Thursday, December 31, 2015

Poor security decisions expose payment terminals to mass fraud

Cryptographic key reuse is rampart in European payment terminals, allowing attackers to compromise them en masse

Some payment terminals can be hijacked to commit mass fraud against customers and merchants, researchers have found.

The terminals, used predominantly in Germany but also elsewhere in Europe, were designed without following best security principles, leaving them vulnerable to a number of attacks.

Researchers from Berlin-based Security Research Labs (SRLabs) investigated the security of payment terminals in Germany and were able to use them to steal payment card details and PIN numbers, hijack transactions and compromise merchant accounts. They plan to present their findings at the 32nd Chaos Communication Congress (32C3) later this month.

INSIDER: 5 ways to prepare for Internet of Things security threats

According to Karsten Nohl, the founder and chief scientist of SRLabs, most terminals in Germany use two communication protocols, ZVT and Poseidon, to talk with cash registers and payment processing providers respectively.

Both of these protocols have features that can be abused by hackers, but the problem is further exacerbated by poor design decisions by payment terminal manufacturers, like the reuse of cryptographic keys across all devices.

The ZVT protocol is used by around 80 percent of payment terminals in Germany to communicate with cashier workstations, SRLabs estimates. It was originally designed for serial connections, but it's now used mostly on TCP/IP networks. This means that on local networks attackers can use techniques such as ARP spoofing to position themselves between terminals and cashier stations in order to intercept and send ZVT commands.

Some of the ZVT traffic is unencrypted, according to SRLabs. For example, a man-in-the-middle attacker can use the protocol without authentication to read the information stored on the magnetic stripes of payment cards inserted into payment terminals.

The protocol also has a mechanism that allows requesting and obtaining a card's PIN number as well, but such requests need to be signed with a message authentication code (MAC). The MAC is verified using a key that's typically stored inside the payment terminal's hardware security module (HSM), a special component designed for secure key storage and cryptographic operations.

The problem is that most terminals, regardless of manufacturer, share the same signature key, violating a basic principle of security design, Nohl said.

The HSM in some terminal models is vulnerable to so-called timing side channel attacks that can be used to extract the key within minutes after gaining access to the terminal through a JTAG debugging connection or a remote code execution flaw, he said.

Attackers can easily find and buy such vulnerable terminals on eBay. Once they extract the key from it, they can use it against most other devices, including newer models, because of the pervasive key reuse among payment terminal manufacturers in Germany.

Terminals used in other countries, especially in Europe, use a different communications protocol called OPI (Open Payment Initiative) that is similar to ZVT, but lacks the remote management functionality that attackers can abuse.

However, some terminal manufacturers added proprietary extensions to OPI to implement that functionality, because they like the comfort of remote management, Nohl said. "At least we've seen this in a few cases. We can't guarantee that it's widespread, but every implementation of OPI that we've looked at had extensions that brought back remote manageability, and like in ZVT, it wasn't secure."

With magnetic stripe data and associated PIN numbers attackers can clone payment cards and perform fraud, even in countries where chip-protected (EMV) cards are widely deployed.

EMV-capable terminals still support magstripe-based transactions for cards that don't have a chip, and verifying whether the card has a chip or not is usually done by checking a specific bit stored on the magnetic stripe. So an attacker can simply change that bit on his cloned card, Nohl said.

Another attack that the SRLabs team found possible through ZVT is to force a terminal to associate with a different merchant account, like one controlled by a hacker, and which would receive all the money from transactions performed through that terminal.

This can be done by a man-in-the-middle attack through a password-protected command that instructs the terminal to change its ID to one that the payment processor associates with a different merchant. The password is the same for all terminals tied to a specific processor, the SRLabs researchers found.

When the terminal ID changes, the processor will send a new configuration back to the terminal including the new merchant's transaction limits and banner -- the merchant identifying information that appears on the printed receipts. The attacker can actually intercept this information and change it so that receipts retain the old merchant's banner, while the money is funneled to the different account controlled by the attacker.

A third attack is possible through the Poseidon protocol that's also widely used in Germany and in some other countries like France, Luxembourg and Iceland. This protocol is used by terminals to communicate with the backend servers of payment processors and is a variation of an international standard called ISO 8583.

Payment terminals require a secret key to authenticate with payment processors over the Poseidon protocol. However, like with ZVT, payment terminal manufacturers implemented the same authentication key across all of their terminals, SRLabs found.

This error can be abused to steal money from merchant accounts. While most transactions add money to such accounts in exchange for goods or services, there are a few that can cost merchants money, for example transaction refunds or top-up vouchers like those used to recharge prepaid SIM cards.

In the worst case scenario, attackers could hijack terminals and use them to issue refunds to bank accounts under their control from thousands of merchants by simply iterating through terminal IDs, which are usually assigned incrementally.

Nohl said that SRLabs performed a demonstration of the attacks for payment terminal manufacturers. Their response was that they haven't seen this type of fraud outside of a laboratory setting, but that they're working to address the issue, he said.

The people who implemented these protocols, which were developed independently from each other, didn't understand how to do proper key management in both cases, Nohl said.

Fortunately, there is functionality in them that allows older keys to be replaced with new ones and which could be used to provide every terminal with its own unique key, as long as the backend servers are also modified to support such a deployment, the researcher said.

The terminals would still be vulnerable to remote code execution or timing side channel attacks, but at least extracting a key would restrict the abuse to a single terminal, not hundreds of thousands.

In the short term, it's paramount to change existing keys with unique ones for every terminal, but in the longer term better standards should be designed that rely less on the security of the terminals themselves. This could be done by implementing things like public-key cryptography instead of symmetric-key algorithms, Nohl said.
Certkingdom 20% Discount Promotion Coupon Code: 45K2D47FW4

Saturday, December 19, 2015

7 signs you're doing devops wrong

Misconceptions and flawed implementations may have you missing the true upsides of devops

Devops is a transformative ethos that many companies are putting to their advantage. As with anything that hinges on culture, however, it can be too easy to slap together a few tools, sprinkle in new processes, and call yourself a devops-fueled organization. After all, saying that your company embraces devops and regularly practices devops techniques is popular nowadays, and it can serve as great PR for bringing in great talent to your team. But in truth, many companies -- and technical recruiters -- that are proclaiming their devotion to devops from the hilltops aren’t really devops organizations.

Here we take a look at some of the most common misconceptions and flawed implementations of devops. Chances are, your company has fallen prey to at least one of them. That doesn’t necessarily mean you aren't practicing devops. It simply means you have a ways to go before your company can fulfill the promise. Devops isn't an award or title you can achieve. It's a philosophy, culture, and way of approaching the task of shipping code.
[ Harness the power of PowerShell: An intro for Windows Server | An intro for Exchange | Essential tips for Windows admins | Don't get left behind -- download the Devops Digital Spotlight, and learn all about the game-changer in app development and deployment. | Get a digest of the day's top tech stories in the InfoWorld Daily newsletter. ]

Read on, take a step back, and assess your company’s commitment to its devops mission. Candor and honesty are essential to guiding your team in the right direction.

Sign No. 1: You need to buy "the devops"

IT departments need "stuff" to operate. They need hardware: computers, servers, server racks, network switches, routers, and load balancers. They also need software: operating systems, antivirus products, productivity software, project management solutions, various line-of-business applications, and software to monitor the health and performance of hardware and software alike.

IT departments have been buying "stuff" since their inception. When the first company decided to use computers as part of their business practices, purchasing as the lifeblood of IT was born. It's natural for IT higher-ups to think they can buy the next big thing that will help them help the business succeed. This is why some companies give themselves the false impression that they can buy "the devops."

But it’s not for the wrong intentions. Many CIOs who attend devops conferences or talk about devops with fellow CIOs begin to see what devops can do for their company. Some decide they want “the devops” -- and they want it now! What they don't understand is that devops is not a product or service to purchase. It is a mind-set or mode of operation.

That’s not to say you can’t purchase a block of hours from highly paid consultants to learn devops principles, but by doing so, ultimately you are purchasing knowledge that requires significant work on your part to implement. Your team must absorb what's being taught, and only then will devops practices begin to take root.

"Devops" cannot be obtained overnight with a simple check and a little training. It is a transformational approach to core processes, and it takes time, dedication, and especially a team that can implement devops practices, many of which will fly against your company's previous modes of operation.

If your company has a devops budget, you're doing devops wrong.

Sign No. 2: You equate software and tools to devops

This misapplication of devops runs in parallel to No. 1 above. IT shops acquire tools to do their jobs more effectively. It’s encoded in the job. IT shops have tools to manage clients and servers, as well as storage, compute, and networking resources. But when it comes to tools and devops, companies often get confused. To be sure, devops greatness cannot be achieved without tools. But when companies ignore other areas of devops and focus solely on the tools themselves, problems arise. Tools may be essential, but they are only part of what makes devops tick.

Various configuration management products associated with devops certainly help you build a devops culture. Without them, you undoubtedly are not practicing devops. You can code together your own tools to automate previously manual processes such as code testing, deployments, and server builds, or you can purchase tools geared to complete these tasks; either way automation is a huge part of devops. Without tools, you'd still be manually building test servers, running through runbooks, and checking off tick boxes on a checklist.

But devops consists of a number of facets that go beyond configuration management; don't focus in on only one simply because a solution exists and it's tangible. If you look for something tangible to latch onto in your journey to be a devops ninja, you will fail.

If your company bought Chef or Puppet as a cure-all for its devops needs, you're doing devops wrong.

Sign No. 3: You use checklists or runbooks to manage code deployments

To hammer the point home, automation is the crux of devops. Automation is of paramount importance in an organizational devops culture. Companies practicing devops have a strong desire to automate everything possible. Automation allows them to remove human error and standardize processes across the entire software development lifecycle.

Businesses know that automation is the seed that grows other devops principles such as establishing consistent, routine code deployments. Without automation, reliable code deployments, in particular, would not be possible. Automation is a crucial philosophy to adopt when driving toward a devops culture.

So if you find yourself having conversations with co-workers that include statements like, "We don't have time to automate," or "Let's just do it manually this time. It'll be faster," then you're not doing devops. When embarking on a new project, if automating everything possible isn't the first idea that comes to your head you're probably not at devops mastery yet.

Devops-heavy cultures realize that even though it may take more time to introduce automation up front it will pay off through more reliable and faster code deployments in the future. Your company must understand that everything is on the table for automation. This means deployments, testing, code check-in policies, servers builds -- everything.

If your company spends hours poring over checklists to ensure code is ready to be deployed, you're doing devops wrong.

Sign No. 4: You release code to production every few months (or years)

Now that we've addressed automation it's important to address deployment frequency. The sole purpose of devops is to fix bugs and release new features to production faster. That's not done by following a traditional waterfall model; that's done by being agile.

At its heart, the agile methodology consists of releasing small changes as often as possible. Its premise is to not plan every little detail ahead of time before releasing to production. It is about defining what is considered "production ready," representing that with a set of automated tests, and trusting that the tests written correctly define what it means for code to be "production ready."

Devops is synonymous with concepts like continuous integration and continuous deployment. Notice the key word in both terms: continuous. Devops is about consistently having developers check code in as often as possible, which kicks off automated tests.

For the true devops rock stars, it's also about taking that code and sending it directly to production through continuous deployment. If your company allows developers to check in code that goes through automated pre-check-in tests, gets handed over to another set of tests to ensure that the code is ready for production, then goes live on your production servers if deemed ready automatically, then you know you've achieved devops greatness.

If your company releases code changes less frequently than the harvest moon, you're doing devops wrong -- no matter how small the changes or how quickly you make them.

Sign No. 5: You consider failure unacceptable

Culture is often considered a "soft" aspect of IT, but it couldn’t be more essential to devops. This is where companies often fail to achieve the promise of devops. They might be automating with the optimal mix of tools. They might be continuously updating their code. But their inability to fully assimilate devops culture gets them every time.

For example, when the code you committed goes on to blow up a production database, what happens to you? Does your boss publicly scold you? Do you get immediately called into a manager’s office for a "closed door" meeting? Is losing your job or your ability to deploy code to production ever again a possible outcome of committing code? If so, then your company is not practicing devops.

Instead, picture this: The meltdown of the production database is treated as a learning opportunity. Your manager brings everyone into a postmortem meeting to provide candid feedback. Everyone exhibits a level of candor that might make you squirm, but it's never at a level that places blame. The root cause is determined, and new tests are built around your mistake so that it's caught next time and everyone acts like it's simply another day. This is when you know your company has adopted an important devops philosophy.

If you are no longer trusted with commit rights to production because you have made or might make a mistake, you're doing devops wrong.

Sign No. 6: You blame others for system problems

Devops philosophy has borrowed heavily from lean, and not blaming others for systemic errors is a key facet that has influenced the human aspect of devops. As with embracing failure, removing individual blame for problems associated with the system is essential to successful devops practices.

True devops practitioners believe that when something goes wrong the fault doesn't lie with the individual using the system but the system itself. For developers and systems ops to get along, a blameless culture must be supported. Suppose a developer creates an application, tests the application on his computer, and hands the code over to operations. If a problem occurs when ops puts the code into production, ops can’t blame the developer for writing shoddy code, nor can the developer blame operations for not managing servers correctly.

Devops resolves this issue by first figuring out the difference between the two testing environments. Once discovered, the fix is implemented, and preferably, an automated test is created to ensure that, in the future, any flawed code will fail the newly automated test, which will prevent that change from ever getting into production.

If your company is firing staff simply for bringing down production, you're doing devops wrong -- regardless of any presumed role or responsibilities you attribute to those involved.

Sign No. 7: The developers and operations groups look like two grain silos

Devops weds the word "developer" to the word "operations." If your developers and operations people still aren't on speaking terms, you don't have a chance at doing devops right. Devops is all about collaboration. It's about coming together as a team to help the company, as a whole, achieve its goal. If your operations people refuse to communicate to developers other than throwing work over the proverbial wall, your devops dreams are toast.

This is the most important part of the devops philosophy. All of the activities I've touched on previously move toward this end result. It doesn't mean developers should be forced to eat lunch with operations people or operations staff must invite developers to their weddings. It's not about liking one another; it's about looking past our human emotions to work as a professional team to build a product that propels the business forward.

If your company has developers on one floor and operations on another, with code commit messages as the only means of communication, you're doing devops wrong.
It’s all about the culture

Devops is not for every company. There are situations that warrant a more meticulous approach to code management. However, even if your company isn't fully committed to building a devops culture, there are many facets of the devops philosophy that can be applied to your practices successfully.

Above all, devops is a cultural philosophy. It takes patience, lots of hard work, an understanding of people, and a business that will support it to truly thrive.

Tuesday, December 1, 2015

70-246 Monitoring and Operating a Private Cloud with System Center 2012

QUESTION 1
Your company has a private cloud that is managed by using a System Center 2012 Operations Manager infrastructure.
The Operations Manager management server role is installed on a server named Server1.
You deploy a server named Server2, and then join Server2 to the domain.
You log on to Server2 and install the Operations Manager agent. You specify Server1 as the management server.
You notice that Server1 did not discover Server2.
You need to add Server2 as an agent-managed device.
What should you do from the Operations Manager console?

A. Modify the Global Management Server Settings - Security settings.
B. Create a new discovery rule.
C. Import the Windows Servers Base Operating System Management Pack.
D. Run the Discovery Wizard - Computer and Device Management Wizard.

Answer:


QUESTION 2
Your network contains an Active Directory domain named contoso.com that connects to a Windows Azure environment. You deploy System Center 2012 R2 Data Protection Manager (DPM) to the domain.
You need to ensure that you can use DPM to back up to the Windows Azure environment.
Which three actions should you perform? Each correct answer presents part of the solution.

A. From Windows Azure, create an endpoint.
B. On the DPM server, allow inbound traffic on TCP port 135.
C. Install the Windows Azure Backup agent.
D. Install a certificate on the DPM server and the upload the certificate to Windows Azure.
E. Create a backup vault.

Answer:


QUESTION 3
Your company has a private cloud that is managed by using a System Center 2012 infrastructure.
You deploy Data Protection Manager (DPM) to a server named DPM1.
A server named Server1 has the Hyper-V server role installed and hosts a virtual machine named VM1.
From DPM1, you perform a full backup of Server1.
You discover that you are unable to restore individual files from VM1.
You need to ensure that you can restore individual files from VM1 by using the DPM Administrator console.
What should you do first?

A. On VM1, install Windows Server Backup.
B. On DPM1, install the Hyper-V server role.
C. On VM1, install the integration features.
D. On DPM1, attach the VHD of VM1.

Answer: B

Explanation: The integration features are also required but the “first” step according to the link below is to install the Hyper-V role on the DPM server.
Ref: http://technet.microsoft.com/en-us/library/hh758184.aspx


QUESTION 4
Your company has a private cloud that is managed by using a System Center 2012 infrastructure.
The company defines the Service Level Agreement (SLA) for a web application as 99 percent uptime.
You need to create service level objectives (SLOs) that meet the SLA requirement.
Which object or objects should you create from the Service Manager Console? (Each correct answer presents part of the solution. Choose all that apply.)

A. a queue
B. a connector
C. a channel
D. a calendar
E. a metric
F. a subscription

Answer:


QUESTION 5
Your company has a private cloud that is managed by using a System Center 2012 infrastructure.
The network contains an Operations Manager infrastructure and a Service Manager infrastructure.
You need to configure Service Manager to create incidents automatically based on Operations Manager alerts.
Which object should you create from the Service Manager Console?

A. A subscription
B. A queue
C. An incident event workflow
D. A connector

Answer:

Thursday, November 26, 2015

98-364 Database Administration Fundamentals


QUESTION 1
The terms "bitmap," "b-tree," and "hash" refer to which type of database structure?

A. View
B. Function
C. Index
D. Stored procedure
E. Trigger

Answer: C


QUESTION 2
One reason to add an index is to:

A. Decrease storage space.
B. Increase database security.
C. Improve performance of select statements.
D. Improve performance of insert statements.

Answer: C


QUESTION 3
You have a table that contains the following data.


You break the table into the following two tables.

This process is referred to as:

A. defragmentation
B. normalization
C. fragmentation
D. denormalization

Answer: B


QUESTION 4
You have a table that contains the following data.



Which database term is used to describe the relationship between ProductID and ProductCategory?

A. Cohort
B. Relationally dependent
C. Deterministic
D. Functionally dependent
E. Compositional

Answer: D


QUESTION 5
Which key uniquely identifies a row in a table?

A. foreiqn
B. primary
C. local
D. superkey

Answer: B

Sunday, November 15, 2015

70-696 Administering System Center Configuration Manager and Intune

70-696 Administering System Center Configuration Manager and Intune

Published: January 23, 2015
Languages: English
Audiences: IT professionals
Technology Windows 8.1, Windows Server 2012 R2, Microsoft Intune
Credit toward certification: MCP, MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft
Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

Deploy and manage virtual applications (14%)
Prepare virtual applications
Sequence applications, install and configure the sequencer environment, prepare applications for deployment in different environments, configure virtual application interaction and sharing
Manage application virtualization environments
Configure App-V, manage application cache, configure System Tray/SFTTray.exe switches, configure application extensions with virtualized applications, configure application settings using group policies
Deploy and manage RemoteApp
Configure RemoteApp and Desktop Connections settings, configure Group Policy Objects (GPOs) for signed packages, subscribe to the RemoteApp and Desktop Connections feeds, export and import RemoteApp configurations, support iOS and Android, configure Remote Desktop web access for RemoteApp distribution

Deploy and manage desktop and mobile applications (15%)
Plan an application distribution strategy
Considerations, including impact on clients due to offline access, deployment infrastructure, and remote locations; choose the appropriate application distribution method; plan to distribute applications to mobile devices, including Windows Phone, Windows RT, iOS, and Android, by using Microsoft Intune; plan to distribute applications to desktops
Deploy applications using Microsoft System Center 2012 Configuration Manager
Choose and configure deployment types, configure user device affinity, configure requirements, manage the software library and application catalog
Deploy applications using Microsoft Intune
Choose between automatic and manual deployment, configure application deployment policies, add software packages, configure the company portal
Plan for application upgrades
Considerations, including application version co-existence, compatibility issues, and migrating application settings and configurations; re-sequence/redeploy applications
Monitor applications
Monitor offline application usage; monitor real-time sessions; monitor application licensing usage; configure Asset Intelligence in Configuration Manager; monitor applications, using Software Center
Manage content distribution
Manage distribution points, distribution point groups, and Content Library; monitor log files

Plan and implement software updates (16%)
Plan and deploy third-party updates
Plan for third-party support, integrate System Center Updates Publisher with Configuration Manager
Deploy software updates by using Configuration Manager and Windows Server Update Services (WSUS)
Configure software update point synchronization to Windows Update, use reports and In Console Monitoring to identify required updates, create update groups, create and monitor deployments, analyze log files, configure Automatic Deployment Rules (ADR), provide secondary access to Windows Update, configure GPO settings
Deploy software updates by using Microsoft Intune
Use reports and In Console Monitoring to identify required updates, approve or decline updates, configure automatic approval settings, configure deadlines for update installations, deploy third-party updates

Manage compliance and Endpoint Protection settings (15%)
Build a Configuration Item (CI)
Create a CI, import a CI, set CI versioning, remediate rules
Create and monitor a baseline
Deploy a baseline, import a configuration pack, build a custom baseline
Configure Endpoint Protection
Create and manage the Endpoint Protection policy; configure definitions within the client policy; export policies; choose which template to use; select exclusions; configure Endpoint Protection, using Microsoft Intune; use In Console Monitoring to monitor client compliance

Manage Configuration Manager clients (15%)
Deploy and manage the client agent
Identify deployment methods, manage client agent settings
Manage collections
Plan the collection structure; define rules for collections; customize collection-specific settings, including maintenance windows and power management
Configure and monitor client status
Configure client status settings, use In Console Monitoring to determine client health, configure alert thresholds, configure client health auto-remediation

Manage inventory using Configuration Manager (12%)

Manage hardware and software inventory
Extend hardware inventory WMI classes, export and import WMI class settings, configure standardized vendor names, analyze the identified inventory and generate reports
Manage software metering
Create software metering rules, enable or disable auto-generated rules, report software metering results
Create reports
Clone and modify reports, create custom reports, import and export reports, manage asset intelligence, install the asset intelligence sync point, enable the WMI classes, modify categories and labels, analyze reports

Provision and manage mobile devices (12%)
Integrate Configuration Manager with the Exchange ActiveSync Connector
Configure and apply ActiveSync policies, view inventory on mobile devices, configure connection to an on-premises or Hosted Exchange server environment, monitor the Exchange connector log file
Manage devices with Microsoft Intune
Provision user accounts, enroll devices, integrate Microsoft Intune with Configuration Manager, view and manage all managed devices, configure the Microsoft Intune subscriptions, configure the Microsoft Intune connector site system role
Manage connection profiles, by using Configuration Manager
Configure Remote Desktop profiles, certificate profiles, email profiles, and Wi-Fi profiles


Monday, October 19, 2015

70-331 Core Solutions of Microsoft SharePoint Server 2013


QUESTION 1
You create a User Profile Synchronization connection. You need to grant the necessary
permissions to the synchronization account. What should you do?

A. Grant the account Full Control on the ActiveUsers OU.
B. Grant the account Full Control on the AuthenticatedUsers AD security group.
C. Grant the account Read permission on the domain.
D. Grant the account the Replicate Directory Changes permission on the domain.
Correct
Answer: D


QUESTION 2
You need to ensure that content authors can publish the specified files. What should you do?

A. Create multiple authoring site collections. Create a site that contains lists, document libraries,
and a Pages library. Create an asset library in a new site collection, and enable anonymous
access to the library on the publishing web application.
B. Create multiple authoring site collections. Create a site that contains lists, document libraries,
and a Pages library. Create an asset library in the authoring site collection, and enable
anonymous access to the library on the authoring web application.
C. Create one authoring site collection. Create a site that contains multiple lists, document
libraries, and Pages libraries. Create an asset library in a new site collection, and enable
anonymous access to the library on the publishing web application.
D. Create multiple authoring site collections. Create a site that contains multiple lists, document
libraries, and Pages libraries. Create an asset library in a new site collection, and enable
anonymous access to the library on the publishing web application.
Correct
Answer: B


QUESTION 3
HOTSPOT
You need to ensure that user-selected subscription content automatically appear on users' My
Sites. Which configuration option should you choose? (To answer, select the appropriate option
in the answer area.)
Hot Area:



Correct Answer:





QUESTION 4
You need to import employee photos into SharePoint user profiles by using the least amount of
administrative effort. Which three actions should you perform? (Each correct answer presents
part of the solution. Choose three.)

A. Define a mapping for the thumbnailPhoto attribute of the Picture user profile property.
B. Run the Update-SPUserSolution Windows PowerShell cmdlet.
C. Run an incremental synchronization of the User Profile Synchronization service.
D. Run a full synchronization of the User Profile Synchronization service.
E. Run the Update-SPProfilePhotoStore Windows PowerShell cmdlet.
F. Define a mapping for the photo attribute of the Picture user profile property.
Correct
Answer: ADE


QUESTION 5
DRAG DROP
You need to install the appropriate versions of Windows Server, Microsoft SQL Server, and
Microsoft .NET Framework in the server environment. Which operating system and applications
should you install? (To answer, drag the appropriate operating systems and applications to the
correct server layers in the answer area. Each operating system or application may be used once,
more than once, or not at all. You may need to drag the split bar between panes or scroll to view
content.)
Select and Place:



Correct Answer:





QUESTION 6
You copy the content of the SharePoint installation media and software updates to your hard
drive. You need to meet the setup requirements for future SharePoint server installations. What
should you do?

A. Extract the content of each file to the Updates folder by running the /extract:<path>
command.
B. Upgrade the installation media by running the /lang:<lcid> command.
C. Extract the content of each file to the Setup folder by running the /extract:<path> command.
D. Extract the content of each file to the PrerequisiteInstallerFiles folder by running the /
extract:<path> command.
Correct
Answer: A




Monday, September 28, 2015

DreamFactory: Building a better backend for your apps

A free, open source solution for connecting mobile, IoT, or Web apps to backend server data and services

Let’s say you’re building a browser-based HTML5 Web application that’s going to display data from a database on your server. The usual development process involves lots of heavy lifting at both the client front end and the server backend.

Now, the front end is what you really care about - delivering the services and functionality to meet the user needs - but the backend work required to make the front end possible can be a huge time sink. You'll not only need database access and management you'll also need user registration, authentication, logging, and management services along with server-side computations, and to connect everything together, you need application programming interfaces (APIs).

While building all of that infrastructure in the long term it’s the APIs that can really cause you grief. Once your logic becomes rich and therefore complex, documenting how your client side apps interact with the server and keeping that information up to date often become a major source of errors, problems, and development and deployment delays.

The problem of how to create not only functional but also maintainable backend services is what the free, open source DreamFactory Services Platform (DSP), published by DreamFactory Software Inc., solves. DSP acts as middleware, automatically creating and documenting REST APIs that connect any client including mobile, Web, and IoT apps to SQL, NoSQL, and server-based files as well as scripting and services external to the server via authentication and security controls all wrapped up in enterprise-grade security.

DreamFactory architecture

APIs generated by DSP can also be customized with pre- and post-process logic using the built-in V8 JavaScript engine and DSP “integrates with Active Directory, LDAP, and OAuth, and takes care of user management, authentication, single sign-on, role-based permissions, and record-level access controls.”

DreamFactory API flow
The generated APIs and associated documentation is based on Swagger, a free, open source API framework used in production by the likes of Apigee, Getty Images, Intuit, LivingSocial, McKesson, Microsoft, Morningstar, and PayPal. Where this feature becomes even more powerful is in the generation of client SDKs:

As each new backend service is hooked up, DreamFactory automatically produces written documentation on the service interface, creates an interactive API browser for exploring the service manually, and generates a dynamic software development kit (SDK) for calling the service.

DSP is written in PHP and can be installed on premises or in the cloud with one-click installers available for Amazon, Azure, Google, VMware, Digital Ocean, and Bitnami, or you can run DSP locally (which makes it really easy to get development started) under Linux, Windows, or OS X.

If you want to start your evaluation as quickly as possible, I’d recommend the free Bitnami DreamFactory installer, Docker image, or virtual machine. I used the installer and had DSP running on OS X in under five minutes. As Bitnami points out, with their packaged solutions you can:

DreamFactory Software offers paid product support packages and commercial licenses. If you want to jump in with serious training and support, DreamFactory Software offers their Jumpstart program starting at $2,000 to get you from newbie to expert really quickly.

This is an amazing piece of engineering and if you’re doing any kind of even vaguely serious app development this DreamFactory Services Platform should absolutely be on your shortlist of service solutions.

Saturday, September 19, 2015

Windows devices account for 80% of malware infections transmitted via mobile networks

mobile security stock image one bad device
As PC owners increasing take to mobile connections for Internet access, malware follows

Microsoft may have just a single-digit slice of the mobile market, but there's one segment of mobile that it's winning: Malware infections delivered via mobile networks.

According to a Wednesday report from Alcatel-Lucent's Motive Security Lab, in June Windows devices accounted for 80% of the infections spotted on hardware that relied on mobile networks for Internet connectivity. Meanwhile, Android's share of the total infection count dropped to about 20% after long hovering at the 50% mark.

iOS and other operating systems were at nearly negligible percentages.

The data was generated from scans by Alcatel-Lucent's Motive Security Guardian technology, which is deployed worldwide by both mobile and fixed-line networks, and monitors traffic from more than 100 million devices.

That Windows malware infections represented such a huge portion of the total when Microsoft's operating system has been a very minor player in mobile is certainly counter-intuitive. If Windows-powered smartphones make up just 2.6% of all those shipped in 2015 -- IDC's latest forecast -- how can Windows comprise 80% of the malware infections?

Simple.
"Most people are surprised to find such a high proportion of Windows/PC devices involved," Alcatel-Lucent said in its report. "These Windows/PCs are connected to the mobile network via dongles and mobile Wi-Fi devices or simply tethered through smartphones. They are responsible for a large percentage of the malware infections observed."

While those devices are powered by Windows and on a mobile network, they're not necessarily smartphones or cellular-equipped tablets. In fact, the vast majority are not: They're traditional PCs, mainly laptops, that use a mobile network rather than a fixed network composed of copper or fiber optic lines. (Of the latter, a Wi-Fi network connected to a fixed network would still be classified as a fixed network by Alcatel-Lucent, even though there are no wires linking the laptop to the Internet.)

"As the mobile network becomes the access network of choice for many Windows PCs, the malware moves with them," the report stated.

Long the favorite target of cyber criminals because of its dominance on devices, overwhelmingly so compared to, say, Apple's OS X -- and due to its open ecosystem that differs dramatically from the "walled garden" of iOS -- Windows doesn't escape infection simply because devices have shifted from fixed to mobile networks.

Windows device infection rate -- what percentage of the total are detected with malware -- was also up significantly in the first half of 2015 on mobile networks. By June, it was approximately 0.6%, representing 6 infections per 1,000 devices. That was more than three times that of Android, the other OS that historically has had a high infection rate.

Alcatel-Lucent credited the decline of Android infection rates to moves Google has made, including efforts to eliminate malware-ridden apps from the Google Play e-mart, as well as Android's Verify Apps feature. The latter was introduced in 2012 with Android 4.2, aka Jelly Bean, and has been beefed up since then. Verify Apps scans apps a user wants to download, compares them against a Google database, and when a known malicious app is detected, blocks the download.

Google's intent has been to both clean up Google Play and stymie dangerous downloads from outside sources, like third-party app markets. The decline of Android infection rates and its share of all infections were signs that the strategy has worked, said Alcatel-Lucent.

Microsoft has had a similar protection in place since 2011, when it added an application reputation feature to its Internet Explorer-based SmartScreen technology.

Most of the infections Alcatel-Lucent detected on Windows devices was adware bundled with games and free software.

"The increase in Windows/PC infections can be attributed to the fact that more people are using their phone's data connection to provide Internet access for their devices," Alcatel-Lucent concluded.



Friday, August 28, 2015

Apple sold 3.6M smartwatches in Q2

But Fitbit held on as the world's top wearables vendor, IDC says

Fitbit retained its title as the world's top wearables vendor for the second quarter of 2015, but Apple is quickly gaining ground.

During its debut quarter in the wearables market, Apple shipped 3.6 million Apple Watches compared to Fitbit's 4.4 million fitness trackers, IDC said Thursday.

Overall, 18.1 million wearables shipped during the quarter, versus 5.6 million units in the year-ago quarter.

Apple began selling its smartwatch in April, but hasn't released sales figures, claiming that disclosing this information would give competitors an advantage.

The company has been vague in describing how consumers have reacted to the Apple Watch. During a call with analysts to discuss Apple's third quarter results, CEO Tim Cook said sales beat expectations while demand exceeded supply.

Apple's reticence has led to speculation and various wide-ranging estimates of Watch sales.

Apple debuted as the second-largest vendor in the wearables market, and dominated the "smart wearables" sub-category, which IDC defines as devices that can run third-party applications: the Apple Watch accounted for two out of every three smart wearables shipped during the quarter.

All other wearables will be compared to the Apple Watch, forcing competitors to keep pace or attempt to surpass Apple, said the research firm. For companies that make basic wearables, that could prove challenging, even for Fitbit.

During the second quarter, Fitbit had notable successes, such as increasing the number of companies using their fitness trackers for corporate wellness programs and posting strong revenue growth, IDC said.

But IDC expects Apple to dominate the wearables space and eventually eclipse Fitbit as the market leader. In fact, IDC predicted that over the next five years, basic wearables will lose market share.

Fitbit's fitness trackers fall into the basic wearables category. Vendors of basic wearables will need to figure out how to make their devices compete with the more sophisticated smart wearables without increasing prices.

Another player in the wearables market is Xiaomi, which in May began selling its Mi Band for $14.99. The Chinese vendor shipped 3.1 million units of the basic wearable in the second quarter, IDC said.

Rounding out IDC's list of leading wearables manufacturers are Garmin, which makes fitness devices like GPS watches, and Samsung, which makes a smartwatch. However, Samsung's products could have limited interest if they run the company's Tizen OS, IDC said.

But Apple will be the wearable vendor to watch, IDC said, especially since the iPhone maker just entered the space and the next version of watchOS will let apps run natively on the Apple Watch.


Friday, August 21, 2015

After three-day shutdown, HP now effectively two companies

HP is nearing 'the last of the restructuring Mohicans,' said CEO Meg Whitman

Hewlett-Packard doesn't officially become two companies until Nov. 1, but the company has already separated its internal systems and is effectively operating as two businesses.

"On August 1, we successfully split the operations and IT systems for the company. This was an incredibly complex process and the team executed very well," CEO Meg Whitman said on HP's quarterly earnings call Thursday.

HP worked directly with 3,500 of its biggest customers and partners to prepare for the cutover, which involved separating 750 systems that handle 95 percent of its business.

"After shutting down for just three days to transition, critical operating systems across our business segments are now live globally," Whitman said.

It's not exactly clear what shutting down for three days means for a company that size, but HP stuffed extra product into its distribution channel to give it a cushion and make sure the transition went smoothly.

HP had already said it planned to flip the switch Aug. 1, to give it time to iron out any kinks before the official split on Nov. 1.

HP will become two companies: HP Inc., which will sell its PCs and printers, and HP Enterprise, which will sell its servers, storage and network gear, as well as its software, enterprise services and cloud services.

HP's revenues have declined every earnings period for the past 16 quarters -- or for four straight years -- and it hopes the split will give each company a sharper focus and the ability to move faster and compete better.

But the prospects that it will hit the ground running look bleak, at least for HP Inc.

After a respite last year when businesses bought replacement PCs ahead of the Windows XP support cutoff, PC sales are now in decline again, and HP doesn't expect things to get better soon.

"Market declines and competitive pricing pressure have accelerated since May," Whitman said Thursday. "We now see a difficult business environment for several quarters to come."

Printer sales were also down last quarter, when the strong U.S. dollar helped Japanese firms to undercut HP's prices.

The enterprise division is faring a little better. Sales were up 2 percent last quarter, with gains in networking and industry-standard servers. The enterprise group has a profit margin of 13 percent -- though that was down a point from last year, in part because HP sold more high-density cloud servers, which yield smaller profits.

But the enterprise group is turning a corner, according to Whitman. In storage, for instance, sales of HP's newer "converged systems," including 3Par equipment, now account for more than 50 percent of sales, Whitman said, overtaking its older, legacy storage products.

HP has done a lot of restructuring in the past several years, including laying off 55,000 workers. A financial analyst on the earnings call noted that the restructuring has cost it roughly $1 billion a year for the past several years.

It's not over yet, but it's drawing to a close, according to Whitman. HP wants to cut more costs from its enterprise services business, which likely means more job cuts. HP will describe those plans at its financial analyst summit next month.

After that, she said, there may be smaller restructuring efforts, but they'll be accounted for within the enterprise services group, rather than by HP as a whole.

"We know it’s been a concern, and frankly it's been a concern to us," Whitman said of the restructuring costs. "So this will be the 'last of the restructuring Mohicans.'"

HP's shares were down about 1 percent after the results were announced, after falling 1.4 percent in the regular trading day. The company's net profit for the last quarter fell 13 percent to $854 million, on revenue of $25.3 billion, down 8 percent.


Monday, August 17, 2015

Microsoft's rollout of Windows 10 gets B+ grade

General vibe of the new OS remains positive, say analysts

Microsoft has done a good job rolling out Windows 10 in the first two weeks, analysts said today, and the general vibe for Windows 8's replacement has been positive, even though glitches have dampened some enthusiasm.

"If I had to give Microsoft a letter grade, it would be a B or a B+," said Steve Kleynhans of Gartner. "It's not an A because it hasn't gone perfectly. They've stubbed their toe over privacy issues, for example."

Microsoft began serving up the free Windows 10 upgrade late on July 28, giving participants in the firm's Insider preview program first shot at the production code. It then slowly began triggering upgrade notices on Windows 7 and 8.1 machines whose owners had earlier "reserved" copies through an on-device app planted on their devices this spring.

The Redmond, Wash. company has said little of the rollout's performance other than to tout that 14 million systems were running Windows 10 within 24 hours of its debut.

Estimates based on user share data from U.S. analytics company Net Applications, however, suggests that by Aug. 8, some 45 million PCs were powered by Windows 10.

Analysts largely applauded the launch. "As far as the roll-out, it's not any worse than any other Windows," said Kleynhans. "But it's all happening at this compressed timetable.

"And social media now amplifies any problems," he continued, much more so than three years ago when Windows 8 released, much less in 2009, when Microsoft last had a hit on its hands.

Others were more bullish on Microsoft's performance. "Windows 10's go-to-market was really quite good," said Wes Miller of Directions on Microsoft, a research firm that specializes in tracking the company's moves.

Miller was especially impressed with Microsoft's ability to make customers covet the upgrade. "Something Microsoft has not always done a great job of is creating a sense of exclusivity," said Miller. "But they're withholding [the upgrade] just enough that there's a sense of excitement. People are saying, 'I want it, I'm not getting the upgrade yet.' Arguably, that exactly what Microsoft wants."

Windows 10's rollout has departed from those of past editions in significant ways.

Historically, Microsoft released a new Windows to its OEM (original equipment manufacturer) partners first, who were given months to prepare new devices pre-loaded with the operating system. Only when the computer makers were ready did Microsoft deliver paid upgrades to customers who wanted to refresh their current hardware. Relatively few users paid for the upgrades; most preferred to purchase a new PC with the new OS already installed.

This cycle, Microsoft gave away the Windows 10 upgrade to hundreds of millions of customers -- those running a Home or Pro/Professional edition of Windows 7 or Windows 8.1 -- to jumpstart the new OS's adoption. With some exceptions, the upgrade hit before OEMs had prepared new devices or seeded them to retail.

Because of the large number of customers eligible for the free upgrade, Microsoft announced it would distribute the code in several waves that would take weeks (according to Microsoft) or months (the consensus of analysts) to complete. While some had predicted that the upgrade's massive audience would stress the delivery system Microsoft had built, or even affect the Internet at large, neither happened.

The "Get Windows 10" app -- which was silently placed on PCs beginning in March -- not only served as a way to queue customers for the upgrade, but also ran compatibility checks to ensure the hardware and software would support the new operating system, another slick move by Microsoft.

"Microsoft rolled out Windows 10 to the audience that would be most receptive," said Patrick Moorhead, principal analyst at Moor Insights & Strategy, referring to the Insiders-get-it-first tactic. "Then they rolled it out to those who weren't Insiders, but who had expressed a desire to get the upgrade. And only those [whose devices] passed all of its tests got it. That was a smart thing to do."

The latter was designed to limit upgrade snafus, something Microsoft has chiefly, although not entirely, accomplished. "While the rollout was pretty clean, there have been glitchy issues here and there," said Kleynhans, who cited post-Windows-10-upgrade updates that crippled some consumers' machines.

Moorhead echoed that, highlighting the out-the-gate problem many had keeping Nvidia's graphic drivers up-to-date as Microsoft's and Nvidia's update services tussled over which got to install a driver. "Problems have been more anecdotal than system-wide," Moorhead said. "And they seem to get remedied very quickly."

The bungles haven't been widespread enough to taint the generally favorable impression of Windows 10 generated by social media, news reports and Microsoft's PR machine, the analysts argued.

"Overall, I'd say Windows 10 has received a much more positive reception than other [editions of] Windows," said Moorhead, who said the reaction was justified, since the developing consensus is that Windows 10 is a big improvement over its flop-of-a-predecessor, Windows 8.

"The vibe is positive, but it's much more about consumers now than businesses," said Directions' Miller. Enterprises, he said, will take a wait-and-see approach -- as they always do -- before jumping onto Windows 10, as they must if they're to stick with Microsoft, a given since there isn't a viable alternative.

A credible reaction from corporate customers, Miller continued, won't be visible until Microsoft finishes unveiling its update tracks, called "branches," particularly the "Long-term servicing branch" (LTSB). That branch will mimic the traditional servicing model where new features and functionality will be blocked from reaching systems that businesses don't want to see constantly changing.

"People are liking what they are getting out of the other end" of the upgrade, added Kleynhans. "From what I've heard, they're happy, surprisingly happy, and generally pretty positive about the OS. But I'd expect the new shine to wear off after the first couple of weeks."

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Saturday, August 8, 2015

Virtual Mobile Infrastructure: Secure the data and apps, in lieu of the device

VMI offers an effective, efficient way to provide access to sensitive mobile apps and data without compromising security or user experience

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Corporate use of smartphones and tablets, both enterprise- and employee-owned (BYOD), has introduced significant risk and legal challenges for many organizations.

Other mobile security solutions such as MDM (mobile device management) and MAM (mobile app management) have attempted to address this problem by either locking down or creating “workspaces” on users’ personal devices. For BYOD, this approach has failed to adequately secure enterprise data, and created liability issues in terms of ownership of the device – since it is now BOTH a personal and enterprise (corporate)-owned device.

MAM “wrap” solutions in particular require app modification in exchange for ‘paper thin’ security. You cannot secure an app running on a potentially hostile (unmanaged) operating system platform, and critically you can’t wrap commercial mobile applications.

By contrast, Virtual Mobile Infrastructure (VMI) offers an effective, efficient way to provide access to sensitive mobile apps and data without compromising enterprise security or user experience.

Like VDI for desktops, VMI offers a secure approach to mobility without heavy-handed management policies that impact user experience and functionality.

From IT’s perspective, VMI is a mobile-first platform that provides remote access to an Android virtual mobile device running on a secure server in a private, public or hybrid cloud. The operating system, the data, and the applications all reside on a back-end server — not on the local device.

From a user’s perspective, VMI is simply another app on their iOS, Android or Windows device that provides the same natural, undiluted mobile experience, with all the accustomed bells and whistles. Written as native applications, these client apps can be downloaded from the commercial app stores, or installed on devices using MAM or app wrapping technologies.

As Ovum states, “Put more simply, this [VMI] means in effect that your mobile device is acting only as a very thin client interface with all the functionality and data being streamed to it from a virtual phone running in the cloud.”

Getting started with VMI

After downloading and installing the VMI client, users go through an easy setup process, inputting server names, port numbers, account names and access credentials. When users connect to the VMI device they see a list of available applications, all running on a secure server that communicates with the client through encrypted protocols.

The client accesses apps as if they were running on a local device, yet because they are hosted in a data center, no data is ever stored on the device. Enterprises can secure and manage the entire stack from a central location, neutralizing many of the risks that mobile devices often introduce to a network.

Two-factor authentication is supported via PKI certificates in the physical phone’s key store. The physical device forces the user to have a PIN number (or biometric) to unlock the phone when there is a certificate in the hardware-backed key store. Additionally, the client supports variable session lengths with authentication tokens.

The server infrastructure that supports VMI clients can be implemented as multiple server clusters across geographic regions. As users travel, the client synchronizes with the server cluster closest to its physical location to access the applications on its virtual mobile device. The client continues to communicate with one server at a time, choosing the server location that provides the best performance.

In a typical deployment, there are compute nodes that host the virtual mobile devices, a storage service that holds user settings and data, and controller nodes that orchestrate the system.

The controller node(s) can be connected to an Enterprise Directory service, such as Active Directory, for user authentication and provisioning, and systems management tools such as Nagios and Monit can be used to monitor all parts of the system to ensure they are up and behaving properly (e.g. are not overloaded). The server hosting the devices creates detailed audit logs, which can be imported into a third party auditing tool such as Splunk or ArcSight.

VMI is platform-neutral, which means organizations can write, test, run and enhance a single instance of an app on a ‘gold disk’ OS image, rather than building separate apps for each supported end-user platform. This represents significant time and cost savings for resource-constrained IT organizations.

And while VMI takes a different approach to securing mobile endpoints than MDM, it does not aim to replace those solutions. Instead, VMI can integrate with MDM, MAM and other container solutions allowing organizations to use MDM to configure and manage an enterprise-owned virtual mobile device running in a data center, and MAM to support version management and control upgrade scheduling of VMI thin clients.

Mobile by design
Because VMI is optimized for smartphones and tablets with small touch screens and many sensors, users enjoy native apps and a full mobile experience. VMI supports unmodified commercial apps, allowing for greater workflow and productivity, and complements sandbox container solutions that provide limited offline access to apps such as corporate email by providing a richer user experience when the user is online (the vast majority of the time).

Users can also access separate work and personal environments from a single device, enjoying Facebook and Instagram and sending personal emails without worrying that corporate IT teams will seize data or wipe their data. When an employee leaves an organization, IT simply revokes their access privileges to the virtual mobile device.

Similar to VDI, there are many different business scenarios in which organizations should evaluate VMI. The most common include:

Healthcare - Enables access to electronic health records and other sensitive apps and data from mobile devices, in compliance with HIPAA privacy requirements.
Financial Services - Facilitates access to more sensitive client transaction data and business processes, from both personally owned and enterprise owned devices.
Retail - Supports secure Point of Sale as a Service for credit card transactions; Protecting the confidentiality of customer data accessed both from on and off premises.
Enterprise BYOD - Provides secure access to native apps from employee-owned mobile devices; keeping all data secure in the data center while at the same time not infringing on personal privacy.

Commercial Services - Extends the mobile enterprise to contractors, partners and customers.
Classified mobility - Allows government and security services to access data and applications from classified mobile devices, ensuring compliance with the thin client requirements of NSA’s
Mobility Capability Package.

With 1.9 billion devices expected to hit the market by 2018, IT professionals are on the hunt for a more effective way to secure the enterprise. VMI provides the access they need without compromising security or user experience.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Tuesday, July 28, 2015

Deep-dive review: Windows 10 -- worth the wait

Deep-dive review: Windows 10 -- worth the wait

Microsoft makes up for Windows 8 by delivering a truly integrated operating system.

Finally, an operating system from Microsoft you can love.
With Windows 10, Microsoft undoes the damage wrought by Windows 8. This is a cleanly designed operating system that works equally well on traditional computers and tablets, brings back the much-mourned Start menu and introduces useful features such as the Cortana digital assistant and new Edge browser.

I've been following the progress of Windows 10 ever since the first technical preview last year, and wrote about the second technical preview back in January 2015. I lived with, tested and reviewed its major iterations. I've seen rough edges smoothed, new features introduced and some features dropped.
ALSO ON NETWORK WORLD: What if Windows went open source tomorrow?

This shipping version (which will be officially available on July 29) is much improved over the last time I reviewed it in late May. Since then, the overall interface and Start menu has been tweaked, Edge has been completed and bugs have been squashed. It's now a more complete and refined operating system. (Note: A separate version for smaller mobile devices is expected to be released in the fall.)

That's not to say that all is perfect. In this review, I'll give an in-depth look at the new operating system, including its best and worst features. Read on for the complete rundown.

Starting with the Start menu
In Windows 10, everything starts with the new Start menu. Tap the Windows key to launch it; tap it again to make it disappear. The Start menu is command central for the entire operating system, displaying live tiles with changing information from Windows 10 apps, letting you launch all your apps, giving you access to your settings and to File Explorer, and letting you shut down and restart Windows.

And note -- there's been yet another name change. Microsoft has a new designation for the touch-screen apps once called Metro and then called Modern: They are now simply Windows apps. Applications written for use with a keyboard are called desktop apps.



Windows 10 start menu
In Windows 10, everything starts with the new Start menu.

If you use Windows 10 on a non-touch desktop or laptop PC, you thankfully never need to see the touch-oriented tablet mode (what Microsoft called the Start screen in Windows 8) -- you boot right into the desktop. The Start menu and desktop is all you need and all you get. For me, this alone makes the new operating system a winner.

The left side of the Start menu has links to your most used programs, recently added programs, File Explorer, Settings and Power, along with a link that leads to a list of all the apps on your computer. At the top left of the menu is an icon that shows you which user account you're currently using and takes you to a menu that lets you switch accounts, log out of your account or go to the Lock screen.

Eye-candy fans (such as me) will appreciate that the Start menu is transparent. It's also customizable. You can change the menu's height (but not its width) by pulling down the double-headed arrow that appears at the top when you move your cursor over it and dragging it to make it the menu taller or shorter. Oddly enough, a double-headed arrow appears when you put your cursor on the right side of the menu, implying you can change its width, but I wasn't able to drag the arrow to do that.

There's a lot more you can do to customize the Start menu. You can group related applications and then name them -- for example, you might want to put the Groove Music, Movies & TV and Xbox apps into a group that you call Entertainment. You can also pin and unpin apps to and from the Start menu and Taskbar, and resize the tiles by right clicking on them. Depending on the app's capabilities, you might also be able to turn a live tile off so that it's static instead of displaying changing information. (I found this a surprisingly useful feature. With too many tiles flashing at me, I felt at times as if I was in a Vegas casino.)

Right-clicking also lets you uninstall apps. Some Microsoft apps, though, can't be uninstalled, including the Movies & TV, Calendar and Groove Music apps. They can, however, be unpinned from the Start menu; if you want to run them later, you can type their name into Cortana.

The upshot? The Windows 10 Start menu is more than just a redone version of its Windows 7 predecessor. With it, you run both Windows 10 apps and desktop apps, which goes a long way towards making Windows 10 feel like a truly integrated operating system.

Continuum and tablet mode
Also helping to unify the operating system is a new feature called Continuum, which lets Windows 10 perform a shape-shifting trick by detecting the type of machine you're running, and then changing its interface to the one suited for the device. It's particularly useful for two-in-one devices such as the Microsoft Surface Pro, which works as a tablet or laptop, depending upon whether you have a keyboard attached.

And the OS will change dynamically. If you're using the tablet with a keyboard attached, you see the desktop-based interface, complete with Start menu. Detach the keyboard and you get a pop-up notification that asks if you want to switch to tablet mode. If you don't want to be bothered by the notification again, you can select "Remember my response and don't ask again." From then on, you'll switch automatically from desktop to tablet mode and back again.


Windows 10 continuum
A new feature called Continuum lets Windows 10 detect the type of machine you're running and switch the interface to suit the device.

Continuum worked for me without a hitch, switching every time I unplugged a keyboard from my Surface tablet, or plugged the keyboard back in.

Tablet mode offers much the same Start screen interface that many Windows 8 users, including me, have come to hate: Big tiles representing the apps you want to run. It's ideal for tablets, though. And although most of the changes Microsoft has made in Windows 10 have to do with the desktop, the company has also made some improvements to the tablet interface.

Gone is Windows 8's kludgy Charms bar with links for sharing, settings, devices, moving to the Start screen and searching. Of all those links, the only truly useful one was for searching -- and in Windows 10, you search in tablet mode by tapping the Cortana search button at the bottom left of the screen. (For more about Cortana, head to the next section of this article.)

I won't miss the Charms bar. I think that few people will.

Windows 10 tablet mode
Tablet mode offers much the same Start screen interface that came with Windows 8, although with improvements.

There have been other changes as well. There's now what some people call a "hamburger menu" at the top left of the screen -- three horizontal stacked lines. In a way, it's a mini-Start menu for tablets: Tap it and you get a menu that lists your most-used and most recently added apps; it also contains links to File Explorer, Settings, the Power button and all your apps.

I'm a big fan. There's no longer any need to scroll and hunt through the Start screen for apps I frequently run. Instead, they're easily available from the menu. And you can run desktop apps from this menu, not just Windows apps. It's one more way in which Windows 10 now works as a unified operating system.


Windows 10 all apps
A "mini-Start menu" for tablets lists your most-used apps, your most recently added apps and links to useful system tools.

At the bottom left of the Start screen there's another menu icon that looks like a bulleted list. Tap it to see a list of all of your apps, including desktop apps and built-in Windows apps such as Settings.

Also new is that the Taskbar runs at the bottom of the screen in tablet mode -- the same Taskbar that is on the desktop. Although I risk sounding like a broken record, it's one more way that Windows 10 feels like a single interface spanning two modes, rather than two operating systems uneasily joined together.

Cortana
I'm not much of a fan of iPhone's Siri digital assistant or Google's Google Now -- I tried them briefly and found them only moderately helpful. They sometimes felt more like parlor tricks than practical features I could use throughout the day. So I didn't think I'd be happy with Cortana.

I was wrong. Cortana is more than a mildly useful appendage to Windows 10. It's embedded deeply into the operating system. The more you use it, the more useful it becomes, because it learns about you over time. Not that it's perfect, because it makes errors along the way and there are some important things it can't do.


Windows 10 cortana

The Cortana digital assistant is present primarily as a search bar under the Start menu.

Cortana is present primarily as a search bar under the Start menu; you can also launch it by tapping its tile on the Start menu. (In tablet mode, it's accessible from an icon on the Taskbar). You wake it up by saying "Hey Cortana" or "Hi Cortana." You can then ask it to do something, such as find a file, launch a program or find information. If you prefer typing to talking, type your request into the search bar.

What you'll see next depends upon your request. Cortana, which is based on Bing's search engine, looks through your files, your Microsoft OneDrive cloud storage account, your videos and music, the apps on your PC, your settings, your email and the Web. The actions it takes or the way it shows your search results varies according to what you've asked for.

For example, when I said, "Show me my photos from Italy," Cortana quickly found them on both my PC and on OneDrive -- and displayed them. At the top of the results, I could click a link to search for photos of Italy on the Web.

When I asked, "What's the weather?" it knew my location and told me it was 74 degrees and sunny, and also displayed the weather forecast. And when I said, "Add an appointment on Sunday," it asked me what time the appointment was scheduled to start, and from there I was able to quickly add an appointment to my calendar.


Windows 10 Cortana photos
The search results after a request to Cortana to see photos from a trip to Italy.
There are limits to Cortana's capabilities, though. I use Gmail as my primary email account, and Cortana wasn't able to reach into it to search through messages. In fact, it wouldn't even launch Gmail for me. Instead, it did a Bing search for Gmail and showed me a page of search results on the Web. If Cortana is going to become a truly useful digital assistant, Microsoft will have to figure out a way for Cortana to interact with all the major Web-based apps.

I will say this for Cortana, though -- it's a fast learner. When I said "Launch Google Chrome," it asked whether I wanted to launch Google Chrome or Chrome App Launcher. I told it to launch Google Chrome. Every time after that, when I made that same request, it launched Google Chrome without asking for clarification.

When Cortana runs, it displays a menu made up of a group of four icons stacked underneath a "hamburger" menu on the left side of the screen, which are both somewhat useful and somewhat confusing. The top one, Home, simply navigates you to the main Cortana interface. Beneath it, the strangely-named Notebook icon leads you to a tool to change Cortana's settings -- such as whether you want to get recommendations about places to eat or events to attend; what your home, work and other "favorite locations" are; how to change the name Cortana uses for you; and so on.

Beneath Notebook, the Reminders icon does exactly what it says -- lets you set reminders, which can be triggered by a time or a location you visit. And the bottommost icon, Feedback, lets you provide feedback about Cortana.

Cortana is tied to your Microsoft ID, so it has the same information about you on all the Windows devices you use, including smartphones.

Overall, Cortana is still a work in progress. It does an excellent job of reaching into your PC; searching the Web; knowing your location, likes and dislikes; and delivering you information based on that. But until it can also reach into Web-based apps like Gmail, Cortana can never be a complete digital assistant.

Gaining an Edge

Another big addition to Windows is the new Edge browser, which replaces the justifiably maligned Internet Explorer. Edge is Windows 10's default browser and with it, Microsoft hopes to eventually bid farewell to IE.

Microsoft can't entirely get rid of Internet Explorer yet, though, especially because enterprises have built apps based on it. So you'll still find it in Windows 10. But unless you have to run it for compatibility reasons, don't -- because Edge is a considerable improvement.

With Edge, Microsoft focused on creating a speedy browser -- and the work has paid off. I found that it displayed Web pages extremely quickly, much faster than Internet Explorer, and equal to or possibly faster than Chrome.

To check my impression, I ran three browser speed tests using Edge, Internet Explorer and Chrome. I ran each test three times for each browser and averaged the results. Edge scored faster than Internet Explorer in all three tests and faster than Chrome in the SunSpider and Kraken tests, while losing to Chrome in the Octane test.
Windows 10 Edge browser: Test results

But even though Edge is speedy, you may encounter rendering problems with some Web pages. It won't run Google Inbox, for example. And when I ran the HTML5 test, which tests for compatibility with HTML5 standards, it lagged behind Chrome, scoring 402 out of a possible 555 points, compared to 526 for Chrome. Internet Explorer did even worse than Edge, with a score of 348.

Edge takes much of its inspiration from Chrome, dispensing with as many menus and extraneous design elements as possible. For example, it has jettisoned Internet Explorer's oversized back and forward buttons, so that the content of a Web page stands out more. Edge will also support add-ins, but that feature is not yet available, and will be included at some time later.


Windows 10 edge
The Edge browser will eventually replace Internet Explorer.

The browser's basics are straightforward -- there are several icons to the right of the Address Bar that offer access to a variety of features.

To begin with, you click on a star to add a favorite. A menu icon just to the star's right lets you to browse favorites, view downloaded files, see your history list and use the browser's reading list feature (more on that in a bit).

Another icon lets you share a URL via Mail, Twitter, OneNote and the reading list. And over on the far right there are three small dots that, when clicked, bring up other features such as zooming, launching a new window, printing, pinning the current site to the Start screen, opening a new "InPrivate" window for anonymous browsing, and launching the current page in Internet Explorer.

There is an icon to the left of the star that resembles a book and activates Edge's Reading View, which is much like a similar Safari feature: It strips out everything extraneous to a page's content, including ads, navigation, sidebars and anything else that diverts attention from the content. You read the text in a scrollable window, with graphics included. The icon will be grayed out if you're on a page that Reading View can't handle, such as a page that is primarily used for navigation.

As for the reading list, it's a list of your Reading View favorites. So when you're in Reading View, click the star icon for adding favorites and the current page gets added to your reading list.

Edge also offers the ability to annotate and share Web pages. Click the annotation icon (to the right of the menu icon -- it looks like a pencil and paper) and you'll be able to mark up a Web page using highlighters and note-creation tools, save the annotated page and share it as a .jpg graphics file via email, OneNote or Twitter. You can also save the annotations to your PC via Microsoft OneNote. I personally found that feature less than useful; others may differ.


Widnows 10 Edge markup

Edge includes the ability to annotate Web pages.

On the other hand, one of Edge's most useful features is the way in which it takes advantage of Cortana, which inconspicuously appears at the top of pages for which Cortana can offer help. For example, when I went to the Web page of one of my favorite restaurants, the Cortana icon appeared to the right of the Address Bar with the message, "I've got directions, hours, and more." When I clicked it, a sidebar appeared on the right-hand side of the page with a map, address, phone number, description of the restaurant and reviews. There were also links for getting directions, looking at the menu and calling the restaurant.

For me, this is the biggest edge that Edge has over competing browsers. It doesn't just display specific Web pages, but it can also deliver useful information not found on that page.
Windows 10 cortana helps edge

Edge doesn't just display specific Web pages, but can deliver additional useful information not found on the page.


My verdict on Edge? Given its speed, Reading View, Cortana integration, simple design and eventual ability to use add-ins, it's a winner. For now, it may not render all Web pages correctly, but I expect that will be fixed eventually. When that happens, I may abandon Chrome for it.

Windows Apps on the desktop
One reason Windows 8.1 felt like two separate operating systems was the dramatically different behavior of the apps that were written for the touch interface (now called Windows apps, remember?) and those written for the non-touch desktop. Desktop apps could be run in resizable windows, but Windows apps ran either full-screen, "snapped" next to another Windows app (but not a desktop app), or minimized. So you couldn't have multiple Windows apps running in separate windows on the desktop alongside desktop apps.

That changes in Windows 10. Windows apps can now be resized, minimized and closed in the same familiar way as desktop apps. You can drag the edges of a Windows app to resize it and use the familiar desktop menu on the upper right for minimizing, maximizing and closing the app.



Windows 10 apps
The apps in the Windows touch interface can now be resized the same way that desktop apps can.
Windows apps have been redesigned in another way as well. On the left-hand side of the screen is a series of icons for accessing different features in an app. These icons change depending on the app. For example, the Weather app has icons for news, maps, historical weather and so on. And in the news app there are icons for local news and videos, and for customizing your news interests.

Another improvement: Windows apps in version 8 were low-powered and not particularly useful -- more like simple tablet apps than fully featured desktop apps. In Windows 10, that changes. Some are quite good. You may even find yourself wanting to run them.

Three apps in particular have been powered up: Maps, Mail and Calendar. Mail has been notably improved with a new interface and new features. Unlike the Mail app in Windows 8, it supports POP-based mail. It's also much simpler to manage your mail in it. When reading an email, icons across the top let you reply, forward, delete, archive and flag mail. You can click the menu at the upper right to get at more features, including moving mail, marking it as read, printing and zooming.

Text-formatting features are also better than in the Windows 8 version. When you compose mail, a large toolbar appears at the top of the screen, which lets you change text formatting; undo and redo text changes; insert tables, pictures and links; and attach files. You can also spell check your mail and change its language.


Windows 10 mail

The Mail app's text formatting features have been greatly improved.

Tablet users will be pleased to know that gestures work in the Mail app. Swipe an email to the right to archive it and swipe again from the right to unarchive it. Swipe to the left to flag a message.

The Calendar app is also much improved. I found the Windows 8 version so cluttered and confused-looking it felt unusable. If you wanted to do something simple like change the view (Day, Work Week or Month) it wasn't clear at first how to do it. You had to call up a menu, and then make your choice.

In the Windows 10 version, the Day, Work Week, Week, Month and Today views are all accessible by clicking an icon at the top of the page. I also appreciate that even when looking at a day's calendar, the month view is available on the right side of the screen.


Windows 10 calendar

The new Calendar apps has a much cleaner interface than the previous Windows 8 version.

As with Mail, improvements are more than skin deep. Notably, unlike in the Windows 8.1 version, the new Calendar supports Google Calendar. Just click Setting / Accounts / Add Account, click Google and follow the instructions on-screen. You can add an iCloud calendar in the same way.

Maps is also improved. Travelers who use tablets or laptops will appreciate that you can download maps and use them when you're not connected to the Internet. This is especially useful if you're travelling overseas and want to keep down your data use, or if you know you're going to be somewhere beyond the reach of an Internet connection.



Windows 10 maps

The app is much better designed than previously. Icons down the left let you search for a location or for places such as hotels, restaurants and coffee shops; add a location to a favorites list; get directions for driving, walking or for public transportation; change your settings; and visit what Microsoft calls 3D cities. Go to one of these 3D cities and you'll see a view of it similar to Google Earth. I didn't find them particularly useful, but you can't beat the feature if you want to virtually visit Aix en Provence, Paris or Barcelona. (I passed on Brownsville, Tex. and Abington, Penn.)

On the right side of the Maps app you'll find buttons for zooming in and out, tilting the map, changing its orientation and adding overlays for traffic and other tools.

One piece of big news is that the app now has a Street View-like feature called Streetside, which works much like the Bing Maps Streetside feature. With the addition of Streetside, the Maps app could give Google Maps a run for its money. It has much the same features and integrates well with Cortana. For example, if I tell Cortana, "Give me directions to Ithaca, New York," the Map app launches, complete with directions. If I ask Cortana to see a map of a city, Maps launches to it.
One Settings app to rule them all

In Windows 8.1, if you wanted to change your settings, you had to go on a treasure hunt. Some settings were in the Windows Settings app, which was accessible via the Charms bar, while others were in Control Panel. It was difficult to remember where each setting was located.

In Windows 10, you'll find almost all settings in the Settings app, accessible from the bottom of the Start menu. It's cleanly and logically organized, with nine sections: System, Devices, Network & Internet, Personalization, Accounts, Time & Language, Ease of Access, Privacy and Update & Security. Click on the icon for any section, drill down, and you'll easily navigate to what you need. There's also a search bar so that you can forgo browsing and search for a specific setting instead.


People who do a great deal of customization and tinkering (including me) won't find everything they need in Settings. If you want to assign your PC a static IP address, have your system display files that are normally hidden, display file extensions for common files or access a host of other techie settings, you'll have to go to the old standby, Control Panel. On the other hand, having settings that you don't use much relegated to the Control Panel makes sense, because it makes the main Settings app easier to navigate.
Hello, Action Center

New in Windows 10 is the Action Center, which is accessible via an icon on the right side of the Taskbar. The Action Center performs two functions: It displays notifications for such things as new emails and security and maintenance messages, and it gives you access to a handful of common settings for such tasks as connecting to Wi-Fi networks, turning Bluetooth on and off, and changing brightness settings. The notifications for new email, security alerts and others first appear on their own on the lower right of the desktop and disappear after a few seconds. But they live on in the Action Center, so that you can attend to them there when you want.

For example, if you tap an email notification, the email opens in the Mail app. Tap a security notification, and you'll be taken to the appropriate tool. When I received a notification that I could speed up my PC because three unnecessary programs were launching on startup, I was sent to the Task Manager, which let me stop those programs from running.


Windows 10 action center

The Action Center displays notifications and offers access to commonly-used settings.

At the bottom of the Action Center are icons for making quick changes to common Windows settings. You can turn Bluetooth on and off, change your screen's brightness, and switch between tablet mode and non-tablet mode, among other settings.

Other changes

There have been a lot of other lesser changes in Windows 10. The Taskbar now runs on the Start screen when you're in tablet mode, which helps to unify the tablet and non-tablet interfaces. It's now black, which makes the icons on it stand out more clearly.

File Explorer has seen changes as well. Its icons are more colorful and brighter. You can pin and unpin folders to it on the Start menu. You also get to OneDrive from inside File Explorer; it appears as a folder with subfolders underneath it. And you can share files -- click a file and select Share from the top menu and you get a variety of ways for sharing, including via email and Twitter. You can compress a file and burn it to disc from the same menu.

The Windows Store has also gotten a makeover. The design is simpler, cleaner, even elegant. More important than that, though, is that you can now download and install desktop apps from it, something not previously possible. Microsoft is also making a push to get more apps into the store by introducing what it calls Universal apps that will be able to run on any Windows device, including desktops, laptops, tablets and phones.

Also new is Task View and the ability to create multiple desktops. Tap the small icon just to the right of the Cortana search bar and you'll see all of your currently running apps and applications as thumbnails on the desktop. Click the X on any of the thumbnails to close it.

More importantly, though, you can create multiple desktops, each with different apps and applications running on them. To do that, when you're in Task View, you click New desktop to create a second desktop; you can then run apps and applications inside it. In fact, you can create several desktops; to switch among them, click the Task View icon, and then click the desktop you want to switch to.


Windows 10 task view running
Task View shows all of your currently running apps.

If you've got the proper hardware, Windows 10 supports a biometric security feature that Microsoft calls Windows Hello, letting you log into Windows via a fingerprint scan, face scan or iris scan.

Not everything about Windows 10 is an improvement over Windows 8, though. Whether you like it or not, Windows 10 updates are always automatically installed. In Windows 8 you could pick and choose which updates to install. Not so with Windows 10. What Microsoft sends via Windows Updates gets installed. Case closed.
The bottom line

It's this simple: Windows 10 is a dramatic improvement over Windows 8. It works as single, unified operating system rather than a Rube Goldberg kludge of two operating systems poorly bolted together. It changes its interface depending on whether you're on a tablet or a traditional PC, and runs well on both.

Cortana, despite some shortcomings, is a very worthwhile addition, and the Edge browser gives Chrome a run for its money. Built-in apps are greatly improved.

Despite some bugs and annoyances (like being forced to accept Windows updates), it will be worthwhile to upgrade from Windows 8.1 before July 29, 2016, when Microsoft's one-year free upgrade offer runs out. Windows 7 users should consider upgrading as well, thanks to Cortana, Edge and the advent of useful Windows apps. (That said, you do have that full year to upgrade, and there are compelling reasons to wait a little while.)

As for me, I'm upgrading every Windows device I have to it.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com