Tag Archives: MCTS

Microsoft 70-630 Q & A / Study Guide

 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 


QUESTION 1
You work as a SharePoint Server administrator at Certkingdom.com. You have just the completed the
insertion of new content in the root site. However, later that day the users complained that the new
content is not added in the search results when they run searches on the root site. You need to
make sure that the relevant content is included in query results.
What actions should you take to perform this task?

A. The best option is to set the Complete Through constraint.
B. The best option is to reset the crawled content and start a full crawl.
C. The best option is to set the Resource Center view.
D. The best option is to edit the CSS style sheet to include the new content.

Answer: B

Explanation:


QUESTION 2
You work as a SharePoint Server administrator at Certkingdom.com. One of Certkingdom.com branch offices
consists of a Windows Server 2003 Active Directory domain. You have received instructions from
the CIO to extend SharePoint user profiles to include the userID property from the users’ domain accounts.
What actions should you take to perform this task?

A. The best option is to add a Microsoft Operations Manager (MOM) server.
B. The best option is to create a custom Microsoft Management Console that can access the branch office.
C. The best option is to create a new user profile property that is configured with import mapping.
D. The best option is to run the SharePoint Products and Technologies Configuration.

Answer: C

Explanation:


QUESTION 3
You work as a SharePoint Server administrator at Certkingdom.com. The Certkingdom.com network contains a
SharePoint Portal Server 2003 server named ABC-SR44. ABC-SR44 hosts a SharePoint portal
that is accessed through a hyperlink on the users’ client computers.
The hyperlink points to https:://www.Certkingdom.com/ms/certifications.
You want to migrate ABC-SR44 to Microsoft Office SharePoint Server (MOSS) 2007. You need to
ensure that the SharePoint portal will be accessible after the migration.
What actions should you take to perform this task?

A. By running the stsadm command with the osearch operator.
B. By editing the hyperlink so it will point to the new URL of the migrated content.
C. By running the stsadm command with the enumsites operator.
D. By enabling the Shared Services Provider Synchronizing job.

Answer: B

Explanation:


QUESTION 4
You work as a SharePoint Server administrator at Certkingdom.com. Certkingdom.com contains a Microsoft
Content Management Server 2002 computer named ABC-SR11. You have received instructions
from the CIO to uABCrade ABC-SR11 to Microsoft Office SharePoint Server (MOSS) 2007.
What actions should you take to perform this task?

A. The best option is to run the stsadm command with the addwppack operator.
B. The best option is to run the stsadm command with the installfeature operator.
C. The best option is to run the CMS Assessment utility on ABC-SR11.
D. The best option is to run the Optimize HTML command in SharePoint Designer.

Answer: C

Explanation:


QUESTION 5
You work as a SharePoint Server administrator at Certkingdom.com. Certkingdom.com has a Development
department with a database server named ABC-DB02. ABC-DB02 hosts a database named CkdProducts.
Certkingdom.com has implemented a Web application in the SharePoint site that must access data in CkdProducts.
What actions should you take?

A. The best option is to obtain and install an application definition file from the Development department.
B. The best option is to enable the Save for Sharing option, then save CkdProducts in the Development department.
C. The best option is to save CkdProducts as a Microsoft Excel 2007 worksheet.
D. The best option is to create a custom group in the Site Settings page to the trusted file locations list.

Answer: A

Explanation:


QUESTION 6
You work as a SharePoint Server administrator at Certkingdom.com. Certkingdom.com has a Web site named
testdocs that is hosted by an Internet service provider (ISP). Anonymous authentication is
configured on testdocs.
Certkingdom.com adds a Microsoft Excel 2007 spread sheet to testdocs. However, you have received
complaints from Certkingdom.com users that they get access denied errors when trying to use Excel
Services to access the spreadsheets.
What step should you perform to resolve this problem?

A. You should consider configuring a new Excel Services trusted file location.
B. You should consider selecting the Enable logging option.
C. You should consider configuring the Event Throttling feature.
D. You should consider editing the application.master file.

Answer: A

Explanation:


QUESTION 7
You work as a SharePoint Server administrator at Certkingdom.com. Certkingdom.com has a Sales department
that stores documents in a SharePoint site. The site has a list view Web part named
ABCCustomers that is populated with the names of customers.
You have received instructions from the CIO to add another Web part that will allow the Sales department
members to filter the names displayed on the ABCCustomers Web part.
How would you accomplish this?

A. By adding a Text Filter Web part.
B. By adding a DropDown List on the Web part.
C. By replacing the ABCCustomers Web part with a GridView.
D. By using the view in the team builder.

Answer: A

Explanation:


QUESTION 8
You work as a SharePoint Server administrator at Certkingdom.com. You have received instructions from
the CIO to create a new SharePoint site based on the Report Center template. The site must have
a new page with the Key Performance Indicator (KPI) and the Key Performance Indicator (KPI)
Details Access Web parts.
What actions should you take?

A. The best option is to add a new dashboard page.
B. The best option is to add a pivot table on the Article page layout.
C. The best option is to add a State field on the News Home page layout.
D. The best option is to edit the default.master file on the Document Center template.

Answer: A

Explanation:


QUESTION 9
You work as a SharePoint Server administrator at Certkingdom.com. The Certkingdom.com network has a
database server named ABC-DB30 that is running Microsoft SQL Server 2005. Certkingdom.com has
acquired a Marketing Data Catalog (MDC) application that will access a database hosted on ABCDB30.
To ensure productivity throughout the company you need to make sure that the information
exposed via the Marketing Data Catalog (MDC) application is available in the search results.
What actions should you take to perform this task?

A. By having the information displayed in the Resources Earned Value view.
B. By having Project selected from the View Type list in order to display the resource data.
C. By having the application.master file edited using an ASCII editor.
D. By having the default access account implemented for the Marketing Data Catalog (MDC)
application.

Answer: D

Explanation:


QUESTION 10
You work as a SharePoint Server administrator at Certkingdom.com. You have received instructions from
the CIO to implement a new SharePoint site. The CIO wants the site to have a key performance
indicator (KPI) list, a data connections library and a reference library.
How would you accomplish this?

A. The best option is to add a new pivot chart.
B. The best option is to add a new dashboard page.
C. The best option is to add a new State field.
D. The best option is to add a new Project Center page.

Answer: B

Explanation:


 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Microsoft 70-526 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You are working as an application developer at Certkingdom.com. The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com.
Certkingdom.com uses Visual Studio 2005 as an application platform. Certkingdom.com
consists of a Development department. You as the developer of Certkingdom.com use a
client computer named Certkingdom-WS001 as developing collateral. You have
received instructions to make sure that the PictureBox control’s properties cannot
be changed with a logo that you have added to the PictureBox in the designer of the
form base. Before the time you have added a form to the Microsoft Windows Forms
Control Library project and add a PictureBox control to the form. The form is
presenting Certkingdom.com’s logo.
What action should you take?

A. You should set the Locked property to False.
B. You should set the Locked property to True.
C. You should set the Modifiers property to Private.
D. You should set the Modifiers property to Protected.

Answer: C

Explanation:
When you set the Modifiers property to Private, the value will show
that only the base form can modify the control.
Incorrect Answers:
A: You should not set it to False, because the control can be moved and resized.
B: If you set the property to True the control cannot be removed of resized. .
D: If you set the Modifiers property to Protected, the value will show that the base form
and any of the form yet to come can modify the control.


QUESTION 2
You are working as an application developer at Certkingdom.com. The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com.
Certkingdom.com uses Visual Studio 2005 as an application platform. Certkingdom.com
consists of a Development department. You as the developer of Certkingdom.com use a
client computer named Certkingdom-WS005 as developing collateral. You have just
included a DateTimePicker control to a form. You then set the format property to
Time. During the cause of the day, you check how the DateTimePicker control is
working, and learnt that it does not allow the Certkingdom.com users to change the
selected time.
What should you do to change the control so that it will allow the Certkingdom.com uses
to change the selected time?

A. You should set the ShowUpDown property to True.
B. You should set the ShowSelectBox property to True.
C. You should set the Visible property to False.
D. You should set the Checked property to False.

Answer: A

Explanation:
The ShowUpDown property is by default set on False. You should set
it on True. On False it will show the DateTimePicker must simulate a drop-down
control. This setting will allow the users to set the MonthCalender. If it is set to True
the users can select the time.
Incorrect Answers:
B: The ShowSelectBox will not resolve the problem. This will show if a CheckBox
should be displayed on the DateTimePicker.
C: If you set the Visible property to False, it will hide the DateTimePicker. .
D: You should not set the Checked property to False. If this is set on True, a CheckBox
control will be displayed on the DateTimePicker.


QUESTION 3
You are working as an application developer at Certkingdom.com. The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com.
Certkingdom.com uses Visual Studio 2005 as an application platform. Certkingdom.com
consists of a Development department. You as the developer of Certkingdom.com use a
client computer named Certkingdom-WS001 as developing collateral. The manager of
Certkingdom.com wants to have a borderless form with the background shown in the
exhibit.

When the form is view, the manager named Rory Allen does not want the maroon
area to be visible. He only wants the blue to be visible when the form is displayed.
Which of the following code segments should be used?

A. this.TransparencyKey = Color.Maroon;
B. this.BackColor = Color.Maroon;
C. this.TransparencyKey = Color.CornflowerBlue
D. this.BackColor = Color.Transparent;

Answer: A

Explanation:
The TransparencyKey = Color.Maroon specify the color that the
transparent represents the area on the form. With this setting the blue will respond
to the mouse.
Incorrect Answers:
B: You should not use the BackColor = Color.Maroon. This will determine the
background color of the form.
C: You should not use this code segment. The manager does not wan the blue area to be
transparent.
D: You should not use the BackColor = Color.Transparent. The manager does not want
the background to be transparent.


QUESTION 4
You are working as an application developer at Certkingdom.com. The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com.
Certkingdom.com uses Visual Studio 2005 as an application platform. Certkingdom.com
consists of a Development department. You as the developer of Certkingdom.com use a
client computer named Certkingdom-WS020 as developing collateral.
You have configured three columns to a form and add a TableLayoutPanel to the
form. You want the two side columns to have a fix width of 200 pixels each and
anchor the four edges of the form to the control. A Certkingdom.com manager wants
the center column to fill the remaining space, when ever the form is resized. You
need to change the ColumnStyle instance that represents the center column?
How should you set the ColumnStyle instance’s Size Type property?

A. Set it to AutoSize and the Width property to 100F.
B. Set it to Absolute and the Width property to 100F.
C. Set it to Percent and the Width property to 100F.
D. Set it to AutoSize and the Width property to 0F.

Answer: C

Explanation:
This setting will show that the column should fill the remaining space.
Incorrect Answers:
A: This setting will allow the column to be sized enough so that not any of its child
controls are clipped. In this setting the middle will not occupy the remaining free space.
B: If you set it to Absolute, the value of the Width property will show the number of
pixels for the column.
D: You need to set the ColumnStyle instance’s Size Type property to AutoSize and the
Width property to 100F.


QUESTION 5
You are working as an application developer at Certkingdom.com. The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com.
Certkingdom.com uses Visual Studio 2005 as an application platform. Certkingdom.com
consists of a Development department. You as the developer of Certkingdom.com use a
client computer named Certkingdom-WS020 as developing collateral. You have added
a SplitContainer control named CertkingdomSplitContainer to a form. You then left the
control to the default properties. To the right-most container of the SplitContainer
control, you need to add a PropertyGrid.
Which of the following code segments should you use?

A. PropertyGrid propertyGrid = new PropertyGrid[];
Panel rightPanel = [Panel] CertkingdomSplitContainer.GetContainerControl[];
rightPanel.ControlAdd[porpertyGrid];
B. PropertyGrid propertyGrid = new PropertyGrid[];
Panel rightPanel = [Panel] CertkingdomSplitContainer.GetNextControl[propertyGrid, true];
rightPanel.ControlAdd[porpertyGrid];
C. PropertyGrid propertyGrid = new PropertyGrid[];
CertkingdomSplitContainer.Container.Add[propertyGrid, “RightPanel”];
D. PropertyGrid propertyGrid = new PropertyGrid[];
CertkingdomSplitContainer.Panel2.Control.Add[propertyGrid];

Answer: D

Explanation:
An area can be divided into two containers, which is separated by a
movable bar, if you use the SplitContainer control. When the two Panels are
created, the left one is the Panel1 and the right is Panel2. You are adding a panel so
it will be on the right. You then need to specify Panel2.
Incorrect Answers:
A, B, C: You should not use the Add method of the SplitContainer.Container to add the
PropertyGrid. You also should not pass a PropertyGrid instance to the GetNextControl
method to return a Panel instance. This will actually retrieve the next tab-ordered control
given the current control. You also should not call the GetContainerControl method to
return a Panel instance. This will return the logical container of the SplitContainer
control.


QUESTION 6
You are working as an application developer at Certkingdom.com. The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com.
Certkingdom.com uses Visual Studio 2005 as an application platform. Certkingdom.com
consists of a Development department. You as the developer of Certkingdom.com use a
client computer named Certkingdom-WS020 as developing collateral. You are busy to
develop a Microsoft Windows Forms exam delivery application. This is going to be
used to access the content of the exam via the Internet. A WebBrowser named
testbrowser is added to the control to a form named CertkingdomForm, which is define
as follows:
[PermissionSet[SecurityAction.Demand, Name=”FullTrust”]]
[System.Runtime.InteropServices.ComVisible[true]]
public CertkingdomForm : Form
{
public CertkingdomForm[]
{
InitializeComponent[];
}
public void Expire[]
{
}
}
The JavaScript-based timer that is used by the Web site for the exam has a function
to inform the exam delivery application when the time has expired for the exam,
which is the following:
window.external.Expire[];
What should you do to make sure that the Expire method of CertkingdomForm is called
when the JavaScrip function is carry out?

A. You should set the Document.DomDocument property of the browser instance to the
current instance of the CertkingdomForm class.
B. You should set the ObjectForScripting property of the browser instance to the current
instance of the CertkingdomForm class.
C. You should call the AttachEventHandler of the Document property of the browser
instance.
D. You should call the ExecCommand method of the Document property of the browser
instance.

Answer: B

Explanation:
You must set the ObjectForScripting for the browser instance to the
current instance of the CertkingdomForm class.
Incorrect Answers:
A: The property of the Document.DomDocument represents the true DOM object of an
HTML document.
C: The AttachEventHandler allows you to attach a HTML Document Object Model
event to an event handler.
D: The ExecCommand method allows you to execute commands against DOM
documents.


QUESTION 7
You are working as an application developer at Certkingdom.com. The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com.
Certkingdom.com uses Visual Studio 2005 as an application platform. Certkingdom.com
consists of a Development department. You as the developer of Certkingdom.com use a
client computer named Certkingdom-WS003 as developing collateral. You have
received instructions to make sure that the PictureBox will display dynamically
loaded images.
Which property will display a static image if any dynamic image fails to load?

A. BackgroundImage
B. Image
C. ErrorImage
D. InitailImage

Answer: C

Explanation:
The ErrorImage property specifies the image that should be
displayed. This will happened only if the image that you are trying to load
dynamically fails.
Incorrect Answers:
A: The BackgroundImage property specifies a background image which is used by the
control.
B: The Image property specifies the image you want the PictureBox control to display.
D: The InitailImage specifies the image you want the PictureBox control to display while
the other one is loading.


QUESTION 8
You are working as an application developer at Certkingdom.com. The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com.
Certkingdom.com uses Visual Studio 2005 as an application platform. Certkingdom.com
consists of a Development department. You as the developer of Certkingdom.com use a
client computer named Certkingdom-WS020 as developing collateral. You are
developing a Web service for new updates to query automatically, by use of a
Microsoft Windows Forms application. You then add a NotifyIcon component
named Certkingdomnotify to the application’s main form. Whenever a new update is
available you want the following balloon tip to display as seen in the exhibit for 5
seconds.

Which segment should you use to write a code to download the updates if the users
click the balloon tip?

A. Certkingdomnotify.BallonTipClick +=delegate
{
// Download the updates
}
Certkingdomnotify.ShowBallonTip[5000, “New Update Available”; “Click here to download”
, ToolTipIcon.Info];
B. Certkingdomnotify.ShowBallonTip[5];
Certkingdomnotify.BalloonTipIcon = ToolTipIcon.Info;
Certkingdom.Balloon TipTitle = “New Update Available”;
Certkingdom.BalloonTipText = “Click here to download”;
Certkingdom.Click += delegate
{
// Download the updates
}
C. Certkingdomnotify.BalloonTipIcon = ToolTipIcon.Info;
Certkingdom.Balloon TipTitle = “New Update Available”;
Certkingdom.BalloonTipText = “Click here to download”;
Certkingdom.Click += delegate
{
// Download the updates
}
Certkingdomnotify.ShowBallonTip[5000];
D. Certkingdomnotify.ShowBallonTip[5, New Update Available”, “Click here to download”,
ToolTipIcon.Info];
Certkingdom.BalloonTipClick += delegate
{
// Download the updates
}

Answer: A

Explanation:
You should use an event handler, attach the BalloonTipClicked to the
event and call the ShowBalloon Tip method of the NotifyIcon class. When a user
clicks a balloon tip, a BalloonTipClicked event is raised.
Incorrect Answers:
B, C, D: You should not attach the BalloonTipClicked even to an event handler after you
have called the ShowBalloonTip method. Also note that the event is raised when the icon
is clicked and not the balloon tip.


QUESTION 9
You are working as an application developer at Certkingdom.com. The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com.
Certkingdom.com uses Visual Studio 2005 as an application platform. Certkingdom.com
consists of a Development department. You as the developer of Certkingdom.com use a
client computer named Certkingdom-WS020 as developing collateral. You are busy
adding a MenuStrip control, which has an instance of a ToolStripMenu item named
testjobItem, to a form in a Microsoft Windows Forms application. This item’s
display text is Job. You have received instructions to add two menu items to the Job
menu item. The first item’s display text should be Create New Job, and the second
one is Run Job.
Which code segment should you use to programmatically add the two menu items?

A. ToolStripMenuItem createNewJobItem = new ToolStripMenuItem[“Create New
Job”];
ToolStripMenuItem runJobItem = new ToolStripMenuItem[“Run Job”];
jobItem.Container.Add[createNewJobItem];
jobItem.Container.Add[runJobItem];
B. ToolStripMenuItem createNewJobItem = new ToolStripMenuItem[“Create New
Job”];
ToolStripMenuItem runJobItem = new ToolStripMenuItem[“Run Job”];
jobItem.Owner.Items.Add[createNewJobItem];
jobItem.Owner.Items.Add[runJobItem];
C. ToolStripMenuItem createNewJobItem = new ToolStripMenuItem[“Create New
Job”];
ToolStripMenuItem runJobItem = new ToolStripMenuItem[“Run Job”];
ToolStripMenuItem[] items = new ToolStripMenuItem[]{create NewJobItem,
runJobItem}
jobItem.DropDownItems.AddRange[items];
D. ToolStripMenuItem createNewJobItem = new ToolStripMenuItem[“Create New
Job”];
ToolStripMenuItem runJobItem = new ToolStripMenuItem[“Run Job”];
ToolStripMenuItem[] items = new ToolStripMenuItem[]{create NewJobItem,
runJobItem}
jobItem.Owner.Items.AddRange[items];

Answer: C

Explanation:
For the jobItem instance you should call the AddRange. The property
of the DropDownItems represents a collection of child items of the jobItem instance,
which allows you to add the two items to the job menu item.
Incorrect Answers:
A: This property returns an instance of IContainer, which represents a logical container
for other components.
B: The Owner property returns the Menu script instance that owns the
ToolStripMenuItem instance.
D: This action will add the two new menu at the same level as the Job menu item.


QUESTION 10
You are working as an application developer at Certkingdom.com. The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com.
Certkingdom.com uses Visual Studio 2005 as an application platform. Certkingdom.com
consists of a Development department. You as the developer of Certkingdom.com use a
client computer named Certkingdom-WS050 as developing collateral. You were busy
with a task to add a ContextMenuStrip control to a form.
What should you do to display a custom control as a menu item of the
ContextMenuStrip control?

A. Add a ToolstripContainer control to the form and add the custom control to the
Controls collection residing on the toolStripContainer control. You should then add the
ContextMeniStrip control to the controls of the ToolStripContainer control.
B. Of ToolStripControlHost, create an instance and specify your custom control instance
as a parameter to the conductor. You should then the ToolStripControlHost instance to
the Items collection of the ContextMeniStrip control.
C. Add a ToolstripContainer control to the form and add the custom control to the
Controls collection residing on the toolStripContainer control. You should then add the
ToolstripContainer control to the controls of the ContextMeniStrip controls.
D. Of ToolStripControlHost, create an instance and specify your custom control instance
as a parameter to the conductor. You should then the ContextMeniStrip controls to the
collection of the ToolStripControlHost instance.

Answer: B

Explanation:
The ToolStripControlHost class to host a custom control as a menu
item in the ContextMeniStrip. You should also the custom control instance as the
parameter to the constructor.
Incorrect Answers:
A, B, C: The ToolstripContainer should not be used to reach your goal. Furthermore, you
cannot host a ToolstripContainer control as the menu item in a ContextMeniStrip controls.

 

 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

Ice Fishing Tackle and Tools

The hype around cloud computing is hard to ignore and as each vendor is trying to put the word “cloud” in front of all its products, enterprises are finding it extremely difficult to sift through the noise and really find which products work best specifically for their data center.

MCTS Certification, MCITP Certification

Microsoft Avaya Exam Training , Avaya Certification and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com

While the ability to utilize the public cloud is extremely appealing due to the reduced infrastructure management needed in a public rather than private environment, CIOs and data center managers are hesitant to place important data and applications in the public cloud. With this cautious viewpoint, enterprises are turning to private and/or hybrid cloud solutions that will enable them to receive the benefits of a public cloud while keeping their infrastructure under their control and experience improved agility and infrastructure utilization—leading to dramatic cost and time savings.

Therefore, the popularity in turnkey, ready to go, cloud solutions has skyrocketed over the past year as enterprises are on an active search for the simplest and quickest way to get their private cloud infrastructure up and running. A turnkey cloud promises some appealing benefits like simplicity, quick roll-out, and cost savings, but many organizations are still perplexed by how to evaluate a turnkey solution—or even what capabilities one should include—and how to integrate it with their existing network, compute and storage infrastructure.

To help enterprises evaluate here are the three essential elements that should constitute any turnkey private and/or hybrid cloud solution:

1. Intelligent and reliable automation features:

A turnkey cloud solution must be able to automatically provision configurations when needed and decommission devices when not needed. Additionally, it should be able to combine all known devices, discover new devices and compile them into a resource pool. With the introduction of hybrid cloud computing the importance for intelligent automation features significantly increases. Enterprises need to be able to reliably and securely burst into a public cloud when resources are not available in the private cloud.

One of the most important elements of ensuring the selection of the correct turnkey solution for an environment is selecting a solution that not only provisions virtualized resources but physical and public cloud resources as well. Today, when organizations think of cloud solutions they seem to jump right to technology that only handles virtualization. However, this is only a partial solution as enterprises on average have only 50 percent of their applications virtualized. Therefore, when building a private cloud using a tool that provisions hardware is a necessity to gain the full benefits of a private cloud. The ability to provision and decommission entire hardware and virtualized topologies that include compute, network and storage is a crucial element of a turnkey solution. This feature is crucial to controlling resource sprawl and maximizing the utilization of existing resources.

2. Out-of-the-box adaptors for existing infrastructure:

Seamless integration of a cloud management tool into an enterprise’s existing infrastructure is extremely important as CIOs and data center managers are trying to get the most out of their existing infrastructure. All environments these days are heterogeneous with equipment from multiple systems, network and storage vendors. So, when enterprises bring in a private cloud solution it needs to be able to work across these multi-vendor devices.

If additional resources need to be added to a workload IT should not have to hesitate because they have a Dell system but would like an HP system. Similar to the frustration that arises if someone gets a flat tire and has a Goodyear right around the corner but all they can use is Michelin, a turnkey solution that is not able to provision a wide variety of devices can cause a lot of headaches for IT.

There are thousands of hardware devices and several virtualization vendors that exist today and writing an adaptor for each of these resources is extremely time consuming which is why enterprises need to look for tools that have pre-built adaptors for most of the popular hardware devices and virtual resources from vendors including Dell, IBM, HP, NetApp, EMC, Cisco, Juniper, VMware, Citrix, Microsoft, Red Hat, etc. By creating a private cloud out of existing hardware it not only saves on time, but also creates significant CAPEX savings by re-utilizing existing resources and spare capacity for new workloads instead of purchasing new equipment.

3. Predefined templates for commonly used compute, network and storage configurations:

It is important to first mention that without predefined templates a cloud solution cannot be turnkey. The initial starting point to ensure this requirement is met is looking for the library of predefined templates. The greatest expense for building a private cloud is in the designing and crafting of the templates for the topologies that will frequently be used. Additionally, with most cloud solutions one can build custom templates that need to take the existing environment in the data center into consideration.

When the turnkey cloud solution offered a pre-built library of templates for commonly used topologies then enterprises are able to significantly speed up the time it takes to get a private cloud up and running, thus accelerating their time to value. These predefined templates can deliver 50 to 90 percent of the design for an environment and all they require is IT making easy customizations to make the template fit their specific environment perfectly.

The purpose for a turnkey solution is to be able to quickly and reliably convert an existing static environment into a self-service dynamic environment. And in order for this environment to be successful the turnkey solution must contain the three elements discussed. These capabilities will be crucial for enterprises looking to deploy a turnkey private or hybrid cloud.

By Garima Thockchom, VP of Marketing at Gale Technologies, a leading provider of infrastructure automation software solutions that power IT as a Service for labs, enterprises, and service providers.

Microsoft 70-447 – Q & A / Study Guide

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com

 

 

QUESTION 1
You work as DBA at Certkingdom.com. You administer two Windows Server 2003
computers named Certkingdom A and Certkingdom B. You install SQL Server 2005 on both
Certkingdom A and Certkingdom B to host a new company database. Certkingdom A hosts a
read-write copy of the company database in which all changes are made. Certkingdom B
subscribes to a publication on Certkingdom A and is only used for reporting. A Windows
domain administrator provides you with a domain user account named SQLSRV to use as
the security context for the SQL Server services. A password policy of 42 days exists in
the Default Domain Group Policy object (GPO). You install the database on Certkingdom A
and Certkingdom B and configure replication. Everything works fine for six weeks, but then
all SQL Server services fail. You need to correct the problem. What should you do?

A. Ask the Windows domain administrator to grant the Log on as service right to the
SQLSRV domain user account.
B. Configure the SQLSRV domain user account with a new strong password. Configure
the new password in the properties of each SQL Server service that failed.
C. Create a local user account on Certkingdom A named Certkingdom A and a local user account
on Certkingdom B named Certkingdom B. Configure Certkingdom A and Certkingdom B to run under the
context of the appropriate local user account.
D. Ask the Windows domain administrator to grant the SQLSRV domain user account
membership in the Domain Admins group.

Answer: B

Explanation:
The Default Domain Group Policy object requires that passwords are
changed every 42 days. In order to correct this problem you have to change the
password in the Active Directory AND configure the new password on both you
SQL Servers to the newly changed password.


QUESTION 2
You are a database administrator of two SQL Server 2005 computers named Certkingdom A
and Certkingdom B. You have a Microsoft .NET application that has been modified so that it
now accesses a database on Certkingdom B in addition to Certkingdom A. You do not want the
user application to connect directly to Certkingdom B. You need to enable the data retrieval
from Certkingdom B while maintaining the ability to assign different permissions to different
users who use the .NET application. What should you do?

A. Change the .NET application to define a new server connection to Certkingdom B.
B. Configure a linked server on Certkingdom A to point to Certkingdom B.
C. Change the stored procedures called by the .NET application to include the
OPENXML command.
D. Configure a linked server on Certkingdom B to point to Certkingdom A.

Answer: B

Explanation:
SQL Server lets you access external data sources from your local
Transact-SQL code. You need to define a linked server for each external data
source you want to access and then configure the security context under which your
distributed queries will run. After you create a linked server, you can use the
Transact-SQL OPENQUERY function to execute your distributed queries.


QUESTION 3
You are a database administrator for Certkingdom.com. Your company uses a different
company’s application that is based on SQL Server 2005 Standard Edition. The
application executes a query that uses an index query hint. The index query hint is not
suitable for your environment, but you cannot modify the query. You need to force the
application to use a different query execution plan. What should you do?

A. Create a plan guide for the query.
B. Clear the procedure cache.
C. Create a new covering index on the columns that the query uses.
D. Update the statistics for all of the indexes that the query uses.

Answer: A
Over the past few years, Microsoft SQL Server has increased its
presence in the industry and has reduced its TCO. This reduced TCO is a direct
result, primarily, of the numerous self-tuning mechanisms built into Microsoft(r)
SQL Server. These mechanisms automatically perform tasks that would otherwise
have to be performed by experienced database administrators. One such
mechanism is the cost-based optimizer (CBO) that is used to dynamically generate
query execution plans. The CBO probes several system-wide resource states and
employs many complex, heuristical algorithms to generate the best possible plan for
a given query and the underlying table and index structures. This mechanism works
well for the vast majority of user queries, but there are times when experienced
users need to force a particular query plan, based on some prior knowledge or
insights into future uses.


QUESTION 4
You are a database administrator for Certkingdom.com. Your SQL Server 2005 computer
contains one user database that holds sales transaction information. Users report that the
queries and stored procedures that they use every day are taking progressively longer to
execute. You also notice that the amount of free disk space on the SQL Server computer
is decreasing. You need to create a maintenance plan to correct the performance and
storage problems. What are two possible ways to achieve this goal? (Each correct answer
presents a complete solution. Choose two.)

A. In the SQL Server Maintenance Plan Wizard, use the Check Database Integrity option.
B. In the SQL Server Maintenance Plan Wizard, use the Reorganize Index option.
C. In the SQL Server Maintenance Plan Wizard, use the Shrink Database option.
D. In the SQL Server Maintenance Plan Wizard, use the Clean Up History option.
E. In the SQL Server Maintenance Plan Wizard, use the Execute SQL Server Agent Job
option.

Answer: B,C

Explanation:
When you indexes are not heavily fragmented you can reorganize
indexes, which uses few system resources and runs automatically online. In SQL
Server 2005, certain operations such as large delete operations or -one-time data
loads might leave database files larger than they need to be. SQL Server 2005
enables a DBA to shrink each file within a database to remove unused pages and
regain disk space.


QUESTION 5
You are a database administrator for Certkingdom.com. You are responsible for a SQL
Server 2005 database that has several indexes. You need to write a stored procedure that
checks the indexes for fragmentation. Which Transact-SQL statement should you use?

A. DBCC INDEXDEFRAG
B. SELECT * FROM sys.dm_db_index_physical_stats
C. SELECT * FROM sys.indexes
D. DBCC DBREINDEX

Answer: B

Explanation:
The index_physical_stats function takes five parameters: database_id,
object_id, index_id, partition_id, and mode. This function returns row size and
fragmentation information.


QUESTION 6
You work as DBA at Certkingdom.com. You administer two SQL Server 2005 computers
named Certkingdom A and Certkingdom B. Certkingdom A and Certkingdom B contain a copy of a
database named Sales. The database is replicated between Certkingdom A and Certkingdom B by
using transactional replication. A full backup of each database is performed every night.
Transaction log backups are performed every hour. Replication latency is typically less
than two minutes. One afternoon, the Sales database on Certkingdom A becomes corrupted.
You are unable to repair the database. The Sales database on Certkingdom B is unaffected.
You need to return the Sales database on Certkingdom A to normal operation as quickly as
possible. You must ensure a minimum loss of data and minimal impact to users of either
server. What should you do?

A. Perform a full database backup on Certkingdom B. Restore the backup to Certkingdom A.
B. Restore the most recent full database backup and all transaction logs made since the
full backup was made.
C. Restore only the most recent transaction log backup.
D. Detach the Sales database on Certkingdom B. Copy the database file to Certkingdom A, and
attach the database on both servers.

Answer: A

Explanation:
Detaching the database will not apply to the minimal impact on users
as it will be offline during copy. Restoring only the latest transaction log will not
give you a working database and restoring last full backup and all transaction logs
after that will not apply to the restore normal operations as quickly as possible part
of the requirements.


QUESTION 7
You are a database administrator for Certkingdom.com. The company runs a popular
database-driven Web site against a SQL Server 2005 computer named Certkingdom B. You
need to ensure a quick response time and appropriate audit trail in the event that
Certkingdom B experiences excessive traffic due to denial-of-service (DoS) attacks. Which
two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)

A. Configure the new performance alert to start a SQL Server Profiler trace.
B. Create a new performance alert to monitor the Current Bandwidth counter.
C. Configure the new performance alert to start a Network Monitor capture.
D. Create a new performance alert to monitor the Bytes Total/sec counter.

Answer: C,D

Explanation:
Using alerts, System Monitor tracks specific events and notifies you of
these events as requested. An alert log can monitor the current performance of
selected counters and instances for objects in SQL Server. When a counter exceeds
a given value, the log records the date and time of the event. An event can also
generate a network alert. Characteristic for a typical DoS attack is a large number
of Bytes/sec. Characteristic for a DDoS attack is also a large number of Bytes/sec
but also a large number of connections made from a large number of hosts.


QUESTION 8
You are a database administrator for Certkingdom.com. One of the databases on a SQL
Server 2005 computer contains a stored procedure. Users run this stored procedure to
import data into a table. The stored procedure needs to use the TRUNCATE TABLE
command before importing new data into the table. However, the users who run the
stored procedure do not have permission to truncate the table. You need to provide a way
for the stored procedure to truncate the table before it imports new data. What should you
do?

A. Configure the stored procedure to use the EXECUTE AS command.
B. Configure the stored procedure to be owned by the same database user as the table.
C. Assign the users DELETE permission in the table.
D. Add the users to the db_datawriter fixed database role.

Answer: A

Explanation:
In SQL Server 2005 you can implicitly define the execution context of
the following user-defined modules: functions (except inline table-valued functions),
procedures, queues, and triggers. By specifying the context in which the module is
executed, you can control which user account the SQL Server 2005 Database Engine
uses to validate permissions on objects that are referenced by the module. This
provides additional flexibility and control in managing permissions across the object
chain that exists between user-defined modules and the objects referenced by those
modules. Permissions must be granted to users only on the module itself, without
having to grant them explicit permissions on the referenced objects. Only the user
that the module is running as must have permissions on the objects accessed by the
module.
Syntax:
Functions (except inline table-valued functions), Stored Procedures, and DML Triggers
{ EXEC | EXECUTE } AS { CALLER | SELF | OWNER | ‘user_name’ }


QUESTION 9
You are a database administrator for Certkingdom.com. You have separate SQL Server 2005
development and production environments. You use the Business Intelligence
Development Studio to create a SQL Server Integration Services (SSIS) package in your
development environment. Then, you use the SSIS package to import data into your
development environment from one of your company’s trading partners. You need to
deploy the SSIS package to your production environment. Your production environment
uses different table names than your development environment. What should you do?

A. Save the SQL Server Integration Services (SSIS) package to a file. Copy the file to the
production server. Configure the SSIS package on the production server to use the new
file.
B. Back up the master database and restore it to the production server. Rename the
appropriate tables inside the master database.
C. Create a SQL Server Integration Services (SSIS) package configuration. Build a
deployment utility. Copy the deployment folder for your SSIS project to your production
server. Execute the manifest file.
D. Back up the msdb database and restore it to the production server. Rename the
appropriate tables inside the msdb database.

Answer: C

Explanation:
You have to use a SSIS package to accomplish this but you can not use
the package built for your development environment as the table names differ.


QUESTION 10
You are a database administrator for Certkingdom.com. You notice that one of the data files
on a SQL Server 2005 computer is corrupted. You need to restore the database from the
most recent set of backups. You want to perform this task as quickly as possible, with a
minimum loss of data. What should you do first?

A. Restore the most recent transaction log backup.
B. Restore the most recent full database backup.
C. Perform a full database backup.
D. Perform a transaction log backup.

Answer: D

Explanation:
In order to restore from the most recent set of backups, you have to
first ensure that you can restore all transactions that have occurred between the
time of the backup and the time when the database went corrupt. In order to
accomplish this you should backup the transaction log.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com

Verizon says it doesn’t use Carrier IQ software

Verizon Wireless said Thursday it doesn’t add to its phones any software from Carrier IQ, the company that has come under fire in the past few days for what some say amounts to spying on mobile phone users.

MCTS Certification, MCITP Certification

Microsoft HP Exam Training , HP Certification and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com

Also, Carrier IQ put out another statement clarifying what its software does, in an attempt to calm the uproar, which began when a security researcher published a report showing the software could be used to collect data such as user locations, keys pressed on phones and what applications are running. Phone users typically aren’t aware that their phones have the software and they aren’t able to turn it off.

Apple, AT&T, Sprint, HTC, Samsung and T-Mobile have said some of their phones use the software. Research In Motion and Nokia have said they don’t load the software onto their phones.

On Twitter, Verizon spokesman Jeffrey Nelson wrote on Thursday: “We do not add Carrier IQ to our phones. We do not use other similar software on our devices.”

Carrier IQ, meanwhile, continues to assert that it doesn’t collect any private information about phone users. In a statement it reiterated that its software does not record, store or transmit the contents of text messages, emails, pictures, audio or video. It captures information such as whether an SMS was delivered and which applications drain the battery, the company said. It “vigorously disagrees” with people who allege that Carrier IQ violates wiretap laws.

On Wednesday, Al Franken, the U.S. senator from Minnesota, sent a letter to Carrier IQ asking it to respond to questions about what kind of personal information it collects about users without their knowledge. He suggested the company might violate privacy laws.

His letter followed Carrier IQ’s threat to sue Trevor Eckhart, the researcher whose report kicked off the uproar. Carrier IQ has since withdrawn that threat and apologized for it.

Eckhart reported that Carrier IQ software runs on Verizon phones as well as those from RIM and Nokia. Developers have reported that they have some evidence that shows some Verizon phones run the software. Verizon did not immediately respond to a request for comment about those findings.

Ten Great Strategies For Today’s Climate

This is a challenging time to be in business but there lies the opportunity. I’ve listed 10 specific characteristics of downtimes and 10 positive strategies that embrace and capitalize on them.

MCTS Certification, MCITP Certification

Microsoft IBM Exam Training, IBM Certification  and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com

More time to create a focused business: Use this slower paced market to revisit the business you are in – what defines you. This is the perfect time for repositioning, selling off non-core subsidiaries, sharpening up product road maps and value propositions.
Flight to price and quality: Now is the time to revisit your product mix and pricing strategies. Buying behavior changes dramatically in a recession. Lower priced versions of your product or subscription based business models may be relevant to ease customer cash flow pain.
Measuring the signals is vital:> Mistakes made in downtimes can prove fatal.
Convert your Accounts Department into a Metrics Center. Trap and visualize your key performance indicators. Audit the signals and constantly interpret the significance to your strategies.
Acquisitions just got cheap: PE ratios of the majority of public companies are in single digits and the valuations of private companies are low. Consider a proactive approach to acquisitions by building a robust acquisition process that is proven to work.
The “C” level suite just got a free pass to visit their customers: Never has there been a better time for the inner cabinet to visit their customers to understand the specific issues challenging them. It’s not only productive, it’s essential for shaping strategy. Define your engagement strategy and get on site.
Value Propositions must improve a customer’s performance: Receiving a purchase order, confirming a big deal is very satisfying but it’s not enough. You need to be invested in the improved performance that will be achieved because your customer uses your product. Does your sales process achieve this?
Curiosity & Urgency of managers dramatically increased: Well it certainly should have. This new level of alertness (perhaps it’s fear) needs to be channeled to produce results. Difficult projects shelved in better times are prime candidates for this energy. Staff want to be effective and busy to get things moving again. Tap into this momentum.
People and tasks are mis-aligned: Now is the time to think like a start-up. The key –Define Performance Profiles that your company needs to be executed, not job specs but tasks that need to be done well. This will cause old jobs to be merged and new jobs to be created.
Silo Management is broken: Urgent initiatives will fail without cross-functional support. Company visions need to inspire and flow across functions. Build cross functional teams to execute top priorities.
Competition thins out: It might be difficult to create double digit growth but you can grab market share. The best companies don’t just survive bad times; they grow and develop into more robust and valuable businesses.

As an experienced business leader, Ian Smith is passionate about maximizing the potential of fast-growing companies. The Portfolio Partnership offers Corporate Development Services on an advisory, operational or investment model. Specifically we execute growth strategies by repositioning companies organically and/or by acquisition.

Ian was educated in Scotland, earning a BA degree from the University of Strathclyde and qualified as a Chartered Accountant of Scotland with Grant Thornton. Post qualification he joined Thomson the publishing giant and became one of their youngest divisional Finance Directors at 26 and was awarded the prestigious, UK Accountant of the Year ahead of many experienced FDs. From 1988 to 2000 he successfully built up two major boutique M&A advisory firms, Livingstone Guarantee and Capita Corporate Finance. During this period he completed over 40 acquisition, disposal or finance transactions, many cross border, many in the technology sector. He assisted dozens of entrepreneurs execute their vision.

In late 2001 he moved to the states to successfully reposition and grow Teamstudio, an IBM business partner with HQ in Beverly, MA and offices in the UK and Japan. During the next 5 years the top line was grown by over 45% and losses were turned into EBITDA of over $10m. high achiever, Ian expects the highest performance from his staff but always mixed with a Glaswegian sense of humor!

Court rules that HP’s Hurd probe document can remain secret

A document tied to an internal Hewlett-Packard sexual harassment investigation of former CEO Mark Hurd will remain sealed, according to a ruling handed down this week by the Delaware Supreme Court.

HP shareholder Ernesto Espinoza had filed a lawsuit seeking to inspect the document, which was prepared by the law firm Covington and Burling on HP’s behalf.

MCTS Certification, MCITP Certification

Microsoft IBM Exam Training, IBM Certification  and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com

The Delaware Chancery Court had already ruled against Espinoza on grounds his need to see the document wasn’t sufficient enough to override “attorney-client privilege and work product immunity protections,” the state supreme court said in its ruling, which was handed down Monday. “We affirm, but on the alternative ground that Espinoza has not shown that the Covington Report is essential to his stated purpose, which is to investigate possible corporate wrongdoing.”

Hurd resigned from HP in August 2010 and also reached a confidential settlement with a former HP contractor, Jodie Fisher. Shortly thereafter, he took a job as co-president of Oracle.

Although the internal HP investigation did not conclude Hurd was guilty of sexually harassing Fisher, it found he had broken HP’s business conduct standards and uncovered a “systematic” series of inaccurate expense reports meant to cover up his relationship with her, the ruling added.

Hurd received a lucrative severance package from HP. Espinoza had argued that if HP’s board had reason to fire Hurd “for cause,” then the payments shouldn’t have been made, the court said.

Oracle: HP paying Intel to keep Itanium going

Hewlett-Packard has secretly contracted with Intel to keep making Itanium processors so that HP can maintain the appearance that “a dead microprocessor is still alive”, and make money from its locked-in Itanium customer base and take business away from Oracle’s Sun servers, Oracle said in a court filing on Friday.

MCTS Certification, MCITP Certification

Microsoft Oracle Exam Training , Oracle Certification and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com

The market has never been told that Itanium lives on because HP is paying Intel to keep it going, Oracle said. Intel’s independent business judgement would have killed off Itanium years ago, it added.

HP however described the filing as a “desperate delay tactic designed to extend the paralyzing uncertainty in the marketplace” that it said was created when Oracle announced in March, 2011, in a breach of contract, that “it would no longer support HP’s Itanium platform”.

HP has made statements to the marketplace to the effect that Intel’s commitment to Itanium is its own, based on its normal calculations for investing in processors that it believes have a future, Oracle said in a filing before the Superior Court of the State of California for the County of Santa Clara.

A public redacted version of the filing was made available to The Wall Street Journal’s AllThingsD blog. Intel said it is not a party to the lawsuit, and therefore does not have any comment on it. “Intel does not comment on commercial agreements that we may or may not have with our customers,” the chip giant said in an e-mailed statement.

Oracle also claimed that HP had kept secret from the market, but revealed in a filing two days previously, that HP and Intel have a contractual commitment that Itanium will continue through the next two generations of microprocessors.

HP’s strategy behind its “false statements” about Intel’s support for Itanium was to take away business from Oracle Sun, and “reap lucrative revenues from the locked-in Itanium customer base using HP’s HP-UX operating system on Itanium servers”, as the company gets few service contracts on operating systems like Linux that run on x86 processors, Oracle said.

Oracle acquired Sun Microsystems last year.

HP filed a suit in June over Oracle’s decision to stop developing software for the Itanium processor, the chip used in HP’s high-end servers, claiming that Oracle’s decision violates “legally binding commitments” that it made to HP and the companies’ 140,000 joint customers.

Oracle said at the time that HP tricked it into signing an agreement last September to continue its support for Itanium, even though HP knew of an Intel plan to discontinue Itanium. HP already knew all about Intel’s plans to discontinue Itanium, and HP was concerned about what would happen when Oracle found out about that plan, Oracle said in a statement in June.

As Oracle well knows, HP and Intel have a contractual commitment to continue to sell mission-critical Itanium processors to customers through the next two generations of microprocessors, thus ensuring the availability of Itanium through at least the end of the decade, HP said in a statement.

“The fact remains that Oracle’s decision to cut off support for Itanium was an illicit business strategy it conjured to try to force Itanium customers into buying Sun servers — and destroy choice in the marketplace,” HP said.

Learn About IBM 000-229,000-236,000-252 Certification Exam

Regardless of how quickly IBM 000-229 exam the purpose of the changes, our 000-229 training materials are changing quickly, as we always deliver the best, latest and most accurate IBM 000-229 Exam Training Tools to you.

MCTS Certification, MCITP Certification

Microsoft IBM Exam Training, IBM Certification  and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com

 

Do not trust low quality IBM 000-229 practice tests and IBM 000-229 brain dumps by others. You can always trust Certarea links as a reliable supplier of IBM 000-229 Training Tools. You can find the best solution for your 000-229 needs preparation than links Certarea. Our 000-229 Free Notes, IBM 000-229 Questions 000-229 samples and brain dumps are reliable and regularly updated with the changing IBM 000-229 Exam Objectives to give you the most accurate study material 000-229 is possible. You can trust our 000-229 Free Notes, IBM 000-229 Questions 000-229 Free samples and notes for the successful preparation of IBM 000-229 Certification Exam. Certarea fully equipped with resources and IBM 000-229 exam questions. It also contains IBM 000-236 practice test dump, which can help a candidate for test preparation pass the examination. Your training is made much easier because you can download 000-236 Braindump Exams and testing software from the site Certarea. Certarea provides the best quality and up to date training materials for the preparation 000-236 study guide. All training materials and other products Certarea training are cost effective and available online with free upgrades Certarea objects. All these training products are available at Certarea with a money back guarantee. Certarea 000-236 torrent deliver you extensive training of all key concepts and skills exam curriculum. Certarea 000-236 training materials do you prepare the questions same as the IBM 000-236 exam. Moreover, our 000-252 Q & practice based on VUE testing center features so to give you everything before you actually take your 000-252 Exam. We are IBM certification exam Certarea 000-252 have extensive experience in the field exam Braindumps and study notes as our team is constantly working on more advanced 000-252 exam guide and test questions. In the IBM 000-252 Certarea, 000-252 Braindumps page all the necessary 000-252 exam guide is available which not only includes free 000-252 but it also contains 000-252 study guide and 000-252 practice exam. You will receive the most accurate and current information available on the market, so you can be sure to go to the testing room with confidence and knowledge to pass your 000-252 exam on your first try. Certarea guarantee that you will pass your 000-252 exam on your first attempt after using one of our 000-252 Q & A product training.

IBM to build e-commerce research labs for Chinese retailer

IBMhas reached a deal with Chinese electronics retailer Suning Appliance to build research centers in China and the U.S. meant to develop e-commerce products for the company.

MCTS Certification, MCITP Certification

Microsoft IBM Exam Training, IBM Certification  and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com

IBM, already a provider of internal management systems for Suning since 2005, will now help the Chinese company expand its e-commerce site and services, said IBM spokeswoman Harriet Ip.

As part of the plan, IBM will build a research center in the Chinese city of Nanjing that will be staffed with 15,000 Suning employees over the next three to five years. Some of the products the center will develop include applications to allow household appliances to connect with the Internet and mobile handsets.

IBM is also establishing a joint development lab with Suning in Silicon Valley. The planning for the lab is still in the preliminary stages, but it will also focus on developing e-commerce services, Ip said.

Suning made the deal as the company is aiming at a greater presence in China’s burgeoning e-commerce sector. While Suning has 1,700 physical stores, the company has to compete with the likes of China’s Alibaba Group, which operates two of the top online retail sites in the country.

Suning has launched its own business-to-consumer (B2C) site, which now has a 2.4% market share, according to Beijing-based research firm Analysys International. In contrast, Alibaba’s Taobao Mall has a 35.5% share.

“There is no question that we live in a time of rapid change that calls for the transformation of organizations in many industries,” said Frank Kern, an IBM senior vice president in a speech last Friday.

Suning’s goal is to build an e-commerce platform that will better personalize the shopping experience, by recommending appropriate products and providing better search. Financial terms of the detail were not disclosed.

Suning could not be immediately reached for comment. The company’s president Zhang Jindong said in a statement that his company was moving to a business model that could leverage both e-commerce and physical retail shopping.

“With this innovative business model, consumers, suppliers and businesses along with society can all benefit,” he said.