Tag: Operating system

Microsoft Names Satya Nadella Its New CEO

Microsoft Names Satya Nadella Its New CEO:

Microsoft Corp.  Announced that its Board of Directors has appointed Satya Nadella as Chief Executive Officer and a member of the Board of Directors effective immediately.  Before being named CEO in February 2014, Nadella held leadership roles in both enterprise and consumer businesses across the company.

Satya Nadella

Joining Microsoft in 1992, he quickly became known as a leader who could span a breadth of technologies and businesses to transform some of Microsoft’s biggest product offerings.

Most recently, Nadella was executive vice president of Microsoft’s Cloud and Enterprise group. In this role he led the transformation to the cloud infrastructure and services business, which outperformed the market and took share from the competition. Previously, Nadella led R&D for the Online Services Division and was vice president of the Microsoft Business Division. Before joining Microsoft, Nadella was a member of the technology staff at Sun Microsystems.

Satya

Originally from Hyderabad, India, Nadella lives in Bellevue, Wash. He earned a bachelor’s degree in electrical engineering from Mangalore University, a master’s degree in computer science from the University of Wisconsin – Milwaukee and a master’s degree in business administration from the University of Chicago. He is married and has three children.

“During this time of transformation, there is no better person to lead Microsoft than Satya Nadella,” said Bill Gates, Microsoft’s Founder and Member of the Board of Directors. “Satya is a proven leader with hard-core engineering skills, business vision and the ability to bring people together. His vision for how technology will be used and experienced around the world is exactly what Microsoft needs as the company enters its next chapter of expanded product innovation and growth.”

Since joining the company in 1992, Nadella has spearheaded major strategies and technical shifts across the company’s portfolio of products and services, most notably the company’s move to the cloud and the development of one of the largest cloud infrastructures in the world supporting Bing, Xbox, Office and other services. During his tenure overseeing Microsoft’s Server and Tools Business, the division outperformed the market and took share from competitors.

all

Microsoft is one of those rare companies to have truly revolutionized the world through technology, and I couldn’t be more honoured to have been chosen to lead the company,” Nadella said. “The opportunity ahead for Microsoft is vast, but to seize it, we must focus clearly, move faster and continue to transform. A big part of my job is to accelerate our ability to bring innovative products to our customers more quickly.”

“Having worked with him for more than 20 years, I know that Satya is the right leader at the right time for Microsoft,” said Steve Ballmer, who announced on Aug. 23, 2013 that he would retire once a successor was named. “I’ve had the distinct privilege of working with the most talented employees and senior leadership team in the industry, and I know their passion and hunger for greatness will only grow stronger under Satya’s leadership.”

Microsoft also announced that Bill Gates, previously Chairman of the Board of Directors, will assume a new role on the Board as Founder and Technology Advisor, and will devote more time to the company, supporting Nadella in shaping technology and product direction. John Thompson, lead independent director for the Board of Directors, will assume the role of Chairman of the Board of Directors and remain an independent director on the Board.

Nadella addressed customers and partners for the first time as CEO during a Customer and Partner Webcast event.

https://az169342.vo.msecnd.net/events/2014/1402/PublicEvent/media/Customer_Partner_Webcast_1000k.mp4

How peoples’ lives are changed through Microsoft technology with a Super Bowl ad. This one-minute ad celebrates what technology can do, and is narrated by Steve Gleason, former NFL player and post-Katrina hero of the New Orleans Saints, now living with ALS. Steve narrates the spot in the same way he communicates daily — using his Surface Pro to speak, via eye tracking technology

Source: Microsoft

McAfee ePO Installation errors

McAfee ePO Installation errors:

I had encountered three problems when installing McAfee ePO 4.5, 4.6 & 4.6.6 on Windows 2008 server standard edition R2.

Problem 1: SQL2005 backward compatibility:
McAfee ePO comes with SQL 2005 express, however you will encounter a problem of unable to install the SQL 2005 backward compatibility on Windows 2008 server R2 standard edition. You have to install SQL 2008 otherwise ePO installation cannot be preceded.

Problem 2: 8.3 naming convention was disabled:

8.3 naming error

You need to modify the registry to enable the 8.3 convention. 8.3 naming is needed for the tomcat service.

computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem\NtfsDisable8dot3NameCreation from 2 to 0

regedit-naming-convention

Another method which is easier – is to use fsutil.exe.

set-8dot3-naming-cmd

NOTE:  While installing McAfee ePO 5.0, it won’t throw 8.3 naming convention error.

Problem 3: Setup is unable to access UDP port 1434:

This problem will arise while installing all versions of McAfee ePO 4.5, 4.6. 4.6.6 and 5.0.

SQL error

To resolve above error, we have to start SQL server browser service. By default SQL server browser is disabled. SQL Server Network Configuration protocols TCP/IP to be enabled, this protocol also by default disabled.

Go to Start -> All programs -> MS SQL Server 2008R2 ->Configuration Tools ->click on Configuration Manager (for details see the image given below)

SQL server config Manager

SQL sever config Manager 2

SQL sever config Manager 3

Once  changes done we have to restart the SQL server service (see the below image)

SQL sever config Manager 4

That’s it, further click Next… Next finish the installation.

Happy computing….

From here forward, McAfee will be known as Intel Security.

Intel_McAfee_Security

Source: Microsoft, cyruslab, McAfee, McAfee community

 

CYOD – Choose Your Own Device:

CYOD – Choose Your Own Device:

The organisation offers employees a choice of devices (which are likely to be from multiple manufacturers on multiple operating systems), with the organisation retaining ownership of the SIM/contract. The device can then be used by the employee for both business and personal use, with policies set centrally to manage usage.

CYOD is less about devices and more about people.

CYOD is a flexible policy where:

  • The business can expand the range of ‘company approved’ devices offered to the employee
  • Or alternatively the business can make a contribution to the employee’s own choice of device
  • Ultimately there is one dual purpose device for personal and business usage
  • Crucially the businesses own the SIM and contract for greater visibility, control and potentially lower costs.

CYOD - 1

Choose-Your-Own-Device (CYOD) overcomes the limitations of BYOD and builds upon its advantages

A CYOD policy allows IT managers to provide their employees with a menu of devices, all of which the organization will support. CYOD, therefore, gives employees a real choice in their preferred computing or mobile device, while still limiting the variety of devices that the IT department needs to work with.

 In this way, CYOD bridges the gap between the unregulated device choice and the IT department’s need to manage and secure the organization’s IT assets.

 CYOD standardizes security and management over a range of IT-approved devices. It can help businesses manage the deployment of multiple device options with the right configurations easily. 

CYOD-2

The CYOD phenomenon also provides a credible alternative to Bring Your Own Device (BYOD) concept.

 CYOD not only overcomes the limitations of BYOD, but it further builds upon the latter’s advantages. When organizations choose CYOD, they ensure that only the most up to date and secure versions of operating systems and apps are accessed by all employees. It is a win-win situation for employees – who get to choose a device of their preference – and the IT manager.

cyod survey

CYOD – Choose Your Own Device

DBYOD – Don’t Bring Your Own Device

BYOD – Bring Your Own Device

The key benefits of CYOD over BYOD:

  • Centralised estate management – centralised billing from a primary network provider enables a single source of billing and interrogation, greater visibility of tariff costs, personal usage and operating efficiency.
  • Reduced mobile call costs – users will benefit from reduced rates for International/roamed calls compared to standard call rates on a (BYOD) consumer tariff.
  •  Increased productivity – employees are able to select the device that they want to use which offers the user experience and functionality that suits them.
  • Clearer liability – as the company owns the SIM and associated tariff it can ensure that its usage policy and limits can be applied for personal usage and also capped for international or roaming charges. Retaining control of the SIM eliminates several grey areas around the disclosure of usage information.
  • Enterprise retains control – by owning the SIM, IT can exert much greater control over expenditure, contract negotiation, compliance, security requirements and costs.

 

BYOD Matrix

Also, by overcoming the unique set of challenges that BYOD comes with, CYOD is definitely the next step in procuring client PCs for any progressive organization.

 

Source: azzurricommunicationschooseyourowndeviceinsightciol,

How to Create a New Hard Drive Partition: Windows 8

How to Create a New Hard Drive Partition: Windows 8

Disk partitioning is the act of dividing a hard disk drive (HDD) into multiple logical storage units referred to as partitions, to treat one physical disk drive as if it were multiple disks, so that different file systems can be used on each partition

HDD Partition

Benefits of having multiple Partitions:

Creating more than one partition has the following advantages:

  • Separation of the operating system (OS) and program files from user files. This allows image backups (or clones) to be made of only the operating system and installed software.
  • Keeping frequently used programs and data near each other.
  • Having cache and log files separate from other files. These can change size dynamically and rapidly, potentially making a file system full.
  • Use of multi-boot setups, which allow users to have more than one operating system on a single computer. For example, one could install Linux, BSDMac OS XMicrosoft Windows or other operating systems on different partitions on the same HDD and have a choice of booting into any compatible operating system at power-up.
  • Protecting or isolating files, to make it easier to recover a corrupted file system or operating system installation. If one partition is corrupted, other file systems may not be affected.
  • Raising overall computer performance on systems where smaller file systems are more efficient. For instance, large HDDs with only one NTFS file system typically have a very large sequentially accessed Master File Table (MFT) and it generally takes more time to read this MFT than the smaller MFTs of smaller partitions.
  • Partitioning for significantly less than the full size available when disk space is not needed can reduce the time for diagnostic tools such as checkdisk to run or for full image backups to run.
Disadvantages of multiple partitions:
  • Reduces the total space available for user storage on the disk, as it forces the operating system to duplicate certain file system administration areas on the disk for each partition.
  • Reduces overall disk performance on systems where data is accessed regularly and in parallel on multiple partitions, because it forces the disk’s read/write head to move back and forth on the disk to access data on each partition and to maintain and update file system administration areas on each partition. It also prevents disk optimizers from moving all frequently accessed files closer to each other on the disk, which could reduce the number and distance of required head movements. Files can still be moved closer to each other on each partition, but those areas themselves will still be far apart on the disk. This issue does not apply to Solid-state drives as access times on those are neither affected by nor dependent upon relative sector positions.
  • Increases disk fragmentation because it lowers the average size of continuous free blocks on each partition – as compared to a single partition of the same overall size – after the same amount of data has been written to them.
  • May prevent using the whole disk capacity, because it may break free capacities apart. For example, if you have a disk with two partitions, each with 3 GB free (hence 6 GB in total), you can’t copy a 4 GB DVD image file on that disk, because none of the partitions will actually provide enough space for that – even though you have more than enough free capacity in total on the disk. If the same files on those two partitions would have been stored on a single partition spanning the whole disk, then the 4 GB file could be easily stored in the 6 GB of free space.
  • Hurts portability and might impose constraints on how entities might be linked together inside the file system.

Creating a Partition on Windows 8:

Hold the Windows logo key on your keyboard and press “R” (Winkey+R). This will launch the Run the utility. Type “diskmgmt.msc” inside the text box and press Enter. This will open the Windows Disk Management utility. This is where you can format, create, and delete hard drive partitions.

1In order to create a partition, you need unallocated space. Unallocated space is basically disk space that is not formatted or not prepared for storage. Formatting is the act of preparing a disk space for storage. It’s similar to establishing a foundation for a place to be inhabited. Thus, unallocated space is just useless blank space with no “foundation” or format.

To create unallocated space, you need to shrink your hard drive. When you shrink your hard disk, the remaining space becomes unallocated.

To do this, right-click your main drive and select “Shrink Volume.”

2

Now you need to enter the amount you want to shrink the hard disk by in megabytes (1000 megabytes = 1 gigabyte). For example if you want to create a 1 gigabyte partition, enter 1,000 megabytes in the text box. Now click “Shrink.”

The Disk Management Utility will show you the maximum amount of shrink space available. That’s the maximum size that can be allocated to the new partition.

3

You will then see the region of unallocated space (shaded black). Please note that  this space is not yet usable

4

Now you need to create “new volume” and format  the unallocated space. This will allow for the space to become usable.

Right-click the region of unallocated space and select “New Simple Volume.”

5

This will launch the New Simple Volume Wizard. This will guide you through the installation process.

6

Assign the disk a drive letter. You can choose any drive letter that is not currently in use.

7

Select a file system for the disk. The file system is basically the type of format or “foundation” the storage device has. If you plan on installing a Windows OS to the partition select the “NTFS” file system.

8

Name the partition in the “Volume Label” text box.  You can choose any name for your partition.

Now click “Finish” to create the new partition.

9

Source: Wikipedia, technorms

Microsoft warns of security risk:Disable Windows Sidebar and Gadgets on Vista and Windows 7

Microsoft recommending that all users disable the Windows Sidebar and Gadgets — immediately.

“Disabling the Windows Sidebar and Gadgets can help protect customers from vulnerabilities that involve the execution of arbitrary code by the Windows Sidebar when running insecure Gadgets,” states a security advisory released July 10 by Microsoft.

An attacker who successfully exploited Gadget vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Gadget/widget:

Gadgets are those little mini-applications, resembling animated icons that hang around the desktop to tell you the time, weather, news headlines and so on. (Other software makers, including Apple and Yahoo!, call them “widgets.”)

Gadgets and the Windows Sidebar they live in, first appeared in 2007 as a default setting in Vista.

Windows 7 has Gadgets built in as well, but they’re turned off by default. Instead of being in a sidebar pinned to the right edge of the screen, Gadgets are in a floating window that can be placed anywhere on the desktop.

If you’re using Windows7 OS and want to see them, right-click on your desktop and select “Gadgets.”

The page where Microsoft used to host additional Gadgets for download now states, “The Windows website no longer hosts the gadget gallery.”

“Microsoft hasn’t issued a security patch to fix the vulnerability,” “They’re suggesting you completely nuke your Windows Sidebar and Gadgets.”

Applying the automated Microsoft Fix It solution described in Microsoft Knowledge Base Article 2719662 disables the Windows Sidebar experience and all Gadget functionality.

 Gadgets have not yet appeared in the preview versions of Windows 8, due this fall, and likely never will.

Click on the below link to download Microsoft Fix It.

http://support.microsoft.com/kb/2719662

Source: Microsoft, msn

Phone-in-a-Phone

Phone-in-a-Phone : 

VMware Horizon Mobile solution basically enables a user to run a “phone-in-a-phone,” meaning run both work and personal mobile environments separately on the same device. With VMware Horizon Mobile users would be able to have two phone numbers and data accounts on the same smartphone.

Note: We are not talking about dual sim phones.

Think of it like a partition on a computer hard drive, but in terms of virtualization with far less dedicated space for the work phone, and it’s much easier to toggle between the two user interfaces.

The work environment is entirely encrypted and tied to the requirements of the respective enterprise providing the phone number (and possibly the smartphone), but the personal side is unaffected and can download as well as use any apps.

If the phone is lost or the employee leaves, the company data on the phone can be remotely wiped. The work phone can also be switched off leaving the personal phone still connected.

The trend is powered not only by the growth in mobile devices but also by cloud computing, with companies able to buy ready-to-go virtual desktops.

Running a phone within a phone raises some questions about the impact on processing speed, power management, memory and the like. But VM and the host phone should work well with any ARM processor typically used on mobile devices. There could be an application performance penalty because an Android OS is running inside another Android OS, but that “will be pretty minor, with ‘minor’ being less than 10 percent.”

As seen in the screenshots below, the personal phone is truly the main screen with an icon to the “work phone.” One click on that icon takes you to the VMware UI, shown in the second screenshot. The work side takes up less than 1GB of space, and it also allows pre-approved apps (i.e. Salesforce, etc.) from a corporate app store so the users don’t have to worry about more expenses and the configuration.

Screen shot 1
Screen shot 2

Management of that store as well as the devices can be controlled by IT departments (alleviating some of those bring-your-own-device security worries) in the platform seen below.

What is VMware MVP? 

VMware MVP (VMware Mobile Virtualization Platform)is a thin layer of software that will be embedded on a mobile phone that decouples the applications and data from the underlying hardware. It will be optimized to run efficiently on low-power-consuming and memory-constrained mobile phones. The MVP is planned to enable handset vendors to bring phones to market faster and make them easier to manage. 

Benefits to Handset Manufacturers:

  • Accelerated time to market:

Today handset vendors spend significant time and effort in getting new phones to market due to the use of multiple chipsets, operating systems and device drivers across their product families. The same software stack does not work across all the phones, and therefore, must be ported separately for each platform. This process is slow and expensive and ultimately slows time to market. VMware MVP will virtualize the hardware, enabling handset vendors to develop a software stack with an operating system and a set of applications that is not tied to the underlying hardware. This will enable the vendors to deploy the same software stack on a wide variety of phones without worrying about the underlying hardware differences. At the same time, by isolating the device drivers from the operating system, handset vendors can further reduce porting costs because they can now use the same drivers irrespective of the operating system deployed on the phone.

Increasingly, handset vendors and carriers are looking to migrate from proprietary operating systems to rich, open operating systems to enable their customers to access the widest selection of applications. With this transition to open operating systems, protection of trusted services such as digital rights management, authentication, billing, etc. is becoming an increasing concern. VMware MVP will allow vendors to isolate these important trusted services from the open operating system and run them in isolated and tamper-proof virtual machines so that even if the open environment is compromised, the trusted services are not impacted.

Benefits to Businesses and End Users:

  • Multiple Profiles:

Companies are under increasing pressure from employees to support employee-owned mobile devices (BYOD). Choice, however, brings with it complexity in managing a wide variety of devices in terms of both cost and security. It also brings increased risk in securing and managing employee-owned devices, especially if they contain confidential information. VMware MVP will allow IT organizations to deploy a corporate phone personality that can run alongside the employee’s personal phone on the same physical device.

  • Persona on the Go: 

Smart phones are quickly becoming a combination of a PC and a wallet rolled into one package. A person’s phone persona – an individuals’ collection of applications, pictures, videos, music, emails, bank info, credit card information, PIM, etc. – is becoming much richer and more valuable. Consequently, the ability to protect and migrate personas will become an important purchasing decision. VMware MVP will save the persona as a set of files so that all the applications and data on the phone can be managed as a collection of files. People can then easily move their persona to a new device making the upgrade to a new phone virtually painless.

The Mobile Virtualization Platform (MVP) hypervisor allows users to run multiple operating system instances on top of a phone’s physical platform. That means employees can manage a personal and work phone on one device, simplifying life for IT administrators.

  Understanding and using VMware MVP

The Mobile Virtualization Platform essentially creates two usable phones on the same physical device by installing a guest OS in a virtual machine (VM). Because VMware MVP is a hosted hypervisor, you can have two OSes running on the device, resulting in a work environment that is isolated from a user’s personal applications and data. Currently, VMware MVP works only on Android devices. If VMware gets MVP into the Android kernel, you could theoretically run even more than two OSes on the same mobile device.

VMware MVP extends an enterprise’s “bring your own device” (BYOD) initiative beyond laptops and tablets to phones. With it, an employer can centrally manage an OS image and isolate corporate applications such as email from apps that users download for personal use, which have the potential to corrupt corporate data.

Running VMware MVP makes subtle changes to the Android OS interface. When you look at the Android phone’s notification bar, you’ll see events for two mobile virtualization partitions – both the work and personal data. These appear in different colours to differentiate between the events that occur in each partition. When you respond to a notification, the Mobile Virtualization Platform hypervisor intelligently switches the phone to the appropriate partition and application.

The VMware MVP work partition is managed by VMware’s Horizon Mobile Manager, which is currently only offered by Verizon for use by business customers. By using Horizon Mobile, IT departments can provision, manage and cut off mobile devices over a cellular signal. The software also allows managers to push applications to the device and set policies for the corporate profile. That means it’s no longer a huge problem if you lose your mobile device, as the business can easily retrieve corporate data.

Horizon also allows direct access to Windows applications and Software as a Service tools. Employees can access a catalogue of corporate-approved applications, which load directly onto the phone’s work profile.

There has been substantial manufacturer support for VMware MVP. LG and Samsung both build phones containing VMware’s mobile hypervisor. One of the biggest benefits of developing phones with the Mobile Virtualization Platform is that it makes the devices more attractive to the corporate sector. Still manufacturers will be competing against RIM’s popular BlackBerry mobile devices, which feature a secure enterprise server connection and are very popular in the enterprise.

For a closer look at VMware’s mobile initiatives, check out the promo video about VMware’s partnership with LG below:

VMware MVP challenges

As with most new technologies, there are some challenges facing VMware’s Mobile Virtualization Platform and Horizon Mobile. Here are three major concerns about VMware MVP that have been voiced in the IT community:

Battery life and performance

Battery life, as with any smartphone, is always a concern. You are potentially running two full instances of the Android OS to support the VMware MVP environment. Couple that with applications running on separate virtual slices and there are serious concerns as to how long a battery will last. Although the hypervisor itself may be very thin, active users operating multiple apps and running on a 4G network should be prepared for some decreased performance and shortened battery life.

What about the iPhone? 

At this time, VMware MVP only supports Android devices. To see truly widespread adoption of MVP, VMware will have to get access to Apple’s portion of the smartphone market. But if VMware is developing an Apple iOS implementation, they are probably already aware of Apple’s notorious ability to lock down its OSes. If VMware wants to run the Mobile Virtualization Platform and Horizon Mobile on iPhones, they may need a different strategy with Apple products.

Android development fragmentation

It’s well known that Google depends on carriers and phone makers to test, deploy and update users on any OS changes that may occur. So there is sometimes a significant time gap between Google’s updates and when the carriers or manufacturers actually deploy the update.

This places VMware in an awkward situation with its Mobile Virtualization Platform. VMware doesn’t have control over Google’s development cycle and won’t know when it needs to push VMware MVP updates to the end user. That means there may be instances when Android phones receive updates and their secondary OS no longer functions. VMware will need to work with Google, the phone manufacturer and the carrier to make sure its mobile virtualization hypervisor is always supported and updated.

Source: zdnet, vmware,searchvmware.techtarget

How to Block Websites without Hardware or Software

It’s a simple technique.

The user just needs to modify one “Host” file.

The user who is going to modify “HOST” file should have administrative privileges

1.] Browse C:\WINDOWS\system32\drivers\etc

2.] Find the file named “HOSTS

3.] Open it in notepad

4.] Under “127.0.0.1 localhost” add 127.0.0.2 www.sitenameyouwanttoblock.com , and that site will

no longer be accessible.

5.] Done!

-So-

127.0.0.1   localhost

127.0.0.2 www.blockedsite.com

–> www.blockedsite.com is now inaccessible

The host file will have the following line 127.0.0.1 local host (it will be there by default) in all three operating systems windows XP, Windows Vista and Windows 7.

In the next line, we have to add 127.0.0.2 www.blockedsite.com127.0.0.3 www.abc.com

127.0.0.1   localhost

127.0.0.2 www.blockedsite.com

127.0.0.3 www.abc.com

127.0.0.4 www.xyz.com

Above example is for Windows XP.

In the Windows Vista and in the Windows 7 we have to add websites without #.

Example shown in Windows 7 image given below.

I have pasted host file to show how it looks in Windows XP, Windows Vista and in Windows 7 operating systems:

Windows XP Host File is shown below:

Windows XP

Windows Vista Host file is shown below:

Windows Vista

Windows 7 Host File is shown below:

The users will be able to browse other sites; they would not be able to browse the sites which are all added in the host file.