Tuesday, April 28, 2015

A year later, Microsoft's Nokia deal isn't a clear winner

It was a marriage of convenience for two industry giants whose past successes weren’t helping them win in the red-hot smartphone market. One year later, it’s hard to say that Microsoft’s acquisition of Nokia’s device business has produced the results its backers envisioned.

In the wake of the US$7.2 billion acquisition, Lumia smartphones and the Windows Phone OS are still running into many of the same market roadblocks.

But Microsoft isn’t throwing in the towel, and has high hopes that its phone business will get a major boost from Windows 10, which is meant to create an environment where users can move easily between desktops, tablets and their smartphones.
MORE ON NETWORK WORLD: 12 most powerful Internet of Things companies

That Microsoft’s smartphone adventure is a work in progress was highlighted last week, when CEO Satya Nadella said during the quarterly earnings call that device-related costs have to be cut more, ahead of the arrival of Windows 10. However, Nadella also revealed that Microsoft sold more Lumias in the quarter than it did a year ago.

There has been much speculation that Nadella was never a fan of the deal, brokered by his predecessor Steve Ballmer. But it seems the new CEO is giving it a go, betting, at least for now, that the acquisition can fulfill its goals: to make Microsoft a credible player in the mobile OS and smartphone device markets, able to give major players like Apple, Google and Samsung a run for their money.

Yet Nadella has his work cut out for him. Microsoft still isn’t selling enough devices; not enough large manufacturers are backing its OS; and Windows Phone apps are an afterthought to most developers.

On the hardware side, Microsoft frantically focused on launching affordable smartphones, including Lumia models 430, 535, 640 and 640XL, all of which cost between US$70 and $200 without a contract.

The strategy makes sense on paper because the low-end segment is growing faster than other parts of the smartphone market. Also, consumers in emerging markets—the target audience for these devices—aren’t as wedded to specific smartphone brands, user interfaces and ecosystems as their counterparts in the U.S. and Western Europe. But the competition in this segment is fierce and Microsoft is up against a multitude of Android-based smartphones.

Windows Phone’s market share sits below 3 percent, despite the low-end Lumia push, growing enterprise interest in the OS and adoption by a number of small smartphone vendors. To secure the future of the OS, Microsoft needs to increase the share to at least 10 percent, according to Ben Wood, chief of research at CCS Insight.

“In our forecasts we don’t see anywhere near that level in the next three years, which underlines the scale of the challenge Microsoft faces,” Wood said.

Complicating matters is the decline in shipments of the Nokia feature phones Microsoft also acquired.

To significantly boost Windows Phone sales, Microsoft needs to sign big partners that can sell millions of devices per quarter. Getting them onboard is one of many things Windows 10 is expected to help with, and there is some positive momentum.

The OS will feature an updated user interface and a host of improved applications, such as the new Spartan browser. It also provides more integration between PCs and smartphones, including the ability to see notifications across different devices.

Chinese vendor Xiaomi recently announced that some users of its Android-based smartphones will be able to test Windows Phone 10 by installing it on their phones. Getting Xiaomi onboard would be a big win for Microsoft. The company has become one of the world’s biggest smartphone manufacturers, even though it doesn’t sell its products in Europe or the U.S.

Microsoft has struggled to get the biggest smartphone vendors to back the OS. For example, Samsung has only launched two Windows Phone devices in the last two years, and it didn’t give them anywhere near as much marketing support it gives its Android smartphones. Samsung declined to comment on its plans for Windows 10.

One smaller vendor backing Windows Phone is Florida-based Blu Products, and while its CEO Samuel Ohev-Zion is very critical of the Nokia acquisition, he has high hopes for Windows 10 and its expected ability to attract more users and developers.

The deal overvalued Nokia’s assets, he said, because it has become much easier to develop smartphones. And not getting the valuable Nokia brand as part of the acquisition was a big mistake, he added. Microsoft has been using its own brand on Lumia smartphones since October.

Windows 10, on the other hand, is going to be groundbreaking, Ohev-Zion predicts. The biggest turnoff with the current version of the OS is that users aren’t familiar with the interface and don’t understand how it works. But that will change with Windows 10, because the experience on PCs and smartphones becomes more similar, he said.

Microsoft is also doing the right things from a software development perspective, according Ohev-Zion. With Windows 10, developers will be able to build so-called universal apps for PCs, tablets, the Xbox game console and smartphones. That will help open up the platform to a much larger developer audience, he said.

The launch of Windows 10 is expected to be followed by the arrival of Microsoft’s first high-end smartphones. The company will make sure it has products in this market segment, but making a dent is very difficult, thanks to Apple’s and Samsung’s dominance, according to Christophe Francois, vice president of strategy and business development at telecom operator Orange.

“You have to be persistent, and invest quite a lot to establish a strong foothold. But it’s clear that with Microsoft’s ambitions, it’s something it has to do,” said Francois.

Orange has seen products such as the Lumia 635 and the Lumia 530—both of which use the Nokia brand—sell well, and help increase Windows Phone’s market share among its subscribers significantly. To build on that, Microsoft has to work to improve its own brand, according to Francois.

In Finland, many families won’t be celebrating the deal’s one-year anniversary, following the thousands of jobs Microsoft cut in Nokia operations. At the time, the Finnish finance minister Antti Rinne said that Microsoft had betrayed Finland.

There was some expectation the deal would be more of a joint venture, but it has most definitely been a Microsoft takeover, according to Wood.

However, some of these workers may be able to get jobs next year when Nokia will once again be able to produce smartphones. The company is said to be planning a comeback using Android. For now, though, Nokia is denying it currently has any plans to manufacture or sell consumer handsets.

Meanwhile, for Microsoft, the next twelve months will determine whether the Nokia deal goes down in corporate history as a success or a failure.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Friday, April 24, 2015

VCP510 VMware Certified Professional 5 - Data Center Virtualization


QUESTION 1
Which VMware solution uses the security of a vSphere implementation and provides linked-clone
technology to virtual desktops?

A. VMware ACE
B. VMware View
C. VMware Workstation
D. VMware ThinApp

Answer: B

Explanation:
Reference:http://www.vmware.com/files/pdf/VMware-View-4-Composer-DS-EN.pdf(page 1, last
paragraph)


QUESTION 2
An administrator has recently upgraded their Update Manager infrastructure to vSphere 5.x.
Several hosts and virtual machines have not been upgraded yet.
Which vSphere component when upgraded will have the least impact to the existing environment?

A. Virtual Machine Hardware
B. ESX Hosts
C. VMFS datastores
D. VMware Tools

Answer: D

Explanation:
VMware Tools isn't a single application but a set of drivers, services and user processes that's
installed in a guest operating system. They add a wide assortment of functionality to VMware
infrastructures -- everything from improving color depth and video resolution in the vSphere Client
to memory optimization.
Typically, an outdated version of VMware Tools doesn't have an immediate impact. But with every
update to vSphere, you'll likely have to update VMware Tools on every virtual machine.


QUESTION 3
An administrator is using Update Manager 5.x to update virtual appliances in a vSphere
environment. The environment is using the vCenter Server Virtual Appliance (vCSA).
What would cause the remediation to fail?

A. Updating of the appliance can only be done if the vCenter Server Virtual Appliance (vCSA) has
been put into Maintenance Mode.
B. Remediation must be configured on the Appliance Administration page before use.
C. Remediation of the vCenter Server Virtual Appliance (vCSA) with Update Manager is not
supported.
D. Remediation requires the hosts to be connected to vCenter using an IPv4 address.

Answer: D

Explanation:
Update Manager 5.0 does not support virtual machine patch baselines.If a host is connected to
vCenter Server by using an IPv6 address, you cannot scan and remediate virtual machines and
virtual appliances that run on the host.


QUESTION 4
An administrator is working to update the hosts and virtual machines in a vSphere 5.x deployment
using Update Manager Baselines.
Other than host patches, which three items require a separate procedure or process to update?
(Choose three.)

A. Operating system patches
B. Virtual Appliance updates
C. Virtual Machine Virtual Hardware upgrades
D. VMware Tools on machines without VMware Tools already installed
E. Application patches within the virtual machine

Answer: A,D,E

Explanation:
Operating system patches are related to operating system so they need a separate procedure
altogether. Same is the case with VMware tools and applications patches because applications
are stand alone pieces of code that need separate procedure to apply a patch.


QUESTION 5
A series of Auto Deploy ESXi 5.x hosts, which utilize vSphere Standard Switches, are unable to
boot. In prior testing, all of the hosts were able to boot successfully.
Which two conditions might cause this issue? (Choose two.)

A. The Hosts are unable to connect to the SAN.
B. The TFTP server is down.
C. The DNS server is down.
D. The DHCP server is down.

Answer: B,D

Explanation:
If the TFTP server is down, ESXi will not boot because it needs TFTP to get the information.
Similarly, when DHCP is down, it will not assign the IP addresses and ESXi needs IP address to
boot properly.


Wednesday, April 1, 2015

CRISC Certified in Risk and Information Systems Control

QUESTION 1
Which of the following is the MOST important reason to maintain key risk indicators (KRIs)?

A. In order to avoid risk
B. Complex metrics require fine-tuning
C. Risk reports need to be timely
D. Threats and vulnerabilities change over time

Answer: D

Explanation:
Threats and vulnerabilities change over time and KRI maintenance ensures that KRIs continue to
effectively capture these changes.
The risk environment is highly dynamic as the enterprise's internal and external environments are
constantly changing. Therefore, the set of KRIs needs to be changed over time, so that they can
capture the changes in threat and vulnerability.

Answer: B is incorrect. While most key risk indicator (KRI) metrics need to be optimized in respect
to their sensitivity, the most important objective of KRI maintenance is to ensure that KRIs
continue to effectively capture the changes in threats and vulnerabilities over time. Hence the most
important reason is that because of change of threat and vulnerability overtime.

Answer: C is incorrect. Risk reporting timeliness is a business requirement, but is not a reason for
KRI maintenance.

Answer: A is incorrect. Risk avoidance is one possible risk response. Risk responses are based
on KRI reporting, but is not the reason for maintenance of KRIs.


QUESTION 2
You are the project manager of a HGT project that has recently finished the final compilation
process. The project customer has signed off on the project completion and you have to do few
administrative closure activities. In the project, there were several large risks that could have
wrecked the project but you and your project team found some new methods to resolve the risks
without affecting the project costs or project completion date. What should you do with the risk
responses that you have identified during the project's monitoring and controlling process?

A. Include the responses in the project management plan.
B. Include the risk responses in the risk management plan.
C. Include the risk responses in the organization's lessons learned database.
D. Nothing. The risk responses are included in the project's risk register already.

Answer: C

Explanation:
The risk responses that do not exist up till then, should be included in the organization's lessons
learned database so other project managers can use these responses in their project if relevant.

Answer: D is incorrect. If the new responses that were identified is only included in the project's
risk register then it may not be shared with project managers working on some other project.

Answer: A is incorrect. The responses are not in the project management plan, but in the risk
response plan during the project and they'll be entered into the organization's lessons learned
database.

Answer: B is incorrect. The risk responses are included in the risk response plan, but after
completing the project, they should be entered into the organization's lessons learned database.


QUESTION 3
You are the project manager of GHT project. You have identified a risk event on your project that
could save $100,000 in project costs if it occurs. Which of the following statements BEST
describes this risk event?

A. This risk event should be mitigated to take advantage of the savings.
B. This is a risk event that should be accepted because the rewards outweigh the threat to the
project.
C. This risk event should be avoided to take full advantage of the potential savings.
D. This risk event is an opportunity to the project and should be exploited.

Answer: D

Explanation:
This risk event has the potential to save money on project costs, so it is an opportunity, and the
appropriate strategy to use in this case is the exploit strategy. The exploit response is one of the
strategies to negate risks or threats appear in a project. This strategy may be selected for risks
with positive impacts where the organization wishes to ensure that the opportunity is realized.
Exploiting a risk event provides opportunities for positive impact on a project. Assigning more
talented resources to the project to reduce the time to completion is an example of exploit
response.

Answer: B is incorrect. To accept risk means that no action is taken relative to a particular risk;
loss is accepted if it occurs. But as this risk event bring an opportunity, it should me exploited and
not accepted.

Answer: A and C are incorrect. Mitigation and avoidance risk response is used in case of negative
risk events, and not in positive risk events. Here in this scenario, as it is stated that the event could
save $100,000, hence it is a positive risk event. Therefore should not be mitigated or avoided.


QUESTION 4
You are the project manager of a large construction project. This project will last for 18 months
and will cost $750,000 to complete. You are working with your project team, experts, and
stakeholders to identify risks within the project before the project work begins. Management wants
to know why you have scheduled so many risk identification meetings throughout the project
rather than just initially during the project planning. What is the best reason for the duplicate risk
identification sessions?

A. The iterative meetings allow all stakeholders to participate in the risk identification processes
throughout the project phases.
B. The iterative meetings allow the project manager to discuss the risk events which have passed
the project and which did not happen.
C. The iterative meetings allow the project manager and the risk identification participants to
identify newly discovered risk events throughout the project.
D. The iterative meetings allow the project manager to communicate pending risks events during
project execution.

Answer: C

Explanation:
Risk identification is an iterative process because new risks may evolve or become known as the
project progresses through its life cycle.

Answer: D is incorrect. The primary reason for iterations of risk identification is to identify new risk
events.

Answer: B is incorrect. Risk identification focuses on discovering new risk events, not the events
which did not happen.

Answer: A is incorrect. Stakeholders are encouraged to participate in the risk identification
process, but this is not the best choice for the


QUESTION 5
You are the risk official in Bluewell Inc. You are supposed to prioritize several risks. A risk has a
rating for occurrence, severity, and detection as 4, 5, and 6, respectively. What Risk Priority
Number (RPN) you would give to it?

A. 120
B. 100
C. 15
D. 30

Answer: A

Explanation:
Steps involving in calculating risk priority number are as follows:
Identify potential failure effects
Identify potential causes
Establish links between each identified potential cause
Identify potential failure modes
Assess severity, occurrence and detection
Perform score assessments by using a scale of 1 -10 (low to high rating) to score these
assessments.
Compute the RPN for a particular failure mode as Severity multiplied by occurrence and detection.
RPN = Severity * Occurrence * Detection
Hence,
RPN = 4 * 5 * 6
= 120

Answer: C, D, and B are incorrect. These are not RPN for given values of severity, occurrence,
and detection.