Microsoft earnings insights: On-premises Office still has a lot of life left

As they were last quarter, Office products were a key contributor to Microsoft’s earnings yet again this time around.

During Microsoft’s analyst call about its first fiscal 2012 quarter results, the Softies made some noteworthy points about the interrelationship between Office on-premises and Office in the cloud  –as well as about expectations by more than a few industry watchers that non-cloud versions of communications and productivity products are on their way out.

MCTS Certification, MCITP Certification

Microsoft MCTS CertificationMCITP Certification and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com

Microsoft just beat the Street’s predictions on October 20, reporting net income of $5.74 billion, or 68 cents a share for Q1 FY2012. Non-GAAP earnings were 68 cents a share on a revenue of $17.37 billion, up 7 percent from the same period a year ago.

The Microsoft Business Division (MBD) led all divisions in terms of contributions to the company’s revenue total, at $5.62 billion. (Windows was at $4.87 billion and Server and Tools brought in $4.25 billion for the quarter.)

Ninety percent of MBD revenues come from Office products, with the other 10 percent from the Dynamics line. MBD revenues were up primarily due to sales of the 2010 Office system — meaning the Office client, Exchange Server, SharePoint Server and Lync Server, officials said.

Business revenues for the division were up $326 million, or 8 percent, “primarily reflecting growth in multi-year volume licensing revenue, licensing of the 2010 Microsoft Office system to transactional business customers” (along with strong Dynamics revenue growth), according to Microsoft’s latest 10-Q. Unlike the case with Windows, where consumer growth was tepid for the quarter, consumer revenue in MBD was up $75 million, or 7%, due mainly to strong sales of the 2010 Microsoft Office system, the 10-Q stated.

(Microsoft officials said in July 2011 the company had sold 100 million copies of Office 2010 and are not providing any updated figures at this time.)

Microsoft isn’t releasing separate sales data for the recently released Office 365 bundle of Microsoft-hosted Exchange Online, SharePoint Online and Lync Online. But officials did say Office 365 is paving way for increased sales of Lync, SharePoint, & Exchange by customers of all sizes.

I’m not quite clear if this means that customers going with Office 365 are subsequently buying more on-premises versions of the products in the suite (Exchange Server, SharePoint Server, Lync Server) — or vice versa. Or maybe both — a kind of virtuous circle?

In any case, the implication is that sales of the Office cloud products and the Office on-premises products are reinforcing one another. And that’s an interesting trend, especially given the doubts by many industry watchers that users still wanted on-premises versions of products like Office, Exchange, SharePoint and Lync, and not simply cloud-only variants that Google provides.

70-270 Exam Q & A


Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com



QUESTION 1
You work as an administrator at CertKingdom.com. The corporate network consists of a single Active
Directory domain named CertKingdom.com. All client computers on the corporate network are configured
to run Windows 2000 Professional.
You are preparing to uABCrade the client computers to Windows XP Professional with zero impact
on productivity. You use a server named ABC-SR01 that has a shared folder named Data to save
the Setup files required for the uABCrade. You need to determine the appropriate manner in which
to start the Setup.
What is the first step to make sure the Setup files are installed in an unattended process on the
client computers?

A. You should create a test environment and run an unattended installation of the Setup Files.
B. You should execute the Winnt32.exe command and follow up with the xcopy command onABCSR01.
C. You should execute the Winnt32.exe command with the /dushare:\\ABC-SR01\data
parameters.
D. You should use an OEM installation package on the first client computer.

Answer: C

Explanation: Your best option in this scenario would be to use the dushare switch and indicate
the updates folder.
Reference:
Rick Wallace, MCSE (Exam 70-270) Microsoft XP Professional Training Kit, Microsoft Press,
Redmond, 2002, Chapter 2, Lesson 3
Microsoft Knowledge Base Article – Q312110, How to Deploy the Windows XP Dynamic Update
Package


QUESTION 2
You are the desktop administrator for CertKingdom.com. The CertKingdom.com network consists of a single Active
Directory domain named CertKingdom.com. All client computers on the network are configured to run
Windows XP Professional.
The CertKingdom.com users who are assigned laptop computers often work from home. These laptop
computers are set up specifically to make a connection to the network and the Internet without any
problems. After a few weeks several laptop users complained that they cannot access the shared
folders on the laptop computers even when working at the office.
You check and discover that these users have permission to access the shared folders. You thus
decide to make the necessary modifications in the local GPO on all laptop computers.
Which actions should you take to make sure of continued Internet protection and provide access
to the shared folders? (Choose Two.)

A. You should configure the Windows Firewall on the laptop computers.
B. You should assign all laptop computers to a global security group.
C. You should change the local GPO by deselecting the Prohibit the use of ICF on your DNS
domain network option.
D. You should enable TCP/IP filtering.
E. You should enable the Allow users to connect remotely to this computer option.

Answer: A,C

Explanation: To ensure that users can access shared folders on the portable computers during
the day and to ensure that the portable computers are protected when they are connected to the
Internet in the evening, you need to enable Windows Firewall and then enable the Prohibit the use
of ICF on your DNS domain network setting in the local GPO.
The ICF should not be used on VPN connections as it interferes with file sharing and print
services. ICF can cause undesirable issues if clients in a network enable ICF on their LAN
interfaces. Instead, large network should use better alternatives such as dedicated firewalls.
Reference: Sharing (ICS) and Internet Connection Firewall (ICF)
http://www.techexams.net/technotes/xp/ics_icf.shtml


QUESTION 3
You are employed as an administrator at CertKingdom.com. The CertKingdom.com network consists of a single
Active Directory domain named CertKingdom.com. A server named ABC-SR27 is used as a file server that
hosts a shared folder. All network users store their files and documents on the shared folder.
The CertKingdom.com Finance department makes use of a custom application and save their files to the
shared folder on ABC-SR27.
You received a complaint from the Finance Department members that some of the custom
application files have become unusable resulting in productivity decrease when they have to
restore the application using the backup. You then find that the other network users configured the
shared folder to be available offline and all indications are that this is the cause of the problem.
You must make sure that the custom application files will remain unavailable when the users are
not logged on.
How can you achieve this without impacting on user access to other files in the folder? (Choose
TWO. Each answer forms part of the solution.)

A. You should change the network policy.
B. You should assign the Allow – Write permission to all users.
C. You should configure “My Documents” to be available offline in Windows Explorer on every
client computer.
D. You should include the custom application files in the Files not cached domain group policy.
E. You should select the Synchronize all offline files before logging off check box on the Offline
Files tab.

Answer: A,D

Explanation: The custom application files become corrupt due to the offline caching. In this
scenario we need to prevent this type of file being made available offline. We can do this by
configuring the ‘Files not cached’ setting in group policy.
Files not cached
Computer Configuration\Administrative Templates\Network\Offline Files
Reference:
Lisa Donald & James Chellis, MCSA/MCSE: Windows XP Professional Study Guide Second
Edition, Sybex Inc., Alameda, 2003, p. 344


QUESTION 4
You work as the network administrator at CertKingdom.com. All client computers on the CertKingdom.com network
are configured to run Windows XP Professional.
A CertKingdom.com user named Kara Lang is assigned a laptop computer named ABC-WS15. She
complains that she gets random error messages regarding missing .dll files on ABC-WS15 when it
is not connected to the docking station.
After some troubleshooting you discover that the device driver uses the .dll file mentioned in the
error messages as an external storage device. The storage device is in turn linked to the docking
station of Kara Lang. There are no random error messages when she works in docked mode. To
ensure productivity you need to make sure that this incident does not recur.
How can this be accomplished? (Choose THREE. Each answer forms part of the solution.)

A. By disabling the support for the docking station in the BIOS.
B. By creating a new hardware profile named KingUndocked by copying the default hardware
profile of ABC-WS15.
C. By disabling the server service in the Services Options.
D. by disabling the storage device in the undocked hardware profile.
E. By informing the user too restart ABC-WS15 using the undocked hardware profile.
F. by disabling the devices used by the docked hardware profile.

Answer: B,D,E

Explanation: Hardware profiles are used to load different sets of device drivers according to
which profile is selected. In this scenario, we have a docking station with an external storage
device attached. Therefore, we want to load the driver for the external storage device when the
computer is docked, but not when the computer is undocked. To do this, we can create another
hardware profile to be used when the computer is undocked. We can configure the undocked
profile to not load the driver by disabling the external storage device in Device Manager.
Reference:
Rick Wallace, MCSE (Exam 70-270) Microsoft XP Professional Training Kit, Microsoft Press,
Redmond, 2002, Chapter 10, Lesson 3 & Chapter 15, Lesson 6


QUESTION 5
CertKingdom.com has employed you as an administrator for their organization. All computers on the
network are configured to run Windows XP professional.
A CertKingdom.com user named Rory Allen is assigned a computer named ABC-SR12. ABC-SR12 is
configured to host a custom application to create huge databases.
A vast amount of disk space is occupied when databases are created with this application. At
present the ABC-SR12 configuration is as in Exhibit:

You receive a complaint from Rory Allen regarding an error message when he attempts to run the
application to create a database.
Which actions should you take to create a mount point on the ABC-SR12 C-Drive to make sure
that the application allows the creation of database without any error message?

A. You should point the mount point on the C-Drive to the D-Drive root directory.
B. You should convert both Disk A and Disk B to dynamic volumes.
C. You should convert both Disk A and Disk B to basic volumes.
D. You should configure an alternative file distribution system.

Answer: A

Explanation: Your best option in this scenario would be to create mount points. Volume mount
points permits a volume to be mounted on an existing folder rather than at the root of a new drive
letter. You are able to create a volume mount point for an empty NTFS directory in order to permit
an administrator to create new volumes without needing extra drive letters.
We create a mount point on the volume that needs more space, C-Drive, and points it to the
volume which has the required free disk space.
Reference:
Rick Wallace, MCSE (Exam 70-270) Microsoft XP Professional Training Kit, Microsoft Press,
Redmond, 2002, Chapter 10, Lesson 3


QUESTION 6
You work as a desktop administrator for CertKingdom.com. All computers on the CertKingdom.com network are
configured to run Windows XP Professional.
A CertKingdom.com employee named Rory Allen took over the duties of another employee named Kara
Lang. This move involved taking over files, documents and the workstation named ABC-WS02
that was used by Kara Lang. however, Rory Allen discovered that he cannot access the
documents and files on ABC-WS02. You then attempt to grant Rory Allen the required
permissions after logging on with a local administrator account, but only get an error message
stating “access denied”.
Which actions should you take to make the ABC-WS02 files accessible to Rory Allen? (Choose all
that apply.)

A. You should assign the files and documents stored on ABC-WS02 to you.
B. You should make Rory Allen a member of the Power Users group.
C. You should make Rory Allen a member of the Domain users group.
D. You should assign Rory Allen the Allow-Full Control permission.
E. You should assign Rory Allen the Allow – Read & Execute permissions.
F. You should assign Rory Allen the Allow- Modify permission.

Answer: A,D

Explanation:


QUESTION 7
You are employed as an administrator at CertKingdom.com. All client computers on the CertKingdom.com network
run Windows XP Professional.
You are preparing to install an OEM version of Windows XP Professional on a new client
computer named ABC-WS10. ABC-WS10 is equipped with the following components:
• A PCI network card and graphics card
• To accommodate the various drives including the hard drive, an industry standard architecture
(ISA) SCSI controller.
Just after initializing the Setup process on ABC-WS10 you get an error message that informs you
the “Setup is unable to find a hard disk’. However, even after checking for loose cables and
functionality of the SCSI hard disk, you get the same problem. To ensure productivity you need to
make sure that the installation process can run successfully on ABC-WS10.
How can this be accomplished? (Choose TWO. Each answer forms part of the solution.)

A. By restarting the Setup process.
B. By changing the Boot.ini file of ABC-WS10.
C. By running fdisk.exe /mbr and restart the installation.
D. By installing the driver for the SCSI adapter using F5 during the Setup process.
E. By restarting the installation from the Windows XP Professional installation CD.
F. By install the driver for the SCSI adapter using F6 during the Setup process.

Answer: A,F

Explanation: To ensure that the installation can run to completion you need to select options A
and F. During the early text-mode phase of the setup process, you are allowed to press F6 and
install the driver for the SCSI adapter.
Reference:
Rick Wallace, MCSE (Exam 70-270) Microsoft XP Professional Training Kit, Microsoft Press,
Redmond, 2002, Chapter 11, Lessons 1 & 2


QUESTION 8
You are employed as an administrator at CertKingdom.com. All client computers on the CertKingdom.com network
are configured to run Windows 2000 Professional.
You performed a successful migration to Windows XP Professional on all the client computers.
You receive a complaint from a user named Kara Lang stating that she is experiencing problems
while opening some of the Utilities that are available on the Control Panel.
You receive an instruction to restore functionality to Kara Lang’s computer. All indications are that
the error on her computer was caused by a dynamic linked library file (.dll file) that is located on a
corrupted area on her hard drive.
What actions should you take to accomplish this task?

A. You should execute the Sfc.exe command and command prompt.
B. You should execute the Sysprep.exe command at command prompt.
C. You should execute the Sysprep.exe command prior to installing the application.
D. You should execute the RIPrep.exe command prior to installing the application.
E. You should re-install Windows XP Professional.

Answer: A

Explanation: Your best option in this scenario would be to select Option
A. The Windows File
Protection (WFP) feature in Windows 2000 and Windows XP prevents overwriting or replacement
of certain system files, such as system .dll files. A command-line utility called System File Checker
(SFC.EXE) allows an Administrator to scan all protected files to verify their versions. SFC.exe
scans all protected system files and replaces incorrect versions with correct Microsoft versions.
In this scenario it seems likely that a system .dll is corrupted and should be replace or repaired-
Reference:
Windows 2000 Platform Development, Windows File Protection and Windows
Microsoft Knowledge Base Article (Q259283): How to Use the File Signature Verification Tool to
Find Third-Party Drivers


QUESTION 9
CertKingdom.com has employed you as an IT admin for their organization. The CertKingdom.com network consists
of a single Active Directory domain named CertKingdom.com.
You performed a successful migration of all Microsoft Windows 98 client computers to Windows
XP Professional. A CertKingdom.com employee named Mia Hamm informs you that she is unable to
access or restore her information from a tape device that was created before the uABCrade to
Windows XP Professional.
Identify the next steps for restoring the backup to a Windows 98 computer? (Choose TWO. Each
answer forms part of the solution.)

A. You should restore the information in a non-compressed mode.
B. You should establish a performance baseline and restore the information.
C. You should restore Windows 98 using Ntbackup utility and the most recent Automated System
Recovery (ASR) backup.
D. You should restore the information in a compressed mode.
E. You should restore the information on the computer of Mia Hamm.

Answer: A,E

Explanation: Your subsequent steps should be to restore the information in a non-compressed
mode. Thereafter the information should be restored on the computer of Mia Hamm. Windows XP
works only with the compression that is included with NTFS. For this to work you need to first
uncompress any drives that are compressed with DoubleSpace, DriveSpace, or any other drive
compression software. If you do not uncompress a drive, the data on the drive is not available in
Windows XP. The data on the drive is still intact, but it is not available in Windows XP. To be able
to use the data on the compressed drive, you must dual-boot with the operating system that
supports the compression method. When your C-Drive is compressed, you cannot install Windows
XP.


QUESTION 10
You work as an administrator at CertKingdom.com. All client computers on the network are configured to
run Windows XP Professional computers.
A CertKingdom.com user named Kara Lang informs you that she is unable to connect to the secure
intranet Web site at intranet.CertKingdom.com. She gets an error message that the digital certificate is not
from a trusted source as soon as she types https:://intranet.CertKingdom.com into the Internet explorer
address bar.
You check and discover that the intranet Web server is using a digital certificate issued by your
company’s Enterprise Certificate Authority. The Enterprise Certificate Authority is located on a
server named certificates. CertKingdom.com.
Which action should you take to make sure that Kara Lang is able to access the secure intranet
Web site? (Choose TWO. Each answer forms part of the solution.)

A. You should install the certificate in the certificate store using the Certificate import Wizard.
B. You should open the Internet Explorer’s list of certificates on the Kara Lang computer.
C. You should enable Use TLS 1.0 option in order to configure internet Explorer for the Kara Lang
computer.
D. You should request a new certificate from the enterprise CA.
E. You should contact the support company to obtain a certificate and add it to the list of personal
certificates.
F. You should import a copy of the certificate into the Trusted Publishers certificates store of Kara
Lang.

Answer: B,E

Explanation: The Internet Explorer Certificate Manager permits you to install and remove trusted
certificates for clients and CAs. Many CAs have their root certificates already installed in Internet
Explorer. You can select any of these installed certificates as trusted CAs for client authentication,
secure e-mail, or other certificate purposes, such as code signing and time stamping. If a CA does
not have its root certificate in Internet Explorer, you can import it. Each CA’s Web site contains
instructions that describe how to obtain the root certificate. To install or remove clients and CAs
from the list of trusted certificates click Internet Options on the Tools menu, and then click the
Content tab. Click Certificates and then click the Trusted Publishers tab. To add other certificates
to the list, click Import. The Certificate Manager Import Wizard steps you through the process of
adding a certificate.
Reference:
Rick Wallace, MCSE (Exam 70-270) Microsoft XP Professional Training Kit, Microsoft Press,
Redmond, 2002, Chapter 13, Lesson 4

 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

Microsoft: BPOS components average 99.9-plus percent uptime

The hosted applications in Microsoft’s Business Productivity Online Standard Suite (BPOS) have averaged uptime of 99.9 percent or better in the past year, according to the company.

MCTS Certification, MCITP Certification
Best Comptia A+ Training | Comptia A+ Certification 2000+ Exams at Examkingdom.com

BPOS, a collaboration and communications suite hosted by Microsoft and sold with partners, includes Exchange Online, SharePoint Online, Office Communications Online and Live Meeting.

Last week, Google touted a 99.98 percent uptime for its hosted Gmail service in 2010, for both individual account holders and people who use it as part of Google Apps, a BPOS rival. Google didn’t provide the uptime rate for the other Apps suite components, like Docs and Calendar.

Google and Microsoft offer a 99.9 percent uptime guarantee for their Apps and BPOS suites, respectively. When that service level agreement (SLA) isn’t met, Google offers affected customers credits and extends their subscriptions, while Microsoft offers cash reimbursement.

Google announced last week that it was modifying its SLA to count every instance of downtime; previously, it logged only outages of 10 minutes or more. It also tweaked its SLA to include outages due to planned maintenance work, which previously wasn’t counted against the 99.9 percent uptime commitment.

According to a spokesman for Microsoft, the BPOS SLA counts “any service issue as downtime, from the minute it starts to resolution.”

“We also count issues for any number of impacted users, not just if ‘enough’ users are impacted,” he said via e-mail.

The competition between Google Apps and BPOS has been heating up in the past year. Google has been updating its suite with capabilities aimed at large enterprises and their CIOs. Google Apps has traditionally been aimed at small and medium-size businesses.

Meanwhile, Microsoft is beta testing a big upgrade to BPOS called Office 365, whose applications will be based on the latest 2010 versions of their on-premise counterparts. Office 365 will also include versions that come with Office Web Apps, a hosted version of Microsoft Office, and with the option of the full-featured Office suite itself.

Because BPOS and Google Apps are cloud-hosted suites, their performance and uptime are critical aspects to their respective customers, most of whom rely on the suites as their primary workplace e-mail service.

Cloud tools give Microsoft partners a jump-start

Microsoft is giving its partners tools that could help drive more business to its cloud-based services.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

At the company’s annual Worldwide Partner Conference, being held this week in Washington, the new Microsoft channel chief unveiled programs that give Microsoft business partners free access to its cloud software as well as training.

“We’re going to provide a wide array of tools to help partners both drive the deals and once they get the deals, then manage the customers from the support and deployment aspect,” said Jon Roskill, who assumed the role of corporate vice president of the worldwide partner group on July 1.

While earlier in the week, Microsoft CEO Steve Ballmer extolled the virtues of Microsoft’s cloud services to partners, Roskill detailed how Microsoft would help partners get their own services started.

One package, called the Microsoft Cloud Essentials Pack, will offer partners free use of Microsoft cloud software, as well as access to an expanded online directory of business opportunities in 46 countries.

With this program, the company is offering 250 free internal-use seat licenses for two online Microsoft services, Microsoft Business Productivity Online Suite (BPOS) and Microsoft Dynamics Online, which is the company’s customer relationship management service. Free licenses would also be available for Microsoft’s InTune and Azure services as well, though Roskill did not specify how many free seats would be available for these services.

Microsoft will also offer a range of courses for how to work with BPOS, as well as free pre-sales phone support for partners who register with the company’s advanced cloud program, called Microsoft Cloud Accelerate.

“We believe this will allow partners to quickly and effectively position BPOS solutions and resolve any issues that come up while they are going through the trial and deployment phases,” he said.

In his talk, Roskill offered the audience a list of traits that the “most successful partners” of Microsoft would possess. For one, such companies would run the “latest and greatest” Microsoft software. “I’ve seen partners who are still running on Windows XP and on Linux, and those are great folks, but they won’t be Microsoft’s best partners,” he said.

Secondly, the partners would need to understand their places in the ecosystem. “You all figured out your niche in the world — construction, [telecommunication], multimedia. The most successful partners have a clear understanding of where they are operating,” he said.

In his new role, Roskill will report to Vahé Torossian, corporate vice president of the worldwide small and midmarket solutions and partners group. Allison Watson, the former channel chief, will assume Roskill’s former role as the U.S. head of business and marketing.

Apple employees to celebrate Jobs, stores to close

Apple is holding a private memorial service for employees to celebrate the life of company co-founder and former chief executive Steve Jobs.

The service, announced to Apple employees in an email by CEO Tim Cook, is scheduled for 10 a.m. Wednesday at company headquarters in Cupertino.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

It will also be webcast to employees worldwide.Apple plans to close its retail stores for several hours so employees can watch the service online, according to a person familiar with the matter. The person was not authorized to speak publicly about the issue, and spoke on condition of anonymity.

The service will take place in the campus’ outdoor amphitheater, according to Cook’s email.

The celebration is for employees to “take time to remember the incredible things Steve achieved in his life and the many ways he made our world a better place,” Cook wrote.

The event follows a memorial at Stanford University last Sunday for friends and family. That service at Memorial Church reportedly brought out tech titans including Oracle chief Larry Ellison and Microsoft’s Bill Gates, as well as politicians including Bill Clinton. U2 frontman Bono and Joan Baez reportedly performed.

Jobs died on Oct. 5 at age 56 after a battle with pancreatic cancer.

Microsoft prepares new ‘Next’ website

Microsoft appears to be preparing to launch a new website called “Next” where it will share information about new technologies it and others are developing.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com

“It’s Microsoft’s home for stories and conversations about what’s new and on the horizon,” according to the “about” page.

For now, the main page says that the site is “coming soon.” The only blog post says: “Congrats if you found this site already…you weren’t supposed to! We’ll be back soon.”

It was written by Steve Clayton, who has worked at Microsoft for 13 years and, according to his profile, recently moved to the company’s Redmond, Washington, headquarters “to work on storytelling.”

The site will offer stories about people at Microsoft and the technologies they are developing, according to the “about” page. “It’s not all about Microsoft though — we’ll look at where technology is going, how it will impact our lives and what the important trends are. Innovations and innovators of all types are fair game here and we’ll shine a light on them as well as on Microsoft,” it says.

Microsoft will welcome feedback about the kinds of topics it should cover on the site, it said. “The site is ultimately for you, to show you who we are, what we’re about and where we’re headed,” it says.

The main page also includes a list of items posted on Twitter from Microsoft’s Twitter account. The URL links the site to Microsoft’s TechNet blogs, which often cover technical topics related to the company’s products.

Microsoft did not immediately respond to a request for comment about the site or when it will go live.

iPhone 4S users seeing yellowish screen tint

Some new iPhone 4S owners are saying that their screens display a yellowish tint, prompting a few of them to dub the alleged defect “yellowgate.”
Posting messages at the Apple Support Forum, several of the users say that the screen looks washed out and that the whites look more yellow, especially when compared with the iPhone 4. Some say the issue is specific to the black iPhone 4S, noting that the display in the white version looks fine.

 

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com

As a possible explanation, a couple of commenters said they believe the yellowish display is the result of the glue used to put the screens together not having fully cured or hardened. One poster noticed the same problem with the iPhone 4 last year and said it took about two weeks for the yellow tint to disappear.
However, a couple of other users countered the glue argument by pointing out that the screen appears washed out, which wouldn’t necessarily be caused by the glue not having hardened.
Summing up the issue, one person wrote that “my 4S screen is less contrasty, and the whites are more yellow (beyond ‘warm’) compared to my iPhone 4 screen. The colors are less vibrant, and some are pretty washed out. I’ve also noticed that the screen is more directional than the 4 screen, and in some viewing angles it’s more yellow, and in others it’s more contrasty. I’m really hoping this is a glue issue, which could improve. I don’t think I’ll be able to get used to this.”

Yellow tint is an issue that has affected Apple devices in the past. Some iPhone 3G users complained of this problem, which one researcher said was caused by certain cases blocking the light sensor. A round of iPad 2 owners reported a similar glitch earlier this year, which was attributed to the glue not having hardened. And as indicated in the support forum, new iPhone 4 users ran into the same issue last year, complaining of a yellow discolored area or yellow tint on the screen. In most of the cases, Apple offered to replace the phone.
Assuming it’s a glue issue, the problem should resolve itself before too long. If it remains, then affected iPhone 4S owners will want to drop by their local Apple stores to talk to the techs at the Genius Bar.
Have any of you new iPhone 4S owners run into the same display issue? If so, please chime in via the comments section.

Stallman on Steve Jobs: Tasteless or Incisive?

“I appreciate all RMS has done,” said Mobile Raptor blogger Roberto Lim. “I appreciate what Steve Jobs has accomplished. I appreciate what Dennis Ritchie has achieved. In the end, all these great inventors and innovators together with many others one-upping each other is why I can send this [email] to you half a world away.” Bottom line? “We are now one man down. It is just unfortunate that RSM cannot seem to appreciate this.”

The world’s leading SSL certificates now offer more protection and security. Now from Symantec. Download your free trial of the world’s leading SSL certificates at verisign.com/ssl/free-30day-trial.

Well it’s starting to look like 2011 is just going to be one, long roller-coaster ride. No sooner does the prospect of a quiet day loom on the horizon than something happens to turn the world on its ear once again.

In the past two weeks, of course, we’ve had to endure the loss of not just one but two leading figures in the technology world: Steve Jobs and Dennis Ritchie. That’s been upsetting enough, but — as if we needed any more turmoil — we’ve also had free software guru Richard Stallman expounding his views on Apple’s (Nasdaq: AAPL) former CEO, causing widespread outrage in the process.

“I’m not glad he’s dead, but I’m glad he’s gone,” wrote Stallman, quoting former Chicago Mayor Harold Washington. “We all deserve the end of Jobs’ malign influence on people’s computing.”

One could argue that it might have been a good idea to let a little more time than just a day pass after Jobs’ death before expressing such opinions; then again, this is RMS we’re talking about.

‘What Everyone Is Too Polite to Say’

Not surprisingly, talk about RMS is just what bloggers have been doing ever since, too — and not always in the most understanding of terms.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com

Nearly 1,500 comments appeared on Slashdot alone, but not before even more fuel was added to the fire. Namely, none other than Eric Raymond spoke out in defense of Stallman, while “What Everyone Is Too Polite to Say About Steve Jobs” was a headline that appeared over on Gawker.

So, which is it? Did the free software community’s key spokesman put his foot in his proverbial mouth in a big way, or was he just telling it like it is? Linux Girl encountered arguments on both sides on the streets of the blogosphere.

‘He Has Become a Liability’

“RMS needs to understand RIP better rather than rant about DRM,” said Slashdot blogger yagu. “I think he’s wrong here. He can rant as much as he wants, but in my opinion his rants after Jobs’ passing lack class. Not nice.”

Similarly, “RMS needs to just go away,” consultant and Slashdot blogger Gerhard Mack told Linux Girl. “It’s not that he was wrong about what he said, but you don’t just go and say something like that while people are mourning.

“I met him a few years ago, and the impression I got was that he is someone who has spent so much time in his little bubble that he has no idea how normal people do things,” Mack added. “At this point he has become a liability to the cause he has been working so hard for. He really needs to stop talking to the press and leave talking to someone more articulate.”

‘An Open Sore and a Laughing Stock’

Indeed, “there’s a time and a place,” agreed Barbara Hudson, a blogger on Slashdot who goes by “Tom” on the site. “Urinating on the open grave of someone you did not know personally, with no consideration for their friends, family, or co-workers, is simply not done.”

Stallman’s “zealotry” has blinded him to reality, Hudson added, causing him to “brand anyone who doesn’t agree as evil.”

Not only did his approach “put the focus on the messenger instead of the message,” but it also “devalued both,” Hudson asserted. “And because it was so public, those who disagree have two choices — condone it by our silence, or speak out against both the message and the perp behind it.”

In short, “Stallman is like that old comic with one schtick, which he continues to milk because that’s all he’s got,” she said. “He is a kindred spirit to Fred Phelps and Westboro Baptist, demonizing anyone who disagrees with him or his values.”

Ultimately, “he’s become both an open sore and a laughing-stock,” Hudson concluded. “Either the FSF gets rid of him, or they will suffer the same fate.”

‘It Shows RMS Has No Taste’

Slashdot blogger hairyfeet took a similar view.

“It shows RMS has no taste,” hairyfeet said. “What kind of talk is that? Whether you liked his product or not, the man had just died. Hadn’t anyone taught RMS that if you don’t have anything nice to say, say nothing at all?”

The episode underlies a bigger problem, however, hairyfeet ventured — specifically, “RMS and his elitist, arrogant attitude.

“You see, with RMS, it isn’t just that he offers free software, it is that he wants you to have NO CHOICE BUT free software,” hairyfeet explained. “I’d say that makes him just as bad or worse than anybody you can name.”

‘Jobs Deserves to Be Respected’

Chris Travers, a Slashdot blogger who works on the LedgerSMB project, is “ambivalent about Apple in general,” he told Linux Girl. “Where I think RMS errs is in blaming Jobs specifically” for the opacity and lock-in of the company’s products.

More open platforms probably wouldn’t be “half of what they are today” without the resulting competition, so “I suppose I end up disagreeing with RMS despite the fact that I totally understand and even to a slight extent sympathize with his points,” Travers explained.

“Jobs deserves to be respected for who he was in relation to the Free and Open Source Software worlds: A serious, capable, and generally honorable adversary worthy of the highest respect,” Travers concluded.

‘Those Crazy Prophets’

Along similar lines, “Richard M. Stallman is entitled to say what he thinks,” Roberto Lim, a lawyer and blogger on Mobile Raptor, told Linux Girl. “We are all entitled to our opinions.”

At the same time, “as much as I like the open source community, sometimes I think some of them act like those crazy prophets predicting the end of the world,” Lim added. “Actually, those guys are less insane — one day the world will actually come to an end.

“I appreciate all RMS has done,” Lim continued. “I appreciate what Steve Jobs has accomplished. I appreciate what Dennis Ritchie has achieved. In the end, all these great inventors and innovators together with many others one-upping each other is why I can send this [email] to you half a world away.”

Bottom line? “We are now one man down. It is just unfortunate that RSM cannot seem to appreciate this,” Lim concluded.

‘A Crime Against Humanity’

As on Slashdot, however, others thought Stallman had a good point.

“RMS has it right,” blogger Robert Pogson told Linux Girl, for example.

“Steve Jobs was an enemy of Free Software and freedom to use PCs flexibly,” Pogson explained. “He was often a ‘partner’ of M$. His ‘walled garden’ approach to software is a blight on the world.

“His exclusion of competitive technology is a horrible abuse if not illegal,” Pogson went on. “His concentration on high-margin markets to the exclusion of those on the other side of the Digital Divide is a crime against humanity. His patent-trolling should be a trigger to eliminate software patents.”

‘Champion of the Rights of the User’

Martin Espinoza, a blogger on Hyperlogos, took a similar view, he told Linux Girl, noting his explanation on Slashdot.

“The time to make the statement is while it is relevant,” Espinoza wrote.

“It is critical that we receive this message — not you and I, maybe, but as many of the wide-eyed legions of Apple as can be reached,” he added. “Because what Apple represents is precisely the same thing that Microsoft (Nasdaq: MSFT) or Sony (NYSE: SNE) represents: a dearth of choice.

“Stallman might be an egotistical ass, but he is certainly the foremost champion of the rights of the user,” Espinoza went on. “Some programmers don’t like that, so they don’t like the GPL, and they don’t like Free Software. They call it a virus and they would prefer to stamp it out rather than have to deal with something so confusing.”

In short, “other people can make the same point in a month, and a year, and reach other audiences, but this point needs to be made now and it needs to be made well,” he concluded. “Stallman has done both.”

70-660 Exam


 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

 




QUESTION 1
You work as the desktop support technician at Certkingdom.com. The Certkingdom.com network consists of a
single Active Directory domain named Certkingdom.com. The Certkingdom.com network has a Windows Server
2008 application server named ABC-SR01.
Certkingdom.com has entered into partnership with Weyland Industries. Weyland Industries has recently
developed an application for their network users, which will be run from ABC-SR01.
During the course of the day you receive complaints from the Weyland Industries network users
that the application as result of heap corruption. After a brief analysis, you instruct the Weyland
Industries network users to enable the full page heap dump when creating a user dump file for
troubleshooting.
You would like to verify whether the Weyland Industries network users had indeed enabled the full
page heap dump when they created the user dump.
Which of the following actions should you take?

A. You should consider making use of the WinDbg !Locks command.
B. You should consider making use of the WinDbg !runaway command.
C. You should consider making use of the WinDbg !gflag command.
D. You should consider making use of the Debub: D (dump file) command.

Answer: C

Explanation:


QUESTION 2
You work as the desktop support technician at Certkingdom.com. The Certkingdom.com network consists of a
single Active Directory domain named Certkingdom.com. The Certkingdom.com network has a Windows Server
2008 application server named ABC-SR01. Certkingdom.com has recently developed an application that
uses a service for their network users which will be run from ABC-SR01.
While performing daily system maintenance on ABC-SR01 you notice that the CPU is operating at
maximum capacity. You have been tasked with determining which service results in the CPU
utilization being heavy by performing a process dump of the service.
Which of the following actions should you take?

A. You should consider making use of the System Monitor utility after running the dump.
B. You should consider making use of the Adplus.vbs utility after running the dump.
C. You should consider making use of a Process Viewer utility after running the dump.
D. You should consider making use of the Task Manager utility after running the dump.

Answer: B

Explanation:


QUESTION 3
You work as the desktop support technician at Certkingdom.com. The Certkingdom.com network consists of a
single Active Directory domain named Certkingdom.com. All servers on the Certkingdom.com network run
Windows Server 2008. The Certkingdom.com network contains an application server named ABC-SR01.
Certkingdom.com has recently developed an application that makes use of an I/O dispatch routine, which
supports buffered I/O. The CIO from Certkingdom.com has asked you to modify the application to make
use of a 5-KB I/O request packet (IRP). The CIO from Weyland Industries has also asked you to
obtain the kernel address of the 5-KB buffer.
Which of the following statements are true with regard to the kernel address of the 5-KB buffer?

A. The Irp->Overlay.Driver[1] field of the IRP would contain the kernel address of the 5-KB buffer.
B. The Irp->UserBufferContext field of the IRP would contain the kernel address of the 5-KB
buffer.
C. The Irp->AssociatedIrp.SystemBuffer field of the IRP would contain the kernel address of the 5-
KB buffer.
D. The Irp->Overlay.Context field of the IRP would contain the kernel address of the 5-KB buffer.

Answer: C

Explanation:


QUESTION 4
You work as the desktop support technician at Certkingdom.com. The Certkingdom.com network consists of a
single Active Directory domain named Certkingdom.com. All servers on the Certkingdom.com network run
Windows Server 2008. The Certkingdom.com network contains an application server named ABC-SR01.
Certkingdom.com has recently developed a multithreaded application for their network users, which will be
run from ABC-SR01. A current Certkingdom.com written security policy states that all applications should
be tested for heap leaks.
You have been given the task of enforcing this policy.
Which of the following actions should you take?

A. You should consider making use of the Process\Handle Count counter of Performance Monitor.
B. You should consider making use of the Process %Privilege Time counter of Performance
Monitor.
C. You should consider making use of the Process\Private Byte counter of Performance Monitor.
D. You should consider making use of the Process %Elapsed Time counter of Performance
Monitor.

Answer: C

Explanation:


QUESTION 5
You work as the desktop support technician at Certkingdom.com. The Certkingdom.com network consists of a
single Active Directory domain named Certkingdom.com. All servers on the Certkingdom.com network run
Windows Server 2008. The Certkingdom.com network contains an application server named ABC-SR01.
Certkingdom.com has recently developed a driver for newly developed hardware. A current Certkingdom.com
written security policy states that verification on the process interrupts and processor time is used
by new drivers.
You have been instructed to enforce this security policy.
Which of the following actions should you take?

A. You should consider making use of the Windows Event Viewer utility.
B. You should consider making use of the Performance Monitor utility.
C. You should consider making use of the System MonitorTaskmgr.exe utility.
D. You should consider making use of a Process Viewer utility.

Answer: B

Explanation:

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

Microsoft delivers Windows Intune 2.0 cloud-management service

Microsoft has made the second version of its Windows Intune cloud-management service generally available to customers on October 17, as promised.

MCTS Certification, MCITP Certification
Cisco CCNA Training, Cisco CCNA Certification 2000+ Exams at Examkingdom.com

On October 17, Microsoft made generally available the second version of its Windows Intune cloud-management service.

Windows Intune enables businesses to manage and secure PCs. It also provides users with rights to current and future versions of Windows — similar to what they’d get if they signed up for Microsoft’s Software Assurance volume-licensing program. Microsoft also is attempting to pitch Windows Intune as a way to get customers to move from Windows XP to Windows 7 because of the current/future Windows 7 rights.

Windows Intune is a Microsoft cloud service that provides IT pros with PC management and security for $11 per seat per month. (There’s a free 30-day trial for users with up to 25 PCs available.)

Windows Intune is comprised of two components: On-premises Windows and Windows management tools, plus an online management and security service. Windows Intune evolved from a Microsoft project known as System Center Online Desktop Manager (SCODM).

The new (2.0) version of Intune supports third-party application updates and patching. It also will add the ability to perform remote IT tasks, and read-only access to the administration console and new reporting capabilities.

Update: Though many of us currently refer to the latest version as “Windows Intune 2.0″ (to differentiate it from the first release, a Microsoft spokesperson noted that, going forward, this update will be known officially either as “just Windows Intune or the Windows Intune October 2011 release.”

Current Windows Intune customers will be automatically upgraded “in the few weeks following October 17,” with no action required by customers, according to Microsoft officials. Current Intune users will see an alert displayed in the Windows Intune administration console, indicating the exact date and time when Intune will be updated. Those beta testing Intune 2.0 will see the beta close on November 17.

Microsoft released version 1.0 of Windows Intune in March 2011.

There’s still no official date from the Softies as to when the company plans to integrate Windows Intune with Office 365, though that is the plan of record. The new Windows Intune FAQ (frequently asked questions) document notes that Office 365 and Windows Intune’s portals are still separate and that the two cloud properties require separate logins.