Friday, April 27, 2012

Huawei aims to offer touch-free smartphones, infinite cloud storage


The company will increase research and development spending up 20% from last year

IDG News Service - Huawei Technologies is aiming to bring touch-free smartphones and more inexpensive cloud storage to users, as the company boosts its research and development spending in order to bring "disruptive" technologies that will alter the market landscape.

"We are focused on disruptive technology and taking interesting ideas and turning them into something exciting," said John Roese, general manager for Huawei's North American research and develop center, on Friday.

The China-based company is best known as a supplier of telecommunication equipment. But the firm has been ambitiously expanding into both the consumer and enterprise sides of the technology business, aiming to provide products including Huawei branded smartphones, tablets along with servers and cloud computing offerings.



Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com

Last year, the company spent $3.76 billion on research and development, resulting in 11,000 new employees hired for the company's R&D efforts. For this year, Huawei's R&D spending is expected to grow by 20% to about $4.5 billion.

Roese, who spoke to journalists on Friday, manages a research and development staff of 1,000 employees in North America, and was a former CTO for Nortel. One technology the company has been working on is touch-free smartphones, allowing the devices to read users' hand gestures in order to initiate commands.

"What if you use the camera of a tablet or a smartphone and use it to capture the visualization of your hands," he said. "So imagine instead of touching a smartphone, you can actually have a three-dimensional interaction with it."

Touchscreen smartphones and tablets currently allow for the use of several fingers to issue certain commands when pressed on the display. But users only have five fingers on a hand, limiting the number of commands that can be made, Roese said. Using hand gestures, however, would allow users to more easily bring objects forward, push them back or rotate them within the smartphone's graphical user interface, he said.

Other companies already offer motion-sensing input. Microsoft for example uses motion sensing in its Xbox 360 Kinect device. Last month, Sony also announced the Android-based smartphone, the Xperia sola, which can read finger gestures to highlight links in text.

Huawei, however, expects its own touch-free smartphones will need a powerful graphics processor and also two front-facing cameras to fully read a user's hand movements, according to Roese. The technology will be added incrementally over time, starting with small features, and likely start on tablets first, he added.

Last year, the company sold 20 million smartphones. But for 2012, the company plans to reach even higher, and has the goal of smartphone sales hitting 60 million units.

Outside of mobile phones, Huawei also wants to make cloud storage less expensive. The company has partnered with CERN, the European Organization for Nuclear Research, to investigate new storage techniques.

Through the partnership, Huawei's cloud storage system is being used to process and store 15,360TB of physics data taken each year. Roese believes the research could revolutionize computing storage architecture.

"If we are successful, which I think we will be, it literally could change the economics of storage by an order of a magnitude," he said. Suppliers could give infinite backup and only charge people when they needed to restore it, while still making money, he said.

"Of all the projects, and there are lots of good projects, that is the one that could have a profound impact on the market," he said.

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com

Tuesday, April 24, 2012

Intel's Ivy Bridge chips raise the bar for rivals

The 22nm, low-power chips mark a tech milestone with longer battery life and faster boot times

Computerworld - With the arrival of Intel's Ivy Bridge processors, the chip maker has just given its competition a new bar to shoot for.

On Monday, Intel took the wraps off its first third-generation Core processors, which have been known by their code-name, Ivy Bridge. The new chips bring Intel into the realm of 22-nanometer processing, a big step down from the 32-nm build process, which rival Advanced Micro Devices is still working with.

That means these are the first 22nm logic chips, marking a technology milestone. On top of that, the chips are faster and more power-efficient than their Core predecessors.

MCTS Training, MCITP Trainnig
Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com


"Ivy Bridge sets the stage where the rest of the industry will need to measure their design and fab process and geometries against Intel's new 22nm design," said Patrick Moorhead, an analyst with Moor Insights & Strategy. "This is in some ways an evolution and a game changer."

"It is big for Intel in that it is the first in the marketplace with 22nm. This means a smaller die for better costs and it fundamentally enables better power characteristics for better performance at less power," he said.

Moorhead added that Ivy Bridge provides what he's dubbed an evolutionary 10% to 20% improvement in general purpose compute performance. However, that also offers revolutionary improvements in terms of recoding video, since the new chips are seeing a "20X speedup," he said.

The Ivy Bridge lineup right out of the gate includes 13 quad-core processors for high-end desktops, laptops and all-in-one designs. In the next few months, Intel will introduce Ivy Bridge chips for ultrabooks, as well as mainstream laptops and desktops.

"It's a pretty big deal," said Jack Gold, an analyst with J. Gold Associates. "The initial ships are targeted at higher-end desktops. But soon Ivy Bridge mobile chips will be available. This is what will power next-gen ultrabooks. The lower power/higher performance could be a game-changer. And it will be difficult for AMD to catch up in the short-term."

Gold noted that enterprises will appreciate faster boot times and longer battery life for laptops and ultrabooks.

Dan Olds, an analyst with The Gabriel Consulting Group, said Ivy Bridge is a good evolutionary step for Intel and for the end users.

"Ivy Bridge is also the first processor to use Intel's FinFET three-dimensional transistor design, which pays dividends both in terms of power use and performance," Olds said. "Overall, Ivy Bridge should be close to 30% faster than Intel's Sandy Bridge processor it replaces, while consuming 20% less power."

He said the new chips are built for low-power more than high-performance. "We'll see faster chips using less power over time, bringing more performance to smaller devices that don't suck down batteries like a three-year-old drinking chocolate milk for the first time," Olds said

MCTS Training, MCITP Trainnig
Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com

Tuesday, April 17, 2012

Update New Windows 7 Training for CompTIA A+

A lot has changed for IT techs since the CompTIA A+ exam was released in 2009. People blinked and Windows Vista was gone. Windows 7 swooped in and became the smash hit that everyone was hoping Vista would be. This year (for the first time ever) CompTIA made drastic changes to the objectives of the A+ exam to accomodate the new popularity and new features of Windows 7. To help prepare you for all the new material, our CompTIA A+ Certkingdom Cloud Classroom course has been fully updated with everything you need to know about Windows 7. Mike Meyers is back with seven all new video chapters that prepare you for everything from installing Windows 7 to IPv6, networking and more. Check out Mike Meyers as he introduces you to the new additions to your A+ Certkingdom Cloud Classroom course

In addition, we’ve updated your A+ practice exams, study guides, guide content, assessment quizzes, certificate of mastery exams and more. It’s like a whole new course! The brand new A+ is available for check out right now in your Ultimate Access library.


Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification
at Certkingdom.com

Looking to advance your IT career? Certkingdom offers the absolute best training materials for technologies including CompTIA A+, Network+, MCITP Certification, CCNA Training and more. The Certkingdom Cloud Classroom makes studying better and more convenient by putting your training in the Cloud and supporting compatibility with most mobile devices including the iPad 2, Android and many more.

Friday, April 13, 2012

CT0-101 Q&A / Study Guide / Testing Engine / Videos

Cisco CCNA Training, Cisco CCNA Certification

Best CCNA Training and CCNA Certification
and more Cisco exams log in to Certkingdom.com


QUESTION 1
A user is complaining that during calls the remote caller's voice intermittently cannot be heard.
Which of the following is the MOST likely cause?

A. Network to Public Switched Telephone Network (PSTN) impedance is mismatched
B. Network packet drops on the receivers side of the conversation
C. Network jitter is above acceptable limits on the round trip path
D. Network packet drops on the transmitting side of the conversation

Answer: B


QUESTION 2
Which of the following BEST describes a network bottleneck?

A. A router with multiple WAN links.
B. A switch that is underutilized.
C. A network with multiple switches.
D. A router that is receiving more information than it can process.

Answer: D


QUESTION 3
Which of the following is true about jitter?

A. Jitter is caused by insufficient network capacity.
B. Jitter is the variation in time between thearrival of voice packets.
C. Jitter can only be solved by using prioritization techniques.
D. Jitter is caused by endpoints.

Answer: B


QUESTION 4
Which of the following protocols can be used in scripting call flows in an Interactive Voice
Response (IVR)?

A. HTML
B. HTTP
C. XML/VXML
D. TCP/IP

Answer: C


QUESTION 5
Which of the following codecs would a technician configure on the VoIP server to match the voice
quality of a regular Public Switched Telephone Network (PSTN) call on a VoIP phone?

A. G. 729
B. G. 732
C. G. 722
D. G. 711

Answer: D


Cisco CCNA Training, Cisco CCNA Certification

Best CCNA Training and CCNA Certification
and more Cisco exams log in to Certkingdom.com

Monday, April 9, 2012

Emerging software tools help boost IT spending projections

Forrester Research forecast sees hardware spending lagging; IT hiring outlook mixed

Computerworld - Overall U.S. tech spending is forecast to grow by 7.1% this year and then by 7.4% in 2013, according to Forrester Research.

The strongest growth area will be software management tools, and much of that growth will come from cloud-based products.

Overall financial management, human resources management, ePurchasing, CRM and business intelligence software will collectively grow by 11.4% through 2011, and 12% next year, Forrester said.

Comptia A+ Training, Comptia A+ certification
Best comptia A+ Training, Comptia A+ Certification
at Certkingdom.com


Some hot new software categories are emerging from these broad software management areas.

These include case management tools, automated spend analysis, services procurement, supplier risk and performance management, services procurement, as well as talent and recruitment management software tools, according to Forrester.

Software in these categories will grow by 15% to 20% both this year and next, with most purchases for software as a service products, the researcher projected.

"The problems that technology is being expected to solve are expanding," said Andrew Bartels, an analyst at Forrester. The emerging tools are used to manage areas that, in the past, lacked strong technical solutions.

Case management software is used to manage a social service case or an insurance case. The tools are designed to bring together all relevant information a user needs to manage a case. They also analytical capabilities and the ability to work with other people.

"The technology that's available has a better fit against the unsolved business problems," said Bartels.

Supplier risk management tools allow a purchasing department, or line of business, to have in one place all the information, such as orders and history of business, about any of its suppliers.

The risk management systems draw on third parties to check the financial condition of a supplier, and can even provide data on non-financial risk factors, such as environmental or social responsibility ratings, said Bartels.

Computer equipment spending growth this year will be 4.5%, less than half of what it was last year, said Forrester. Strong hardware spending over the last two years has given most firms the capacity they need.

Hardware spending will rebound in 2013, rising to 8.4%, Forrester predicts.

Overall IT spending next year will be $1,266 billion on all goods, services and staff.

The largest categories are IT salaries accounting for $241 billion, and software at $232 billion. Computer equipment spending will be $92 billion.

What isn't growing fast is IT hiring.

Forrester estimates that IT staffs grew by only 0.3% last year, although salary and benefit increases brought up spending on staff to more than 4%.

Hiring should grow by 2% this year and then to 4% in 2013. Competition for workers will cause compensation to rise, which will increase staff spending to 7.2% next year.

The IT job market growth is either strong or weak, depending on what government data is used. Differences in IT job estimates are based on the decisions analysts make on what labor categories to include or not include in the estimate.

TechServe Alliance, which tracks government data monthly says that 15,000 IT jobs were added in March out of the 120,000 new jobs reported by the government. TechServe estimates the IT workforce now stands at 4.14 million.

Janco Associates, a research firm that tracks IT employment, looks a narrower segment of IT jobs, and reported a net increase of 4,900 seasonally adjusted jobs IT jobs in March.

Comptia A+ Training, Comptia A+ certification
Best comptia A+ Training, Comptia A+ Certification
at Certkingdom.com

Saturday, April 7, 2012

CAS-001 Q&A / Study Guide / Testing Engine

MCTS Certification, MCITP Certification

Microsoft Commptia A+ Training , Comptia A+ Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


QUESTION 1
You need to ensure that a session key derived from a set of long-term public and private keys will
not be compromised if one of the private keys is compromised in the future?

A. Perfect forward secrecy
B. Secure socket layer
C. Secure shell
D. Security token

Answer: A

Explanation:
Perfect forward secrecy (or PFS) is the property that ensures that a session key derived from a set
of long-term public and private keys will not be compromised if one of the (long-term) private keys
is compromised in the future.
Forward secrecy has been used as a synonym for perfect forward secrecy, since the term perfect
has been controversial in this context. However, at least one reference distinguishes perfect
forward secrecy from forward secrecy with the additional property that an agreed key will not be
compromised even if agreed keys derived from the same long-term keying material in a
subsequent run are compromised.
Answer option C is incorrect. Secure Shell (SSH) is a program that is used for logging into a
remote computer over a network. Secure Shell can be used to execute commands on a remote
machine and to move files from one machine to another. SSH uses strong authentication and
secure communications over insecure channels.
Answer option B is incorrect. Secure Sockets Layer (SSL) is a protocol that was developed by
Netscape for transmitting private documents via the Internet. It uses a cryptographic system
thatuses public and private keys to encrypt data. A public key is globally available and a private
key is known only to the recipient of the message. Both Netscape Navigator and Internet Explorer
support the SSL protocol. Several web sites use this protocol to obtain confidential user
information. When the SSL protocol is used to connect to a Web site, the URL must begin with
https instead of http.
Answer option D is incorrect. Security token can be a physical device that an authorized user of
computer services is given to ease authentication. The term may also refer to software tokens.
Security tokens are used to prove one's identity electronically (as in the case of a customer trying
to access his bank account). The token is used in addition to or in place of a password to prove
that the customer is who he claims to be. The token acts like an electronic key to access
something.


QUESTION 2
The Security Development Lifecycle (SDL) consists of various security practices that are grouped
under seven phases. Which of the following security practices are included in the Requirements
phase?
Each correct answer represents a complete solution. Choose all that apply.

A. Incident Response Plan
B. Create Quality Gates/Bug Bars
C. Attack Surface Analysis/Reduction
D. Security and Privacy Risk Assessment

Answer: B,D

Explanation:
The Requirements phase of the Security Development Lifecycle (SDL) includes the following
security practices:
• Security and Privacy Requirements
• Create Quality Gates/Bug Bars
• Security and Privacy Risk Assessment
Answer option C is incorrect. Attack Surface Analysis/Reduction is a security practice included in
the Design phase of the Security Development Lifecycle (SDL).
Answer option A is incorrect. Incident Response Plan is a security practice included in the Release
phase of the Security Development Lifecycle (SDL).


QUESTION 3
Which of the following components of a VoIP network is frequently used to bridge video
conferencing connections?

A. MCU
B. Videoconference station
C. IP Phone
D. Call agent

Answer: A

Explanation:
A Multipoint Control Unit (MCU) is a device frequently used to bridge video conferencing
connections. The Multipoint Control Unit is an endpoint on the LAN that provides the ability for 3 or
more terminals and gateways to participate in a multipoint conference. The MCU consists of a
mandatory Multipoint Controller (MC) and optional Multipoint Processors (MPs).
Answer option C is incorrect. IP Phones provide IP endpoints for voice communication. Answer
option D is incorrect. A call agent provides call control for IP phones, CAC, bandwidth control and
management, and address translation. Unlike a gatekeeper, which in a Cisco environment
typically runs on a router, a call agent typically runs on a server platform. Cisco Unified
Communications Manager is an example of a call agent.
The call agent controls switching logic and calls for all the sites under the central controller. A
central gateway controller includes both centralized configuration and maintenance of call control
functionality, when new functionality needs to be added, only the controller needs to be updated.
Answer option B is incorrect. A videoconference station provides access for end-user involvement
in videoconferencing. The videoconference station contains a video capture device for video input
and a microphone for audio input. A user can view video streams and hear audio that originates at
a remote user station.


QUESTION 4
Which of the following is a declarative access control policy language implemented in XML and a
processing model, describing how to interpret the policies?

A. SAML
B. SOAP
C. SPML
D. XACML

Answer: D

Explanation:
XACML stands for extensible Access Control Markup Language. It is a declarative access control
policy language implemented in XML and a processing model, describing how to interpret the
policies.
Latest version 2.0 was ratified by OASIS standards organization on 1 February 2005. The planned
version 3.0 will add generic attribute categories for the evaluation context and policy delegation
profile (administrative policy profile).
Answer option B is incorrect. SOAP, defined as Simple Object Access Protocol, is a protocol
specification for exchanging structured information in the implementation of Web Services in
computer networks, it relies on extensible Markup Language as its message format, and usually
relies on other Application Layer protocols for message negotiation and transmission. SOAP can
form the foundation layer of a web services protocol stack, providing a basic messaging
framework upon which web services can be built.
Answer option C is incorrect. Service Provisioning Markup Language (SPML) is an XML-based
framework developed by OASIS (Organization for the Advancement of Structured Information
Standards). It is used to exchange user, resource and service provisioning information between
cooperating organizations.
SPML is the open standard for the integration and interoperation of service provisioning requests.
It has a goal to allow organizations to securely and quickly set up user interfaces for Web
applications and services, by letting enterprise platforms such as Web portals, application servers,
and service centers produce provisioning requests within and across organizations.
SPML is the open standard for the integration and interoperation of service provisioning requests.
It has a goal to allow organizations to securely and quickly set up user interfaces for Web
applications and services, by letting enterprise platforms such as Web portals, application servers,
and service centers produce provisioning requests within and across organizations.
Answer option A is incorrect. Security Assertion Markup Language (SAMLJ is an XML-based
standard for exchanging authentication and authorization data between security domains, that is,
between an identity provider and a service provider. SAML is a product of the OASIS Security
Services Technical Committee.


QUESTION 5
You work as a Network Administrator for uCertify Inc. You want to allow some users to access a
particular program on the computers in the network. What will you do to accomplish this task?

A. Apply remote access policies
B. Apply NTFS permissions
C. Apply group policies
D. Apply account policies

Answer: C

Explanation:
In order to accomplish the task, you should apply group policy in the network.
A group policy that is created by an administrator affects all users on a computer or all users on a
domain. Group policies can be used for defining, customizing, and controlling the functioning of
network resources, computers, and operating systems. They can be set for a single computer with
multiple users, for users in workgroups, or for computers in a domain. Administrators can
configure group policy settings for users as well as for computers in many ways. Group policies
can be used to allow or restrict the access of a particular program by a particular user. It can also
be used to configure the desktop, the Start menu, the taskbar. the Control Panel, security settings,
among other things. In Windows XP, group policies can be configured by using the Group Policy
Console dialog box, which can be opened by running the GPEDIT.MSC command from the Start
menu.
Answer option D is incorrect. An account policy controls the password expiration policy, the
lockout policy, and other password features.
Answer option B is incorrect. NTFS permissions are attributes of the folder or file for which they
are configured. These include both standard and special levels of settings. The standard settings
are combinations of the special permissions which make the configuration more efficient and
easier to establish.
Answer option A is incorrect. A remote access policy specifies how remote users can connect to
the network and the requirements for each of their systems before they are allowed to connect. It
defines the methods users can use to connect remotely such as dial up or VPN. This policy is
used to prevent damage to the organizational network or computer systems and to prevent
compromise or loss of data.


MCTS Certification, MCITP Certification

Microsoft Commptia A+ Training , Comptia A+ Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com

CA1-001 Q&A / Study Guide / Testing Engine

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com


QUESTION 1
You need to ensure that a session key derived from a set of long-term public and private keys will
not be compromised if one of the private keys is compromised in the future?

A. Perfect forward secrecy
B. Secure socket layer
C. Secure shell
D. Security token

Answer: A

Explanation:
Perfect forward secrecy (or PFS) is the property that ensures that a session key derived from a set
of long-term public and private keys will not be compromised if one of the (long-term) private keys
is compromised in the future.
Forward secrecy has been used as a synonym for perfect forward secrecy, since the term perfect
has been controversial in this context. However, at least one reference distinguishes perfect
forward secrecy from forward secrecy with the additional property that an agreed key will not be
compromised even if agreed keys derived from the same long-term keying material in a
subsequent run are compromised.
Answer option C is incorrect. Secure Shell (SSH) is a program that is used for logging into a
remote computer over a network. Secure Shell can be used to execute commands on a remote
machine and to move files from one machine to another. SSH uses strong authentication and
secure communications over insecure channels.
Answer option B is incorrect. Secure Sockets Layer (SSL) is a protocol that was developed by
Netscape for transmitting private documents via the Internet. It uses a cryptographic system that
uses public and private keys to encrypt data. A public key is globally available and a private key is
known only to the recipient of the message. Both Netscape Navigator and Internet Explorer
support the SSL protocol. Several web sites use this protocol to obtain confidential user
information. When the SSL protocol is used to connect to a Web site, the URL must begin with
https instead of http.
Answer option D is incorrect. Security token can be a physical device that an authorized user of
computer services is given to ease authentication. The term may also refer to software tokens.
Security tokens are used to prove one's identity electronically (as in the case of a customer trying
to access his bank account). The token is used in addition to or in place of a password to prove
that the customer is who he claims to be. The token acts like an electronic key to access
something.


QUESTION 2
The Security Development Lifecycle (SDL) consists of various security practices that are grouped
under seven phases. Which of the following security practices are included in the Requirements phase?
Each correct answer represents a complete solution. Choose all that apply.

A. Incident Response Plan
B. Create Quality Gates/Bug Bars
C. Attack Surface Analysis/Reduction
D. Security and Privacy Risk Assessment

Answer: B,D

Explanation:
The Requirements phase of the Security Development Lifecycle (SDL) includes the following
security practices:
• Security and Privacy Requirements
• Create Quality Gates/Bug Bars
• Security and Privacy Risk Assessment
Answer option C is incorrect. Attack Surface Analysis/Reduction is a security practice included in
the Design phase of the Security Development Lifecycle (SDL).
Answer option A is incorrect. Incident Response Plan is a security practice included in the Release
phase of the Security Development Lifecycle (SDL).


QUESTION 3
Which of the following components of a VoIP network is frequently used to bridge video
conferencing connections?

A. MCU
B. Videoconference station
C. IP Phone
D. Call agent

Answer: A

Explanation:
A Multipoint Control Unit (MCU) is a device frequently used to bridge video conferencing
connections. The Multipoint Control Unit is an endpoint on the LAN that provides the ability for 3 or
more terminals and gateways to participate in a multipoint conference. The MCU consists of a
mandatory Multipoint Controller (MC) and optional Multipoint Processors (MPs).
Answer option C is incorrect. IP Phones provide IP endpoints for voice communication. Answer
option D is incorrect. A call agent provides call control for IP phones, CAC, bandwidth control and
management, and address translation. Unlike a gatekeeper, which in a Cisco environment
typically runs on a router, a call agent typically runs on a server platform. Cisco Unified
Communications Manager is an example of a call agent.
The call agent controls switching logic and calls for all the sites under the central controller. A
central gateway controller includes both centralized configuration and maintenance of call control
functionality, when new functionality needs to be added, only the controller needs to be updated.
Answer option B is incorrect. A videoconference station provides access for end-user involvement
in videoconferencing. The videoconference station contains a video capture device for video input
and a microphone for audio input. A user can view video streams and hear audio that originates at
a remote user station.


QUESTION 4
Which of the following is a declarative access control policy language implemented in XML and a
processing model, describing how to interpret the policies?

A. SAML
B. SOAP
C. SPML
D. XACML

Answer: D

Explanation:
XACML stands for extensible Access Control Markup Language. It is a declarative access control
policy language implemented in XML and a processing model, describing how to interpret the
policies.
Latest version 2.0 was ratified by OASIS standards organization on 1 February 2005. The planned
version 3.0 will add generic attribute categories for the evaluation context and policy delegation
profile (administrative policy profile).
Answer option B is incorrect. SOAP, defined as Simple Object Access Protocol, is a protocol
specification for exchanging structured information in the implementation of Web Services in
computer networks, it relies on extensible Markup Language as its message format, and usually
relies on other Application Layer protocols for message negotiation and transmission. SOAP can
form the foundation layer of a web services protocol stack, providing a basic messaging
framework upon which web services can be built.
Answer option C is incorrect. Service Provisioning Markup Language (SPML) is an XML-based
framework developed by OASIS (Organization for the Advancement of Structured Information
Standards). It is used to exchange user, resource and service provisioning information between
cooperating organizations.
SPML is the open standard for the integration and interoperation of service provisioning requests.
It has a goal to allow organizations to securely and quickly set up user interfaces for Web
applications and services, by letting enterprise platforms such as Web portals, application servers,
and service centers produce provisioning requests within and across organizations.
SPML is the open standard for the integration and interoperation of service provisioning requests.
It has a goal to allow organizations to securely and quickly set up user interfaces for Web
applications and services, by letting enterprise platforms such as Web portals, application servers,
and service centers produce provisioning requests within and across organizations.
Answer option A is incorrect. Security Assertion Markup Language (SAMLJ is an XML-based
standard for exchanging authentication and authorization data between security domains, that is,
between an identity provider and a service provider. SAML is a product of the OASIS Security
Services Technical Committee.


QUESTION 5
You work as a Network Administrator for uCertify Inc. You want to allow some users to access a
particular program on the computers in the network. What will you do to accomplish this task?

A. Apply remote access policies
B. Apply NTFS permissions
C. Apply group policies
D. Apply account policies

Answer: C

Explanation:
In order to accomplish the task, you should apply group policy in the network.
A group policy that is created by an administrator affects all users on a computer or all users on a
domain. Group policies can be used for defining, customizing, and controlling the functioning of
network resources, computers, and operating systems. They can be set for a single computer with
multiple users, for users in workgroups, or for computers in a domain. Administrators can
configure group policy settings for users as well as for computers in many ways. Group policies
can be used to allow or restrict the access of a particular program by a particular user. It can also
be used to configure the desktop, the Start menu, the taskbar. the Control Panel, security settings,
among other things. In Windows XP, group policies can be configured by using the Group Policy
Console dialog box, which can be opened by running the GPEDIT.MSC command from the Start
menu.
Answer option D is incorrect. An account policy controls the password expiration policy, the
lockout policy, and other password features.
Answer option B is incorrect. NTFS permissions are attributes of the folder or file for which they
are configured. These include both standard and special levels of settings. The standard settings
are combinations of the special permissions which make the configuration more efficient and
easier to establish.
Answer option A is incorrect. A remote access policy specifies how remote users can connect to
the network and the requirements for each of their systems before they are allowed to connect. It
defines the methods users can use to connect remotely such as dial up or VPN. This policy is
used to prevent damage to the organizational network or computer systems and to prevent
compromise or loss of data.


Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com

Wednesday, April 4, 2012

Ethernet Alliance chair talks about key trends, what's next

John D'Ambrosia, Chief Ethernet Evangelist in the CTO Office at Dell (he came onboard when Dell bought Force10), is a founder of the Ethernet Alliance and currently serving as its chairman. Network World Editor in Chief John Dix recently caught up with D'Ambrosia for an update on the Alliance and Ethernet advances.

Give us a top top-level view of the Ethernet Alliance.
The Ethernet Alliance is a different type of Ethernet organization in the sense that, if you look at prior alliances, such as the Fast Ethernet Alliance, the Gigabit Ethernet Alliance, the 10 Gigabit Ethernet Alliance, they were always put together in conjunction with the introduction of a new speed. The Ethernet Alliance is an ongoing umbrella organization that covers all of the Ethernet projects, not just speed jumps.

MCTS Certification, MCITP Certification

Microsoft Commptia A+ Training , Comptia A+ Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com

Tuesday, April 3, 2012

Oracle net income rises 18%, but hardware sales slump

Oracle tries to soften the hardware blow, emphasizing the company's focus on specialized systems, not commodity boxes

IDG News Service - Oracle on Tuesday said third-quarter net income rose 18 percent to $2.5 billion, while revenues grew 3 percent to $9 billion. However, hardware systems revenues sagged 16 percent to $869 million.

New software license revenues, which are considered a key indicator of IT executives' current attitudes toward new projects and spending, jumped 7 percent to $2.4 billion.

Earlier in the year, Oracle had posted second-quarter results that showed only 2 percent growth in new software license revenue. That was viewed by market watchers as a harbinger of possible bad news for the vendor.

"It's clear from these [third-quarter] numbers that Q2 was an aberration," co-president Safra Catz said during a conference call on Tuesday. "We feel good about all of our product lines."

Oracle sought to place the third-quarter hardware results into a certain context, as officials have repeatedly stated the company has no interest in competing in the commodity hardware market, and instead is focusing on specialized systems like the Exadata database machine, which provide higher profit margins.

"This past quarter Oracle delivered the hardware and software for our new extreme-performance Exalytics In-Memory Machine," Oracle CEO, Larry Ellison said in a statement. "At the core of Exalytics is our new in-memory database technology capable of instantaneous big data analysis; questions are answered at the speed of thought."

"And unlike SAP's HANA in-memory appliance, Exalytics runs your existing applications," Ellison claimed.

"Hardware revenue for our engineered systems grew 139 percent this quarter and going into Q4, we have a record pipeline," Oracle co-president Mark Hurd said in a statement.

Oracle's fourth-quarter hardware revenue should total between $870 million and $980 million, Catz said on the call.

"Next fiscal year, our hardware business will be a growth story," Ellison said during the call. "We're pretty confident."

Oracle is also hoping its recently launched next-generation Fusion Applications will help it take market share from competitors like SAP over time.

Oracle's Public Cloud, which was announced at the OpenWorld conference in October, will be available in the fourth quarter, Ellison said. The offering will include Fusion Applications, cloud versions of Oracle's database and WebLogic application server, and the Oracle Social Network.

"We feel we've addressed our customers' most serious concern about cloud computing: Security," Ellison said. "Salesforce.com does not provide this level of security in their cloud."

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com

When Oracle executives began discussing the company's Fusion Applications product, they launched into Oracle's time-honored tradition of bashing rival SAP.

Oracle's plans to offer Fusion Applications from the cloud as well as in on-premises form will prove to be another advantage for the company on top of its security capability, Ellison said. "As the cloud grows in popularity, we thank God we sit here with complete ERP [enterprise resource planning] applications written for the cloud and SAP has yet to start," Ellison said.

"Applications sold to big businesses are the bulk of SAP's revenue," he added. "If you're a large customer that wants to run financial applications in the cloud, SAP can't help you. It will take years for SAP to catch up."

SAP has taken a different approach to selling SaaS (software as a service), delivering cloud-based ERP suites such as Business ByDesign for smaller companies as well as divisions of large enterprises and focusing on specialized add-on cloud applications for large enterprises now running its on-premises Business Suite.

"We welcome the chance to compete in the market on Fusion as Oracle customers face costly migrations," SAP spokesman Jim Dever said in an interview after Oracle's conference call.

Ellison also heaped scorn on SAP's HANA in-memory database platform, for which SAP has reported rapid sales growth since its release last year.

"I don't think SAP is equipped to compete with us in the database business," Ellison said. "This is our core competency, database management."

In addition, Oracle's Exalytics appliance incorporates the TimesTen in-memory database, which Oracle has been working on for quite some time, Ellison added.

"We've been working on in-memory technology for a decade," he said. "They just brought this out of the lab."

So far, HANA has been aimed primarily at analytic workloads, but SAP plans to make it support transactional applications as well. The vendor has said HANA will run core modules of the Business Suite by the end of this year. That move could pave the way for SAP to replace Oracle's database, which now supports many Business Suite implementations.

Ellison was sharply skeptical of those plans. "I know on their roadmap they say it will compete with the Oracle database," he said. "They'll never make it that far down the road. It will never even begin to compete with the Oracle database."

Nor is Oracle seeing any competition from HANA these days among the customers it's talking to, Hurd claimed.

"We've been looking out in the market, we see all the rhetoric and the noise," he said. "I don't want to make it seem like we're in denial. I just can't find them."

Hurd's comments should be placed in the proper context, said analyst Curt Monash of Monash Research. For one thing, SAP isn't trumpeting HANA as having replaced Oracle yet, he said. In addition, Oracle may not be talking to SAP loyalists. "I don't think Oracle [analytics] is heavily marketed to those highly loyal SAP users that would be early HANA adopters," Monash said.

SAP spokesman Dever also downplayed Ellison and Hurd's comments.

"Oracle says it sees no threat from SAP HANA, yet spent nearly 10 minutes of a 45-minute conference call talking about it," he said. "In this case, actions speak louder than words."