Showing posts with label Global Knowledge Training Blog. Show all posts
Showing posts with label Global Knowledge Training Blog. Show all posts

Wednesday, 16 November 2016

VMware’s App Volumes Simplifies Management for VDI

bluelaptopApplication management can be a complicated task when it comes to virtual desktop infrastructure (VDI), but it doesn’t have to be. App Volumes is VMware’s product for virtual machine application layering that helps simplify the process. These layers are known as AppStacks, which are virtual disks that contain everything necessary (executables, registry keys, etc.) to run the application.

AppStacks are not run in isolation or containerized like ThinApp packages. Instead, the agent for App Volumes merges the AppStack contents with the virtual machines’ file system and Windows Registry. Users have no indication that this is happening; to the user it appears as though the applications are actually installed in the system.

Two components make up App Volumes:

  • App Volumes Manager–a central management console that is used for provisioning and managing entitlements for AppStacks.
  • App Volumes Agent–installed on the virtual machines and is responsible for handling processes needed to mount the AppStacks and make the applications available to the end user.

As mentioned, AppStacks are virtual disks that contain one or more applications and can be assigned to Active Directory users, groups, computers and/or organizational units (OUs) as a read-only disk. One or multiple AppStacks can be assigned to a user’s virtual machine depending on how the applications are managed. There’s another option that may be used called Writable Volumes, which are user-specific disks that can be used to store applications installed by the user, as well as user profile information.

What I have been describing so far is App Volumes 2.x but you may quickly realize that App Volumes 3.0 was released earlier this year. Customers using App Volumes 3.0 have encountered issues and there have been complaints about the new version, including issues with AppStacks and the interface. VMware released version 2.11 approximately three months after releasing 3.0. VMware has indicated that the two different versions should be treated as two separate products: 2.x should be used for on-premises deployments whereas 3.x is designed for use with cloud-based deployments.

App Volumes 3.0 introduces a new way to create AppStacks called AppCapture. AppCapture is run from the command line or by using Microsoft PowerShell. AppCapture also has a component called AppIsolation, which allows AppCapture to integrate with VMware ThinApp to provide both native and VMware ThinApp applications through a single format–the AppStack.

Additionally there’s a new capability called AppToggle that allows per-user entitlement and installation of applications using a single AppStack. This would reduce the number of AppStacks required, ultimately lowering storage usage and increasing manageability.

Lastly, there is a new feature called AppScaling that allows the addition of multiple file shares for hosting AppStacks, pairing them to different VMware vCenter Server instances. A service runs to scan the shares and populate the AppStacks into datastores within the VMware vCenter Server instances. This eliminates the need to replicate AppStacks across multiple sites.

Applications are an integral part of virtual machines, especially virtual desktops. App Volumes helps reduce the overhead for handling application lifecycle management by simplifying application packaging and delivery. With App Volumes, applications can be delivered using virtual disks without having to modify the virtual machine. Having a real-time application delivery system is a major asset to any enterprise virtual desktop infrastructure environment.

Related Courses
VMware Horizon 7: Install, Configure, Manage [V7]
View our complete VMware portfolio.

 



from
CERTIVIEW

Tuesday, 15 November 2016

Tech the Halls: Top 12 Gadgets of the Holiday Season

It’s the perfect time to get a jump on your holiday wish list. For technology lovers, that means just one thing—gadgets. Whether you prefer to stand in line for hours to buy the newest smartphone or long for the days of 8-bit gaming, there’s a perfect tech toy for you this holiday season.

We asked Global Knowledge’s resident experts for their ultimate tech gifts this year. Here are their top 12 picks and reasons for wanting each device, as well as a way we can help you geek out with your most coveted tech gadgets.

12. Fisher Price Think & Learn Code-a-pillar ($49.99)

How it works: For ages 3-6, this children’s toy “crawls” in different directions based on the arrangement of its eight segments. Each combination will send the Code-a-pillar on an alternate course.
Coolest feature: There is no wrong sequence. The Code-a-pillar moves regardless of how it is assembled. But if kids want more of a challenge, they can piece together the Code-a-pillar so it will reach certain destination targets placed around a room. It’s a great way to learn how to problem solve and strengthen motor skills through play.
Laura Faughtenberry, Product Marketing Manager: “Encouraging your child to learn to code at an early age can increase their creativity and excite them to develop great problem-solving skills. And with a toy like this, they won’t even realize they are learning. I’m excited to see my kids put their minds to work! As the cloud and interconnectivity become more and more prevalent in our day-to-day lives, I want to make sure my kids have a foundational understanding of computer science early on.”

Canon, camera, Christmas11. Canon DSLR 7D Mark II ($1,849.99)

How it works: This 20.2-megapixel digital camera is perfect for both amateur and professional photographers. The camera captures images up to 5472 x 3648 pixels while the movie mode records footage at 60p in MOV and MP4 formats.
Coolest feature: Burst mode makes it possible to capture images in a rapid sequence. It’s ideal for nature and sports photography as well as finally getting decent shots of family members furiously unwrapping their presents.
Kevin Colleton, Senior Project Manager: “The primary feature that attracted me to this camera was its sheer speed: a whopping 10 frames per second! This made it a great camera for taking action shots at my son’s soccer games and other sporting events. It doesn’t have a ‘full-framed’ digital image sensor like a professional photographer might use. However, it does have Canon’s latest dual DIGIC 6 image processors that can process 64 different focus points! It takes great photos and has excellent video capabilities at 1920 x 1080 resolution. The Canon 7D Mark II camera is a great choice for the photo enthusiast who desires professional-level results at consumer-level pricing.”

10. SkyBell HD Wi-Fi Video Doorbell ($199.99)

How it works: Each time your doorbell rings, you receive an alert to your phone and are able to see and speak to the visitor. There’s also a motion sensor to alert you even if the doorbell isn’t pushed. It’s a terrific security device, especially when you’re not home or are trying to avoid the in-laws.
Coolest feature: You can access a live feed of your front door at any time using the SkyBell app. It doesn’t matter where you are; you’ll have access to HD video and can even record or take a snapshot of each visitor.
Jack Broeren, Manager, Pre-Sales Support: “The SkyBell video doorbell is at the top of my list this year. I’m a total geek when it comes to home automation. I love being able to control the electronics in my home from my iPhone. The HD camera is amazing and the color night vision is impressive. The two-way audio feature means I’ll never have to rush to the post office after missing my latest Amazon order! SkyBell even works with the smart lock on my front door.”

Star Wars, BB8, droid, Christmas9. Sphero Special Edition BB-8 App-Enabled Droid ($149.99)

How it works: This is the droid you’re looking for. Control and communicate with BB-8, the pint-sized breakout star from the blockbuster film “Star Wars: The Force Awakens,” using your smartphone or tablet. In addition to the app, BB-8 reacts to voice commands and records virtual holograms. There’s also the option to have BB-8 patrol, so it’ll roam around your home on its own, protecting you from any invading factions of the First Order.
Coolest feature: You get your own droid! Also, if you pair BB-8 with a Sphero Force Band, you can control it with a wave of your hand—no training from Yoda needed.
Marnee Bruno, Vice President of Marketing – Canada: “Christmas is the time for nostalgia. I am old enough to remember the pre-CGI world of ‘Star Wars’ in the ‘80s, so BB-8 makes me think of the real wonder I felt watching R2-D2 as a kid! But, memories aside—and maybe more importantly—I need to relax this Christmas, and I am looking forward to being cuddled up by the fire and using my app-controlled BB-8 to run and wear out my puppy while I sip my eggnog!”

8. NES Classic Edition ($59.99)

How it works: Nintendo has packaged 30 of its original NES video games into one small console. All games are pre-installed in this miniature version of the iconic gaming system, initially released in 1985, and each console comes with the classic rectangular controller.
Coolest feature: We know what you’re thinking—it’s not a true NES experience unless you’re playing on an oversized CRT television from the ‘80s. Well you’re in luck! Each player has the option to select three different displays, including the “CRT Filter” that provides a retro look, with scan lines and all. Now if only there was a filter to help you beat the “Super Mario Bros.” water levels.
David Price, Director, Learning Architecture: “The NES Classic takes me back to those carefree, halcyon days of youth, when my best buds and I would get home from school on a rainy day, tear open a bag of chips, plant ourselves in my parent’s living room, fire up the Nintendo and the 19-inch Sylvania, and do the Donkey Kong. This diminutive device packs 30 games for a mere $60, which is a small price to pay for a journey back to (the good parts of) adolescence.”

Google, Chromecast, stocking, Christmas7. Google Chromecast ($35)

How it works: Chromecast lets you stream apps like Netflix, Hulu, HBO Go and YouTube directly to your television from a phone or laptop. You can also use your smartphone as a remote, which comes in handy if you find yourself inclined to fast forward through the scary parts of “Stranger Things.”
Coolest feature: Set-up is one step: plug it in. Seriously, as long as you have a USB port on your TV, you’ll be watching your favorite show in seconds. Also, if there’s an app on your laptop or phone that isn’t available on Chromecast, you can still mirror the content from your device to your television.
Casey Wasserman, Marketing Communications Specialist – Editor: “I just moved and decided to cut the cord once and for all. Using Chromecast, I can stream my favorite shows (hello, ‘Breaking Bad’ marathon!), and the best part is that I don’t have to worry about losing the remote in a sofa cushion. My phone does all the work!”

6. Samsung Family Hub Refrigerator ($3,899.99)

How it works: Looking to save energy? Want to spy on your food? The Samsung Family Hub Refrigerator’s three built-in cameras let you peer inside your fridge without opening the door. The 21.5-inch touchscreen is also helpful when looking to shop online or when you want to leave a note for a family member. There’s also a compartment that can be utilized as a fridge or a freezer—you decide. It’s a great way to maximize space.
Coolest feature: Have you ever been grocery shopping and forgotten what’s in your fridge? You can view your refrigerator contents from your mobile device. It’s also a great way to see who eats all of the holiday leftovers.
Lia Byers, Cisco Product Manager: “This refrigerator goes beyond the word ‘refrigerator.’ It is a place for family members to connect and leave messages for each other. It is a family photo album that runs in slide show or individual mode. It has Pandora, a radio station tuner and a shopping list that can be viewed on your smartphone. You can even send messages to the touchscreen while you’re out of the house. How amazing! Please Santa, bring me my own.”

Microsoft, laptop, tablet, Christmas5. Microsoft Surface Pro 4 ($899.99)

How it works: The Surface Pro 4 erases the need for both a tablet and a laptop. It’s thin and portable with a keyboard that isn’t flimsy like many associated with laptop/tablet hybrids. The included Surface Pen further enhances its versatility as it allows users to write and draw directly on the screen.
Coolest feature: The Surface Pen elevates the Surface Pro 4 many ways. You can sketch with it by taking advantage of 1,024 levels of pressure sensitivity to produce detailed images. You can also take notes during classes or meetings. Or you can screenshot a webpage, mark it up with the pen and share it with a friend or colleague. And for those of us who aren’t perfect, there’s an eraser.
Andrew Kyriakoulis, Web and Graphic Designer: “When tablets hit the market, I admit I wasn’t very impressed. I loved the idea, but wanted something much more powerful and versatile. Then the Surface Pro came out and I’ve been eyeing it ever since. I love that it comes equipped with Windows 10 (instead of a mobile OS) and has the specs necessary to handle more intensive computing tasks. Normally when I’m on the go, I keep a sketchbook handy for on-the-fly notes, sketches and ideas. With the Surface Pro’s perfect size, awesome touchscreen and pressure sensitive pen, I think it could be an even better creative sidekick. Now, what I really want is to pair the Surface Pro with the new Surface Studio coming out in 2017. There’s a dream come true.”

4. Apple iPhone 7 ($799.99 without contract)

How it works: The lack of a headphone jack is getting the most press, but the newest iPhone has a multitude of improvements over its predecessor. For starters, the phone’s speed, camera, stereo and battery life have been upgraded. The display screen is also brighter and more colorful than previous versions.
Coolest feature: We wouldn’t recommend intentionally spilling your morning coffee on your iPhone 7, but if you want to, you can. Hey, whatever floats your boat. The phone’s case and screen are water resistant, so a trip into the shower or pool won’t leave you disconnected to the rest of the world.
Amanda Gladieux, Sales Director – Canada: “I have to admit it, I want the latest and greatest. The iPhone 7 Plus is definitely on my list this year. After getting used to my apparently massive 6 Plus (and the comments I get when I hold it up!), I can’t imagine downsizing. The large screen is just too good to give up. Here is what’s cool about the iPhone 7 Plus—it is fully water resistant (meaning it will survive if you drop it in the bathtub or toilet), it has a dual camera system with good front camera image quality (for those creative photographers or selfie-obsessed), the battery lasts longer and there are bigger storage options. Although it’s a splurge, the new iPhone 7 makes my list this year.”

Echo Dot, Christmas, stocking3. Amazon Echo Dot ($49.99)

How it works: The Echo Dot works just like the Echo, but with a smaller speaker. That’s it, that’s the difference. (And half the price, which is nice.) The device streams music and is voice-activated, so Alexa is still there to tell you the weather forecast, order pizza or let you know if the Knicks won. (They probably didn’t.)
Coolest feature: The size of the Echo Dot is its biggest attribute. It can easily fit in your coat pocket or handbag, so moving it from room to room and taking it on the go is a breeze. While the original Echo has the sound advantage, the Echo Dot can be connected to external speakers, allowing you to control the audio quality and volume.
Ruth Patterson, Senior Marketing Manager: “My wish for this holiday season is to get the all-new Echo Dot! I think it’s so cool with the ability to get smarter as I use it with things like playing music, using the alarm clock, requesting time and temperature, and ordering a Domino’s pizza—all hands-free. I’m sure by the time I master all of these uses there will be many more. Can’t wait!”

2. Bose SoundSport wireless headphones ($149.99)

How it works: Headphone jacks may soon be extinct so there’s no better time to ditch the wires. The SoundSport wireless headphones pair with your Bluetooth device and stay charged for up to six hours. They’re also sweat and weather resistant, so you can go the extra mile during your workouts.
Coolest feature: The StayHear tips are designed to be lightweight and deliver strong sound quality. Better yet—they’re designed to stay in your ear! Crazy concept, we know. There’s nothing worse than earbuds that don’t stay in place when you move.
Kerrie McCullough, HR Generalist: “I would love to wake up Christmas morning to find the Bose SoundSport wireless headphones under my tree. I love to listen to music at home, work and when I’m out for my walks. I’m a fast walker and always end up pulling the earbuds out of my ears. These will allow me to go crazy with my arms during my speed walks while listening to my favorite music.”

Gaming, virtual reality, Oculus Rift, Christmas1. Oculus Rift ($599.99)

How it works: The Oculus Rift is a virtual reality headset that allows users to play video games, watch TV shows and movies, and connect with friends in a virtual environment. The Oculus Rift comes with an Xbox wireless controller while a new motion-capturing controller, the Oculus Touch, will be released Dec. 6. The Touch will register arm and finger movement to create an even more interactive experience.
Coolest feature: Prefer to watch movies in the theater? The Oculus Rift has a video feature that allows users to watch movies and videos in a virtual reality theater environment. You can take a trip to the movies while still on your couch. All that’s missing is the popcorn.
Justin Alisauski, Application Developer: “Virtual reality has a long history, but only recently, with constant technology evolution, have we come to an age where video graphics are more realistic and where things like the Nintendo Wii and the Xbox Kinect have increased interactivity with video games. Enter the Oculus Rift, which has revolutionized virtual reality. It has the controls to allow for interactive game play as well as the graphics to give an experience where users actually forget they are in their living room. The Oculus Rift allows users to share experiences with friends and family, so you can witness their reactions as they go deep-sea diving, journey to space or fend off endless hordes of zombies.”

Bonus Stocking Stuffer: $500 Best Buy® e-Gift Card

How it works: Sign up and attend an eligible Global Knowledge IT course and receive a $500 Best Buy® e-Gift Card on us. It’s the best way to get Cool Stuff and check items off your own gadget wish list.
Coolest feature: You don’t have to wait for Santa to get the tech toy of your choice this year! Use the $500 Best Buy® e-Gift Card to score some wireless headphones to pair with your new iPhone 7. Or pick up the Amazon Echo to play your favorite holiday tunes for all to hear. (Blast them as loud as you want to—we won’t judge.)

What’s on your wish list?
Let us know your favorite gadgets from our countdown or share your own personal wish list by tagging @GlobalKnowledge and using #TechtheHalls.

Don’t forget to share
Dear @OfficialSanta, please bring me the #iPhone7 or anything on the @GlobalKnowledge #TechtheHalls list: http://wp.me/p3Dcss-3aw



from
CERTIVIEW

Tuesday, 8 November 2016

Reducing the Security Risks Associated with BYOD

studentbyod150533398Today’s tech-savvy workforce just became more empowered, but will organizations pay the price?

Bring Your Own Device (BYOD) initially started as a trend by employees due to the fact that they are more familiar with their own devices and applications; what’s more, most organizations are behind on technology due to lack of funding or resources.

Employees found that the same work could potentially be completed faster and more efficiently by using personal devices instead of the outdated and severely weathered equipment issued by their employer. However, this is more than merely using their own devices; it’s about ease of access and having the ability to work from any location—not just from the office.

It’s the employees’ personal devices and their knowledge of the equipment that allows them to be away from life in a noisy cube farm and still be able to perform their assigned duties. The daily struggle to constantly combat against their neighbor’s keyboard echoes and having to apologize to prospective or current customers for the background noise consisting of the latest joke or other charades is more than enough reason to want to work remotely. But is ease of access worth the inevitable security risks?

It’s understandable that employers find it difficult to keep up with the latest technology let alone the technological demands from its employees; these things cost money. However, proposing what some consider a “simple” solution presents dangers that extend way beyond dropping a cell phone in the toilet. These dangers, or risks, include a data breach or data leaks. “Bring in your own device and have the ability to work from anywhere.” Sounds simple enough, right? “My personal laptop is so much better than this old, clunky laptop that my company allows me to use, and I can do more work from my own laptop at home.” I can’t tell you how many times I’ve heard that exact statement, and my response is always the same: “I apologize, but we can’t take the risk of having you connect your device to our network because we don’t know if it’s secure or not.” But with a BYOD plan, it’s easy, right? Unfortunately, it’s not that simple.

BYOD is an acronym that makes every IT Security professional cringe. This isn’t due to the extra work associated with successfully implementing a BYOD solution. Instead, the thought of every employee being able to use their own devices (cell phones, tablets, laptops, etc.) on an organization’s internal network is absolutely terrifying due to numerous security risks.

The transition to personal devices involves a lot more than simply giving the go ahead. There are several security concerns that companies must consider:

  1. What will the anti-virus solution be, and how will it be deployed and managed for mobile devices?
  2. What regulations do we need to adhere to for BYOD in order to maintain a compliant status?
  3. How will we regulate policies and access control to ensure that our data is safe?
  4. How can we ensure confidentiality, integrity and availability of company data?
  5. Will there be any accountability, and if so, how do we enforce associated procedures?
  6. How can we know for certain that our data is and will continue to be safe?

That is only a short list of security concerns, and nothing on that list even mentions asset management. Asset management utilities are a popular solution specifically for mobile devices, but they aren’t able to identify or discover malicious activity or any other security-related issues. Moreover, implementing that type of solution will mean that employees would have to allow their employers the ability to access their personal devices. This reality does not sit well with most employees as personal information resides on these devices. Each device would also have to be checked for malicious software prior to implementation. There is also the issue of compatibility; each device (since they will not all be the same) may not have the ability to interact with this specific application and so on.

It is almost certain that organizations will make the switch to BYOD in the foreseeable future. When that switch does happen, employees can facilitate a seamless execution by being more aware of what they access and what information they could potentially be sharing. Employers, on the other hand, need to ensure that a structured plan is put into effect prior to any action. The application of a solid asset management solution, policy enforcement, security monitoring and a security awareness plan is necessary. A network is only secure as its weakest point, and we, as employees, need to do our part in following security measures and remaining aware of what is taking place on our devices.

Related Resources
http://ift.tt/2fyCJ8e

Guest Author: Marty Coolidge



from
CERTIVIEW

Monday, 7 November 2016

CCNP Collaboration Question of the Week: PSTN Gateway

ccnpQoW03

Two phones in the same cluster and location have a call currently connected. The site PSTN gateway loses connection with the Cisco Unified Communications Manager. Which two results do you expect? (Choose two.)

A. SRST is active, and all the phones enter SRST mode.
B. No new incoming and outgoing calls can be made.
C. Still able to receive incoming calls.
D. The current call is continues.
E. The phones display “CM Fallback Service”

 

Related Courses
CIPTV1 – Implementing Cisco IP Telephony and Video Part 1 v1.0
CIPTV2 – Implementing Cisco IP Telephony and Video Part 2 v1.0
CTCOLLAB – Troubleshooting Cisco IP Telephony and Video
CAPPS – Implementing Cisco Collaboration Applications v1.0

Related Certification
CCNP Collaboration



from
CERTIVIEW

Thursday, 3 November 2016

What to Expect at AWS re:Invent 2016

awsreinventblogThe 800-Pound Gorilla Goes to Vegas

With a full extra day of content, two new venues, and twice as many breakout sessions as last year — this year’s re:Invent looks to be unlike any before. Keep in mind, this is AWS so we can expect every modern IT topic and trend to be covered, including IoT, containers, mobile, and big data, making it an IT even you won’t want to miss.

The heart of the conference will be at the Venetian again, however the Mirage (across the strip) will host some sessions, deep dives, and labs and the boot camps will be delivered at the Encore (right next door).

Tip: Give yourself a good 10-15 minutes to walk between venues … it is Vegas after all.

 What’s New?

This year’s re:Invent should be less crowded than previous ones since the conference is now hosted by additional venues. Other improvements include:

Tip: RSVP ASAP! The popular sessions hit capacity quickly.

  • Twice as Many Sessions: Covering nearly every discipline and technology, re:Invent offers so many topics that picking the right sessions is tougher now than ever before, especially with new “Mini Cons” (miniature conferences) — which are one-day immersions into topics such as machine learning, IoT, security and containers.

Tip: Divide and conquer. If you’re going with coworkers or friends, coordinate with them so that each can attend different tracks and then do an internal brain dump later.

  • More Quirky Social Events: In addition to popular staples like the re:Play party (with acts like ZEDD and deadmau5 in previous years), and the PubCrawl. There’s now a Harley Ride, and a 5K run.Tip: Don’t miss the re:Play party and pub crawl!
  • Pre-Game Webinars: To make re:Invent less daunting, the AWS team is now offering two Webinars in advance of the event to help attendees get the most out of the conference.Tip: Sign up for the “Know Before you Go” webinar on Nov. 16; “Deep Dive on Sessions” on Oct. 17; and “Registered Seating” on Oct. 27.

Specialized Tracks, Mini Cons, Hackathons and Jams

The breakout sessions are – and always will be – the bread and butter of the conference. AWS classifies levels within the tracks: “Introductory” (100, 200 level); “Advanced” (300); and “Expert” (400). Tracks include topics such as networking, storage, databases, DevOps, and architecture. Newer tracks added this year include Alexa, content delivery, and mobile.

Tip: Download the must-have mobile app (not yet available as of this writing) for re:Invent 2016 so you can take advantage of all the conference has to offer.

Recognizing that many attendees wanted deeper explorations of some topics, this year’s re:Invent also offers full-day deep dives into topics like IoT, containers, machine learning, big data, security, and serverless computing.

Tip: The Mini Cons offer a great way to fully learn the ins-and-outs of a new technology or something you’ve been considering adopting, but register ASAP since they fill up quickly.

Like previous years, the ever-popular Hackathons give developers a chance to show their skills by building out real-world product for non-profits. There’s also an all-day “Security Jam” event planned, which will showcases how to best plan for and mitigate security incidents when they arise.

Tip: AWS Live allows you to stream the keynotes from the comfort of your hotel room if you don’t want to fight the crowds in the venue. Also keep in mind that AWS posts all session videos on their YouTube page, usually within a week after the event allowing you to catch up on any missed topics.

Pre-Game and After-Hours Details

It’s no secret this crowd knows how to party and some might argue the re:Invent social events are the single biggest reason to attend. A major headliner takes the stage at re:Play (Dec. 1). This music and dance party is tons of fun entertainment and includes games, food and an open bar.

More free food and drinks come your way at the Pub Crawl, which takes place at more than 15 restaurants inside the Venetian. Socialize with friends and coworkers while sampling different foods and meeting new people.

For those with a more adventurous streak, you might consider checking out the wing-eating contest, Harley Ride, or even the 5K run. As with previous years, you can expect several “pop-up” events such as trivia contests and impromptu dinners. Make sure to take advantage of the breakfasts and lunches included in the conference pass. Their meals are extremely efficient, providing attendees with good and healthy food.

Tip #1: Don’t Miss re:Play or the Pub Crawl!. And when you go to re:Play, you may want to hit the t-shirt booth first. The longer you wait to get your free t-shirt, the higher the chance they’ll be out of your size and preferred style.

Tip #2: There are tons of other opportunities for R&R! The Venetian has one of the best poker rooms on the strip and don’t forget to take advantage of your hotel pool. A morning walk or run down the strip is always fun.

Tip #3: Try not to over indulge the free alcohol and food around every corner. It’s easy to over-consume and then tank the next day. Take extra care to avoid “The Vegas Hangover”.

Training, Labs and Certifications

AWS bootcamp tracks are one-day (sometimes half-day) in-depth explorations into various technical topics. Materials and methods used from the formal three+ day training tracks to include topics such as security, building microservices, Data Lakes, and Alexa. Bootcamps are an additional charge but I assure you it’ll be some of the best money you’ll spend at this conference.

Tip: Use the bootcamps to get a quick leg up on anything from introductory topics to more advanced ones. But again, sign up early; they fill quickly.

The conference offers you a chance to get hands-on experience using AWS. More than 100 labs (each 30-60 minutes long) are available to you for free, and can be used any time Tuesday through Friday.

Tip: Definitely spend any extra time you have during the conference at the labs.

In Global Knowledge’s 2016 Salary Survey, we learned that AWS Architecture Certification (we’re talking just the Associate level) was the second highest paying certification out there. It commands a mean annual salary of $123K — higher than even darlings like the MCSE, PMP and CISSP. If you’re motivated to get certified, re:Invent is a great place to do that! Although seating is limited, you can register to take any of the five certifications that AWS currently offers (walk-ins are also welcome).

Tip #1: AWS does not offer certification testing in some states. If you live in a state that doesn’t offer local certification tests, re:Invent is the best way to take these tests.

Tip #2: Try not to take more than two Associate-level tests per day or one Professional-level test per day. These tests are not easy.

Conclusion

With so much to see, do, eat, and drink, you’ll want to plan your trip as carefully as possible. Use the tips provided and refer to the AWS re:Invent FAQ page to get the most from your experience.



from
CERTIVIEW

Tuesday, 1 November 2016

ITIL Ranks Among Top 5 Paying IT Certifications

top5itilblogAs the technology industry has advanced, the professional certification industry has grown alongside it. The Global Knowledge 2016 IT Skills and Salary Report revealed that Cisco, Microsoft, IT service management, ITIL® and security certifications are the most lucrative to obtain.

ITIL came in at 11 percent above the salary norm for certified respondents. It is comprised of IT best practices that describes common approaches that organizations can apply to day-to-day activities. Its overall objective is to align the services IT provides with the needs of the organization. Professionals who have ITIL and IT service management (ITSM) certifications average a salary of $98,212.

How to Get High-Earning ITIL Certifications

The ITIL certification program consists of 13 certifications that attest to the holder’s knowledge – from a baseline level of understanding – to a deeper, more robust knowledge set indicating overall mastery. View the ITIL certification roadmap.

Step 1: ITIL Foundation

In an ITIL certification program, the first certification that you earn is ITIL Foundation. It’s an entry-level certification that indicates individuals have general familiarity with ITIL terminology and processes. ITIL Foundation is just that, foundational, and it is intended to set the stage for higher-level ITIL certifications.

Step 2 (Option A): ITIL Practitioner

The newest ITIL certification available is ITIL Practitioner. It builds on the introductory knowledge gained in ITIL Foundation to help adopt and adapt the framework to meet the needs of your organization.

Step 2 (Option B): ITIL Intermediate Certifications

Following the foundational exam, nine unique ITIL Intermediate certifications are available to take a deeper dive into the five ITIL knowledge areas. The intermediate certifications are divided into two paths: lifecycle and capability. Intermediate lifecycle courses are intended for non-practitioners and managers to learn how to implement ITIL from a high-level perspective. While Intermediate capability courses are better suited for practitioners, responsible for hands-on implementation.

Step 3: ITIL Expert

Once a candidate has earned the ITIL Foundation certificate plus 17 credits gained from other ITIL certifications, they are eligible to take the class, Managing Across the Lifecycle (MALC). MALC, like the intermediate certifications, requires that the individual pass a challenging exam. The ITIL Expert credential indicates that the person has a strong understanding of the ITIL best practices and how they’re used to help organizations.

Step 4: ITIL Master

In order to achieve ITIL Master, the individual is required to describe and defend real-life projects they have completed using ITIL best practices. You must already hold the ITIL Expert certification, and have at least five years of experience in high-ranking IT service management positions.

What’s the Value of Achieving ITIL Certifications?

The average salary for ITIL-certified professionals ranges from $92,000 in Mountain markets such as Albuquerque, Colorado Springs and Casper to $105,842 in Pacific markets such as San Diego and Portland.

More than 90 percent of respondents in the category of IT service management obtained ITIL Foundation, which has an average salary exceeding $98,000. The range for the category is not as high as others, though salaries for several of the more advanced certifications such as ITIL Service Lifecycle: Service Operation and ITIL Service Lifecycle: Service Transition exceed $117,000 on average.

No doubt we all like money, but beyond that, ITIL certifications hold noteworthy value for both individuals and employers. ITIL benefits are universal and can be put to use across industries and work environments. The value to the organization includes ensuring that services align to and meet the needs of the business, helps to manage risk and service disruption or failure, and offers a stable environment to support business changes.

ITIL pairs well with related methodologies that organizations often employ like Enterprise Architecture and Project Management. These process-driven frameworks work in tandem providing structure around IT infrastructure to deliver predictable, repeatable results.

If you are looking to adopt ITIL into your organization and are unsure of where to begin, view this complementary white paper to help you get started, “ITIL Implementation: Where to Begin”.

Note: The data from this blog came from the Global Knowledge 2016 IT Skills and Salary Report.



from
CERTIVIEW

Monday, 31 October 2016

ITIL® Foundation Question of the Week: Service Transition

ITILqow05Which of the following responses contain processes that are all defined in the Service Transition stage of the Service Lifecycle?

A. Service Asset and Configuration Management, Service Catalogue Management, Request Fulfillment
B. Change Management, Request Fulfillment, Knowledge Management
C. Service Asset and Configuration Management, Change Management, Knowledge Management
D. Change Management, Request Fulfillment, Service Catalog Management

 

Related Course
ITIL Foundation

Related Certification
ITIL Foundation



from
CERTIVIEW

Friday, 28 October 2016

CCNP Collaboration Question of the Week: CLI Command

ccnpQoW03

You are troubleshooting video quality issues on a Cisco TelePresence system. Which CLI command shows the number of lost video packets and jitter during a call in progress?

A. Show call statistics video
B. Show call statistics all
C. Show call statistics detail
D. Show call statistics video detail
E. Show call statistics all video detail

 

Related Courses
CIPTV1 – Implementing Cisco IP Telephony and Video Part 1 v1.0
CIPTV2 – Implementing Cisco IP Telephony and Video Part 2 v1.0
CTCOLLAB – Troubleshooting Cisco IP Telephony and Video
CAPPS – Implementing Cisco Collaboration Applications v1.0

Related Certification
CCNP Collaboration



from
CERTIVIEW

Tuesday, 25 October 2016

How the First Email Message was Born

Back in October 1971, programmer Ray Tomlinson had no idea what he was about to start when he essentially sent the first email. That email consisted of something resembling “QWERTYUIOP.” It was a test email and had absolutely no importance to him at the time, so it was not preserved for posterity.

While email had been sent before on networks such as PLATO and AUTODIN, those messages were sent to users on the same computer. Yes, there was a time when not everyone had their own computer. What made Tomlinson’s email so unique and revolutionary is that he was able to send it to a single user on a different host connected to ARPANET. This is how the first email message was born.

Born in Amsterdam NY in 1941, Tomlinson received a Bachelor of Science degree in electrical engineering from Rensselaer Polytechnic Institute. He participated in RPI’s co-op program with IBM. He also received a Master of Science degree in electrical engineering at the Massachusetts Institute of Technology’s Speech Communication Department. At MIT, he developed an analog-digital hybrid speech synthesizer, which was also the subject of his Master’s thesis.

Tomlinson joined the research and development firm BBN Technologies in 1967. There he had a hand in developing the TENEX operating system and the TELNET network protocol. He also was assigned to the development of ARPANET, the US military’s communications network, which was an early form on the Internet.

One of his duties included adapting a program called SNDMSG for use on TENEX. The SNDMSG program allowed different users on a shared computer to leave messages for each other. Using code from CPYNET, Tomlinson devised a way to send messages to users on other computers, which resulted in the first email. That first email was sent from one Digital Equipment Corporation computer to another DEC-10, which happened to sit beside each other in his lab.

Amazingly, Tomlinson is also responsible for choosing the “@” sign to designate users from different hosts, thus establishing the convention for the modern email address. At first he didn’t make a big deal about his technological breakthrough and didn’t realize the significance his side project would have decades later.

Tomlinson would later show colleague Jerry Burchfiel his email-messaging system, not thinking it was a big deal. Burchfiel knew better. Tomlinson’s discovery was quickly adopted across the ARPANET, which significantly increased the popularity of email.

Earlier this year on March 4, 2016, Tomlinson passed away at his home in Lincoln, Massachusetts from a heart attack at age 74. Today, nearly 45 years later after its beginnings, billions of emails are sent every day, and we have Ray Tomlinson to thank for it.



from
CERTIVIEW

Monday, 24 October 2016

Starting Points to Jumpstart a T-SQL Career

jumpstarttsqlTechnology is ever changing and very few areas are stable. This makes information technology interesting, but challenging. T-SQL or Transact-SQL is one area that is stable. There is also a vast use of T-SQL and many career options.

T-SQL is the combination of standard SQL as well as the proprietary adds-ons for Microsoft that include functions, stored procedures and other elements of the language. SQL or the Structured Query Language is the programming language used to inquire, create, control and manipulate objects in a relational database. It is also used for administering the database. SQL is both an American National Standards Institute (ANSI) and International Standards Organization (ISO) standard.

SQL statements are used to perform tasks such as adding data, making data modifications, creating objects, performing maintenance tasks and retrieving data from a database. Most analysis and business decisions are made as a result of querying and understanding data in the databases.

Databases hold core information that allow businesses to function. Relational database management systems use SQL. These include platforms like Oracle, DB2, Sybase, Microsoft SQL Server, and Access as well as others. Typically, each database platform follows the ANSI / ISO standards and then also has features in the language that are proprietary. This is true of Microsoft SQL Server and the full language is called T-SQL.

The place to begin learning T-SQL depends on the task at hand. Here are some example roles and starting points to jump start your career in each role.

Report Writer or Analyst

  • Focus on the Select statement. Report writers and analysts must know how to ask questions (i.e. query the database). Global Knowledge course Querying Microsoft SQL Server 2014 (M20461) or Querying Data with Transact-SQL (M20761) are good starting points.
  • Learn how to turn your queries into stored procedures. For example, if you have a query “Select last, first from customer” you can turn it into a stored procedure of “Create procedure usp_GetCustInfo as Select last, first from customer”. Then, you only need to call the procedure from the report “Execute usp_GetCustInfo”. Stored procedures provide performance and security benefits when querying the database.
  • Spend time learning SQL Server Reporting Services. This tool will allow you to graphically produce reports and utilize the Select statements and stored procedures you create in T-SQL. Global Knowledge course Implementing Data Models and Reports with Microsoft SQL Server 2014 (M20466) is an excellent course dealing with reporting services as well as analysis services.

Data Entry

  • Learn these T-SQL statements: Insert, Update and Delete. These allow data entry and modification.
  • Focus on the Select statement. Although the primary focus is data entry, querying the data supports data verification.
  • Learn the interface that supports data entry. This could be a web page or a Microsoft Windows application. Each interface will have its own unique design.

Database Designer

  • Focus on Create, Alter and Drop statements. These statements give definition to the database objects. Examples include creation of tables, stored procedures, views, functions and triggers. The Alter statement supports modification. Drop removes an object.
  • Take a relational database design course or read a relational database design book. Global Knowledge courses Developing Microsoft SQL Server 2014 Databases (M20464), Introduction to SQL Databases (M10985), or Developing SQL Databases (M20762) are excellent options. “Database Design for Mere Mortals”, by Michael Hernandez is a fabulous first book.
  • Learn to map business questions to objects that need to exist. Take this question: Who are the best ten customers in terms of revenue and loyalty? Tables need to exist for customers, orders, time and perhaps customer satisfaction. This single question represents many topics – customers, orders, loyalty (probably over time), and revenue.

Database Administrator

  • Start small. Two ways to do this are to: join a team as a junior database administrator (DBA) and learn from more senior people or volunteer at a nonprofit or small business to help with their database. Spend time learning from the staff about their business and database platform.
  • Focus on T-SQL statements such as Grant, Revoke and Deny. These all deal with security which is a primary responsibility of a DBA. These statements control access to objects that have been created by the database designer. These statements control whether a person is allowed to see data, modify data, create tables, drop tables or any other privilege.
  • Focus on performance and metadata. Learn dynamic management views, system stored procedures, and system functions that deal with metadata. Administering Microsoft SQL Server 2014 Databases (M20462) is a good starting point for those pursuing a database administration role.

Although each role has its specialty, every role needs the ability to query the database, or database metadata (i.e. the objects within the database). Every person needs an understanding of the Select statement. Many roles need an understanding of statements such as create, alter, drop, insert, update, delete, grant, revoke and deny. The place to begin in T-SQL is with the select statement, regardless of role.

Related Courses
Querying Microsoft SQL Server 2014 (M20461)
Administering Microsoft SQL Server 2014 Databases (M20462)
Developing Microsoft SQL Server 2014 Databases (M20464)
Implementing Data Models and Reports with Microsoft SQL Server 2014 (M20466)
Querying Data with Transact-SQL (M20761)
Developing SQL Databases (M20762)



from
CERTIVIEW

ITIL® Foundation Question of the Week: Value of a Service

ITILqow05What are the three (3) main aspects used by a customer to determine the value of a service?

A. Functionality, Cost, Warranty
B. Outcomes, Functionality, Preferences
C. Preferences, Features, Performance
D. Outcomes, Preferences, Perceptions

 

Related Course
ITIL Foundation

Related Certification
ITIL Foundation



from
CERTIVIEW

Friday, 21 October 2016

CCNP Collaboration Question of the Week: H.323 Endpoints

ccnpQoW03

Which parameter should be set to prevent H.323 endpoints from registering to Cisco TelePresence Video Communication Server (VCS) automatically?

A. On the VCS, go to Configuration, Protocols, H.323, and set Auto Discover to off.
B. On the VCS, go to Configuration, Protocols, H.323, and set Auto Registration to off.
C. On the VCS, go to Configuration, Registration, Allow List, and set Auto Discovery to off.
D. On the VCS, go to Configuration, Registration, Configuration, and set Auto Discovery to off.

 

Related Courses
CIPTV1 – Implementing Cisco IP Telephony and Video Part 1 v1.0
CIPTV2 – Implementing Cisco IP Telephony and Video Part 2 v1.0
CTCOLLAB – Troubleshooting Cisco IP Telephony and Video
CAPPS – Implementing Cisco Collaboration Applications v1.0

Related Certification
CCNP Collaboration



from
CERTIVIEW

Thursday, 20 October 2016

The Unending Challenge of Managing “The Database”

unendingchallengedatabaseblogIf you’re a large organization, somewhere in the bowels of the IT department is “The Database”. It doesn’t matter what kind of database server it runs on, maybe it’s SQL Server, maybe it’s MySQL, but The Database has something big in it – the output of that exhaustive customer survey you did, or the company’s complete sales history back to 1986. But whatever it is, it has gobs of data, and you likely have no idea what’s in it.

The IT department probably even bugs you about it from time to time. “Hey, do you still need this database? It hasn’t been read from in three years, and it’s taking up half a terabyte of storage!” You can’t delete it, of course – that’s irreplaceable company history, or it’s something the company spent a lot of time or effort to assemble.

There could be extremely valuable insights to be gleaned by analyzing the information in The Database. But who’s going to do it? Do you have somebody who knows SQL and can query a database? That’s good, but is he or she a person also trained in statistics sufficiently to spot meaningful trends and patterns in the data that comes out of the query? (Don’t look at me, stats class in college was some of the most expensive naps I ever took.)

Do you have a programmer on staff? Somebody who can build GUI interfaces? Excellent – that’s a good start. But will he or she be able to take the data coming from the database professional to correctly forecast the next quarter or two based on that existing data? How are their data visualization skills?

Do you have any employees skilled in the fast-growing art of machine learning? These people are gifted in the ability to build programs that get progressively more sophisticated the more they analyze your company’s data. If you do, you’re in the minority today. And, do your machine learning pros really understand relational databases?

You see the problem, perhaps. Increasingly, companies need someone who brings all these skills to the table: delivering an understanding of database design, savvy querying skills, statistical acumen, data visualization artistry, and machine learning wizardry, all in one package. Do you have that consummate data analysis professional on your staff? Maybe not – and that’s a problem that Microsoft wants to fix.

Solution: The Data Science Degree

If no name of a current employee with all these skills pops into your head, you aren’t alone. As early as 2012 Gartner, the IT industry analysis organization, had identified this critical shortage of experts that can mold and shape a company’s raw data into actionable business intelligence. “There is not enough talent in the industry,” said Gartner’s Peter Sondergaard, adding, “Data experts will be a scarce, valuable commodity.”

It’s not hard to see why. The IT industry is currently generating a quantity of new data each year that is measurable in zettabytes of storage. A zettabyte represents 1,024 exabytes of storage. Each of the following units of measurement describe 1,024 of the one that follows – getting smaller as we go. An exabyte is 1,024 petabytes, which in turn is 1,024 terabytes. Each of those terabytes is a bit more than the storage capacity of 200 DVD discs. So a zettabyte is somewhere around 200 billion DVDs-worth of data. Whoa.

And that’s just the new data being added each year to the zettabytes that have come before. The skills needed to manage that quantity of information are not widely spread. The potential for amazing new businesses and growth potential in existing businesses is in danger of being throttled by a lack of professionals with the complete set of skills to capitalize on new opportunities provided by big data.

What would it take to create a new generation of data analysts? Microsoft doesn’t claim it will be easy. Their curriculum of self-paced learning materials delivered through edX.com could consume 200 hours of effort to complete – or more! On top of all that is the final exam, a real-world project requiring another six to 10 hours to bring all the lessons of the program to bear. When you consider that a bachelor’s program at a university only requires 120 credit hours to complete, it becomes clear why this program is named the Microsoft Professional Degree Program.

What’s in the program?

The curriculum of the program is grouped into three units. The first unit contains four courses focused on the basics of data science: querying data and applying statistical analysis techniques to the results. After an initial orientation course, the meat of Unit 1 starts with a course on mastering the Microsoft querying language Transact-SQL (T-SQL) for the purposes of retrieving and modifying data. Students are then free to choose Excel or Power BI as their tool for data visualization and analysis and will complete a course in that chosen tool. The first unit completes with an extensive section on statistics – a vitally important tool for determining when a blip in the data is the beginning of an important trend, or just a funny quirk of fate.

Unit 2 uses three courses to focus on some of the broader software development skills needed to begin building software solutions to data science problems. Students start with a course introducing them to their choice of Python, a popular general-purpose programming language, or R, a language created explicitly for statistical analysis situations.

This is followed by a course on the skills of data science proper such as learning to explore and visualize patterns in data, dealing with corrupt or incomplete data sets, and transforming that data into other forms that better support analysis. Unit 2 then concludes with a deep dive into the principles of machine learning, as students learn to write software that spots patterns in data and which gets better at understanding the data as time goes by.

Students that have made it this far are now prepared for the rigorous content of Unit 3. Only two courses are needed to complete Unit 3, but students get a number of choices along that path. Students revisit their Unit 2 programming language for a deeper explanation of their choice of R or Python. This time, basic syntax for the language is replaced with thorough explorations of how to use their language choice for organizing data for analysis.

Students then have a second big decision to make: choose between one of three available courses to conclude their formal studies. Option one is a course in advanced methods in machine learning. Option two is a course on intelligent app development building IOT and big data bots on the Azure Machine Learning system. The third option is a deep dive into the Azure HDInsight platform, providing cloud-based data analysis services on an on-demand basis.

All this prepares budding data scientists for their final challenge in Unit 4: a 12-hour-long capstone project demonstrating real-world skills as a data science professional. Students are challenged to create a project that utilizes the Cortana Intelligence Platform. This project is then scored by administrators of the Microsoft Professional Degree (MPD) Program to determine if the individual has indeed earned a degree in data science.

You’re probably wondering, how much is this going to set back my budget?

One of the most remarkable aspects of this program is how little is being charged for it. Attending the classes is, as of this writing, entirely free of charge. Students that wish to prove their completion of the various courses can purchase a verified completion certificate costing $49 for each course, but the information itself is being provided completely free.

Microsoft is placing some big bets on big data. From improvements in SQL Server, to programming language development, visualization tools and Azure-based compute clusters, Microsoft is demonstrating that they see huge potential for organizations to do business in bigger and better ways than ever before by leveraging what’s in The Database.

But that can’t happen if efforts to access an organization’s data is hampered by shoddy database design, or inadequate data scrubbing capabilities, substandard data transformation techniques, uninspiring data visualization efforts or limitations imposed by the analysis capacity of on-premises hardware.

The market-crushing businesses of the future need full-spectrum analysts who understand a company’s data intimately, and who can efficiently produce innovative solutions that surface latent data insights to company stakeholders. They need people that have had a collegiate level of immersion in every aspect of data analysis. Tomorrow’s market leaders need data scientists, and Microsoft has inexpensively delivered an amazing wealth of knowledge to nurture those data experts in your organization to fill exactly that role.

Related Courses
Analytics and Data Management Training



from
CERTIVIEW

Wednesday, 19 October 2016

Security+ Question of the Week: Risk of Collision

SecurityQOW03Which of the following has the highest risk of collision?

A. SHA‐1
B. HMAC
C. MD5
D. SHA‐2

 

Related Courses
Security+ Prep Course (SY0-401)
Security+ Certification Boot Camp (SY0-401)

Security+ Question of the Week (SY0-401) Series



from
CERTIVIEW

Tuesday, 18 October 2016

Why Upgrade to Windows Server 2016?

windowsserverblogOn September 26, 2016, Microsoft announced the general availability of Windows Server 2016. We already have a taste of what the user interface looks like from Windows 10. In actuality, there are a few other features that Windows 10 picked up first, such as PowerShell 5.0 and the latest version of Hyper-V, that are also part of Windows Server 2016. Many other heavy-hitting server-only features will be here soon. Here are five compelling reasons to upgrade to the newest edition of Windows Server:

Nano Server

One of the most interesting new features of Windows Server 2016 is the advent of a new installation option called Nano Server. This is similar to the Windows Server Core option which began with Windows Server 2008 R1. However, Nano is far smaller than Server Core, requiring less than 600MB of hard disk space and can run in as little as 128MB of RAM.

Server Core needs around 3GB of hard disk space and 512MB of RAM at a minimum. We have to go all the way back to Windows NT 4.0 to find a Windows Server operating system that used less hardware than Nano. Last year at Ignite, I saw a demonstration of Nano server running on a stack of tiny devices, each about the size of a deck of cards. Nano Server has many fewer components running, which will mean a smaller attack surface, and far less patching. That does mean that Nano will only be able to run a select few workloads, such as Hyper-V and File Services.

What will likely throw many Windows administrators for a loop is the fact that Nano is almost completely headless. It does have an Emergency Management Console from which you can change the IP address of the machine, shutdown, restart and configure Windows Firewall settings. Other than that, there is no command-prompt or PowerShell prompt to work with like there is on Server Core. In addition, Nano cannot be raised to a full edition server or downgraded from full edition. Nano is a one-way installation choice. All management of Nano Server will be performed remotely with PowerShell or the graphical RSAT suite.

Containers

The Containers concept has been around for some time in other environments, but is now making its way to Windows. Containers allow services to be run in an isolated manner that makes them far more portable, less resource intensive and easier to deploy in large numbers. Windows Server Containers allow for one or more instances of a service to run on the same server. They can be spun up instantaneously and still provide isolation on the host. Hyper-V Containers run in a minimalistic virtual machine to provide even greater levels of isolation, albeit with more resource consumption. Microsoft has been working with Docker to bring the container management and libraries found in Linux over to Windows.

For those of you familiar with Microsoft’s App-V platform, Containers provide similar capabilities for the backend server environment. Where App-V is typically about providing a wrapper around an end-user application, Containers usually provide that isolation for services running on a server (although, there is certainly crossover between the two).

Storage Spaces Direct

The new Storage Spaces Direct feature is an outgrowth of the Storage Spaces capability introduced with Windows Server 2012. Storage Spaces isolates the underlying physical disks and aggregates them into storage pools on a single server. Storage Spaces Direct allows these storage pools to span multiple servers.

Not only can Storage span disks on multiple servers, it can also be made redundant across those servers. This means the storage pool can survive the outage of a disk and also survive the outage of a server in the storage pool.

This technology is not likely to knock the SAN off of its perch at the pinnacle of our storage hierarchy, but it could be a very useful option for some environments where the cost of continuously adding storage to the SAN is becoming a management and cost nightmare.

PowerShell enhancements

Windows Server 2016 comes with PowerShell 5.0 which includes a large number of enhanced features. PowerShell 5.0 provides hundreds of new cmdlets addressing many of the new features of the Windows Server 2016 operating system and new capabilities for PowerShell in general.

For starters, the PowerShell prompt has been given a facelift, enhancing it with colorized commands, CTRL key copy and paste, and line-wrap selection of text. Next, PowerShell 5.0 includes package management functionality allowing for the download of PowerShell modules from public or private libraries. This opens up an enormous library of enhancements that can easily be taken advantage of directly from PowerShell.

From a programmability standpoint, classes can now be developed directly in PowerShell much like other object-oriented languages. Finally, if you missed the announcement, Microsoft has open sourced PowerShell with development of Linux and Mac OS X versions of PowerShell already in Alpha.

Hyper-V enhancements

Hyper-V has been updated with many new features and enhanced capabilities in Windows Server 2016. The features are explained in greater detail in this blog, but here is the outline of the new features:

  • Storage Replica – A block-level volume replication technology for clusters. This feature will primarily affect Hyper-V, but could be used for other workloads.
  • Rolling Cluster Upgrades – Again, this is something that affects clustering in general, but will be most useful in a Hyper-V cluster scenario.
  • Hot-add NICs and Memory – Previously, VMs had to be shut down to add more memory or virtual network cards.
  • Software Defined Networking – Provides a new Network Controller role, along with new load balancing capabilities.
  • PowerShell Direct – Allows PowerShell commands to be sent to VMs through the Hyper-V host.
  • Shielded Virtual Machines – Allows for VMs to be protected from intrusion even by the Hyper-V administrator.
  • Linux Secure Boot – Linux VMs can now boot using the Secure Boot feature of the UEFI firmware in Hyper-V.
  • Nested Virtualization – Allows for Hyper-V hosts to run inside another Hyper-V host.
  • Nano Server – Nano Server can be used as a Hyper-V host, providing the smallest footprint yet for a Windows-based Hypervisor.

Related Courses
Windows Server 2016 Training
Microsoft Training



from
CERTIVIEW

Monday, 17 October 2016

ITIL® Foundation Question of the Week: Categorizing Incidents

ITILqow05What is the reason for categorizing Incidents?

A. To determine where to escalate the issue.
B. To understand the number of each type of incident.
C. For reporting and trending.
D. To determine which function is responsible for fixing the most incidents.

 

Related Course
ITIL Foundation

Related Certification
ITIL Foundation



from
CERTIVIEW

Friday, 14 October 2016

CCNP Collaboration Question of the Week: Discard Digits Instruction

ccnpQoW03

Which discard digits instruction removes the access code from a number before sending the number onto an adjacent system?

A. PreDot
B. PreNot
C. NoDigits
D. PostDot

 

Related Courses
CIPTV1 – Implementing Cisco IP Telephony and Video Part 1 v1.0
CIPTV2 – Implementing Cisco IP Telephony and Video Part 2 v1.0
CTCOLLAB – Troubleshooting Cisco IP Telephony and Video
CAPPS – Implementing Cisco Collaboration Applications v1.0

Related Certification
CCNP Collaboration

CCNP Collaboration Question of the Week Series



from
CERTIVIEW

Thursday, 13 October 2016

What’s New in Hyper-V for Windows Server 2016

whatsnewhypervblogMicrosoft’s Hyper-V product got its start in 2006 with the release of Windows Server 2008 R1. Over the next several generations of the Windows operating system, Hyper-V has matured greatly to become a true competitor in the hypervisor marketplace. Hyper-V has been updated with many new features and enhanced capabilities in Windows Server 2016.

Some of these new features can be seen in the client Hyper-V that is included with Windows 10. (Most people don’t know that you can enable Hyper-V on a Windows 10 Pro or Enterprise edition machine.) Many of the more robust Hyper-V server-related features are now available in Windows Server 2016.

Here are some of the more notable features:

General Hyper-V Improvements

Nested virtualization allows for Hyper-V hosts to run inside another Hyper-V host. Previously, the only way to run Hyper-V was directly on hardware that supported hardware assisted virtualization. This new feature will be a great addition for lab and training environments allowing for the use of multiple Hyper-V hosts on a single piece of hardware.

Nano Server can be used as a Hyper-V host, providing the smallest footprint yet for a Windows-based Hypervisor. With Nano Server running as the host, the amount of patching required will be a mere fraction of a full edition server, and significantly less than even Server Core. This will result in far fewer reboots of the Hyper-V host throughout the course of a year.

PowerShell Direct allows PowerShell commands to be sent to virtual machines (VMs) directly through the Hyper-V host. The VM does not need network access or even a virtual NIC. Commands are sent to the Hyper-V host first, then from the host they are passed through to the VM.

Storage Improvements

Storage Replica is a block-level volume replication technology for clusters. This feature will primarily affect Hyper-V, but could be used for other workloads. In previous versions of Windows, a cluster that spanned locations could only be replicated with third-party hardware or software. Now, the ability to replicate data from one location to another is included in Windows Server 2016.

Storage resiliency allows Hyper-V VMs to recover from storage access problems. Interruptions in storage access typically causes a VM to crash with a Stop Screen message. The new Storage Resiliency feature allows Hyper-V to intercept the failed request and places the VM in a critical paused state until such time as the storage interruption has been resolved.

Clustering Improvements

Rolling cluster upgrades affect clustering in general, but will be most useful in a Hyper-V cluster scenario. This can be used to upgrade a cluster from Windows Server 2012 R2 to Windows Server 2016 in an incremental fashion. The cluster can continue to run while the individual members are being upgraded.

Shared vhdx files being used in a guest cluster can now be resized while the VMs using the shared vhdx are online. The shared vhdx files can also be protected against failure by using the Hyper-V Replica feature.

Start order priority can be used to determine in what order VMs will start when they are clustered. This is useful when VMs depend others for services that must be present first.

Hardware Improvements

Hot-add NICs and memory allow virtual network interface controllers (NICs) and memory to be added to a VM without downtime. Previously, VMs had to be shut down to add more memory or virtual network cards.

Discrete device assignment allows a VM to have direct access to some PCIe hardware. This can result in faster access since it is bypassing the Hyper-V stack and can result in a VM having access to hardware that would otherwise be only available to the host.

Networking Improvements

Software-defined networking provides a new network controller role, for centralized management and monitoring of the virtualized network infrastructure.

Network function virtualization allows for services typically provided via hardware appliances to be shifted over to software based virtual appliance. The network function virtualization (NFV) technologies provided in Windows Server 2016 include the Datacenter Firewall, RAS Gateway, Software Load Balancer and NAT.

Switch embedded teaming (SET) allows for multiple network adapters to be configured as a network team providing similar capabilities to the NIC teaming feature in Windows Server 2012 R2. SET, however, is more tightly integrated with Hyper-V and provides better fault-tolerance and performance than traditional NIC teams.

Security Improvements

Shielded virtual machines allow for VMs to be protected from intrusion even by the Hyper-V administrator. This is accomplished by using a virtual trusted platform model (TPM) chip on the VM to encrypt the virtual disks. The VM can also be encrypted as it is transferred from one host to another via live migration. Also, the VM can be isolated so that the memory of the VM is inaccessible while either running or at rest.

Host resource protection helps to protect against attacks coming from other VMs in the infrastructure. VMs are monitored for overconsumption of resources when perpetrating such attacks and can help to prevent denial of service attacks from being successful.

Linux secure boot allows Linux VMs to start up using the Secure Boot feature of the UEFI firmware in Generation 2 VM on Hyper-V. This new feature is used to prevent modification to kernel mode code, and was previously available only to Windows Server 2012 R2 VMs.
With all of these new features in Windows Server 2016, in addition to the capacity increases provided in Windows Server 2012 (R2), Hyper-V is now on par with other players in the virtualization space and provides a compelling option for virtualizing the modern datacenter.

Related Courses
Windows Server 2016 Training



from
CERTIVIEW