What are the major tech companies doing to win in the cloud, and how might
the market shake out?
There's an old joke that starts: How do you make God laugh?
The answer, of course: Make plans.
Larger services companies bent on world domination have poised a lot of capital
into developing cloud resources, and some aren't doing well. Let's ignore
Software-as-a-service/SaaS and pure-play cloud services companies, and instead
let's focus on some new entrants that staked their claims in other markets
beside cloud.
Dell
What They Did: Clouds are made of up disk and virtual stuff, and Dell just
bought EMC – whose disk empire is legendary – and with it, a huge chunk of
VMware, whose feisty formula for virtualizing all-things-not-nailed-down is
legendary.
What Might Happen: In one huge private (not public) transaction, Dell gets The
Full Meal Deal, and makes up for a half-decade of losing ground.
Amazon
What They Did: Like all good B-School grads, they took a key success ingredient
in their rapidly evolving IT infrastructure and resold excess capacity at such a
price as to make it highly attractive to the IT-Maker hybrid community, thus
launching still another way to make Amazon more fluid whilst spawning developer
and service provider imaginations.
What Might Happen: All leaders are the biggest targets of competitors, who learn
by a leader's mistakes, and find cracks to drive hydraulically powered wedges.
They've captured imagination, and to keep the pace of that attractiveness and
fluidity, must imagine products that don't go stale easily through a long
revenue cycle. I say: spin-off.
Microsoft
What They Did: Dawdled, then attempted to take an increasingly brittle if varied
and successful computing infrastructure for businesses, along with a huge user
base, then not only adapted it for the web, but also made licensing suitable for
actual virtualization—then cloud use. Their cloud offering, Azure, now mimes
appliance, DevOps/AgileDev, and ground-floor services of their strongest
competitors, if a little green in places.
What Might Happen: Microsoft will continue to try to leverage a huge user base
into forward-thinking capabilities to extend but not destroy F/OSS initiatives,
gleaning the good stuff and vetting as much as is possible into the user cloud
model, and also the hybrid and public cloud models. Profit!
Oracle
What They Did: After the indigestion of Sun and MySQL, Oracle wrestled with
evolving their own vertical cloud, knowing that their highly successful DB
products required comparative platform (and also customer) control. Attempts at
virtualization weren't very successful, but the oil well in the basement, SQL
infrastructure, continued to produce oil. Cloud offerings were designed for
their target clientele and no others, holding ground while not losing ground.
What Might Happen: Oracle's enterprise clientele has a love/hate relationship
with Oracle, and migration to another platform makes them shudder and perspire.
Core line-of-business functionality continues to evolve but at a
comparatively/competitively lower pace than visible progress made in the arena
Oracle plays in.
HP
What They Did: HP purchased Eucalyptus, a burgeoning cloud emulation and DevOps/AgileDev
integration software organization known for their AWS emulation private cloud
capabilities. HP evolved the purchase into the HP Helion Cloud, which offered
private, public, and hybrid clouds. Development appeared (to me) to languish at
least in the public space as smaller competitors, notably Rackspace (and other
pure-play cloud services organizations) evolved. HP announced last week that
they're dropping the public portion of their Helion Cloud, after changing
management earlier.
What Might Happen: As a hardware company, HP competes potentially with cloud
services organizations on the cloud front. Its support for initiatives like
OpenStack may change. Now that competitor Dell will digest EMC and VMware, the
game has changed.
“If you do one thing, do it very well.” That mantra seems to ring true, and each
of these organization has struggled to keep up with the pace of change and
competitive pricing, all while attempting to gain, rather than hold, ground.
Juggling clouds, to coin a metaphor, isn't easy.
There's one motivating a migration to the cloud that must be absorbed by cloud
services organizations that no one likes to talk about: shifting depreciation.
Each of these organizations (and more like them) faces cost models while the
sands of depreciation fall through the ROI glass.
Tuesday, October 27, 2015
Monday, June 8, 2015
70-687 Configuring Windows 8.1
70-687 Configuring Windows 8.1
Published: 17 September 2012
Languages: English, Chinese (Simplified), French, German, Japanese, Portuguese (Brazil)
Audiences: IT professionals
Technology: Windows 8.1
Credit towards certification: MCP, MCSA, MCSE
Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area in the exam. The higher the percentage, the more questions you are likely to see on that content area in the exam.
Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.
As of January 2014, this exam includes content covering Windows 8.1.
Install and upgrade to Windows 8.1 (10–15%)
Evaluate hardware readiness and compatibility
Choose between an upgrade and a clean installation; determine which SKU to use, including Windows RT; determine requirements for particular features, including Hyper-V, Miracast display, pervasive device encryption, virtual smart cards and Secure Boot
Install Windows 8.1
Install as Windows To Go, migrate from previous versions of Windows to Windows 8.1, upgrade from Windows 7 or Windows 8 to Windows 8.1, install to VHD, install additional Windows features, configure Windows for additional languages
Migrate and configure user data
Migrate user profiles; configure folder location; configure profiles, including profile version, local, roaming and mandatory
Preparation resources
Utility spotlight: Are you compatible with Windows 8?
Install, deploy and migrate to Windows 8
Windows 8 upgrade paths
Configure hardware and applications (10–15%)
Configure devices and device drivers
Install, update, disable and roll back drivers; resolve driver issues; configure driver settings, including signed and unsigned drivers; manage driver packages
Install and configure desktop apps and Windows Store apps
Install and repair applications by using Windows Installer, configure default program settings, modify file associations, manage access to Windows Store
Control access to local hardware and applications
Configure application restrictions, including Software Restriction Policies and AppLocker; manage installation of and access to removable devices; configure Assigned Access
Configure Internet Explorer 11 and Internet Explorer for the desktop
Configure compatibility view; configure Internet Explorer 11 settings, including add-ons, downloads, security and privacy
Configure Hyper-V
Create and configure virtual machines, including integration services; create and manage checkpoints; create and configure virtual switches; create and configure virtual disks; move a virtual machine’s storage
Preparation resources
Device drivers and deployment
Managing client access to the Windows Store
Configure network connectivity (10-15%)
Configure IP settings
Configure name resolution, connect to a network, configure network locations
Configure networking settings
Connect to a wireless network, manage preferred wireless networks, configure network adapters, configure location-aware printing
Configure and maintain network security
Configure Windows Firewall, configure Windows Firewall with Advanced Security, configure connection security rules (IPsec), configure authenticated exceptions, configure network discovery
Configure remote management
Choose the appropriate remote management tools; configure remote management settings; modify settings remotely by using MMCs or Windows PowerShell; configure Remote Assistance, including Easy Connect
Preparation resources
Managing the new wireless network (IEEE 802.11) policies settings
Windows Firewall with advanced security and IPsec
Deploy remote server administration tools
Configure access to resources (10–15%)
Configure shared resources
Configure shared folder permissions, configure HomeGroup settings, configure libraries, configure shared printers, set up and configure OneDrive
Configure file and folder access
Encrypt files and folders by using Encrypting File System (EFS), configure NTFS permissions, configure disk quotas, configure file access auditing
Configure authentication and authorisation
Configure user rights, manage credentials, manage certificates, configure biometrics, configure picture passwords, configure PIN, set up and configure Microsoft account, configure virtual smart cards, configure authentication in workgroups or domains, configure User Account Control (UAC) behaviour
Preparation resources
Microsoft Virtual Academy: Windows 8 security insights: Module 7—SmartScreen filtering
Windows authentication overview
Configure remote access and mobility (15–20%)
Configure remote connections
Configure remote authentication, configure Remote Desktop settings, configure virtual private network (VPN) connections and authentication, enable VPN reconnect, configure broadband tethering
Configure mobility options
Configure offline file policies, configure power policies, configure Windows To Go, configure sync options, configure WiFi direct
Configure security for mobile devices
Configure BitLocker and BitLocker To Go, configure startup key storage
Preparation resources
Windows 8 VPN get connected
Deploy Windows To Go in your organisation
BitLocker Group Policy settings
Monitor and maintain Windows clients (10–15%)
Configure and manage updates
Configure update settings, configure Windows Update policies, manage update history, roll back updates, update Windows Store apps
Manage local storage
Manage disk volumes and file systems, manage storage spaces
Monitor system performance
Configure and analyse event logs, configure event subscriptions, configure Task Manager, monitor system resources, optimise networking performance, configure indexing options
Preparation resources
Windows Update PowerShell module
Windows Performance Monitor
Windows 8: Task Manager retuned
Configure system and data recovery options (10-15%)
Configure system recovery
Configure a recovery drive, configure system restore, perform a driver rollback, perform a refresh or recycle, configure restore points
Configure file recovery
Restore previous versions of files and folders, configure file history, recover files from OneDrive
Preparation resources
Repair and recovery
How to: Set up and use file history on Windows 8
Windows 8 Jump Start Module 6: Recovery and security
QUESTION 1
A company has 100 client computers that run Windows 8. You need to assign static IPv6
addresses to the client computers. Which Windows Powershell cmdlet should you run?
A. Set-NetTCPSetting
B. Set-NetIPInterface
C. Set-NetlPv6Protocol
D. set-NetIPAddress
Answer: D
QUESTION 2
A company has an Active Directory Domain Services (AD DS) domain. All client computers run
Windows 8. Portable client computers no longer connect to the corporate wireless network. You
need to ensure that when the corporate wireless network is available, the computers always
connect to it automatically. Which two actions would achieve the goal? (Each correct answer
presents a complete solution. Choose two.)
A. Create a Group Policy object (GPO) to configure a wireless network policy. Link the GPO to
the organizational unit that contains the computers.
B. Configure the corporate wireless network as an unmetered network.
C. Configure the corporate wireless network as a preferred network.
D. Manually connect to the corporate wireless network and select the option to connect
automatically to that network.
Answer: CD
QUESTION 3
A company has client computers that run Windows 8. The corporate network is configured for
IPv4 and IPv6. You need to disable Media Sensing for IPv6 on the client computers without
affecting IPv4 communications. What should you do on each client computer?
A. Run the Disable-NetAdapterBinding Windows PowerShell cmdlet.
B. Run the Disable-NetAdapter Windows PowerShell cmdlet.
C. Run the Set-NetlPv6Protocol Windows PowerShell cmdlet.
D. Run the Set-NetlPv4Protocol Windows PowerShell cmdlet.
Answer: C
QUESTION 4
DRAG DROP
A company has an Active Directory Domain Services (AD DS) domain. All client computers run
Windows 8. Two computers named COMPUTER1 and COMPUTER2 are connected to one network
switch and joined to the domain. Windows Firewall is turned off on both computers. You are
planning a remote management solution. You have the following requirements:
* Ensure that COMPUTER2 can run remote commands on COMPUTER1.
* Test the solution by successfully running a command from COMPUTER2 that executes on
COMPUTER1.
You need to select the commands to run on COMPUTER1 and COMPUTER2 to meet the remote
management requirements. Which commands should you run?
To answer, drag the appropriate command or commands to the correct location or locations in
the answer area. Commands may be used once, more than once, or not at all. You may need to
drag the split bar between panes or scroll to view content.
Select and Place:

Answer:

QUESTION 5
A company has 100 client computers that run Windows 8. The client computers are members of a
workgroup. A custom application requires a Windows Firewall exception on each client computer.
You need to configure the exception on the client computers without affecting existing firewall
settings. Which Windows PowerShell cmdlet should you run on each client computer?
A. New-NetFirewallRule
B. Set-NetFirewallSetting
C. Set-NetFirewallRule
D. Set-NetFirewallProfile
E. New-NetIPSecMainModeRule
Answer: A
Published: 17 September 2012
Languages: English, Chinese (Simplified), French, German, Japanese, Portuguese (Brazil)
Audiences: IT professionals
Technology: Windows 8.1
Credit towards certification: MCP, MCSA, MCSE
Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area in the exam. The higher the percentage, the more questions you are likely to see on that content area in the exam.
Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.
As of January 2014, this exam includes content covering Windows 8.1.
Install and upgrade to Windows 8.1 (10–15%)
Evaluate hardware readiness and compatibility
Choose between an upgrade and a clean installation; determine which SKU to use, including Windows RT; determine requirements for particular features, including Hyper-V, Miracast display, pervasive device encryption, virtual smart cards and Secure Boot
Install Windows 8.1
Install as Windows To Go, migrate from previous versions of Windows to Windows 8.1, upgrade from Windows 7 or Windows 8 to Windows 8.1, install to VHD, install additional Windows features, configure Windows for additional languages
Migrate and configure user data
Migrate user profiles; configure folder location; configure profiles, including profile version, local, roaming and mandatory
Preparation resources
Utility spotlight: Are you compatible with Windows 8?
Install, deploy and migrate to Windows 8
Windows 8 upgrade paths
Configure hardware and applications (10–15%)
Configure devices and device drivers
Install, update, disable and roll back drivers; resolve driver issues; configure driver settings, including signed and unsigned drivers; manage driver packages
Install and configure desktop apps and Windows Store apps
Install and repair applications by using Windows Installer, configure default program settings, modify file associations, manage access to Windows Store
Control access to local hardware and applications
Configure application restrictions, including Software Restriction Policies and AppLocker; manage installation of and access to removable devices; configure Assigned Access
Configure Internet Explorer 11 and Internet Explorer for the desktop
Configure compatibility view; configure Internet Explorer 11 settings, including add-ons, downloads, security and privacy
Configure Hyper-V
Create and configure virtual machines, including integration services; create and manage checkpoints; create and configure virtual switches; create and configure virtual disks; move a virtual machine’s storage
Preparation resources
Device drivers and deployment
Managing client access to the Windows Store
Configure network connectivity (10-15%)
Configure IP settings
Configure name resolution, connect to a network, configure network locations
Configure networking settings
Connect to a wireless network, manage preferred wireless networks, configure network adapters, configure location-aware printing
Configure and maintain network security
Configure Windows Firewall, configure Windows Firewall with Advanced Security, configure connection security rules (IPsec), configure authenticated exceptions, configure network discovery
Configure remote management
Choose the appropriate remote management tools; configure remote management settings; modify settings remotely by using MMCs or Windows PowerShell; configure Remote Assistance, including Easy Connect
Preparation resources
Managing the new wireless network (IEEE 802.11) policies settings
Windows Firewall with advanced security and IPsec
Deploy remote server administration tools
Configure access to resources (10–15%)
Configure shared resources
Configure shared folder permissions, configure HomeGroup settings, configure libraries, configure shared printers, set up and configure OneDrive
Configure file and folder access
Encrypt files and folders by using Encrypting File System (EFS), configure NTFS permissions, configure disk quotas, configure file access auditing
Configure authentication and authorisation
Configure user rights, manage credentials, manage certificates, configure biometrics, configure picture passwords, configure PIN, set up and configure Microsoft account, configure virtual smart cards, configure authentication in workgroups or domains, configure User Account Control (UAC) behaviour
Preparation resources
Microsoft Virtual Academy: Windows 8 security insights: Module 7—SmartScreen filtering
Windows authentication overview
Configure remote access and mobility (15–20%)
Configure remote connections
Configure remote authentication, configure Remote Desktop settings, configure virtual private network (VPN) connections and authentication, enable VPN reconnect, configure broadband tethering
Configure mobility options
Configure offline file policies, configure power policies, configure Windows To Go, configure sync options, configure WiFi direct
Configure security for mobile devices
Configure BitLocker and BitLocker To Go, configure startup key storage
Preparation resources
Windows 8 VPN get connected
Deploy Windows To Go in your organisation
BitLocker Group Policy settings
Monitor and maintain Windows clients (10–15%)
Configure and manage updates
Configure update settings, configure Windows Update policies, manage update history, roll back updates, update Windows Store apps
Manage local storage
Manage disk volumes and file systems, manage storage spaces
Monitor system performance
Configure and analyse event logs, configure event subscriptions, configure Task Manager, monitor system resources, optimise networking performance, configure indexing options
Preparation resources
Windows Update PowerShell module
Windows Performance Monitor
Windows 8: Task Manager retuned
Configure system and data recovery options (10-15%)
Configure system recovery
Configure a recovery drive, configure system restore, perform a driver rollback, perform a refresh or recycle, configure restore points
Configure file recovery
Restore previous versions of files and folders, configure file history, recover files from OneDrive
Preparation resources
Repair and recovery
How to: Set up and use file history on Windows 8
Windows 8 Jump Start Module 6: Recovery and security
QUESTION 1
A company has 100 client computers that run Windows 8. You need to assign static IPv6
addresses to the client computers. Which Windows Powershell cmdlet should you run?
A. Set-NetTCPSetting
B. Set-NetIPInterface
C. Set-NetlPv6Protocol
D. set-NetIPAddress
Answer: D
QUESTION 2
A company has an Active Directory Domain Services (AD DS) domain. All client computers run
Windows 8. Portable client computers no longer connect to the corporate wireless network. You
need to ensure that when the corporate wireless network is available, the computers always
connect to it automatically. Which two actions would achieve the goal? (Each correct answer
presents a complete solution. Choose two.)
A. Create a Group Policy object (GPO) to configure a wireless network policy. Link the GPO to
the organizational unit that contains the computers.
B. Configure the corporate wireless network as an unmetered network.
C. Configure the corporate wireless network as a preferred network.
D. Manually connect to the corporate wireless network and select the option to connect
automatically to that network.
Answer: CD
QUESTION 3
A company has client computers that run Windows 8. The corporate network is configured for
IPv4 and IPv6. You need to disable Media Sensing for IPv6 on the client computers without
affecting IPv4 communications. What should you do on each client computer?
A. Run the Disable-NetAdapterBinding Windows PowerShell cmdlet.
B. Run the Disable-NetAdapter Windows PowerShell cmdlet.
C. Run the Set-NetlPv6Protocol Windows PowerShell cmdlet.
D. Run the Set-NetlPv4Protocol Windows PowerShell cmdlet.
Answer: C
QUESTION 4
DRAG DROP
A company has an Active Directory Domain Services (AD DS) domain. All client computers run
Windows 8. Two computers named COMPUTER1 and COMPUTER2 are connected to one network
switch and joined to the domain. Windows Firewall is turned off on both computers. You are
planning a remote management solution. You have the following requirements:
* Ensure that COMPUTER2 can run remote commands on COMPUTER1.
* Test the solution by successfully running a command from COMPUTER2 that executes on
COMPUTER1.
You need to select the commands to run on COMPUTER1 and COMPUTER2 to meet the remote
management requirements. Which commands should you run?
To answer, drag the appropriate command or commands to the correct location or locations in
the answer area. Commands may be used once, more than once, or not at all. You may need to
drag the split bar between panes or scroll to view content.
Select and Place:

Answer:

QUESTION 5
A company has 100 client computers that run Windows 8. The client computers are members of a
workgroup. A custom application requires a Windows Firewall exception on each client computer.
You need to configure the exception on the client computers without affecting existing firewall
settings. Which Windows PowerShell cmdlet should you run on each client computer?
A. New-NetFirewallRule
B. Set-NetFirewallSetting
C. Set-NetFirewallRule
D. Set-NetFirewallProfile
E. New-NetIPSecMainModeRule
Answer: A
Subscribe to:
Posts (Atom)