admin

  • The mainframe turns 50, or, why the IBM System/360 launch was the dawn of enterprise IT

    In 1964, mainframes weren’t new, but the System/360 revolutionized the computer industry In many ways, the modern computer era began in the New Englander Motor Hotel in Greenwich, Connecticut. It was there in 1961 that a task force of top IBM engineers met in secret to figure out how to […]

  • Build: Microsoft Azure embraces outside technologies

    Microsoft has open-sourced its new C# compiler and Azure now incorporates the open source Chef and Puppet configuration managers As it rolled out tools and features for coders at its Build developer conference Thursday, Microsoft showed that it is ready to embrace technologies and platforms not invented within its walls. […]

  • 70-643: Windows Server 2008 Applications Infrastructure, Configuring

    QUESTION 1 You work as the network administrator at ABC.com. The ABC.com network has a domain named ABC.com. All servers on the ABC.com network run Windows Server 2008 and all client computers run Windows Vista. ABC.com recently entered into partnership with Weyland Industries. You create user accounts in the ABC.com […]

  • ,

    70-414 Implementing an Advanced Server Infrastructure

    QUESTION 1 In order to adhere to the visualization requirements, what user role should you sign to the ABC1 group when you implement the delegation of the virtual environment? A. You should consider utilizing the Activity Implementers user role profile for the ABC1 group. B. You should consider utilizing the […]

  • 70-412 Configuring Advanced Windows Server 2012 Services

    QUESTION 1 You are employed as a network administrator at ABC.com. ABC.com has an Active Directory domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 installed. ABC.com has a server, named ABC-SR07, which is configured as a DHCP server. You have created a superscope on ABC-SR07. […]

  • 312-50v8: Certified Ethical Hacker v8

    QUESTION 1 Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing attacks? A. Configure Port Security on the switch B. Configure Port Recon on the switch C. Configure Switch Mapping D. Configure Multiple Recognition on the switch Answer: A Explanation: QUESTION 2 Jimmy, […]

  • If Microsoft gives away Windows Phone 8, will anyone take it?

    In a bid to increase licensees and gain some badly needed market share, Redmond won’t charge for its phone OS anymore. Rumors and speculation have swirled on this for months, but now it’s official: Microsoft is giving away Windows Phone for free, at least to a pair of Indian handset […]

  • Android malware detection boosted by university research

    Researchers from North Carolina State University have found a way to monitor for Android malware with very low overhead With smartphones and tablets increasingly at risk from malware, researchers from North Carolina State University have devised a new and potentially better way to detect it on Android devices. The tool […]

  • Gartner: Microsoft sells more tablets in 2013, still lags far behind Android, iOS

    2014 offers some hope to Microsoft as ultramobile sales are expected to rise Microsoft sold more than double the tablets last year than it did the year before but still wound up with just 2.1% of total sales, according to Gartner. Windows 8/8.1 likely had a lot to do with […]

  • Ultimate cloud speed tests: Amazon vs. Google vs. Windows Azure

    A diverse set of real-world Java benchmarks shows that Google is fastest, Azure is slowest, and Amazon is priciest If the cartoonists are right, heaven is located in a cloud where everyone wears white robes, every machine is lightning quick, everything you do works perfectly, and every action is accompanied […]