Exam 70-489 Developing Microsoft SharePoint Server 2013 Advanced Solutions

Exam 70-489 Developing Microsoft SharePoint Server 2013 Advanced Solutions

Published: 20 November 2013
Languages: English, Chinese (Simplified), French, German, Japanese, Portuguese (Brazil)
Audiences: Developers
Technology: Microsoft SharePoint Server 2013
Credit towards certification: MCP, MCSD

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area in the exam. The higher the percentage, the more questions you are likely to see on that content area in the exam.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Design and implement search (15–20%)

Query search

This objective may include but is not limited to: build search queries using FAST Query Language (FQL) and Keyword Query Language (KQL), execute search queries using client-side object model (CSOM), Web Services and REST

Customise search results

This objective may include but is not limited to: create custom result sources, create display templates, create result types, create custom refiner definitions, implement query rules

Customise content processing

This objective may include but is not limited to: feed external content types, implement content processing extensions (entity extraction), configure out-of-the box content processing, create content mappings

Preparation resources

Building search queries in SharePoint 2013
Customising search results in SharePoint 2013
Custom content processing with the Content Enrichment web service callout

Implement Business Connectivity Services (BCS) (10–15%)

Create a model

This objective may include but is not limited to: optimise queries for performance and throttling, use naming conventions, use batching, create filters, implement methods, create associations

Create external content types

This objective may include but is not limited to: use SQL data sources, use Windows Communication Foundation (WCF) Web Services, use OData, use .NET connector

Implement authorisation and authentication

This objective may include but is not limited to: use pass-through, use BCS Identity and User Identity, use a custom model

Create custom connectors

This objective may include but is not limited to: implement methods (including Search), implement security trimming, implement configuration properties, implement caching, implement external event receiver

Access BCS data

This objective may include but is not limited to: use BCS Web Parts, use BCS data in workflows, use BCS CSOM, use the server-side object model, use BCS REST

Implement client-side BCS

This objective may include but is not limited to: use caching, use Microsoft Office apps, use Microsoft Visual Studio Tools for Office, use SQL replication, implement authorisation and authentication

Preparation resources

Business Connectivity Services in SharePoint 2013
External content types in SharePoint 2013
BCS client object model reference for SharePoint 2013

Implement user profiles and customise social workload (15–20%)

Manage user profile properties

This objective may include but is not limited to: create and update user profile properties, update privacy filters, map properties to external data, use managed metadata term sets, update profile picture

Manage feeds

This objective may include but is not limited to: use CSOM to follow documents, people, sites, get feeds, create posts, and manage like, reply, mention, tag, link, add pictures

Access user profile data

This objective may include but is not limited to: use CSOM, use the object model, use REST, use Web Services

Preparation resources

Work with user profiles in SharePoint 2013
How to: Learn to read and write to the social feed by using the REST service in SharePoint 2013
Data access options for apps in SharePoint 2013

Implement Enterprise Content Management (ECM) and Web Content Management (WCM) (15–20%)

Implement a multilingual site

This objective may include but is not limited to: submit a page or batch of pages for translation, publish pages, create source and target labels, create channels, implement multi-language site navigation

Implement e-discovery

This objective may include but is not limited to: create a new hold, integrate with Microsoft Exchange Web Services, specify content sources and Search criteria, export discovery sets, manage permissions for hold

Implement Search Engine Optimization (SEO)

This objective may include but is not limited to: create a site map, customise a site map, maintain SEO configuration properties, maintain robots.txt file, maintain SEO properties on term

Implement content management

This objective may include but is not limited to: create information management policies, create content organiser rules, create document sets, create document ID providers

Implement a publishing page

This objective may include but is not limited to: add field controls to a page layout, add web parts to a page layout, create a publishing page layout, inherit content types

Preparation resources

eDiscovery in SharePoint 2013
How to: Create a page layout in SharePoint 2013
Plan web content management in SharePoint Server 2013

Design for performance and troubleshooting (15–20%)

Design solutions to handle a high-traffic site

This objective may include but is not limited to: combine images, implement caching, minimise number of queries, optimise JavaScript loading, use Content Delivery Networks (CDNs), create a scalable aggregator

Design client applications for performance

This objective may include but is not limited to: leverage health score rules, optimise number of batch server requests, use client-side cache, minimise amount of data requested

Monitor and mitigate performance and scalability issues

This objective may include but is not limited to: diagnose application stability issues, debug the server side and app code on the client side, create application diagnostics, measure and test application performance

Preparation resources

Plan for performance and capacity management in SharePoint Server 2013
Solving problems and troubleshooting in SharePoint 2013
Plan for caching and performance in SharePoint Server 2013

Implement Managed Metadata Service (MMS) (15–20%)

Manage term sets

This objective may include but is not limited to: import and export term sets, create multilingual labels, reuse terms, manage term properties, perform translation, create groups and assign permissions

Create solutions by using MMS

This objective may include but is not limited to: use Profile Pages, use the Product Catalog, use cross-site publishing, integrate with Search, implement metadata-driven navigation

Use an MMS API

This objective may include but is not limited to: use CSOM in client applications, use REST in client applications, use managed fields, use server-side object model

Preparation resources

Managed metadata and navigation in SharePoint 2013
SharePoint 2013: Import a term set from an external source
Cross-site publishing in SharePoint 2013


MCTS Training, MCITP Trainnig

Best Microsoft MCP Certification, Microsoft 70-489 Training at certkingdom.com


 

QUESTION 1
You have been tasked with configuring filtering as per the prerequisites.
Which of the following actions should you take?

A. You should consider making use of the itemCategory;category filtering option.
B. You should consider making use of the itemID;num filtering option.
C. You should consider making use of the itemCategory;itemID filtering option.
D. You should consider making use of the itemID;itemCategory filtering option.

Answer: D

Explanation:


QUESTION 2
You are preparing to establish the reason for an error message being presented when adding the
custom Visual Web Part to a SharePoint site.
Which of the following actions should you take?

A. You should consider making use of the Get-SPLogEvent cmdlet.
B. You should consider making use of the New-SPUsageLogFile cmdlet.
C. You should consider making use of the New-SPLogFile cmdlet.
D. You should consider making use of the Get-SPLogLevel cmdlet.

Answer: A

Explanation:


QUESTION 3
You are preparing to write code to create the tool that supports social connections.
Which of the following is a class of the Microsoft.SharePoint.Client.Social namespace that should
be included in the code?

A. The SocialFollowingManager class.
B. The SocialFeedManager class.
C. The SocialActorInfo class.
D. The SocialPostActorInfo class.

Answer: C

Explanation:


QUESTION 4
You are preparing to configure caching in keeping with the prerequisites.
Which of the following actions should you take?

A. You should consider making use of the System File Cache option.
B. You should consider making use of the Cache API option.
C. You should consider making use of the Windows Server AppFabric Cache option.
D. You should consider making use of the Page Output Cache Cache option.

Answer: C

Explanation:


QUESTION 5
You are preparing to make sure that those users who access the site via their Windows phones,
receive notification regarding the newly created Windows phone app.
Which of the following actions should you take FIRST?

A. You should consider modifying the Phone master page.
B. You should consider modifying the Tablet master page.
C. You should consider modifying the Default master page.
D. You should consider setting the IncludedChannels property to Default.

Answer: C

Explanation:

70-341: Core Solutions of Microsoft Exchange Server 2013

70-341: Core Solutions of Microsoft Exchange Server 2013
Published: 15 January 2013
Languages: English, Chinese (Simplified), French, German, Japanese, Portuguese (Brazil)
Audiences: IT professionals
Technology: Microsoft Exchange Server 2013
Credit towards certification: MCP, MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area in the exam. The higher the percentage, the more questions you are likely to see on that content area in the exam.

From July 2014, the questions on this exam include content covering Microsoft Exchange Server 2013 Service Pack 1.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Plan, install, configure and manage transport (25%)

Plan a high availability solution for common scenarios

Set up redundancy for intra-site scenarios; plan for SafetyNet; plan for shadow redundancy; plan for redundant MX records

Design a transport solution

Design inter-site mail flow; design inter-org mail flow; plan for Domain Secure/TLS; design Edge transport; design message hygiene solutions; design shared namespace scenarios

Configure and manage transport

Configure Edge servers; configure Send/Receive connectors; configure transport rules; configure accepted domains; configure email policies; configure Address Rewriting

Troubleshoot and monitor transport

Interpret message tracking logs and protocol logs; troubleshoot a shared namespace environment; troubleshoot SMTP mail flow; given a failure scenario, predict mail flow and identify how to recover; troubleshoot Domain Secure/TLS; troubleshoot the new transport architecture

Configure and manage hygiene

Manage content filtering; manage recipient filtering; manage SenderID; manage connection filtering; manage Spam Confidence Level (SCL) thresholds; manage anti-malware

Preparation resources

Transport high availability
Use an Edge Transport Server in Exchange 2013
Hygiene management

Install, configure and manage the mailbox role (25%)

Plan the mailbox role

Plan for database size and storage performance requirements; plan for virtualisation requirements and scenarios; plan mailbox role capacity and placement; design public folder placement strategy; validate storage by running JetStress

Configure and manage the mailbox role

Create and configure Offline Address Book (OAB); create and configure public folders; deploy mailbox server roles; design and create hierarchical address lists

Deploy and manage high availability solutions for the mailbox role

Create and configure a Database Availability Group (DAG); identify failure domains; manage DAG networks; configure proper placement of a file share witness; manage mailbox database copies

Monitor and troubleshoot the mailbox role

Troubleshoot database replication and replay; troubleshoot database copy activation; troubleshoot mailbox role performance; troubleshoot database failures; monitor database replication and content indexing

Develop backup and recovery solutions for the mailbox role and public folders

Manage lagged copies; determine most appropriate backup solution/strategy; perform a dial tone restore; perform item-level recovery; recover the public folder hierarchy; recover a mailbox server role

Create and configure mail-enabled objects

Configure resource mailboxes and scheduling; configure team mailboxes; configure distribution lists; configure moderation; configure a linked mailbox

Manage mail-enabled object permissions

Configure mailbox folder permissions; configure mailbox permissions; set up room mailbox delegates; set up team mailbox membership; set up auto-mapping; determine when to use Send As and Send On Behalf permissions

Preparation resources

Mailbox server
Database availability groups
Perform a dial tone recovery

Plan, install, configure and manage client access (25%)

Plan, deploy and manage a Client Access Server (CAS)

Design to account for differences between legacy CAS and Exchange CAS/CAF; configure Office web application

Plan and configure namespaces and client services

Design namespaces for client connectivity; configure URLs; plan for certificates; configure authentication methods; implement auto-discover for a given namespace

Deploy and manage mobility solutions

Deploy OWA for Devices; configure OWA policies; configure mobile device mailbox policies; configure Allow Block Quarantine (ABQ); deploy and manage Office Apps

Implement load balancing

Configure namespace load balancing; configure Session Initiation Protocol (SIP) load balancing; plan for differences between layer seven and layer four load balancing methods; configure Windows Network Load Balancing (WNLB)

Troubleshoot client connectivity

Troubleshoot Outlook Anywhere connectivity; troubleshoot POP/IMAP; troubleshoot authentication; troubleshoot web services; troubleshoot AutoDiscover; troubleshoot mobile devices

Preparation resources

Client access server
Clients and mobile
Load balancing

Design and manage an Exchange infrastructure (25%)

Plan for impact of Exchange on Active Directory services

Plan the number of domain controllers; plan placement of Global Catalogue (GC); determine DNS changes required for Exchange; prepare domains for Exchange; evaluate impact of schema changes required for Exchange; plan around Active Directory site topology

Administer Exchange workload management

Configure user workload policies; configure system workload policies; monitor system workload events; monitor user workload events

Plan and manage Role Based Access Control (RBAC)

Determine appropriate RBAC roles and cmdlets; limit administration using existing role groups; evaluate differences between RBAC and Active Directory split permissions; configure a custom-scoped role group; configure delegated setup

Design an appropriate Exchange solution for a given SLA

Plan for updates; plan for change management; design a solution that meets SLA requirements around scheduled downtime; design a solution that meets SLA requirements around RPO/RTO; design a solution that meets SLA requirements around message delivery

Preparation resources

Prepare Active Directory and domains
Exchange workload management
Planning for role-based access control


 

MCTS Training, MCITP Trainnig

Best Microsoft MCSE Certification, Microsoft 70-337 Training
and Microsoft MCP at certkingdom.com

 


QUESTION 1
You need to prepare the environment for the implementation of phase 1.
What changes must be made to the environment before you can install Exchange Server 2013?

A. The operating system or service pack level of TexDC1 needs to be upgraded.
B. The Windows 2008 R2 domain controllers in Washington and Boston need to be upgraded.
C. A server running Exchange Server 2007 or Exchange Server 2010 needs to be installed in
Texas.
D. The PDC emulator role needs to be transferred to a domain controller in Washington or Boston.

Answer: A

Explanation:


QUESTION 2
You are evaluating whether the proposed Exchange solution will meet the current and future
capacity requirements.
You want to gather statistics about the current Exchange environment.
Which of the following tools would you use to determine the number of emails sent to and received
by the current users?

A. Remote Server Administration Tools.
B. Microsoft Exchange Server Profile Analyzer.
C. Microsoft Exchange Server Deployment Assistant.
D. ESEUtil.exe.
E. Microsoft Exchange Server Jetstress.

Answer: B

Explanation:


QUESTION 3
You need to apply the required size restriction to the mailboxes in the new environment.
Which of the following commands should you run?

A. Get-MailboxDatabase | Set-MailboxDatabase –ProhibitSendReceiveQuota
B. Get-MailboxDatabase | Set-Mailbox –ProhibitSendReceiveQuota
C. Get-Mailbox | Set-Mailbox –ProhibitSendReceiveQuota
D. Get-MailboxDatabase | Get-Mailbox | Set-Mailbox –ProhibitSendReceiveQuota

Answer: A

Explanation:


QUESTION 4
You are evaluating whether the proposed Exchange solution will meet the current and future
capacity requirements.
You want to gather statistics about the current Exchange environment.
Which of the following tools would you use to determine the number of IOPS (Input/Output
Operations Per Second) required for the mailbox database storage?

A. ESEUtil.exe.
B. Microsoft Exchange Server Jetstress.
C. Microsoft Exchange Server Deployment Assistant.
D. Exchange Mailbox Server Role Requirements Calculator.
E. SQL Server Analysis Services.

Answer: D

Explanation:


QUESTION 5
You need to install and configure anti-spam and antimalware filtering.
Which servers should you install the anti-spam agents and enable the anti-spam and antimalware
filtering? (Choose two).

A. You should install the anti-spam agents on the Client Access Servers only.
B. You should install the anti-spam agents on the Mailbox serversonly.
C. You should install the anti-spam agents on the Client Access Servers and the Mailbox Servers.
D. You should enable antimalware filtering on the Client Access Serversonly.
E. You should enable antimalware filtering on the Mailbox serversonly.
F. You enable antimalware filtering on the Client Access Servers and the Mailbox Servers.

Answer: B,E

Explanation:

Exam 70-332 Advanced Solutions of Microsoft SharePoint Server 2013

Exam 70-332
Advanced Solutions of Microsoft SharePoint Server 2013

Published: 01 February 2013
Languages: English, Chinese (Simplified), French, German, Japanese, Portuguese (Brazil)
Audiences: IT professionals
Technology: Microsoft SharePoint Server 2013
Credit towards certification: MCP, MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area in the exam. The higher the percentage, the more questions you are likely to see on that content area in the exam.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Plan business continuity management (21%)
Plan for SQL high availability and disaster recovery
Plan for SQL Server mirroring; plan for SQL Server clustering; plan for SQL Server AlwaysOn; plan for SQL Server Log Shipping; plan for storage redundancy; plan for login replication
Plan SharePoint high availability
Plan for service distribution; plan for service instance configuration; plan for physical server distribution; plan for network redundancy; plan for server load balancing; plan for SQL Server aliases

Plan backup and restore
Establish a SharePoint backup schedule; establish an SQL Server backup schedule; plan a non-production environment content refresh; plan for farm configuration recovery; plan for service application recovery; plan for content recovery

Plan for high availability and disaster recovery for SharePoint 2013
Tuning SQL Server 2012 for SharePoint 2013: (04) SQL Server and SharePoint availability
Plan for backup and recovery in SharePoint 2013

Plan a SharePoint environment (20%)
Plan a social workload
Plan communities; plan My Sites; plan social permissions; plan user profiles; plan activity feeds; plan connections
Plan and configure a search workload
Plan and configure search result relevancy; plan and configure index freshness; plan and configure result sources; plan and configure the end-user experience; plan and configure a search schema; analyse search analytics reports

Plan and configure a Web Content Management (WCM) workload

Plan and configure channels; plan and configure product catalogue and topic pages; plan and configure Design Manager; plan and configure content deployment; plan and configure display templates; plan and configure variations

Plan an Enterprise Content Management (ECM) workload

Plan and configure E-Discovery; plan and configure document routing; plan and configure co-authoring; plan and configure record disposition and retention; plan large document repositories; plan and configure software boundaries

Plan for SharePoint 2013
Capacity planning for SharePoint Server 2013
Module 9: SharePoint 2013 ECM and WCM considerations

Upgrade and migrate a SharePoint environment (20%)

Evaluate content and customisations

Perform migration pre-check tasks; analyse content database test results; configure web application authentication for upgrade; resolve orphan objects; resolve missing file system components; resolve configuration conflict issues

Plan an upgrade process

Plan removal of servers in rotation; configure a parallel upgrade; configure read-only access for content; configure upgrade farms; measure upgrade performance; plan an installation sequence

Upgrade site collection

Perform a health check; analyse and resolve health check results; plan and configure available site collection modes; plan and configure site collection upgrade availability; plan and configure EVAL mode; plan and configure site collection upgrade throttling

Upgrade and migrate to SharePoint 2013 (IT pros)
Plan for upgrade to SharePoint 2013
Upgrade a site collection to SharePoint 2013

Create and configure service applications (21%)
Create and configure app management

Create and configure the App Store; create and configure subscriptions; configure marketplace connections; configure DNS entries; configure wildcard certificates

Create and configure productivity services

Create and configure Microsoft Excel Services, Microsoft Access services, Microsoft Visio services, Microsoft Word Automation services, Microsoft PowerPoint Conversion services, and Translation Services

Configure service application federation

Plan services to federate; perform a certificate exchange; manage trusts; manage service application permissions; publish service applications; consume service applications

Create and configure a Business Connectivity Service (BCS) and Secure Store application

Import and configure BCS models; configure BCS model security; configure BCS for search; generate a Secure Store master key; manage Secure Store target application permissions; create Secure Store target applications

Preparation resources

Module 6: SharePoint 2013 service application architecture and individual service applications
Configure services and service applications in SharePoint 2013
Configure business connectivity services solutions for SharePoint 2013

Manage SharePoint solutions, BI, and systems integration (18%)

Manage SharePoint solutions and applications

Manage sandbox solution quotas; configure sandbox solution management; deploy farm solutions; upgrade farm solutions; deploy Apps; upgrade Apps

Plan and configure a BI infrastructure

Plan and configure Performance Point; plan and configure reporting services; plan and configure PowerPivot; plan and configure Excel Services; plan and configure PowerView; plan and configure BI security

Create and configure work management

Configure a connection to Exchange; configure a connection to Microsoft Project Server; manage trusts; plan Exchange configuration for E-Discovery

Preparation resources
Install and manage solutions for SharePoint 2013
Business intelligence scenarios and solutions
SharePoint 2013: Work management service application


MCTS Training, MCITP Trainnig

Best Microsoft MCPCertification, Microsoft 70-332 Exam at certkingdom.com


 

 

QUESTION 1
You are instructed to make sure that the prerequisites with regards to the MyABC.ABC.com site
and the creation of site collections are suitably met.
You have Setup My Sites setting for the User Profile service application to make use of the URL of
the My Site host site collection.
Which of the following actions should you take NEXT?

A. You should consider configuring the Explicit exclusion type.
B. You should consider configuring the Explicit inclusion type.
C. You should consider configuring the Wildcard exclusion type.
D. You should consider configuring the Wildcard inclusion type.

Answer: B

Explanation:


QUESTION 2
You are preparing to configure authentication for the ABC360.ABC.com site as per the
requirements.
Which of the following actions should you take FIRST?

A. You should consider creating a new PerformancePoint target application.
B. You should consider creating a new Secure Store target application.
C. You should consider creating a new PerformancePoint target application.
D. You should consider creating a new Word Automation target application.

Answer: B

Explanation:


QUESTION 3
You have been instructed to make sure that language support meets the prerequisites.
Which of the following actions should you take?

A. You should consider creating one label and setting the locale to English (US).
B. You should consider creating one label and setting the locale to Dutch (HOL).
C. You should consider creating one label and setting the locale to French (FRA).
D. You should consider creating two labels and setting the locale of one label to English (US) and
the other to Dutch (HOL).

Answer: A

Explanation:


QUESTION 4
You have been asked to make sure that developers are assigned the correct permissions as per
the prerequisites.

A. You should consider making use of the Set Metadata Store Permissions option to assign the
Full permissions.
B. You should consider making use of the Set Metadata Store Permissions option to assign the
Read permissions.
C. You should consider making use of the Set Metadata Store Permissions option to assign the
Edit permissions.
D. You should consider making use of the Set Metadata Store Permissions option to assign the
Write permissions.

Answer: C

Explanation:


QUESTION 5
You are preparing to configure Excel Services to meet the prerequisites.
Which of the following actions should you take?

A. You should consider adding a Trusted Data Connection Library to the ABC360.ABC.com site.
B. You should consider adding an Unattended Service Account to the ABC360.ABC.com.
C. You should consider adding the User-defined functions allowed option to the
ABC360.ABC.com.
D. You should consider adding a trusted file location to the ABC360.ABC.com site.

Answer: D

Explanation:

Preparation To The MCTS Examination online 2015

The children live in a world of examinations. And they have to be aware of selecting these examinations as it can make their life verse or best. And the adults must show them the right path as it is their responsibility. If not they will make it worse. But at present Microsoft has jumped up to show the children the right examination which suited to them. And they have introduced a set of examinations which can be taken by them around the world for a low price. Among those examinations MCTS is a highlighted examination as it is a result oriented job guaranteed examination.

MCTS examination is also known as Microsoft Certified Technology Specialist. By following this certification the candidate has the ability to gain sufficient knowledge about the Information Technology.

How To Prepare For The MCTS examination
The candidate has to choose their interested subject and according to that he has to gain information about the relevant field. The accurate information can be taken from the official website of Microsoft. When going through the information the scholar has to study information such as objectives, course structure, exam conductance procedures.

The candidate must join in the online classes as it provides the candidate with much information. And he can gain updated information. Although the candidate can use traditional books as study materials, it is not much efficient. Therefore the most valid source of information is the internet.
MCTS

Studying the techniques of MCTS

When get used for the MCTS examination the scholar has to be in a free mind. He has to be with free of stress. Therefore follow the steps which can reduce the mental stress of the candidate. And it is better to be with another scholar who is preparing for the examination. It would make everything easy as both of the scholars can discuss the course content and release their problems. As well as it is easy to share the studying materials too. This is the best way to reduce the stress of the scholar. And it will also reduce the chance to be bored. It is a must to get an enough to sleep and rest as it keeps the scholar healthy.

From these facts the candidate might be able to prepare for the examination in a successful manner. And he will be able to finish the examination in a successful manner.
Conclusion

Finally we can conclude that the MCTS examination is a most highlighted certification in the field of Information Technology. It is important to pass this examination if somebody wishes to be a professional in Information Technology.


 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Microsoft Exam 70-576: Get PRO at Designing and Developing Microsoft SharePoint Applications

Exam Code : 70-576
Exam Title : PRO: Designing and Developing Microsoft SharePoint 2010 Applications

Microsoft Exam 70-576: Get PRO at Designing and Developing Microsoft SharePoint Applications
Microsoft certification 70-576 exam is all about designing and developing SharePoint application. It was designed in English language on July 12, 2010. It targeted towards Developers and made using the technology of Microsoft SharePoint Server.OLYMPUS DIGITAL CAMERA

Candidate Profile
The Microsoft 70-576 holder will be responsible for designing custom code projects for SharePoint Servers. This will include selecting technology from a number of ways to build code of SharePoint. Also ensuing that the development team’s environment is configures, creating the best strategy for code deployment, structuring, configuration and versioning. The candidate is also suppose to lead a team of SharePoint developers, has a minimum of 2 years of experience of SharePoint development and 3 years of ASP.NET development experience.

Skills Being Measured
This exam will determine your skills and knowledge in the below mentioned key area. The percentage in front of each key area is the weight that particular major topic. However, the topics are not limited to this list and can be changed.

Creating an Application Design (19%)
Evaluating application data access
Identifying artifacts from application requirements
Selection of deployment model
Selecting the appropriate execution method

Designing UX (17%)
Determining the presentation page type
Determining SharePoint visual components
Planning branding strategy
Designing application customization strategy
Designing navigation strategy

Managing Application Development (18%)
Designing for localization and globalization
Developing a security approach
Defineing application configuration approach

Optimizing SharePoint Application Design (15%)
Optimizing page performance
Optimizing data access
Designing for logging and exception handling
Identifying and Resolving deployment issues
Analyzing memory utilization

Designing SharePoint Composite Applications (13%)
Designing external application integration
Determining data capturing approach
Designing SharePoint information architecture

Designing SharePoint Solutions and Features (18%)
For acquiring best result you need to avail all the training offers provided by Microsoft. From classroom training to e-learning they have it all. They provide teaching material and press books. You can join their chat rooms, newsgroups and forums and talk to Microsoft team. You can join Microsoft Learning Community, this is a community where you can connect to forums and ask your peers for suggestions about training resources and take their advice on this course. It is highly recommended by Microsoft that you purchase the learning material for best results.

 


 

MCTS Training, MCITP Trainnig

Best Microsoft MCITP Training , Microsoft 70-575 Training at certkingdom.com

Containers vs. virtual machines: How to tell which is the right choice for your enterprise

There’s a lot more to it than just how many apps you can put in a box

Name a tech company, any tech company, and they’re investing in containers. Google, of course. IBM, yes. Microsoft, check. But, just because containers are extremely popular, doesn’t mean virtual machines are out of date. They’re not.

Yes, containers can enable your company to pack a lot more applications into a single physical server than a virtual machine (VM) can. Container technologies, such as Docker, beat VMs at this part of the cloud or data-center game.

VMs take up a lot of system resources. Each VM runs not just a full copy of an operating system, but a virtual copy of all the hardware that the operating system needs to run. This quickly adds up to a lot of RAM and CPU cycles. In contrast, all that a container requires is enough of an operating system, supporting programs and libraries, and system resources to run a specific program.

What this means in practice is you can put two to three times as many as applications on a single server with containers than you can with a VM.

In addition, with containers you can create a portable, consistent operating environment for development, testing, and deployment. That’s a winning trifecta.

If that’s all there was to containers vs. virtual machines then I’d be writing an obituary for VMs. But, there’s a lot more to it than just how many apps you can put in a box.
Container problem #1: Security

The top problem, which often gets overlooked in today’s excitement about containers, is security. As Daniel Walsh, a security engineer at Red Hat who works mainly on Docker and containers puts it: Containers do not contain. Take Docker, for example, which uses libcontainers as its container technology. Libcontainers accesses five namespaces — Process, Network, Mount, Hostname, and Shared Memory — to work with Linux. That’s great as far as it goes, but there’s a lot of important Linux kernel subsystems outside the container.

These include all devices, SELinux, Cgroups and all file systems under /sys. This means if a user or application has superuser privileges within the container, the underlying operating system could, in theory, be cracked.

That’s a bad thing.
Now, there are many ways to secure Docker and other container technologies. For example, you can mount a /sys file system as read-only, force container processes to write only to container-specific file systems, and set up the network namespace so it only connects with a specified private intranet and so on. But, none of this is built in by default. It takes sweat to secure containers.

The basic rule is that you’ll need to treat containers the same way you would any server application. That is, as Walsh spells out:

Another security issue is that many people are releasing containerized applications. Now, some of those are worse than others. If, for example, you or your staff are inclined to be, shall we say, a little bit lazy, and install the first container that comes to hand, you may have brought a Trojan Horse into your server. You need to make your people understand they cannot simply download apps from the Internet like they do games for their smartphone.

OK, so if we can lick the security problem, containers will rule all, right? Well, no. You need to consider other container aspects.

Rob Hirschfeld, CEO of RackN and OpenStack Foundation board member, observed that: “Packaging is still tricky: Creating a locked box helps solve part of [the] downstream problem (you know what you have) but not the upstream problem (you don’t know what you depend on).”
Breaking deployments into more functional discrete parts is smart, but that means we have MORE PARTS to manage. There’s an inflection point between

To this, I would add that while this is a security problem, it’s also a quality assurance problem. Sure, X container can run the NGINX web server, but is it the version you want? Does it include the TCP Load Balancing update? It’s easy to deploy an app in a container, but if you’re installing the wrong one, you’ve still ended up wasting time.

Hirschfeld also pointed that out container sprawl can be a real problem. By this he means you should be aware that “Breaking deployments into more functional discrete parts is smart, but that means we have MORE PARTS to manage. There’s an inflection point between separation of concerns and sprawl.”

Remember, the whole point of a container is to run a single application. The more functionality you stick into a container, the more likely it is you should been using a virtual machine in the first place.

So how do you go about deciding between VMs and containers anyway? Scott S. Lowe, a VMware engineering architect, suggests that you look at the “scope” of your work. In other words if you want run multiple copies of a single app, say MySQL, you use a container. If you want the flexibility of running multiple applications you use a virtual machine.

In addition, containers tend to lock you into a particular operating system version. That can be a good thing: You don’t have to worry about dependencies once you have the application running properly in a container. But it also limits you. With VMs, no matter what hypervisor you’re using — KVM, Hyper-V, vSphere, Xen, whatever — you can pretty much run any operating system. Do you need to run an obscure app that only runs on QNX? That’s easy with a VM; it’s not so simple with the current generation of containers.

So let me spell it out for you.
Do you need to run the maximum amount of particular applications on a minimum of servers? If that’s you, then you want to use containers — keeping in mind that you’re going to need to have a close eye on your systems running containers until container security is locked down.

If you need to run multiple applications on servers and/or have a wide variety of operating systems you’ll want to use VMs. And if security is close to job number one for your company, then you’re also going to want to stay with VMs for now.

In the real world, I expect most of us are going to be running both containers and VMs on our clouds and data-centers. The economy of containers at scale makes too much financial sense for anyone to ignore. At the same time, VMs still have their virtues.

As container technology matures, what I really expect to happen, as Thorsten von Eicken, CTO of enterprise cloud management company RightScale, put it is that VM and containers will come together to form a cloud portability nirvana. We’re not there yet, but we will get there.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Samsung profits drop in wake of iPhone 6 rollout

The company is banking on new tech and services to attract customers to new smartphones

Samsung Electronics registered its sixth straight quarterly decline in profits in the first three months of this year as competition bit into its key smartphone and display businesses.

The company said net profit during the January to March quarter fell 39 percent on the same period last year to 4.6 trillion won (US$4.3 billion). Revenue was 47 trillion won, down 12 percent, in line with guidance issued earlier in April.

Samsung is under fierce pressure in the smartphone sector, where low-cost Chinese rivals are eroding sales at the low-end while Apple is winning customers at the high end.

The company doesn’t disclose precise smartphone sales figures, but it said it sold 99 million phones of all types during the quarter. Of those, the share of smartphones was in the “mid 80s percent,” it said in a conference call with investors.

Revenue in its mobile division during the quarter was down by a fifth while operating profit in the division collapsed by 57 percent year-on-year to 2.7 trillion won.

The runaway success of the iPhone 6 and iPhone 6 Plus, detailed when Apple reported its earnings on Monday, has made it even more important that Samsung scores a hit with the Galaxy S6, it’s newest flagship handset that went on sale recently.

Apple is riding high on the success of the new phones, the first from the company to come close to matching the large screens found on Samsung’s flagship handsets, and winning customers in China where demand easily outstripped supply.

Looking ahead, Samsung said it expects earnings to improve thanks to increased high-end sales as the Galaxy S6 rolls out worldwide although low- and mid-end smartphone sales are expected to be largely unchanged.

Sales are expected to remain around the same as the first quarter, although the average selling price of each phone is expected to jump a little from the $200 recorded during the first quarter.

Samsung said it plans to focus on new technologies, such a wireless charging, and new services, such as Samsung Pay, to drive demand for its phones.

Its device business, which is a major manufacturer of flat-panel displays and memory chips, saw sales rise 10 percent on the year and operating profit surge 81 percent thanks to strong demand for chips for servers and large-size TV panels.


 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

 

VCP510 VMware Certified Professional 5 – Data Center Virtualization


QUESTION 1
Which VMware solution uses the security of a vSphere implementation and provides linked-clone
technology to virtual desktops?

A. VMware ACE
B. VMware View
C. VMware Workstation
D. VMware ThinApp

Answer: B

Explanation:
Reference:http://www.vmware.com/files/pdf/VMware-View-4-Composer-DS-EN.pdf(page 1, last
paragraph)


QUESTION 2
An administrator has recently upgraded their Update Manager infrastructure to vSphere 5.x.
Several hosts and virtual machines have not been upgraded yet.
Which vSphere component when upgraded will have the least impact to the existing environment?

A. Virtual Machine Hardware
B. ESX Hosts
C. VMFS datastores
D. VMware Tools

Answer: D

Explanation:
VMware Tools isn’t a single application but a set of drivers, services and user processes that’s
installed in a guest operating system. They add a wide assortment of functionality to VMware
infrastructures — everything from improving color depth and video resolution in the vSphere Client
to memory optimization.
Typically, an outdated version of VMware Tools doesn’t have an immediate impact. But with every
update to vSphere, you’ll likely have to update VMware Tools on every virtual machine.


QUESTION 3
An administrator is using Update Manager 5.x to update virtual appliances in a vSphere
environment. The environment is using the vCenter Server Virtual Appliance (vCSA).
What would cause the remediation to fail?

A. Updating of the appliance can only be done if the vCenter Server Virtual Appliance (vCSA) has
been put into Maintenance Mode.
B. Remediation must be configured on the Appliance Administration page before use.
C. Remediation of the vCenter Server Virtual Appliance (vCSA) with Update Manager is not
supported.
D. Remediation requires the hosts to be connected to vCenter using an IPv4 address.

Answer: D

Explanation:
Update Manager 5.0 does not support virtual machine patch baselines.If a host is connected to
vCenter Server by using an IPv6 address, you cannot scan and remediate virtual machines and
virtual appliances that run on the host.


QUESTION 4
An administrator is working to update the hosts and virtual machines in a vSphere 5.x deployment
using Update Manager Baselines.
Other than host patches, which three items require a separate procedure or process to update?
(Choose three.)

A. Operating system patches
B. Virtual Appliance updates
C. Virtual Machine Virtual Hardware upgrades
D. VMware Tools on machines without VMware Tools already installed
E. Application patches within the virtual machine

Answer: A,D,E

Explanation:
Operating system patches are related to operating system so they need a separate procedure
altogether. Same is the case with VMware tools and applications patches because applications
are stand alone pieces of code that need separate procedure to apply a patch.


QUESTION 5
A series of Auto Deploy ESXi 5.x hosts, which utilize vSphere Standard Switches, are unable to
boot. In prior testing, all of the hosts were able to boot successfully.
Which two conditions might cause this issue? (Choose two.)

A. The Hosts are unable to connect to the SAN.
B. The TFTP server is down.
C. The DNS server is down.
D. The DHCP server is down.

Answer: B,D

Explanation:
If the TFTP server is down, ESXi will not boot because it needs TFTP to get the information.
Similarly, when DHCP is down, it will not assign the IP addresses and ESXi needs IP address to
boot properly.


MCTS Training, MCITP Trainnig

Best VMware Certification, VMware VCP510  Training at certkingdom.com

Lessons from Altoona: What Facebook’s newest data center can teach us

How can Facebook’s data center design apply to your data center plans?
Over the past year, Facebook has thrown some interesting wrenches into the gears of the traditional networking industry. While mainstream thinking is to keep most details of your network operations under wraps, Facebook has been freely sharing its innovations. For a company whose business model is built on people sharing personal information, I suppose this makes perfect sense.

What makes even more sense is the return Facebook gets on their openness. Infrastructure VP Jason Taylor estimates that over the past three years Facebook has saved some $2 billion by letting the members of its Open Compute Project have a go at its design specifications.

But what really turned heads was last year’s announcement of Wedge, an open top-of-rack switch developed with the OCP community. Wedge was followed eight months later by 6-Pack, a modular version of Wedge purposed for the network core. Added to these bare-metal switches is FBOSS, an open Linux-based network operating system (well, not exactly an operating system – more on that in a later post), and OpenBNC for system management.

Why this openness matters to the rest of us is that all of this is not just a mad-science project within Facebook’s lair. You can soon buy Wedge through Taiwanese switch manufacturer Accton, bringing switches into your data center for a fraction of the cost of proprietary switches with integrated operating systems. And you’re not locked in to running FBOSS on the switch either. You can shop around, choosing the NOS that makes the most sense to you, such as Open Network Linux, Cumulus Linux, Big Switch Switch Light, and possibly others such as Pica8’s PicOS or even Juniper’s JUNOS. If you have an intrepid team of developers with time on their hands you can even build your own.

I’ll write more about open switches and open software in subsequent articles, but for now I want to focus on what Facebook has been sharing about their innovations in data center network design and what it means for you. Last November, between the announcements of Wedge and 6-Pack, Facebook opened its newest data center in Altoona, Iowa. And as it has done with its other network innovations, Facebook openly shared its new design.

It turns out that there are some valuable takeaways from the Altoona design that can be applied to data centers of any size.

Hyperscale Misconceptions
Say “hyperscale data center” to most anyone who keeps up with such things, and they’ll reflexively name Facebook, Google, and Amazon. And because of this association, people think of hyperscale as something that applies only to mammoth data centers supported by an army of developers.

In reality, hyperscale just means the ability to scale out very rapidly. A hyperscale data center network might be small, but it can grow exponentially larger without changing the fundamental components and structures of the network. You should be able to use the same switches and the same interconnect patterns as you grow – just more of them. You do not need to throw out one class of switches for another just to accommodate growth.

You can have a data center consisting of just a few racks, and if the network is designed right it is a hyperscale data center. Hyperscale is a capability, not a size.

Another misconception about hyperscale data centers is that they are optimized for one or a relatively few applications at massive scale across the entire data center. This stems particularly from the Facebook and Google associations. Hyperscale designs are in fact ideal for very heavy east-west workloads, but hyperscale design principles can apply to an average enterprise data center, supporting hundreds of business applications just as easily as it supports a single social media, big data, or search app.

Hyperscale also conjures up images of do-it-yourself networks built from the silicon up by a cadre of brilliant young architects commanding salaries far out of reach of the average network operator. That might be true of the innovators, but because Facebook has laid its work right out on the table, mere mortals like you and I can put their design principles to work in our own data centers.

To appreciate the significance of the Altoona network, let’s first have a look at the network architecture Facebook is using in its earlier data centers.

Good is not good enough: Facebook’s cluster design
Figure 1 shows Facebook’s pre-Altoona aggregated cluster design, which they call the “4-post” architecture. Up to 255 server cabinets are connected through ToR switches (RSW) to high-density cluster switches (CSW). The RSWs have up to 44 10G downlinks and four or eight 10G uplinks. Four CSWs and their connected RSWs comprise a cluster.
041415 figure 1

Four “FatCat” (FC) aggregation switches interconnect the clusters. Each CSW has a 40G connection to each of the four FCs. An 80G protection ring connects the CSWs within each cluster, and the FCs are connected to a 160G protection ring.

This is a good design in several ways. Redundancy is good; oversubscription is good (generally 10:1 between RSWs and CSWs, 4:1 between CSWs and FCs); the topology is reasonably flat with no routers interconnecting clusters; and growth is managed simply, at least up to the 40G port capacity of the FCs, by adding new clusters.

But Facebook found that good is not good enough.
Most of the problems with this architecture stem from the necessity of very large switches for the CSWs and FCs:

With just four boxes handling all intra-cluster traffic and four boxes handling all inter-cluster traffic, a switch failure has a serious impact. One CSW failure reduces intra-cluster capacity by 25%, and one FC failure reduces inter-cluster capacity by 25%.
Very large switches restrict vendor choice – there are only a few “big iron” manufacturers. And because these few vendors sell relatively fewer big boxes, the per-port CapEx and OpEx is disproportionately high when compared to smaller switches offered by a larger number of vendors.
The proprietary internals of these big switches prevent customization, complicate management, and extend waits for bug fixes to months or even years.
Large switches tend to have oversubscribed switching fabrics, so all ports cannot be used simultaneously.
The cluster switches’ port densities limit the scale and bandwidth of these topologies, and make transitions to next-generation port speeds too slow.
Facebook’s distributed application creates machine-to-machine traffic that is difficult to manage within an aggregated network design.

The individual pods are connected via 40G uplinks to four spine planes, as shown in Figure 3. Each spine plane can have up to 48 switches. Key to this topology is that the fabric switches each have an equal number of 40G downlinks and uplinks – maxing out at 48 down an 48 up – so the fabric is non-blocking and there is no oversubscription between pods. Bisectional bandwidth, running to multi petabits, is consistent throughput the data center.

The diagram in Figure 3 shows the color-coded connections between fabric switches and their corresponding spine planes, but doesn’t do justice to how it all ties together. And something that surely strikes you is that there are a lot of links between fabric switches and spine switches. Optics and cables can become expensive, so it’s important to manage the distances between pods and spine planes. (If you’re interested in learning more about Facebook’s architectures, here are the source documents I used for cluster architecture (PDF) and the Altoona architecture.)

If you rotate the pods and line them up, the way the 48 racks of each pod would be arranged into rows in the data center, and then do the same with the spine planes – but lining them up perpendicular to the pods – you get the three-dimensional diagram shown in Figure 4, with the fabric switches becoming part of the spine planes. Distance between fabric switches and spine switches are reduced. Note that there are also edge pods, which provide external connectivity to the fabric.

Facebook network engineer Alexey Andreyev describes the fabric this way: “This highly modular design allows us to quickly scale capacity in any dimension, within a simple and uniform framework. When we need more compute capacity, we add server pods. When we need more intra-fabric network capacity, we add spine switches on all planes. When we need more extra-fabric connectivity, we add edge pods or scale uplinks on the existing edge switches.”

If you want to hear Andreyev describe the Altoona architecture himself, here’s an excellent video:

Altoona Takeaways

You might be wondering by now what any of this has to do with you and your data center. After all, Facebook is supporting more or less a single distributed application generating machine-to-machine traffic spanning its entire data center. You probably don’t. And while a 48-rack pod is a scale-down from their earlier clusters, most enterprise data centers in their entirety are smaller than 48 server racks.

So why should you care? Because it’s not the scale. It’s the scalability.
The fundamental takeaways from the Altoona design are the advantages of building your data center network using small open switches, in an architecture that enables you to scale to any size without changing the basic building blocks. First look at the switches. You don’t have to wait for Wedge or 6-Pack to go on the market (Accton will be selling Wedge soon). You can pick up bare-metal switches from Accton, Quanta, Celestica, Dell, and others for a fraction of the cost a big-name vendor will charge. For example, a Quanta switch with 32 40G ports lists for $7,495. A Juniper QFX5100 with 24 40G ports lists for a little under $30,000. Is that a fair comparison? That JUNOS premium gives you a pretty awesome operating system, but the bare-metal switch gives you a bunch of options for loading an OS of your choice.

As for the pod and core design, that can be adjusted to your own needs. The pod can be whatever size you want; while the “unit of network” is a wonderful concept, it’s not a rule. You can create a number of pod designs to fit specific workflow needs, or just to start a migration away from older architectures. Pods can also be application specific. As your data center network grows, or you adopt newer technologies, you can non-disruptively “plug in” new pods.

The same goes for the core part. You can build it at layer 2, or at layer 3. It all depends on the workflows you’re supporting. Using a simple pod and core design you can manageably grow your data center network at whatever rate makes sense to you, from a new pod every few years to an explosive growth of new pods every few months.


 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

What’s behind Microsoft’s not-so-crazy startup spending spree

CEO Nadella’s influence, platform-agnostic approach cited

Microsoft so far this year has been the most acquisitive company in enterprise IT, snapping up at least four firms on top of four others that it bought in the last two months of 2014. And while the buyouts might at first glance appear scattershot – we’re talking text analysis, calendaring and digital pen startups among others — there does seem to be a grand plan here.

Our regularly updated Enterprise Networking & IT Acquisition Tracker shows through the first calendar quarter that Microsoft has announced more than twice as many buyouts as any other company (not that all acquisitions are immediately made public and taking into account that our tracker is focused on enterprise-related acquisitions — Google has bought at least four consumer-oriented companies).

Microsoft (NASDAQ: MSFT) is starting its 40th year on a real buyout tear, fleshing out its mobile, cloud and big data/analytics offerings through acquisitions as it moves forward on big initiatives such as Windows 10 and its new Spartan browser. According to the company’s own Acquisition History chart — see a condensed and sortable version at the very end of this article — Microsoft has not gobbled up five companies in a quarter since 2008 when it bought 9 firms, not many of which most people would recall. Caligari or Credentica anyone?

Of the hundreds of TED talks available online, many are geared toward helping people view life in a new
Microsoft finished 2008 with 16 announced buyouts, the most of any year included in its Acquisition History tracker, which goes back to 1994. Wikipedia keeps a list that dates back to 1987, but few purchases were made between then and ’94. Other than for its largest deals, Microsoft is cryptic about how much it pays for companies, requiring those interested to ferret through its SEC filings for clues.

So, Microsoft is on a record-breaking M&A pace for calendar year 2015 — its fiscal year starts in July and ends in June — and all of the deals so far have possible enterprise IT implications. The rundown: LiveLoop is involved in PowerPoint collaboration; Equivio makes text analytics/e-discovery software that could bolster Office 365; and open source company Revolution Analytics promises to bring R programming to more IT shops. It has also been widely reported that Microsoft is buying Israel’s N-trig, which sells digital pens for devices like the Surface Pro 3 tablet (If the N-trig deal is in fact true, three of Microsoft’s last nine deals would have involved Israeli firms). One other deal, Microsoft’s acquisition of iOS/Android calendaring app maker Sunrise, is a consumer-focused pact on the surface but an investor says Sunrise had business use cases in mind.

Microsoft is also rumored to be a front-runner to buy social news reader Prismatic, which would not appear to be an enterprise-related buy.

As Fortune wrote recently, “Microsoft is buying startups people love…”
We reached out to Microsoft a week ago to discuss the spending spree with their M&A personnel and we will either update this article or create a new one if they do get back to us. In the meantime, we got feedback from industry watchers and investors, all of whom credit CEO Satya Nadella and his “new” Microsoft for heading aggressively down the acquisition path.

“Right now is a great time for Microsoft to be buying startups,” says Forrester VP and Principal Analyst J.P. Gownder (@JGownder). “Companies in some of these fields, like machine learning (Equivio), are solving really specific problems in computational intelligence, and would require Microsoft to staff up big teams to catch up. In other cases, the company purchased is already a key partner [such as heavily reported but unconfirmed N-trig buyout]. And in yet other cases, they are receiving IP that applies to their cross-platform strategy to deliver iOS and Android apps (as with Sunrise). These are all well-considered, smart acquisitions.”

CEO Nadella has indeed been a force behind Microsoft’s approach, Gownder says.
“Satya Nadella is driving a new Microsoft forward: One that is more agile, more attuned to customer needs, and less entrenched in the platform wars. He wants to deliver an experience for Windows that customers will ‘love’ (not tolerate), in his words, while also empowering Microsoft to deliver software and services on non-Windows platforms. To accomplish these goals, he needs the traditionally contemplative, slow Microsoft organization to move more quickly. So these acquisitions flow naturally from the new mindset, and bode well for Microsoft’s future (even if a lot of work remains to be done).”

Rob Go (@RobGo), co-founder and partner at Sunrise investor NextView Ventures, concurs.
“Microsoft has had a history of growing its product and talent base for many years. But under Satya Nadella, what we are seeing is a company moving with renewed strategic focus and conviction. One major theme that ties together many of these

acquisitions is a newfound respect for the ecosystem that surrounds the company’s software and hardware products. From an ethos that was much more protective and silo-ed, Microsoft is making major moves in extending their software onto other companies’ platforms (leading productivity apps on IOS and Android like Sunrise and Acompli, a platform-agnostic file viewing service like LiveLoop, third-party integrations with Dropbox, etc).”
ted talks logo

Six TED Talks that can change your career
Jack Gold (@jckgld), principal analyst and founder of J. Gold Associates, describes Microsoft’s moves as both offensive and defensive, and a good use of a cash hoard that hovers around $90 billion even if the company is just scooping up qualified professional staff additions.

“Nadella has refocused Microsoft on becoming innovative again, after a significant number of years where it mainly coasted,” he says. “The acquisitions signal a willingness to go outside for tech it doesn’t have, but thinks it needs to be competitive long term with Google, Apple, IBM, Samsung, etc. Further, it signals that it’s full blown into going to the cloud, after its lukewarm thrusts under the previous management. That’s the offensive side.”

Defensively, look for Microsoft to consume valuable startups and other companies going forward before Google, Apple and others do, Gold says. “As for what this means for enterprise, I see Microsoft’s newfound willingness to go after tech outside its four walls as a refresh of its earlier years where it was an innovator” with Office, Exchange and Windows, he says.

While none of Microsoft’s latest deals would be characterized as blockbusters – unlike billion-dollar-plus transactions in recent years for Nokia’s phone business, Skype and even Minecraft maker Mojang – the startups being stockpiled could pay big dividends for the company and its customers.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Go to Top