Archive for March, 2012

Microsoft upgrades Windows Phone SDK for low-cost smartphones

Two included emulators allow developers to see how their apps perform on phones with different memory capacities

IDG News Service – Microsoft has released Windows Phone SDK 7.1.1, which allows developers to customize their apps for cheaper Windows Phones with less memory, and also run the development kit on Windows 8 machines, the company said in a blog post on Monday.
MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com

Initially, all Windows Phone devices had 512MB of RAM. The first to ship with just 256MB will be Nokia’s Lumia 610, which will cost a$252 and be available in the second quarter, Nokia said when the phone was announced at Mobile World Congress in February.

But the downgrade comes with a cost as well as a saving: Microsoft has identified that 5% of existing applications will not run properly on devices with 256MB of RAM, it said in February.

To see how applications perform, the new SDK has two emulators: one for phones with 512MB of memory and one for phones with 256MB of memory, according to Microsoft.

Microsoft has also blogged about what to think about when developing apps for the phones.

Developers that don’t want their application made available on phones with 256MB of memory can indicate this in the manifest file describing the app’s properties, Microsoft said. The company has already blocked the apps it determined wouldn’t run well on low-memory phones.

The Windows Phone SDK 7.1.1 can also run on the Windows 8 Consumer Preview release. That will allow them to develop mobile apps using the Windows Phone SDK and Windows 8 apps using Visual Studio 11, with both development environments running side by side on the same PC.

Visual Studio 11 is also under development, and Microsoft released a beta version in February.

While the SDK runs on the consumer preview of Windows 8, it won’t be officially supported until the final version of the operating system is released, Microsoft said. It also warned that developers are likely to see a performance degradation in the emulator if they have enabled Hyper-V.

Officially, Microsoft isn’t commenting on when Windows 8 will arrive, but the operating system is expected to be released this year.

The development kit is available for download now from Microsoft’s Download Center. Developers can choose between 10 languages including English, Spanish, Chinese (both traditional and simplified) and Russian.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com

Windows XP Professional MCSE Tutorial and Practice Exam

The Windows 2000 and Windows 2003 MCSA and
MCSE certifications are among the premier certifications you can achieve as
a Microsoft-focused system administrator or system engineer. Microsoft continues
to improve its certification programs and many employers require an MCSA or MCSE
before you can even get your foot in the door for an interview.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

One of the core requirements for the MCSA and MCSE is the exam Installing,
Configuring, and Administering Microsoft Windows XP Professional – exam 70-270.
This free tutorial and free practice exam is designed to teach you the core
knowledge you need to pass this exam and get started on your MCSA or MCSE track.
Passing this exam also qualifies you as a Microsoft Certified Professional (MCP)
– the first step towards future certifications.

Microsoft Windows XP Professional is the most popular business client operating
system. Microsoft MCSE exam 70-270,
Installing Configuring, and Administering Windows XP Professional tests you on

how well you understand administering Windows XP Professional.

Free Certification Tutorial

The MCSE exam 70-270: Installing, Configuring, and Administering Microsoft
Windows XP Professional tutorial covers the major topics as explained by
Microsoft for you to pass the exam. Take the tutorial for free and learn what it
takes to pass the 70-270 exam. Learn how to install an image using a RIS server,
Windows XP printing, or NTFS security permissions. Everything is covered in this
free tutorial.

Free Practice Exam

Testkingdom.com has prepared question practice exam for the
MCSE 70-270 exam. Each question is
material you need to prepare for the MCSE exam. Each question has a descriptive
answer with additional information available.

Tech job seekers less likely to be asked for social-media passwords

Experts say practice is more common in other industries, warn of privacy concerns

There’s been a good amount of talk recently about employers asking for the login information of job applicants. So, should those in the tech world expect the question to be asked the next time they’re in an interview?

A handful of experts queried by Network World say techies actually have less to worry about compared to workers in more heavily regulated industries. Financial services and public sector government jobs, for example, may have more of an incentive to peer into a candidate’s social media life as part of what some call an alarmingly more popular trend.

“The technology industry seems better than average in striking a balance between the personal and professional lives of workers,” says Andrea Matwyshyn, associate professor of legal studies and business ethics at the University of Pennsylvania’s Wharton School. Technology companies seem more open to supporting individual freedom of speech and expression, she says. There’s also, she suspects, a level of comfort technology companies may have toward their employees, encouraging them to be creative, free-thinking individuals. Technology companies are in many cases creating the tools that run these social media sites, she notes.

Nonetheless, there have been increased efforts by employers in some industries to ask for the credentials to social media sites, and employees are finding ways to fight back.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

The issue is not new; in fact there have been public examples of employers asking for login information dating back as much as two years, including in Bozeman, Mont., which has since reversed its position. The Associated Press recently reported several examples of organizations asking for login credentials, mostly in the public law enforcement or financial services industries. With the focus on it, there have been moves to ban such behavior, including an effort in Illinois.

Andrew Walls, a security, risk and privacy researcher at Gartner, calls the efforts to acquire login information of workers “a pretty egregious violation of personal privacy.” Increased attention on the issue “throws gasoline on the fire in the call for more regulation” against the practice, he says.

Walls agrees that he doesn’t expect such a practice would happen as much in the technology industry though. “In the tech world, if you’re trying to hire someone, you probably already know a lot about the perspective employee based on public information,” he says. “If anyone would know how to find it, it would be tech companies.”

Using public information about potential employees is not new, and it’s becoming easier for employers to get that information. There are various products on the market, including one from Kenexa named Social Source, that scan the Internet, including social media sites, to collect information about individuals. For example, an employer can create a form and the system will automatically populate certain query fields using social media profiles. For example, the software can scan the Internet and find an applicant’s LinkedIn profile to pull out resume information, such as prior work experience.

Also, more employers are following perspective employees or existing workers by asking “friend” members of their company on Facebook, for example, with unrestricted rights to track the person, Matwyshyn says.

Seeking login credentials, though, is a different story, and one that some employers are averse to, says Dyke Debrie, of Kenexa, which provides software and job search tools for employers. “It kind of opens a whole Pandora’s box,” he says. Businesses are not allowed to use certain information including age, marital status, religious affiliation or sexual orientation to make employment decisions. Having access to a social media profile could reveal such information and Debrie says the businesses he works with don’t even want to have access to the information because it can create questions about how it is used.

But some employers do want to glean into the social media lives of workers. The industries it is most common in, Matwyshyn says, are highly regulated ones, such as financial services, government and public positions or in which security clearances may be needed. Another area she’s seen increased traction of social media monitoring is in customer-facing jobs and marketing positions. “From an employer’s perspective, if they are putting an individual in a client or public-facing position, they way that candidate represents him or herself online could be an indication of the tone, professionalism and demeanor the individual may bring to the professional setting,” she says.

Some companies feel they even have an obligation to monitor the social media habits of employees. If a financial broker has relationships with individuals or companies they are trading or advising clients of investing in, that can create a conflict of interest that the financial services firms may not only want to know about, but may be required to report and keep a record of. In response, Matwyshyn says, some financial services firms simply don’t allow employees to engage in social media use.

Users that give up their login and password information, Matwyshyn says, are showing the disregard they have for personal privacy. It also demonstrates, Matwyshyn says, a power imbalance between employers and perspective employees. The more access to information job seekers give to their potential employers, they less control they have in crafting the image they want to portray to employers.

Potential employers are fighting back though and finding loopholes. Matwyshyn says, for example, individuals may create multiple social media identities, or restrict what information is shared publicly on the social media profiles. If they give up their username and password though, that control can be lost. Overall, Matwyshyn says employers using social media to track and potentially vet candidates is a concerning practice.

“In the past in real space, we’ve been able to carve out different identities for different contexts,” she says. “In this online realm, when those different identities are all blended together and employers usurp the access to those identities, it can be an alarming trend for individuals.”

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

70-659 Q&A / Study Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2 and all
client computers Windows 7 Professional.
The company network consists of an internal LAN and a perimeter network. The two networks are
separated by an internal corporate firewall. An external corporate firewall connects the perimeter
network to the Internet.
The network includes virtual machines (VMs) running on host servers contained in both the
internal network and the perimeter network.
You have recently installed a server named Certkingdom-VMM1 on the internal network. Certkingdom-VMM1 runs
Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 and will be used to manage
the virtual environment.
You are now in the process of deploying VMM agents on the host servers. You have configured
the port number for the VMM agents and configured the internal corporate firewall to allow
communications on the appropriate port number.
What else do you need to configure to ensure that the VMM agents can communicate with CertkingdomVMM1?

A. You need to configure the name of the VMM server (Certkingdom-VMM1).
B. You need to configure the Fully Qualified Domain Name (FQDN) of a domain controller.
C. You need to configure the name of a SQL Server.
D. You need to configure an encryption key.

Answer: D

Explanation:


QUESTION 2
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2 and all
client computers Windows 7 Professional.
The company network consists of two subnets. The Development subnet is used by the
Development department. The Production subnet is used by all other company departments.
You install a Windows Server 2008 R2 Hyper-V server named Certkingdom-VMHost1 in the Production
subnet. Certkingdom-VMHost1 contains two network interface cards named NIC1 and NIC2. You have
configured NIC1 as a management interface.
You want to configure Certkingdom-VMHost1 to host virtual machines on both the Production subnet and
the Development subnet.
How should you configure Certkingdom-VMHost1?

A. You should use VLAN tags for the VMs and configure NIC2 to use Trunk Mode.
B. You should assign NIC2 as an additional management interface.
C. You should configure both adapters to support jumbo frames.
D. You should configure NIC1 with an IP address in the Production subnet and configure NIC2
with an IP address in the Development subnet.

Answer: A

Explanation:


QUESTION 3
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain. All servers in the network run Windows Server 2008 R2.
A server named Certkingdom-VMM1 runs Microsoft System Center Virtual Machine Manager (VMM) 2008
R2 and is used to manage the company’s virtual environment.
The company includes a Development department. Users in the Development department use
their computers to develop and test software applications for use by other company departments and customers.
You install a Windows Server 2008 R2 Hyper-V server named Certkingdom-VMTest1 in the Development
department. Certkingdom-VMTest1 will host virtual machines (VMs) for the Development department
users to use to test their applications.
You need to ensure that the VMs are completely isolated from production servers.
How can you ensure that the test VMs can communicate with each other while being isolated from
the host server and the rest of the network?

A. By configuring the VMs to connect to a Dedicated virtual network.
B. By configuring the VMs to connect to an Internal virtual network.
C. By configuring the VMs to connect to a Local virtual network.
D. By configuring the VMs to connect to a Private virtual network.

Answer: D

Explanation:


QUESTION 4
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain.
You are configuring a virtual environment for the company. You have an iSCSI storage disk array
that will be used to store virtual machines (VMs).
You install a server named Certkingdom-Host1 that runs a Server Core Installation of Windows Server 2008 R2.
You need to configure Certkingdom-Host1 to store to VMs on the iSCSI disk array.
Which two of the following tools could you use?

A. You could use Disk Management.
B. You could use Diskpart.exe.
C. You could use iSCSICLI.exe.
D. You could use iSCSICPL.exe.

Answer: C,D

Explanation:


QUESTION 5
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain named Certkingdom.com.
The company network consists of an internal LAN and a perimeter network. To comply with
company security policy, servers located in the perimeter network are not members of the
Certkingdom.com domain.
A Microsoft Hyper-V Server 2008 R2 server named Certkingdom-VMHost1 is located in the perimeter network.
You relocate Certkingdom-VMHost1 into the internal network. You now need to join Certkingdom-VMHost1 to the
Certkingdom.com AD DS domain.
How should you join Certkingdom-VMHost1 to the Certkingdom.com domain?

A. You should use the System Properties control panel applet.
B. You should use the Netsh command line utility.
C. You should use the Hyper-V configuration utility (hvconfig).
D. You should use the dcpromo utility.

Answer: D

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Microsoft leads seizure of Zeus-related cybercrime servers

The company said it has shutdown several botnets that stole an estimated US$100 million over five years

IDG News Service – Microsoft said on Monday it and several partners had disrupted several cybercrime rings that used a notorious piece of malicious software called Zeus to steal US$100 million over the last five years.

The company said a consolidated legal case has been filed against those allegedly responsible that for the first time applies the Racketeer Influenced and Corrupt Organizations (RICO) Act.

Zeus has been a thorn in the side for financial institutions due to its stealthy nature and advanced spying capabilities that center around stealing online banking and e-commerce credentials for fraud.
 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com
According to a complaint filed under seal on March 19 in the U.S. District Court for the Eastern District of New York, Microsoft accused the defendants of infecting more than 13 million computers and stealing more than US$100 million over the last five years.

The civil complaint lists 39 “John Doe” defendants, many of whom are identified only by online nicknames, such as “Gribodemon” and “Harderman.”

It marks the latest action led by Microsoft against botnet operators. The company has gone to court before to gain permission to take control over domain names associated with the command-and-control infrastructure of botnets such as Kelihos, Rustock and Waledac.

The company has also initiated civil proceedings against unnamed operators but has had little success due to jurisdiction issues.

Mark Debenham, senior manager of investigations for Microsoft’s Digital Crimes Unit, said the creators of Zeus — as well as related malware such as SpyEye and Ice-IX — sold “builder kits” to other would-be cybercriminals. Simple versions sold for as little as $700, while more advanced versions could cost $15,000 or more, according to Debenham’s affidavit.

Microsoft also said this is the first time other parties have joined it as a plaintiff in a botnet case. The other plaintiffs are the Financial Services Information Sharing and Analysis Center, a nonprofit security organization, and the National Automated Clearing House Association (NACHA).

NACHA oversees the Automated Clearing House system (ACH), a widely-used but aging system used by financial institutions for exchanging details of direct deposits, checks and cash transfers made by businesses and individuals. It has been heavily targeted by Zeus.

In a single day in August 2011, 167 million phishing emails purported to be from NACHA were sent, according to a sworn affidavit included in the court documents from Pamela Moore, senior vice president of administrative services and NACHA’s CFO. Those emails tried to entice victims into clicking links that led to malicious servers which would then install Zeus, she testified.

On a normal day, NACHA would only send out about 1,500 legitimate messages.

“The Zeus botnets have caused, and continue to cause, extreme damage to NACHA and its members, which, if allowed to continue, will be compounded as the case proceeds,” Moore testified.

The court granted Microsoft and its partners permission to seize servers located in Scranton, Pennsylvania, and Lombard, Illinois, on Friday. Microsoft has also taken control of 800 domains that are part of Zeus’ infrastructure in an attempt to completely wrest control of the networks from their operators.

Microsoft said the action resulted in the disruption of several of Zeus botnets, and it would now work to identify and notify people whose computers are infected with the malicious software. Also contributing to the action was Finnish security vendor F-Secure and Kyrus Tech, a security company.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

70-595 Q&A / Study Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com


QUESTION 1
You are employed as a developer at Certkingdom.com. Certkingdom.com makes use of BizTalk Server 2010 in
their environment.
You have designed a BizTalk Server 2010 messaging solution for processing XML messages. You
then configured the solution to makes use of a solitary Business Activity Monitoring (BAM) activity
and BAM tracking profile to obtain content values from a message.
When a message is received, a portion of the values are bound to a receive port. When a
message is sent, the rest of the values are bound to a send port.
You have been instructed to make sure that a single record that includes all content values is
created for each message.
Which of the following actions should you take?

A. You should consider making use of the BizTalk Tracking Profile Utility (bttdeploy.exe) to
redeploy the tracking profile used in this solution.
B. You should consider linking a complete value to ActivityID field.
C. You should consider adding a relationship to the BAM tracking profile.
D. You should consider configuring the solution to make use of another Business Activity
Monitoring (BAM) activity.

Answer: C

Explanation:


QUESTION 2
You are employed as a developer at Certkingdom.com. You are currently in the process of designing a
BizTalk Server 2010 orchestration for Certkingdom.com’s environment.
You have already created and saved a policy, named CertkingdomEmployeeBonus, to compute an
employee’s bonus based on year-to-date sales via the Business Rule Composer. You have also
included a Call Rules shape in the new BizTalk Server 2010 orchestration.
When you access the BizTalk Orchestration Designer, you are unable to find CertkingdomEmployeeBonus
in the menu of accessible policies.
It is imperative that CertkingdomEmployeeBonus is made available.
Which of the following actions should you take?

A. You should consider publish CertkingdomEmployeeBonus from the BizTalk Orchestration Designer.
B. You should consider publish CertkingdomEmployeeBonus from the Business Rules Composer.
C. You should consider creating and publishing a vocabulary containing a definition that
references the XML schema used to evaluate CertkingdomEmployeeBonus from the Business Rules Composer.
D. You should consider creating and publishing a vocabulary containing a definition that
references the XML schema used to evaluate CertkingdomEmployeeBonus from the BizTalk Orchestration Designer.

Answer: B
Reference:

http://msdn.microsoft.com/en-us/library/aa995582(v=BTS.70).aspx


QUESTION 3
You are employed as an administrator at Certkingdom.com. Certkingdom.com is a shipping company that uses
radio frequency identification (RFID) readers with a server shipping management system built on
BizTalk Server 2010 to track shipped containers.
Subsequent to defining a custom tag event, named ContainerArrivalEvent, you include the
SqlServerSink component to the RFID process using the RFID manager.
You are required to make sure that only the custom tag event is logged.
Which of the following actions should you take?

A. You should make use of the Inline XSLT script type.
B. You should make use of the fully qualified assembly name for the EventType property.
C. You should make use of the Inline C# script type.
D. You should make use of the Generic EventType property.

Answer: D
Reference:

http://msdn.microsoft.com/en-us/library/dd352454(v=BTS.70).aspx


QUESTION 4
You are employed as an administrator at Certkingdom.com. Certkingdom.com has a BizTalk Server 2010
environment.
Certkingdom.com has three trading partners to which EDI purchase orders are regularly sent. Certkingdom.com’s
trading partners make use of email, instead of through response messages, to confirm purchase
order acknowledgements. Furthermore, Certkingdom.com’s three trading partners employ identical
versions of the purchase order message. The only difference is that the product types for each
trading partner are defined by custom codes, which are not included in the standard BizTalk
purchase order schemas.
You have been instructed to make sure that a purchase order schema is used for each trading
partner when sending purchase orders. Each purchase order schema should contain the required
custom product type codes for that particular trading partner.
Which two of the following actions should you take? (

A. You should consider defining a local host setting for each of the three trading partners via the
transaction set settings for the party.
B. You should consider defining an envelope for each of the three trading partners via the
transaction set settings for the party.
C. You should consider making use of the default namespace defined by BizTalk for EDI
messages.
D. You should consider defining a custom namespace for each BizTalk schema.

Answer: B,C
Reference:

http://technet.microsoft.com/en-us/library/ff629750(v=BTS.70).aspx


QUESTION 5
You work as a BizTalk Server 2010 administrator at Certkingdom.com. Certkingdom.com makes use of a BizTalk
Server 2010 orchestration that calls a Business Rules Engine policy.
You have previously configured the policy to assess test scores for passes or fails. You then
deployed The BizTalk solution, as well as the policy.
When Certkingdom.com decides to increase the value of a passing score, you are instructed to make the
necessary changes to the policy so that the adjusted rule parameter is displayed.
Which of the following actions should you take? (Choose all that apply.)

A. You should create a new version of the policy in the Business Rules Composer
B. You should create a different policy with a new name that includes the changed parameter in
the Business Rules Composer.
C. You should create a new vocabulary in the Business Rules Composer.
D. You should create a new version of the policy in the Business Rules Composer
E. Add the new parameter to this vocabulary
F. You should edit this version to reflect the changed parameter.
G. You should deploy the new version.
H. You should publish the new version.
I. You should publish the vocabulary.
J. You should deploy the new policy.

Answer: C,E,I
Reference:

http://msdn.microsoft.com/en-us/library/aa560288(v=BTS.70).aspx


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com

Websites in many languages: The benefits of translation memory

One of the most common things I see on a day-to-day basis when interacting with potential clients is confusion between machine translation and translation memory. I recently covered machine translation, so in the interest of equal coverage, I will now focus on translation memory.

A quick definition (for more information, check out the Wikipedia page):
MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com
Translation Memory (TM) is a tool that helps human translators to work more efficiently and with a higher degree of accuracy and quality.

So how does it work? At a high level, translation memory creates a relationship between a segment of source language text and a corresponding segment of target language text.

Here is an example:

You write the sentence, “My house is blue,” on your company website and translate the phrase into Spanish.

“My house is blue” is now linked in the translation memory system with its target language equivalent, “Mi casa es de color de azul.”

Why anyone would have a blue house, or would want to publish this on their website, defies logic, but work with me here, please (note: blue houses are completely normal and this post is not intended to offend anyone who lives in one).

The important thing is that the relationship between those two text segments is in place. Why is this important? For one, if that segment repeats itself across the site, it can be re-used automatically. So you are getting the benefit of accurate, human translation without having to pay for it more than once.

Since the segment is being re-used, you also have the benefit of consistent language. Language consistency is especially important to corporations for many reasons, ranging from maintaining brand voice in marketing content to increasing customer comprehension in informational content. Language is extremely subjective, meaning that content can be written or expressed in multiple ways by different authors and have the same connotation or meaning to the intended audience. The goal is to publish content that is consistent in the source language and then use translation memory tools to ensure that the translated equivalents are consistent, as well.

Another benefit of re-using language is that it increases language accuracy. Each time the technology leverages a previously approved phrase from a database, it removes a human being from having to do a manual process. Therefore, using best-practice translation technology not only increases efficiency, but also increases language accuracy, because it mitigates the risk of introducing an error for segments which have been previously translated.

Since the gating factor in getting content to market is the overall number of words that need to be translated, by reducing the amount of work that needs to be put through a human process, you can go live much faster since you are eliminating manual, repetitive effort.

Another concept of translation memory is “fuzzy matching.” This means that once your translation memory is created and updates are processed against it, the system can look for segments that are close matches (e.g. “My house is red”), so that the translators just need to make minor modifications to the existing target language segment as opposed to an entirely new translation.

We will get into the benefits of server-based translation memory versus desktop-based translation memory in a future post, but the key thing to remember is that this solution offers multiple benefits to the overall translation process.

So make sure that your vendor is using it, you’re made aware of your savings from it, and whatever translation memory is created becomes your intellectual property.

Now I am off to paint my house blue…

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Microsoft: Don’t hate on IE 10

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Microsoft says in combo with Windows 8 touch, the browser has a lot of useful features

Microsoft says its latest version of Internet Explorer clears out a lot of clutter and creates a more immersive browser experience when paired with Windows 8’s touch environment, and that it can be navigated by mouse and keyboard as well, although from the sounds of it not as elegantly.

In the company’s most recent Building Windows 8 blog, the company explains the features new in IE 10, which comes with the download of Windows 8 Consumer Preview.

TEST YOURSELF: Windows 8 Quiz

HANDS-ON: Windows 8: No touch, no fun

HANDS-ON: Windows 8 test drive crash

The browser adapts many of the features of Metro style, the term Microsoft uses for the Windows 8 user interface that relies on monochromatic squares and rectangles branded with words rather than icons to move around the system.

The overhaul from IE 9 is major and requires some learning on the part of users, particularly those familiar with the older browser and how to get around.

For example, the new browser has no visible address or task bars, giving the site being visited top-to-bottom, side-to-side real estate that makes for more immersive viewing. Microsoft says this was inspired by versions of browsers used on mobile phones which feature less “chrome” – hiding tools until they are needed.

These commands can be accessed via “charms,” which are icons that pop in from the edges when called up with either taps or mouse clicks, depending on whether the device has a touchscreen. The charms include Search, Share, Devices (printer, projector, etc.) and Settings (clear history, etc.).

The browser has its own Start screen similar to the one for the operating system. It includes a set of brightly colored tiles that show popular sites, frequently visited sites and favorites that get filtered out as users type in URLs in the address bar that appears across the bottom of the screen.

Windows 8 also supports pinning favorite sites to the main Windows Start page, so users can click on a tile for a Web site there and the browser will call it up, rather than launching the browser and seeking it via a tile on the IE Start screen.

Tabs are gone. Rather than a string of them across the top of the screen, a mini image of the last 10 tabs used can be drawn from the top or bottom with a finger swipe, typing Winidows Key/Z or a mouse click.

For touchscreen devices, a touch keyboard is customized for browsing, including a “/” key to the left of the spacebar and a “.com” key to the right. Similarly, when users are filling in email forms, the “/” key becomes an “@” key.

Web sites that offer a Metro style app can put a box on their sites that when clicked, bring users to that app in the Windows Store where they can download it.

Internet Explorer 10 bumps up security and privacy by extending InPrivate browsing to be run per-tab to block cookies, history and cached data rather than blanket for all tabs.

While it’s not a how-to, the blog does point up important features for trailers of Windows 8 to check out. It does compare and contrast how to perform some functions both by touch and by keyboard and mouse, which reveals the comparative simplicity of touch.

Users familiar with using mouse and keyboard for older versions of IE will find that there are new and often unintuitive ways of getting around the new browser, a possible source of frustration.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Former Google exec rips new, more social Google

Whittaker says CEO Larry Page took his eye off innovation to chase Facebook
Computerworld – A former Google executive has said the company is so focused on advertising and its increasing rivalry with Facebook that the search company is going off track.
MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com
James Whittaker, who for nearly three years was an engineering director at Google until he left to work at Microsoft last month, lashed into Google CEO Larry Page and what he called the “new Google” in a lengthy post on Microsoft’s blog.

Whittaker said he used to love working at Google and was an enthusiastic evangelist for the company. That all changed, he said, when the company stopped focusing on innovation and technology and turned to capturing advertising and going after the world’s biggest social network, Facebook.

Google changed so much after Page took over the company’s reins from former CEO Eric Schmidt last year that he said his last three months at Google were a “whirlwind of desperation.”
Google Plus

Google did not respond to a request for comment by deadline.

Whittaker said he realizes that Google always has been an advertising company but under Schmidt’s leadership, employees were focused on innovation and were lauded for developing new technologies.

“From this innovation machine came strategically important products like Gmail and Chrome, products that were the result of entrepreneurship at the lowest levels of the company,” he wrote in his blog post. “Maybe the engineers who actually worked on ads felt it, but the rest of us were convinced that Google was a technology company first and foremost…”

Then Google executives realized that they had missed the opportunity on social networking. They saw that Facebook had an enormous user base and had become a major competitor for online advertising, Whittaker wrote.

“Larry Page himself assumed command to right this wrong,” wrote Whittaker. “Social became state-owned, a corporate mandate called Google+. It was an ominous name invoking the feeling that Google alone wasn’t enough. Search had to be social. Android had to be social. You Tube, once joyous in their independence, had to be … well, you get the point.”

He added that suddenly all innovation had to be focused on social. “Ideas that failed to put Google+ at the center of the universe were a distraction,” Whittaker said.

It’s not surprising to hear that Google is so focused on making all of the company’s products and services connect with Google+. Page made that strategy clear last fall when he said he wanted to use Google+ to change the entire company.

“Our ultimate ambition is to transform the overall Google experience, making it beautifully simple, almost automagical, because we understand what you want and can deliver it instantly,” Page said last October. “This means baking identity and sharing into all of our products so that we build a real relationship with our users.”

According to Whittaker’s blog, this plan wasn’t a positive shift for the company.

“I think [Whittaker] is saying that the Google he knew was one that drove hard to develop innovative new products for the sake of serving users,” said Dan Olds, an analyst with The Gabriel Consulting Group. “The old Google just tried to push out cool new things for users, and the advertising riches followed. This new Google seems to be trying to channel its efforts to satisfying advertiser, not user, needs. I’d argue that this approach will be less successful over the long term.”

He added that Google’s obsession with Facebook isn’t healthy for the company. “Google has to get used to the idea that they can’t be everything to everyone,” said Olds. “They can’t have all the toys in the store.”

This isn’t the first time that a Google executive has publicly aired his grievances with the company.

MB2-632 Q&A / Study Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com


QUESTION 1
Certkingdom.com has employed you as a Microsoft Dynamics CRM 4.0 administrator. The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com.
The Certkingdom.com management has requested that you draw up a list of facts regarding knowledge
base articles.
Which of the following options would be part of your list?

A. Knowledge base articles can only be viewed by permitted users.
B. A knowledge base article selects the Work Offline option.
C. A knowledge base article displays the data in the Resources Earned Value view.
D. A knowledge base article edits the layout of each page.

Answer: A

Explanation: You should inform management that it can be viewed only by permitted users. If you
are permitted to use Microsoft Dynamics CRM 4.0, you can view the Knowledge Base Articles.
Reference: http://support.microsoft.com/kb/950100


QUESTION 2
Certkingdom.com has employed you as a Microsoft Dynamics CRM 4.0 administrator. Certkingdom.com consists
of a Sales division and a Marketing division. Certkingdom.com is currently promoting the third edition of a
Finance software package. When a fourth edition is released, it is regarded as a major uCertkingdomrade.
The manual for the fourth edition requires a supplementary segment.
You have received instructions from the CIO to retain Third Edition documentation for clients that
continues using that edition of the software. The CIO has also informed you that new
documentation should only be produced for the Fourth Edition of the Finance package.
Which of the following actions should you take?

A. You should bring down the article template for edition 3.0 documents and assimilate a new
article template for edition 3.8 documents.
B. You should configure the content deployment settings to 3.0 documents.
C. You should bring down the article template for edition 3.0 documents and remove the
accounted attribute for edition 3.8 documents.
D. You should delete the projected attribute for edition 3.8 documents.

Answer: A

Explanation: You need to bring down the article template for edition 3.0 documents. You can also
assimilate a new article template for edition 3.8 documents. Article Templates are used when
working with the Knowledge Base (found in the Service section of Microsoft Dynamics CRM).
Reference: Working with Microsoft Dynamics™ CRM 4.0, Second Edition


QUESTION 3
Certkingdom.com has employed you as a Microsoft Dynamics CRM 4.0 administrator.
You receive an instruction from the CIO to inform the new interns in your division of the records
that will be linked to the sales literature.
Which two of the following options should you take?

A. You should inform the interns that the Products will be linked.
B. You should inform the interns that the Attention grabbing headlines will be linked.
C. You should inform the interns that the Strong offers will be linked.
D. You should inform the interns that the Half-truths will be linked.

Answer: A

Explanation: You need to inform the interns that the Competitors and the Products are
associated. The Sales Literature consists of documentation about your products designed to be
used by your sales persons. Furthermore, with Sales Literature you can add Products and identify
Competitors.
Reference: Working with Microsoft Dynamics™ CRM 4.0, Second Edition


QUESTION 4
You are the Microsoft Dynamics CRM 4.0 administrator at Certkingdom.com. Certkingdom.com consists of a Sales
division and a Marketing division. For service management, Certkingdom.com makes use of contracts and
contract lines.
A new Certkingdom.com policy states that all cases must be associated with a contract line because this
information is necessary for analysis and reports. Historically, subject hierarchy was only created
for cases at Certkingdom.com. While analyzing the subject hierarchy, you notice a few previously used
ones that are not required any more.
You have been instructed to update the subject hierarchy.
Which of the following actions should you take?

A. You should navigate to the Views area of the Account Customization window and edit the
Lookup View.
B. The best option is to edit pick list options and current cases under their respective subjects.
C. The best option is to change all messages associated with the hierarchy and put the subjects
with the cases in it.
D. The best option is to reorganize the subject hierarchy.
Thereafter archive parent subject area should be created in the hierarchy and move the redundant
subjects under it.

Answer: D

Explanation: You need to reorganize the subject hierarchy and create an archive parent subject
area in the hierarchy and move the not needed subjects under it.
Reference: Working with Microsoft Dynamics™ CRM 4.0, Second Edition


QUESTION 5
You work as a Microsoft Dynamics CRM 4.0 administrator at Certkingdom.com. The Certkingdom.com network
consists of a single Active Directory domain named Certkingdom.com.
Certkingdom.com consists of a Sales division. Certkingdom.com is using schedules for their Sales division. Some
of the users in the Sales division have permanent contracts, while others are hired on short-term
basis. The short-term users are normally employed for a minimum of two weeks at a time. You
then implement schedules for the users in the Sales division; however, the Sales staff does not
view the schedules. You need to keep the record of the short-term users.
Which of the following actions should you take?

A. You should create new format of the Contact records.
You should then have the short-term users disabled.
B. You should set up a Facility/Equipment record for every short-term user.
You should then remove the record when the short-term user’s contract expires and they depart.
C. You should create Contact entity.
You should then delegate the estimated time of job accomplishment.
D. You should delete the short-term user field from the record.

Answer: B

Explanation: You need to set up a Facility/Equipment record for each short-term user. You should
also delete the record when the short-term user’s contract expires and they depart.
Facilities/Equipment is needed when performing scheduling. It makes up the Resources
component. Delete Entity enables you to completely delete the record.
Reference: Working with Microsoft Dynamics™ CRM 4.0, Second Edition


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com

Go to Top