Twitter
Twitter isn't just for celebrities, companies and parody accounts. It's now an outlet for job boards as well. Turning to Twitter in your job search might not feel natural, but Twitter is becoming a popular recruitment tool. As social media becomes a mainstay of our everyday lives, it's also become a part of your job search as well.

Engagement Labs, creators of eValue, which rates how well companies use social media, rates successful uses of social media based on likes, follows and overall audience engagement. Here are 10 social job boards using Twitter better than the competition.

#1 Twitter: Monster
Monster's main Twitter handle, where the company shares both unique and shared content, has over 150,000 followers. It's eValue score was "20 percent higher than their nearest competitor," according to Engagement Labs, along with the highest impact score, indicating their content is reaching a large -- and interested -- audience.

#2 Twitter: CareerOneStop
CareerOneStop is another socially successful government website, coming in second for its use of Twitter and its ability to engage with its audience of over 5,000 followers. The website is sponsored by the U.S. Department of Labor and offers a number of helpful resources for job seekers in every industry.

#3 Twitter: ZipRecruiter
ZipRecruiter may have a modest following of around 4,000 on Twitter, but the company has created a social outlet for its services and its followers are engaged in the experience. ZipRecruiter posts a number of job-seeker-related content, updates about the company, industry updates and, of course, job listings. The site pulls in jobs from other well-known job boards including Monster, Glassdoor and SimplyHired, just to name a few.

#4 Twitter: AOL Jobs
AOL has come a long way since it dominated the Internet back in the 90s, but the company has since moved on from dial-up tones and mailing out its latest software. The Internet company has now extended its reach into the job market, with AOL Jobs, and it's getting the right feedback on Twitter to put it at number 4 on the list of job boards using Twitter. With over 13,000 followers, AOL Jobs' twitter feed mostly features original - and interesting -- job-seeker focused content that will draw you into the homepage for AOL Jobs.

#5 Twitter: FlexJobs
FlexJobs helps you find jobs that aren't your typical 9-to-5 office roles. It includes remote opportunities, freelance work and other less conventional career listings on its jobs board. FlexJob's Twitter account, with more than 8,000 followers, houses content related to flexible job schedules, remote work and telecommuting. Its number 5 on the list of companies with the most powerful social job boards, so if you're looking for remote, part-time or freelance work, it might be the right account to follow.

#6 Twitter: CareerBuilder
CareerBuilder is a well-known career site and jobs board, but it also dominates the top 10 list for Twitter. At number 6, CareerBuilder uses its Twitter account to connect with nearly 150,000 followers and share content related to job searching, employment, recent college graduates and, of course, job postings.

#7 Twitter: Mediabistro
Mediabistro is more than a jobs board. The website also includes educational programs, articles and industry events in addition to job listings. Its Twitter account, with over 170,000 followers is no different. The social account features job listings, information for job seekers, tips and strategies for finding the right job and more. Mediabistro also poses questions to its followers as well as funny hashtags and memes, going the extra mile to connect with followers.

#8 Twitter: Glassdoor
Glassdoor was a pioneer for job seekers, bringing them reliable salary data and reviews from current and former employees a large number of companies. It's now channeling its know-how and data into a well-rounded Twitter account with over 80,000 followers. The company features original content, shared articles and job search statistics on Twitter, making it another great option to follow if you are in the market for a new job.

#9 Twitter: Snagajob
Snagajob isn't successful only on Facebook, it also makes the top 10 list for Twitter. It's clear that Snagajob is trying to connect with its millennial followers, with its use of emojis and references to pop culture, and it seems to be working. The account has over 14,000 followers and scored high on the list of companies using Twitter effectively.

#10 Twitter: TheLadders
Similar to other jobs boards, TheLadders has a wealth of job-seeker related content on its Twitter account. With over 60,000 followers, TheLadders shares and posts content from its own site, articles from other sources and networking tips. It's focused on connecting with driven job seekers who want to push their career onward and upward, and its Twitter efforts seem to be doing the trick.



Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Sunday, July 5, 2015

Software-Defined Networking will be a critical enabler of the Internet of Things

SDN will support IoT by centralizing control, abstracting network devices, and providing flexible, dynamic, automated reconfiguration of the network

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Organizations are excited about the business value of the data that will be generated by the Internet of Things (IoT). But there’s less discussion about how to manage the devices that will make up the network, secure the data they generate and analyze it quickly enough to deliver the insights businesses need.

Software defined networking (SDN) can help meet these needs. By virtualizing network components and services, they can rapidly and automatically reconfigure network devices, reroute traffic and apply authentication and access rules. All this can help speed and secure data delivery, and improve network management, for even the most remote devices.

SDN enables the radical simplification of network provisioning with predefined policies for plug-and-play set-up of IoT devices, automatic detection and remediation of security threats, and the provisioning of the edge computing and analytics environments that turn data into insights.

Consider these two IoT use cases:
* Data from sensors within blowout preventers can help oil well operators save millions of dollars a year in unplanned downtime. These massive data flows, ranging from pressure readings to valve positions, are now often sent from remote locations to central servers over satellite links. This not only increases the cost of data transmission but delays its receipt and analysis. This latency can be critical – or even deadly – when the data is used to control powerful equipment or sensitive industrial processes.

Both these problems will intensify as falling prices lead to the deployment of many more sensors, and technical advances allow each sensor to generate much more data. Processing more data at the edge (i.e. near the well) and determining which is worth sending to a central location (what some call Fog or Edge Computing) helps alleviate both these problems. So can the rapid provisioning of network components and services, while real-time application of security rules helps protect proprietary information.

* Data from retail environments, such as from a customer’s smartphone monitoring their location and the products they take pictures of, or in-store sensors monitoring their browsing behavior, can be used to deliver customized offers to encourage an immediate sale. Again, the volume of data and the need for fast analysis and action calls for the rapid provisioning of services and edge data processing, along with rigorous security to ease privacy concerns.

Making such scenarios real requires overcoming unprecedented challenges.
One is the sheer number of devices, which is estimated to reach 50 billion by 2020, with each new device expanding the “attack surface” exposed to hackers. Another is the amount of data moving over this network, with IDC projecting IoT will account for 10% of all data on the planet by 2020.

Then there is the variety of devices that need to be managed and supported. These range from network switches supporting popular management applications and protocols, to legacy SCADA (supervisory control and data acquisition) devices and those that lack the compute and/or memory to support standard authentication or encryption. Finally, there is the need for very rapid, and even real-time, response, especially for applications involving safety (such as hazardous industrial processes) or commerce (such as monitoring of inventory or customer behavior).

Given this complexity and scale, manual network management is simply not feasible. SDN provides the only viable, cost-effective means to manage the IoT, secure the network and the data on it, minimize bandwidth requirements and maximize the performance of the applications and analytics that use its data.

SDN brings three important capabilities to IoT:
Centralization of control through software that has complete knowledge of the network, enabling automated, policy-based control of even massive, complex networks. Given the huge potential scale of IoT environments, SDN is critical in making them simple to manage.

Abstraction of the details of the many devices and protocols in the network, allowing IoT applications to access data, enable analytics and control the devices, and add new sensors and network control devices, without exposing the details of the underlying infrastructure. SDN simplifies the creation, deployment and ongoing management of the IoT devices and the applications that benefit from them.

The flexibility to tune the components within the IoT (and manage where data is stored and analyzed) to continually maximize performance and security as business needs and data flows change. IoT environments are inherently disperse with many end devices and edge computing. As a result, the network is even more critical than in standard application environments. SDN’s ability to dynamically change network behavior based on new traffic patterns, security incidents andpolicy changes will enable IoT environments to deliver on their promise.

For example, through the use ofpredefined policies for plug-and-play set up, SDN allows for the rapid and easy addition of new types of IoT sensors. By abstracting network services from the hardware on which they run, SDN allows automated, policy-based creation of virtual load balancers, quality of service for various classes of traffic, and the provisioning of network resources for peak demands.

The ease of adding and removing resources reduces the cost and risk of IoT experiments by allowing the easy deprovisioning and reuse of the network infrastructure when no longer needed.

SDN will make it easier to find and fight security threats through the improved visibility they provide into network traffic right to the edge of the network. They also make it easy to apply automated policies to redirect suspicious traffic to, for example, a honeynet where it can be safely examined. By making networking management less complex, SDN allows IT to set and enforce more segmented access controls.

SDN can provide a dynamic, intelligent, self-learning layered model of security that provides walls within walls and ensures people can only change the configuration of the devices they’re authorized to “touch.” This is far more useful than the traditional “wall” around the perimeter of the network, which won’t work with the IoT because of its size and the fact the enemy is often inside the firewall, in the form of unauthorized actors updating firmware on unprotected devices.

Finally, by centralizing configuration and management, SDN will allow IT to effectively program the network to make automatic, real-time decisions about traffic flow. They will allow the analysis of not only sensor data, but data about the health of the network, to be analyzed close to the network edge to give IT the information it needs to prevent traffic jams and security risks. The centralized configuration and management of the network, and the abstraction of network devices, also makes it far easier to manage applications that run on the edge of the IoT.

For example, SDN will allow IT to fine-tune data aggregation, so data that is less critical is held at the edge and not transmitted to core systems until it won’t slow critical application traffic. This edge computing can also perform fast, local analysis and speed the results to the network core if the analysis indicates an urgent situation, such as the impending failure of a jet engine.

Prepare Now
IT organizations can become key drivers in capturing the promised business value of IoT through the use of SDNs. But this new world is a major change and will require some planning.

To prepare for the intersection of IoT and SDN, you should start thinking about what policies in areas such as security, Quality of Service (QoS) and data privacy will make sense in the IoT world, and how to structure and implement such policies in a virtualized network.

All companies have policies today, but typically they are implicit – that is – buried in a morass of ACLs and network configurations. SDN will turn this process on its head, allowing IT teams to develop human readable policies that are implemented by the network. IT teams should start understanding how they’ve configured today’s environment so that they can decide what policies should be brought forward.

They should plan now to include edge computing and analytics in their long-term vision of the network. At the same time, they should remember that IoT and SDN are in their early stages, meaning their network and application planners should expect unpredicted changes in, for example, the amounts of data their networks must handle, and the need to dynamically reconfigure them for local rather than centralized processing. The key enablers, again, will be centralization of control, abstraction of network devices and flexible, dynamic automated reconfiguration of the network. Essentially, isolation of network slices to segment the network by proactively pushing policy via a centralized controller to cordon off various types of traffic. Centralized control planes offer the advantages of easy operations and management.

IT teams should also evaluate their network, compute and data needs across the entire IT spectrum, as the IoT will require an end-to-end SDN solution encompassing all manner of devices, not just those from one domain within IT, but across the data center, Wide Area Network (WAN) and access.

Lastly, IT will want to get familiar with app development in edge computing environments, which is a mix of local and centralized processing. As network abstraction to app layer changes and becomes highly programmable, network teams need to invest in resources and training that understand these programming models (e.g. REST) so that they can more easily partner with the app development teams.

IoT will be so big, so varied and so remote that conventional management tools just won’t cut it. Now is the time to start learning how SDN can help you manage this new world and assure the speedy, secure delivery and analysis of the data it will generate.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Friday, June 26, 2015

Migrating to the cloud? Start with a readiness assessment

 This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

After careful consideration you’ve decided it’s time to migrate a major on-premise software solution to the cloud. But how do you create and execute a plan to make sure your migration stays on time, on budget, and delivers on your expectations? Effective planning is critical, and it should start with a thorough assessment of your infrastructure by an experienced vendor who understands your specific objectives.

Usually available as a service engagement from a hosting vendor or, better yet, from the software vendor whose solution is being migrated to the cloud, this cloud readiness assessment is part checklist and part roadmap. It audits the entire environment so you can plan and execute an efficient and effective migration.

Why should you consider such a service? It takes the pressure off. Too many organizations attempt to go it alone, which usually means asking overworked IT staff to try to “fit it in.” Today, the average IT department is already responsible for multiple systems, often as many as seven or eight. Trying to add a project as large and complex as an enterprise cloud migration to is simply not realistic. Not only is that approach a disservice to those tasked with making it happen, it also sends the wrong message about the size and importance of the project. Future problems are usually inevitable.

A cloud readiness assessment may also help you achieve a faster time to value. Remember, when you go to a SaaS model, ROI has a completely different meaning. For example, you are no longer looking to recover your long-term capital investment, but instead, expecting to gain instant value from your new OpEx spending. A cloud readiness assessment can help you carefully plan the migration so you can achieve a faster time to value.

Finally, a vendor’s cloud readiness team can usually deliver skills and specialized expertise required for the specific solution that you or hosting provider might not have in-house. These teams are truly cross-functional, with a mix of expertise in project management, technical implementations, business processes, industry-specific insights, and more. Additionally, these teams usually have dozens, if not hundreds, of migrations under their belts.

While no one can say they’ve seen it all, these teams are typically astute and can help you identify potential obstacles – challenges you may not have been aware of – before they become unmanageable.

For example, a cloud readiness team will carefully evaluate your existing environment and document all aspects of your infrastructure that could be affected. This includes your entire architecture, including databases, applications, networks, specialized hardware, third-party interfaces, extensions, customizations, and more. Then, they create a comprehensive report that details these findings as well as their recommended action plan to achieve the most successful migration possible.

Cloud readiness in action
To better understand how a cloud readiness offering could work – and its ultimate benefits – consider the example of moving an on-premise workforce management solution to the cloud. Workforce management solutions are generally large, enterprise-level implementations that span employee-focused areas such as time and attendance, absence management, HR, payroll, hiring, scheduling, and labor analytics.

The example of workforce management is especially relevant because recent research shows that an increasing number of workforce management buyers are adopting SaaS tools. Research shows that SaaS will be the main driver in growing the global workforce management market by almost $1.5 billion from 2013 to 2018. Additionally, Gartner research indicates, through 2017, the number of organizations using external providers to deliver cloud-related services will rise to 91 percent to mitigate cost and security risks as well as to meet business goals and desired outcomes.

This research demonstrates that a majority of companies will soon be moving their on-premise workforce management systems to the cloud. But will they be successful?

They have to be. Workforce management systems manage processes and data related to paying employees, managing their time and balances, storing sensitive HR information, complying with industry regulations, and other critical functions. Errors can be extremely costly, especially if they lead to missing paychecks, employee morale issues, lost productivity, grievances and compliance, or even potential lawsuits. Failure is simply not an option.

A cloud readiness service is the perfect way to minimize these risks and maximize the results. Specifically, a readiness service is ideally suited to address specialized areas of a workforce management deployment, including:

* Data collection terminals. While many employees still refer to these as “timeclocks,” the fact is that today’s data collection devices are sophisticated proprietary technology consisting of hardware, software, and network/communication capabilities. As part of a migration, a readiness audit would assess the organization’s data collection methods. It would also provide recommendations for transitioning them to a secure network model that meets the organization’s security and performance objectives while ensuring that service is not interrupted when the switchover occurs.

* Interfaces and integrations. Like other enterprise-level technology, workforce management solutions tend to use many different interfaces and custom integrations to feed applications such as ERP systems, outside payroll systems, or third-party analytics applications. In this example, the readiness assessment evaluates the entire integration strategy, including database settings, to make sure mission-critical data continues to flow to support existing business processes.

* Customizations and configurations. Most organizations have custom reports, products, or database tables. Here, the cloud readiness service will thoroughly review existing customizations and configurations, and will provide recommendations to maintain, or even improve, the value they deliver.

When it comes to something as significant — and important — as migrating a major enterprise solution to the cloud, don’t go it alone. Investing in a cloud readiness service can help you assess where you stand today, plan for the migration, and execute against the plan. This helps free up valuable IT resources to focus on what’s really important – implementing strategic initiatives to help the business grow.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com