Wednesday, 24 February 2016

MB2-866 Microsoft Dynamics CRM 2011 Customization and Configuration


QUESTION 1
You work as a Microsoft Dynamics CRM Implementation Consultant. You have been hired by
ABC.com to plan, customize and deploy a Microsoft Dynamics CRM 2011 solution for the company.
One of your decisions as a consultant is to decide whether to deploy an on-premises solution or
an online solution of Microsoft Dynamics CRM 2011.
Which two of the following statements are true?

A. Offline synchronization with Microsoft Outlook 2010 is not supported by Microsoft Dynamics CRM Online 2011.
B. The Internet lead capture feature is only supported by Microsoft Dynamics CRM Online 2011.
C. Customworkflow assemblies are not supported by Microsoft Dynamics CRM Online 2011.
D. Custom workflow assemblies are not supported by Microsoft Dynamics CRM 2011 onpremises.

Answer: B,C

Explanation:


QUESTION 2
You work as a Microsoft Dynamics CRM Implementation Consultant. You are using Microsoft
Dynamics CRM 2011 to create a solution package.
Which of the following are solution components that you can use in your solution? (Choose all that
apply)

A. Client Extensions.
B. Service Endpoints.
C. Option Sets.
D. Article Templates.
E. None of the above.

Answer: A,B,C,D

Explanation:


QUESTION 3
You work as a project manager at ABC.com. The company uses Microsoft Dynamics CRM 2011
for its customer relationship management solution.
All users in the company use Microsoft Outlook 2010 with the Microsoft Dynamics CRM 2011 for
Outlook client software.
You modify the system settings in Microsoft Dynamics CRM to configure the synchronizing client
option for Outlook.
Which other Outlook settings can you configure using the system settings in Microsoft Dynamics
CRM 2011?

A. You can use Microsoft Dynamics CRM to determine which data is synchronized with the
Outlook folders.
B. You can use Microsoft Dynamics CRM to configure the synchronization schedule.
C. You can use Microsoft Dynamics CRM to configure the email message sending interval.
D. You can use Microsoft Dynamics CRM to configure the interval between the downloading of
Microsoft Dynamics CRM email messages.

Answer: B

Explanation:


QUESTION 4
You work as a Microsoft Dynamics CRM Implementation Consultant. You have been hired by
ABC.com to plan, customize and deploy a Microsoft Dynamics CRM 2011 solution for the
company.
You have been asked to describe some of the features of the Microsoft Dynamics CRM 2011
platform to ABC.com managers.
Which of the following statements about the Microsoft Dynamics CRM 2011 platform is false?

A. The Microsoft Dynamics CRM 2011 platform prevents direct access to the database by
controlling access through the data access layer.
B. The Microsoft Dynamics CRM 2011 platform allows developers to create software to directly
access the underlying database.
C. The Microsoft Dynamics CRM 2011 platform raises events for workflow processes and custom
business logic implementations.
D. The Microsoft Dynamics CRM 2011 platform uses security to control access to objects.

Answer: B

Explanation:


QUESTION 5
You work as a Microsoft Dynamics CRM Implementation Consultant. You have been hired by
ABC.com to plan, customize and deploy a Microsoft Dynamics CRM 2011 solution for the
company.
A developer asks you to describe the customization features of Microsoft Dynamics CRM 2011.
Which three of the following answers describe ways in which you can customize Microsoft
Dynamics CRM 2011?

A. You can useapplication event programming to extend Microsoft Dynamics CRM 2011.
B. You can create custom processes and entities in Microsoft Dynamics CRM 2011.
C. You can use Microsoft Dynamics CRM dialogs to automate business processes.
D. You can create custom forms and charts within Microsoft Dynamics CRM 2011.

Answer: A,B,D

Explanation:

Saturday, 13 February 2016

7 Android tools that can help your personal security

Forget security suites: These sensible tools are all you really need on your phone to stay safe.

This isn't your typical Android security story.

Most articles about Android security tools focus on malware-scanning suites like Lookout, Norton and AVG. But with the layers of protection already built into the platform, those sorts of apps are arguably unnecessary and often counterproductive -- or even needlessly expensive.

For most Android users, the seven tools below should cover all the important bases of device and data security. Some are third-party apps, while others are native parts of the Android operating system. They all, however, will protect your personal info in meaningful ways -- and without compromising your phone's performance. Plus, all but two of them are free.

(If you're an enterprise-level user, of course, your company may require extra layers of protection to safeguard shared data and separate personal info from corporate property -- but that's a whole other can of worms.)

Your mission, should you choose to accept it: Make your way through this list, then tighten up your Google account security settings -- and breathe easy. Security doesn't have to be scary.

1. Android's own screen pinning system

One of Android's most useful security tools is also one of its most easily overlooked. Screen pinning made its debut with Google's Android 5.0 Lollipop release in 2014 -- but I'm willing to bet the vast majority of Android phone-owners either have forgotten all about it or never even realized it existed in the first place.

Let's fix that, shall we? Screen pinning is designed for those moments when you want to hand someone your phone -- to look at a photo, check something out on a Web page or maybe make a quick call -- without taking the chance of them poking around and getting into your personal stuff.

Take a minute and make sure the feature's activated now so it'll be ready when you need it: Just head into the Security section of your system settings and look for the option labeled "Screen pinning." Tap that line, then check to see that the toggles are activated next to both "On" and "Ask for unlock pattern before unpinning."

You activate the screen pinning feature in the Security section of Settings (left). Go to Recent Apps, scroll up and tap the pushpin key to lock your phone to that app (right).

The next time you need to pass your phone to someone, first open the app you want them to be able to use. Then tap the Recent Apps key (the typically square-shaped icon next to the Home key). Your app should be in front as the most recently opened app; just scroll upwards until you see a circular pushpin icon.

Tap that pushpin, and you're all set: Your phone is now locked to that app and that app alone. In order to do anything else on the device, you'll need to tap and hold the Back and the Overview key at the same time and then enter your pattern, PIN or password to continue.

2. A password management app

Perhaps the greatest risk to your personal security is the use of weak or frequently repeated passwords. We all have about a billion passwords to our names these days, and it's virtually impossible to make each one strong and unique without a little help.

Well, here's your knight in shining armor: a password management app like LastPass. LastPass makes it dead simple to generate and store strong passwords for every site you sign into. It'll even fill the passwords in for you across all the apps on your phone (and do the same on your tablet, laptop or desktop system as well). The program uses advanced encryption to keep your info safe; all you have to do is remember a single secure password to unlock your vault at the start of each session.

LastPass costs $12/yr. for the full premium version, which is what most people will want. Other popular password managers include 1Password and Dashlane, though the former is less polished and user-friendly than LastPass while the latter is significantly more expensive, at $40/yr. for the full set of features.

3. A two-factor authentication utility

No matter how secure your passwords may be, they'll never be bulletproof. Adding a second layer of protection is the best way to keep unwanted intruders out -- and it's really quite easy to do.

The dual-layer protection process is known as two-factor authentication, and it basically means that in order to get into your most important accounts -- like those on Google, Dropbox, a variety of financial institutions and even password management apps like LastPass -- you'll need both your regular password and a second temporary code generated by a device only you would have. With the combination of those two keys, the odds of someone else being able to pick your virtual lock is impressively low.

A free app called Authy is a great place to get started, as it's intuitively designed and able to run on your phone, tablet and even your desktop or laptop system if you'd like. Google also has its own Authenticator app for Android, but it's far less versatile and pleasant to use than Authy's offering.

4. Android's Smart Lock feature

Securing your phone with a pattern, PIN or password is important; we all know that. But having to put in that code every time you want to use the device can get annoying fast -- so it's no surprise a lot of people opt to skip the hassle and just leave their phones unprotected.

Android's Smart Lock feature gives you the best of both worlds by cutting down on the annoyance factor while still allowing you to keep your phone secured when it really counts. You can choose to have your phone remain unlocked whenever you're in a trusted location, like your home, or anytime you're connected to a trusted Bluetooth device, like a smartwatch that's always on your arm or a stereo that's inside your car. You can even opt to have the device stay unlocked if it hasn't left your pocket or purse since you last put in your passcode.

Android's Smart Lock tool gives you a variety of ways to keep your content safe without too much trouble (left). You can even opt to have the device stay unlocked if it hasn't left your pocket (right).

Any time you aren't in one of those secure situations, your phone automatically locks itself and requires your code to get in. And that's the end goal that matters.

Look for Smart Lock in the Security section of your system settings (on Android 5.0 or higher) to get set up.

5. Android's advanced app-scanning feature

You wouldn't know it from all the third-party companies peddling anti-virus software for smartphones, but Android has actually had its own native malware-scanning system in place since 2012. In addition to checking apps for potentially harmful code when they're installed, the OS can continuously scan your device over time to make sure nothing problematic ever pops up.

All you have to do is opt in by going into the Google section of your system settings (or into a separate app called Google Settings, if you have an older device). Select "Security" and then activate the "Scan device for security threats" option, if it isn't already activated. That's it: Your device and the software already on it will handle the rest.

(It's worth noting that this system works in conjunction with a server-side system that scans all apps uploaded to the Google Play Store before you ever see them. All Android devices also automatically watch for signs of SMS abuse, and the Chrome Android browser keeps an eye out for dangerous sites on the Web.)

6. Android Device Manager

Another important security tool Android provides is one that can find, ring and even remotely lock or erase your phone from a computer or other mobile device.

The tool is called Android Device Manager, and it's already on your smartphone and waiting to be used. Confirm that you have it enabled by going into the Google section of your system settings (or into the separate app called Google Settings) and then selecting "Security." You'll want both options under "Android Device Manager" to be activated.

The Android Device Manager can locate your device, have it ring (so you can find it) and, in the worst case, erase all the contents.

Now, if you ever lose your device, just open up the Android Device Manager website or Android Device Manager app (from another phone or a tablet) to track and secure it.

7. An Android VPN client

This final item isn't one everyone needs, but if you spend a lot of time surfing the Web through open Wi-Fi networks -- at airports, hotels or other public places -- it's worth considering. A VPN, or virtual private network, encrypts all of your data and keeps strangers from snooping in and seeing your personal info.

It can allow you to mask your actual IP address and location, too, and thus access websites and services that might normally be blocked in your area -- something that could be relevant and beneficial for some users.

Android has a fair number of VPN clients available, but the one I'd recommend looking at is an app called SurfEasy. A big part of the reason is trustworthiness, especially for an app of this nature: SurfEasy is owned and operated by the same company behind the Opera browser -- in other words, a known and reputable organization. But beyond that, the app is exceptionally simple to use and also reasonably priced, with plans starting at $3/mo. for unlimited use on a single device.

All said and told, taking into account everything on this list, that brings your grand total for personal Android security to a whopping $1 to $4 per month. And you know what? That's a small price to pay for practical peace of mind.

Wednesday, 10 February 2016

650-128 CGAM Authorized Connected Grid Account Manager Knowledge Verification

650-128 CGAM Authorized Connected Grid Account Manager Knowledge Verification

Exam Number 650-128
Duration 30 minutes (20-25 questions)
Available Languages English

This exam will test the knowledge of account managers regarding the features, functions, and design of the Cisco Connected Grid technology solution. There will be a focus on the features and benefits of the Cisco 2010 Connected Grid Router (CGR 2010) and the Cisco 2500 Series Connected Grid Switch (CGS 2500). How these products are positioned within energy and utility companies and how to identify new opportunities and set customer expectations will also be covered on this exam.

Exam Topics
The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

Introduction to Cisco Connected Grid Go-to-Market and Product Positioning
How to Sell
Cisco Connected Grid Ordering and Support
Cisco Connected Grid Solutions

QUESTION 1
Which of these trends is the main driver toward smart grid technology?

A. increased supply, which requires the integration of distributed generation sources
B. reduced demand, which causes an increase in demand and peak load
C. compliance with regulations involving government funding and rules
D. increased carbon footprint

Answer: C

Explanation:


QUESTION 2
How many levels or types of priority can be assigned on a Cisco TAC case?

A. 1
B. 2
C. 4
D. 3

Answer: C

Explanation:


QUESTION 3
Which statement reflects the overall Cisco Smart Grid vision?

A. Sell the existing Cisco IP-based products from end-to-end of our utility customer's smart grid
deployments.
B. Design and architect an end-to-end communications infrastructure that is integrated with the
power grid.
C. Integrate intelligent routing protocols into existing electrical grids.
D. Create a single infrastructure for unified communications from electrical generation plants to all
primary and secondary substations.

Answer: D

Explanation:


QUESTION 4
Which of these is a grouping of elements that are part of the Cisco Substation Automation
solution?

A. multi service communications networks
B. protection and control, auto meter reading, data analysis
C. protection and control, grid monitoring, multi service communications networks data center and
customer call centers
D. customer call centers, electrical auto recharging, home energy management

Answer: C

Explanation:


QUESTION 5
Which of these is part of mission critical substation communications (Operation Data)?

A. physical security alarm
B. workstation email
C. physical access (deny access)
D. fault detection and restoration

Answer: D

Explanation:

Thursday, 4 February 2016

650-082 MITSE Mobile Internet Technology for System Engineers

Exam Number 650-082
Duration 60 minutes (55-65 questions)

This exam will test System Engineer's knowledge of features, functions and design of the Cisco ASR 5000 mobile internet solution. There will be a focus on design and planning for deployment. Candidates should prepare for this exam by taking the Mobile Internet Technology for Account Managers course as the MIT SE exam covers content from both the AM and SE training courses.

Exam Topics
The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

Describe ASR 5000 Hardware and Software
Describe Understanding the StarOS Command Line Interface (CLI)
Describe Software Licensing and Upgrade
Describe ASR 5000 Core services for GPRS/UMTS - SGSN and GGSN Functionalities
Describe the Design and Implementation of xGSN
Describe Billing & Policy
Describe Statistics and Alarms
Describe Services Overview
Describe the Design and Implementation of LTE


QUESTION 1
What Cisco ASR 5000 services are needed for communication between a Serving Gateway and
Packet Data Network Gateway?

A. EGTP and GTPU
B. GTPU and PGW
C. SGW and GTPU
D. EGTP and SGW

Answer: B


QUESTION 2
Which option helps to define activities that are needed to successfully deploy and operate Cisco
technologies?

A. Smart Services
B. Cisco lifecycle Services
C. TAC
D. Cisco Technical Services

Answer: A


QUESTION 3
Which card has the resources to run multiple services?

A. system management card
B. switch processor I/O card
C. packet service card
D. redundant crossbar card

Answer: C


QUESTION 4
Which of these statements about the Web element Manager is true?

A. Clients can connect only by using the internet explorer or Safari Web browser.
B. The application provides FCAPS.
C. Fault management implements an easy-to-use point-and-click GUI to provide configuration for
one or more systems.
D. Supported accounting management operation system allow user to examine and perform real
time statistical analysis.

Answer: C


QUESTION 5
Which controller task is used to facilitate IP routing across and within contexts?

A. Session controller
B. Drive controller
C. VPN controller
D. Resource management controller

Answer: A

Thursday, 28 January 2016

Exam MB6-889 Microsoft Dynamics AX 2012 Service Management

Published: April 26, 2012
Languages: English
Audiences: Information workers
Technology: Microsoft Dynamics AX 2012
Credit toward certification: MCTS

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Manage service agreements (13%)
Create a service agreement header
Understand the use and impact of project management, project accounting and validation settings; set up project or category validation; set up or use service agreement groups; create service agreement headers
Create service agreement lines
Create new service agreement lines, search for service agreement lines to copy, understand the concept of service objects, set up service object groups, create service tasks, create service object relations or service task relations, specify service task notes
Create a service agreement from another source
Copy lines from another service agreement, create service templates and service template groups, copy a service template into a service agreement, create a service agreement from a sales order

Preparation resources
Working with service agreements [Microsoft Dynamics AX 2012]
Create service agreements [Microsoft Dynamics AX 2012]
Create service-agreement lines manually [Microsoft Dynamics AX 2012]

Manage service orders (13%)
Set up service parameters
Define settings for service order creation, set up service order default activities, set up service stages, set up and view stage reason codes
Create a service order manually
Create service order headers, create service orders or service order lines manually, create service object relations or service task relations with service orders, create CRM activities when creating service orders
Create a service order automatically
Combine service orders, describe service intervals, describe and use time windows, create a service order from a service agreement or sales order
Manage a service order
Process service orders; create item requirements; cancel or delete service orders; post a service order from a service order, service agreement, or project; post a service order to a project; invoice service orders

Preparation resources
Create service orders manually [Microsoft Dynamics AX 2012]
Create or modify service orders and repair lines [Microsoft Dynamics AX 2012]
Create service orders automatically [Microsoft Dynamics AX 2012]

Manage Service Level Agreements (SLAs) (12%)
Set up SLAs
Create SLAs, view information about SLAs and service orders, create service agreement groups, filter service agreements by group
Set up time recording
Start, stop, and restart time recording; create reason codes; understand the process of service order sign-off; define the different service order stages; use service order stages to stop time recording

Preparation resources
About Service Level Agreements [Microsoft Dynamics AX 2012]
Create service agreement groups [Microsoft Dynamics AX 2012]

Manage the Service Dispatcher (14%)
Set up the Dispatch board
Set a preferred technician, create activity types, create dispatch teams and assign resources, describe the concept of color-based priorities, set the default date interval on the Dispatch board
Manage service orders by using the Dispatch board
Describe service order integration, create new service orders and assign activity types, set a default start time on service order headers, set default values on service orders
Manage activities by using the Dispatch board
Describe activity management in the Dispatch board, create activities on lines, perform typical activity actions, assign time values to activities, reassign activities, change time assignments, monitor activities, view undispatched activities, jump between forms to view activities

Preparation resources
About the Dispatch board [Microsoft Dynamics AX 2012]
Set up service activity types [Microsoft Dynamics AX 2012]
Dispatch board (form) [Microsoft Dynamics AX 2012]

Manage repairs (12%)
Set up a management process
Understand the repair management process; set up or define symptom areas, symptom codes, and conditions for specified symptoms; set up diagnosis areas and diagnosis codes
Diagnose and repair
Set up resolutions and repair stages, create and finish repair lines, create service order transactions for repairs

Preparation resources
About repair management [Microsoft Dynamics AX 2012]
Service management - Repair configuration key (SMARepair) [Microsoft Dynamics AX 2012]
View service repair lines [Microsoft Dynamics AX 2012]

Manage bills of materials (BOMs) versioning (11%)
Create and modify a template BOM
Create or modify template BOMs
Create and modify a service BOM
Create service BOMs, describe the functions available for service BOMs, move a service BOM from one service object relation to another, update service BOMs, view service BOM reports, replace component items, modify service BOMs by using the BOM Designer

Preparation resources
Create a template BOM [Microsoft Dynamics AX 2012]
Setting up and maintaining bills of materials [Microsoft Dynamics AX 2012]
Modify a service BOM [Microsoft Dynamics AX 2012]

Manage service subscriptions (12%)
Create and modify subscriptions and transactions
Create subscription groups, subscription fee categories, or subscriptions; create and invoice projects; create or adjust subscription fee transactions; set up or update an indexed base price for a subscription
Manage subscription revenue
Invoice subscription fee transactions, create credit notes for subscription transactions, accrue revenue from subscription fee transactions, reverse subscription accruals, examine ledger transactions and posting of accrued revenue, set up subscription parameters

Preparation resources
About service subscriptions [Microsoft Dynamics AX 2012]
About subscription groups [Microsoft Dynamics AX 2012]
Accrue subscription revenue [Microsoft Dynamics AX 2012]

Manage services in the Enterprise Portal (13%)
Manage service orders in the Enterprise Portal for technicians
Describe service order management in the Enterprise Portal; create, access, or edit service orders; create or edit service order lines; create repair lines; view repair lines, object relation lines, and task relation lines; view service agreements; describe Role Center concepts
Manage service orders in the Enterprise Portal for customers
Access and view the status of service orders in the Enterprise Portal, create service orders, view subscriptions, review web service orders, transfer web service orders to the service orders form

Preparation resources
What's new: Enterprise Portal in Microsoft Dynamics AX 2012
About Enterprise Portal roles and user groups
Verify a service web order and assign it to a technician [Microsoft Dynamics AX 2012]


QUESTION 1
You are reviewing a service order to determine whether it is in compliance with the associated service level agreement.
What does the Compliance value shown in the service order header represent?

A. The number of hours of work completed on the service order.
B. The percentage of hours remaining compared to the limit of the service level agreement.
C. The percentage of hours completed on the service order compared to the limit of the service level agreement.
D. The number of hours remaining within the limit of the service level agreement.

Answer: C

Explanation:


QUESTION 2
You are configuring service level agreements in Microsoft Dynamics AX 2012.
What is the purpose of the Calendar setting on a service level agreement?

A. To determine whether a service order can be automatically created for the service agreement
B. To determine the start time of an incoming service order.
C. To determine the sign-off date of an incoming service order.
D. To determine whether the status of an incoming service order will be set to Started.

Answer: A

Explanation:


QUESTION 3
You suspend a service level agreement (SLA) in Microsoft Dynamics AX 2012.
What is the result?

A. The SLA cannot be assigned to service agreements or service agreement groups.
B. The SLA cannot be assigned to service agreements but can be assigned to service agreement groups
C. The SLA cannot be assigned to service agreements but can be assigned to service orders.
D. The SLA cannot be assigned to service agreements or service orders.

Answer: A

Explanation:


QUESTION 4
Which of the following is a result of cancelling the service level agreement on a service order in Microsoft Dynamics AX 2012?

A. The service order is signed off.
B. The status is set to blank.
C. The time recording records are deleted.
D. The service stage is set to Cancel.

Answer: C

Explanation:


QUESTION 5
You are working with service orders in Microsoft Dynamics AX 2012.
In which situation will advancing the service order stage stop time recording?

A. If Stop time recording is selected for the service stage.
B. If the service order has no lines.
C. If the service order stage is changed to Cancel.
D. If Cancel is selected for the service stage.

Answer: A

Explanation:

Friday, 8 January 2016

How to disable impending IE nag notices

Outdated IE editions on Windows 7 will open a new tab with download page to IE11
Next week, Microsoft's Internet Explorer browser (IE) will begin displaying nag notices to users who have not upgraded to the latest available for their operating system.

Users can disable those notices and continue running retired editions without the disruption of the in-browser warnings.

On Jan. 12, Microsoft will deliver the final security updates for IE8, IE9 and IE10 on Windows 7 Service Pack 1 (SP1) to make good on an August 2014 announcement that it would shut off patches and other support for those browsers on the OS. Other versions of Windows will also show the nags to users still running older editions of IE: Those running Windows Vista, for example, will see the alert if they are still on IE7, the browser that was originally bundled with the 2006 operating system, or on IE8, the 2009 follow-up.

The code to display the notifications will be bundled with the cumulative security updates slated to release Tuesday for the affected browsers.

According to Microsoft employee Steve Thomas, the nag will appear in a new tab when an out-of-date IE is launched. The tab will open to the appropriate page on Microsoft's website where the user can download the latest version of the browser; in most cases, that will be this page for downloading IE11.

The tab will reappear 72 hours later if the user ignores the recommendation to upgrade and closes the tab.

Last month, Microsoft published a support document that outlined how enterprises could disable the notification, presumably because they were still in the midst of their upgrade to IE11 on Windows 7, or had paid Microsoft for a custom support plan that will give them security patches for the retired browsers after the public expiration date of Jan. 12.

Anyone who wants to continue running an outdated edition can use the same instructions to switch off the in-IE nags.

To disable the notices, users must edit the Windows registry, a chore best left to advanced users and only after backing up the device; an error in the registry can cripple the computer.

In Windows 7, that can be done by adding the new registry key:

FEATURE_DISABLE_IE11_SECURITY_EOL_NOTIFICATION

to the registry subkey:

HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL

and then under the new key, this entry:

iexplore.exe = 1

The soon-to-retired browsers will continue to work after Jan. 12, although no further security updates will be provided for them. That means -- assuming Microsoft does not release an emergency "out-of-band" update in the coming weeks -- that the retired versions of IE will be as safe as Microsoft can make them until the next Patch Tuesday, which is slated for Feb 9. At that point, the older versions will have fallen behind on patches.
Certkingdom Reviews

Saturday, 2 January 2016

The app dev undead: 5 technologies limping along

Famo.us, io.js, JavaFX, Objective-C, and Spring.Net have all faded away, but for different reasons

Sometimes, technologies are introduced to great fanfare and then, well, fizzle.

For whatever reasons, they do not gain much momentum or get displaced by a theoretically better successor. Not all are inferior tools -- in fact, they may even be superior to what was already available. However, superiority and innovation don't always translate to successful adoption, though some establish cult followings.

The year, we've seen five such technologies aimed at developers fail to live up to their initial promise and thus fade away.

Famo.us: Rich Web tools can't displace native apps

Last year, Famo.us was flying high and looked to give native mobile app development a run for its money. Equipped with a 3D physics-based animation engine, Famo.us positioned its open source JavaScript framework as taking Web development for mobile to the next level and simplifying the building of complex UIs.

The company scored tens of millions of venture-capital dollars and looked to make a killing with a wrapper service for mobile apps. But lately, Famo.us has has gone proprietary, abandoning its open source focus. The company’s open source team was fired, in fact. Famo.us also abandoned its wrapper-service business model in favor of micro-app development and the Famous Micro-App content management system for digital marketers.

Despite the product shift, Famo.us CEO Steve Newcomb says the technical vision remains the same: building native interfaces with Web technologies. Still, the huge impact that Famo.us promised simply didn't happen.

io.js: Ugly divorce resulted in a strengthened marriage

Spun out as a fork of the Node.js server-side JavaScript platform in late 2014, io.js was intended to expand the horizons of the Node realm after devotees got tired with the platform's slow pace of change and restrictive governance model.

Io.js was going to change all that. But the divorce did not last. The two factions, which included some of the same people, agreed to make up this spring; previous releases of io.js are now considered Node releases. Node.js itself did move to the jurisdiction of the Node.js Foundation rather than its original governor, the application virtualization vendor Joyent.

Everybody appears happy with the resolution, and the months of dissonance had no significant consequences on developers.
JavaFX: The rich Internet technology that never took off

Introduced with lofty expectations by Sun Microsystems in 2007, JavaFX was Java's entrant into the rich client application space that Macromedia's Flash and Microsoft's now-all-but-dead Silverlight then dominated. Although it has a loyal following and still exists, JavaFX never took off.

Over the years, JavaFX has been eclipsed by Web technologies such as JavaScript and even Flash (which has problems of its own and is on the road to obsolescence). JavaFX's decline started years ago: Oracle discontinued JavaFX Script, a scripting language associated with the platform, in 2010.

"It is a technology with relatively narrow appeal. We are seeing less and less Java at the front end outside of Android in terms of new projects, and the various Java front-end technologies are not expected at this point to be a major influence,” said IDC analyst Al Hilwa. Indeed, a 2014 thread in Reddit asked, "Why is JavaFX being continued? Nobody uses it." And a recent search on Dice.com found only 30 job postings that mentioned JavaFX skills.

Objective-C: Apple replaced it with Swift

This venerable language has been best known as a platform for developing applications for Apple's software platforms, particularly the popular iOS smartphones and tablets. But with Apple's introduction of the successor Swift language in June 2014, the writing has been on the wall that Objective-C shall decline.

Although there were still more than 6,400 jobs citing Objective-C skills on Dice.com recently, the language has been tanking on the Tiobe index of language popularity, dropping from third place a year ago to 15th place this month. During that time, Swift rose from 17th place to 14th place. Objective-C also has been dropping on the rival PyPL index.

Although Objective-C will be around for a while, it is certain that new development that might have been the domain of Objective-C before will move over to Swift -- because Apple has decreed it so.

Spring.Net: Bounced around, then essentially abandoned

Derived from the popular Spring Framework for Java development, the Spring.Net open source framework enables development of enterprise .Net applications via Spring technologies.

But it has changed hands over the years. In 2009, VMware acquired SpringSource, which developed Spring technologies. Later on, VMware spun out Pivotal, which got jurisdiction over Spring. These days, the Spring.Net community leads the Spring.Net project, according to Pivotal.

A check of the Spring.Net site, though, features on its front page an announcement from December 2012: "We are pleased to announce that the M2 (Milestone 2) release of Spring .Net 2.0.0 is now available." The Downloads page shows version 1.3.2 was the latest production release. The Twitter feed has not seen any activity since March 2014.

Oracle, meanwhile, has been busy trying to persuade Spring Framework Java users to switch to Java EE, arguing that Spring no longer offers developers advantages over Oracle's enterprise Java, such as dependency injection, which Spring had first. The lack of movement at Spring.Net certainly gives Oracle's argument practical credence.
Certkingdom 20% Discount Promotion Coupon Code: 45K2D47FW4