20 May, 2010

pass4sure Microsoft Mcse 2003 70-290 v2.93

MCDBA Managing and Maintaining a Microsoft Windows Server 2003 Environment : 70-290 Exam

Exam Number/Code: 70-290
Exam Name: MCDBA Managing and Maintaining a Microsoft Windows Server 2003 Environment
VUE Code: 70-290
Questions Type: Multiple choice,
Question Numbers of Real-exam: 40
Exam Language(s): English

MCDBA Managing and Maintaining a Microsoft Windows Server 2003 Environment”, also known as 70-290 exam, is a Microsoft certification.
Preparing for the 70-290 exam? Searching 70-290 Test Questions, 70-290 Practice Exam, 70-290 Dumps?

With the complete collection of questions and answers, Pass4sure has assembled to take you through 237 Q&A + 5 Real labs to your 70-290 Exam preparation. In the 70-290 exam resources, you will cover every field and category in MCDBA helping to ready you for your successful Microsoft Certification

The Microsoft Certified Systems Administrator (MCSA) on Windows Server 2003 credential is intended for IT professionals who work in the typically complex computing environment of medium to large companies. An MCSA candidate should have 6 to 12 months of experience administering client and network operating systems in environments that have the following characteristics:

250 to 5,000 or more users
Three or more physical locations
Three or more domain controllers
Network services and resources such as messaging, database, file and print, proxy server, firewall, Internet, intranet, remote access, and client computer management
Connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet

1. You are the administrator of a Windows Server 2003 computer named Server1. Server1 has a single disk. The

disk is configured so that it has four primary partitions, which are formatted as FAT32. The disk also has unallocated space available.
You need to use the unallocated disk space to store user data. What should you do?
A. Convert all existing partitions to NTFS.

B. Using Diskpart.exe, run the create command.

C. Convert the disk to a dynamic disk, and create a new volume. D. Using Diskpart.exe, run the extend command.
Answer: C

2. You are a network administrator for your company. A Windows Server 2003 computer named Server1 functions

as a file server.

Server1 has two data volumes: volume E and volume F. Volume E contains user data. The E:\UserData folder is shared as Users. The Volume Shadow Copy service is scheduled to create a shadow copy backup twice a day on volume E, using the default storage area.
Users report that only the most recent file versions are available in the Previous Versions property of the Users share. You discover that volume E does not have enough space and is discarding old shadow copies too soon. You decide to move the shadow copy storage area to volume F. However, when you open the settings for the volume E shadow copy, you cannot change the storage area location.
You need to move the shadow copy storage area to volume F so that there is enough space for additional copies. What should you do?
A. Add a shadow copy to volume F by using the VSSAdmin command Create Shadow. Then remove the old shadow copy storage association by using the VSSAdmin command Delete Shadows.
B. Change the folder properties on volume E so that you can view protected operating system files. Copy the System Volume Information folder to volume F. Then change the shadow copy storage area of volume E to volume F.
C. Add a shadow copy storage association to volume F by using the VSSAdmin command Add ShadowStorage. Then remove the old shadow copy storage association by using the VSSAdmin command Delete ShadowStorage.
D. Back up and delete all current shadow copies for volume E. Move the shadow copy storage area of volume E

to volume F. Then restore the backup copy to the new location.

Answer: D

3. You are the administrator of a Windows Server 2003 computer named Server1. The hardware vendor for Server1 notifies you that a critical hotfix is available. This hotfix is required for all models of this computer that have a certain network interface card.
You need to find out if the network interface card that requires the hotfix is installed in Server1.

What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

A. Open Network Connections, and then examine the properties of each connection that is listed.

B. Open the Component Services snap-in, expand Computers, expand My Computer, and then examine the list.

C. Run the netsh interface command, and then examine the list.

D. Open Device Manager, expand Network adapters, and then examine the list. Answer: D AND A

4. You are the administrator of a Windows Server 2003 computer named Server1.

Newly hired employees recently started storing files on Server1. Now users report that Server1 is responding much slower than it did before the additional users were added. You suspect the disk subsystem needs to be upgraded to accommodate the additional user load.
You need to confirm whether the disk subsystem on Server1 needs to be upgraded. What should you do?
A. Configure a Performance Logs and Alerts alert on the %Free Space counter.

B. Use Device Manager to populate volume settings and examine the properties of the disk drives on Server1

C. Use Event Viewer to examine the system logs and search the system logs for events generated by the disk event source.
D. Use System Monitor to monitor counters based on the PhysicalDisk object. Answer: D

5. You are the administrator of a Windows Server 2003 computer named Server1. Server1 stops responding several times. Each time, the following stop error message is displayed: “0×000000D1 (0×0000000c, 0×00000002,
0×00000000, 0xf27b4e8e) IRQL_NOT_LESS_OR_EQUAL.”

You suspect that a hardware component is causing the problem, and you contact the vendor. The vendor requires debugging information.

You need to configure Server1 to generate a file that contains relevant information for the vendor.

What should you do?

A. Configure Server1 to perform a memory dump.

B. Add the /debug option to the Boot.ini file on Server1. C. Enable Physical Addressing Extensions on Server1.
D. Install the Recovery Console on Server1. Answer: A

6. You are the administrator of a Windows Server 2003 computer named Server1.

You log on to Server1 and attempt to access the network. You discover that the server is not communicating on the network. You discover that a service pack and an updated network adapter driver were installed on Server1 the previous night. A complete backup, including the System State data, was performed before the service pack and
the driver were installed.

You need to restore network communications. What should you do first?
A. Use Roll Back Driver to reinstall the previous driver for the network adapter.

B. Use the Backup or Restore Wizard to restore the backup from the previous night. C. Restart Server1 by using the Last Known Good Configuration option.
D. Use the Registry Editor to delete the registry settings for the network adapter driver. Answer: A

7. You are the network administrator for your company. All servers run Windows Server 2003. A server named Server3 functions as a file server. All client computers run Windows XP Professional and are members of the domain.
The company periodically hires temporary employees. You need to prepare a custom user profile for all temporary employees.
You log on to a client computer as an administrator, and you configure the desktop settings. You copy the profile

to a folder named \\Server3\Profiles\Temp_profile. You rename the Ntuser.dat file in the

\\Server3\Profiles\Temp_profile folder to Ntuser.man. You create three new user accounts for the temporary employees. The user accounts are named temp_user1, temp_user2, and temp_user3.
You need to configure the temporary user accounts to receive the new desktop settings that you created on Server3.

The temporary employees must not be allowed to retain customized desktop settings.

What should you do?

A. Specify a user profile path of \\Server3\Profiles\username for each of the three user accounts.

B. Specify a user profile path of \\Server3\Profiles\username.man for each of the three user accounts.

C. Specify a home folder path of \\Server3\Profiles\username for each of the three user accounts.

D. Specify a user profile path of \\Server3\Profiles\Temp_profile for each of the three user accounts.

E. Specify a user profile path of \\Server3\Profiles\Temp_profile.man for each of the three user accounts. Answer: D

8. You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.
You place computer accounts for servers in organizational units (OUs) that are organized by server roles. You apply Group Policy objects (GPOs) to these servers at the OU level.
You need to add a new server to the domain. You need to ensure that the appropriate GPOs are applied to this server.
What should you do?

A. Prestage a domain computer account for the new server in the appropriate OU. Join the server to the domain by using the prestaged computer account.
B. On the new server, add the domain name for the Active Directory domain to the DNS suffix setting. Join the server to the domain.
C. Assign a user account the Allow – Create permission for the appropriate OU. Join the new server to the domain

by using the user account.

D. Join the new server to the Active Directory domain. On the new server, run the gpupdate /force command. Answer: A

9. You are the domain administrator for your company’s Active Directory domain. All domain controllers run

Windows Server 2003.

The network consists of 10 offices located across South America. The organizational unit (OU) structure consists

of one top-level OU for each branch office. Each top-level OU contains eight or more child OUs, one for each department. User accounts are located in the appropriate departmental OU within the appropriate office OU.
For security purposes, you routinely disable user accounts for terminated employees. As part of an internal audit,

you need to create a list of all disabled user accounts.

You need to generate the list of disabled user accounts as quickly as possible.

What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

A. In Active Directory Users and Computers, create a new saved query. B. Run the dsget user command.
D. Run the dsquery user command. E. Run the netsh command.
Answer: D AND A

21 April, 2010

MBS AX 4.0 exam MB6-510 and MB6-511 will be available this week!

There are lots of persons contact me to ask for the information about the MBS AX 4.0 exams recently, so I checked the website, but all the exams are still for AX 3.0, so I contacted the tech team from pass4sure. They told me there are two AX 4.0 exams will be available soon:
MB6-510 AX 4.0 Human Resource Management
MB6-511 AX 4.0 Production

The samples will also be posted here as soon as the question pools are repleased, and one can check these links to make sure whether the exams are ready or not: MB6-510 MB6-511

QUESTION 1
You work as an application developer at Certkiller .com. You are in the process of
creating an application that will display confidential employee information.
When your manager informs you that only managers and administrators should be
able to view the information, you utilize windows authentication and .NET
role-based security to guarantee this.
The network administrator in your department informs you that he has noticed that
there are certain users that are not managers or administrators are able to view the
employee information. You immediately analyze your code, and discover an issue
with domain group memberships.
The network administrator asks you to trace the user account and security
identifier (SID) of each user in the application so that he can use this information to
detect users across the enterprise and verify that their group memberships are
correct.
How would you do this?
A. Use the following code:
WindowsIdentity curID = WindowsIdentity.GetCurrent ();
NTAccount account = new NTAccount (curID.Name);
SecurityIdentifier sid = (SecurityIdentifier);
account.Translate (typeof (SecurityIdentifier));
Trace.Write (”User’s SID is” + sid.Value, “User” + account.Value);
B. Use the following code:
WindowsIdentity curID = WindowsIdentity.GetCurrent ();
NTAccount account = new NTAccount (curID.Name);
Trace.Write (”User’s SID is” + sid.Value, “User” + account.Value);
C. Use the following code:
WindowsIdentity curID = WindowsIdentity.GetCurrent ();
Trace.Write (”User’s SID is” + curID.Value, “User” + sid.Name);
D. Use the following code:
WindowsIdentity curID = WindowsIdentity.GetCurrent ();
SecurityIdentifier sid = new SecurityIdentifier (curID.Name);
Trace.Write (”User’s SID is” + curID.Value, “User” + sid.Name);
Answer: A
Explanation: This code retrieves the current WindowsIdentity object associated
with the user, instantiates an NTAccount object using the Name property, invokes
the Translate method to retrieve the current SecurityIdentifier object, and invokes
the Write method on the Trace class to record the Value property of both the

Actualtests.org – The Power of Knowing
SecurityIdentifier and NTAccount objects. The GetCurrent method of the
WindowsIdentity object represents the identity of the application user. The
NTAccount class represents a Windows user group account in the local Security
Accounts Manager (SAM) or in the Active Directory domain. The constructor of the
NTAccount class accepts either a single string representing the account name or two
strings, one representing the domain name and the other representing the account
on that domain. To facilitate SID lookups, the Translate method takes a Type
argument and returns an IdentityReference object. You must convert or cast the
IdentityReference object to a SecurityIdentifier object to retrieve the Sid for the
specified account. The Value property of the SecurityIdentifier and NTAccount
class returns a SID and fully-qualified user name string, respectively. The Write
method of the Trace class outputs the specified message into the specified category.
Incorrect Answers:
B: You should not use the code that does not specify the SecurityIdentifier class because
the NTAccount class does not have a SID property.
C: You should not use the code that does not specify the NTAccount and
SecurityIdentifier classes because there is no SID property in the WindowsIdentity class.
D: You should not use the code that does not specify the NTAccount class because a
SecurityIdentifier object cannot be instantiated using an account name as an argument,
and it does not contain a Name property.
QUESTION 2
You work as an application developer at Certkiller .com. You are currently creating
a sales report application that requires Windows authentication on Certkiller .com’s
domain.
To achieve this, you are required to implement role-based security within the sales
report application.
You establish that the method shown below should only be invoked by members of
the Managers group:
public void UpdateEmpSalesBonus (int empID, double amount)
{
//Update employee’s salary
}
You need to ensure that invocation of the UpdateEmpSalesBonus method is
restricted to only managers.
What should you do? (Choose two)
A. Apply the following attribute to the UpdateEmpSalesBonus method:
[WindowsPricipalPermission (SecurityAction.Demand, Role = "Managers")]
B. Apply the following code to the UpdateEmpSalesBonus method:
WindowsIdentity user = WindowsIdentity.GetCurrent ();
if (user.IsInRole (”Managers”))
{
//Update employee’s salary
}
C. Apply the following attribute to the UpdateEmpSalesBonus method:

Actualtests.org – The Power of Knowing
[PricipalPermission (SecurityAction.Demand, Role = "Managers")]
D. Apply the following code to the UpdateEmpSalesBonus method:
if (Thread.CurrentPricipal.IsInRole (”Managers”))
{
//Update employee’s salary
}
Answer: C, D
Explanation: Imperative role-based security can use the PricipalPermission class or
the IPrincipal object directly. The PricipalPermission class takes a user name and
role as string arguments representing the required membership. The Demand
method indicates that all callers must belong to the user or group membership
specified in the constructor to access the resource. The IPrincipal object can be
retrieved using the Thread.CurrentPricipal property. The IsInRole method takes a
role argument as a string and returns a Boolean value indicating whether the
current caller belongs to that group or not.
Incorrect Answers:
A: You should not use the attribute that applies the WindowsPricipalPermission attribute
because no such attribute exists in the .NET Framework 2.0 class library.
B: You should not use the code that invokes the IsInRole method on the
WindowsIdentity class because no such method exists.
QUESTION 3
You work as the application developer at Certkiller .com. Certkiller .com uses Visual
Studio.NET 2005 as its application development platform. You use a Windwos XP
Professional client computer named Certkiller -WS536 as your development
computer.
You are developing a .NET Framework 2.0 application on Certkiller -WS536. You
are trying to port an old Certkiller .com management application that was written in
unmanaged Windows code with no COM interfaces. The application you are
developing makes calls to the old Certkiller .com management unmanaged library
namedBillPerformance.dll.
You are required to make a call to the GetPerformaceScore method of the
unmanaged Performance.dll library.
What should you do?
A. The Type Library Exporter tool (tlbexp.exe) should be used
B. The Type Library Importer tool (tlbimp.exe) should be used
C. The Assembly Registration tool (regasm.exe) should be used
D. The Platform Invoke (DllImportAttribute) should be used
Answer: D
Explanation: The feature Platform Invoke is used to allow you to call methods that
are in unmanaged libraries but you need to declare the unmanaged method in the

Actualtests.org – The Power of Knowing
managed code using the extern and static keywords with the DllImport attribute
which is used to specify the unmanaged library.
Incorrect Answers:
A, B, C: The tool should not be considered for usage in the scenario because th

13 April, 2010

pass4sure HP0-402 study guide

Implementing HP Enterprise Virtual Array Solutions : HP0-402 Exam
Product Description
Exam Number/Code: HP0-402
Exam Name: Implementing HP Enterprise Virtual Array Solutions
Questions Type: Multiple choice,

“Implementing HP Enterprise Virtual Array Solutions”, also known as HP0-402 exam, is a HP certification.
Preparing for the HP0-402 exam? Searching HP0-402 Test Questions, HP0-402 Practice Exam, HP0-402 Dumps?

With the complete collection of questions and answers, Pass4sure has assembled to take you through 71 questions to your HP0-402 Exam preparation. In the HP0-402 exam resources, you will cover every field and category in HP AIS helping to ready you for your successful HP Certification.

Questions and Answers : 71 questions
Updated: March 20th , 2008

Question: 1
Using Command View EVA, which attributes are displayed for HSV2×0 Controller Properties. Select THREE.

A. mirror port states
B. temperature sensors
C. UPS voltage indicators
D. cache battery module states
E. levels of protection from shelf failures
Answer: A, B, D Question: 2
What are two capabilities of the HP Command View EVAPerf? Select TWO.

A. review port status
B. creation of vdisks
C. display SAN topology
D. collect host connection data
E. review capacity planning data
Answer: A, D Question: 3
What is the maximum number of disk enclosures for an EVA6000?

A. 4
B. 6
C. 8
D. 18
Answer: C Question: 4
What does the EVA provide in a heterogeneous environment? Select TWO.

A. mainframe support
B. no single point of failure
C. reliable and infinitely scalable
D. modular and scalable storage
E. preconfigured operating system solutions
Answer: B, D Question: 5
A customer requires a six hour call-to-repair commitment. Which minimum type of HP Care Pack
Service is appropriate?

A. HP Support Plus
B. HP Critical Service
C. HP 4 Hour, 24×7 Hardware Support
D. HP Proactive Essentials 24×7 Unlimited

Answer: B

Page 1 of 16

TK

Exam Name: Implementing HP Enterprise Virtual Array Solutions
Exam Type HP
Exam Code: HP0-402 Total Questions: 70

Question: 6
What is the best practice when adding disks to an EVA 2C8D for a Robust Availability
Configuration?

A. After adding the disks, delete and recreate the disk group.
B. Add disks in multiples of eight; distributed evenly across the shelves.
C. Install any number of disks and assign each of them individually to the appropriate redundant storage set.
D. After installing a single disk, wait until leveling has taken place in the existing disk group before you install the next disk.
Answer: B Question: 7
Which methods are available to provide system administrators direct notification of Field
Replaceable Unit (FRU) failures? Select TWO.

A. e-mail
B. RPC traps C. SCMI traps D. SNMP traps E. syslog event
Answer: A, D Question: 8
Which disks are used to optimize price per capacity for your EVA storage subsystem? Select
TWO.

A. higher performance disks
B. near online disks
C. larger capacity disks
D. smaller capacity disks
Answer: B, C Question: 9
Why would you consider configuring two separate disk groups instead of a single one? Select
TWO.

A. higher availability
B. lower cost of ownership
C. higher storage efficiency
D. better database performance
E. better utilization of disk space
Answer: A, D Question: 10
How many FC switched fabric connections are there on each M5314A drive enclosure?

A. 0
B. 2
C. 4
D. 8

Page 2 of 16

TK

Exam Name: Implementing HP Enterprise Virtual Array Solutions
Exam Type HP
Exam Code: HP0-402 Total Questions: 70

Answer: A

Question: 11
How is the drive enclosure address assigned?

A. by the loop switches
B. by the enclosure address bus
C. by the HSV controllers at power up
D. by the order that the drive enclosures are powered up
Answer: B Question: 12
What does the EMU do? Select TWO.

A. powers off HSV controllers
B. monitors disk enclosure temperatures
C. monitors disk enclosure and controller temperature sensors
D. reports disk enclosure events through the Enclosure Address Bus (EAB)
Answer: B, D Question: 13
In an EVA4000, what happens to the remaining disk enclosures when one disk enclosure becomes unavailable?

A. The remaining enclosures are unaffected.
B. The remaining enclosures shut down to retain data consistency.
C. The HSV controllers reroute the data around the unavailable enclosure.
D. The remaining enclosures reset enclosure addresses to bypass the failed enclosure.
Answer: A

P4S 642-654 question

I have been thinking about the Cisco certification for a long time, and never had time to prepare for it. But now, I know it is time for it.I have never expected that the 642-654 exam would be so difficult.
Many study materials in the market nowadays contain too many questions which are far from that of the real exams. Doing these practice that will never appear in the 642-654 exam wastes me lots of time.
A colleague of mine, who have got the Cisco certification, recommend Pass 4 sure to me, saying that without the help of Pass4sure, he couldn't have passed the exams.
The quality is the key of PASS4SURE's development and success. Many efforts have been made to ensure that the PASS4SURE products can assistant the students to pass the Pass4sure 642-654 exam without any other stuff.
Pass4sure exams contain realistic questions, validated answers and detailed explanations. What's more, more than 90% of the test objectives are covered by Pass4sure, which ensures the user to pass the 642-654 question exam definitely.
To remove your last worry when shopping at pass4sure, they provide the Free Demo Trial. Thus you can try and see for yourself before you make your decision. During your trial, you will find that everything—the friendly interface, the condensed questions, the accurate answers, the detailed analysis, the professional explanations, and the simplified software—is developed to your satisfaction!

25 March, 2010

testking cisco sales expert 646-967 exam

the tk Cisco: 646-967 Exam
Interactive Testing Engine Included!
50 Questions
Updated : 03/10/2008
Price : $87.99 $79.99

Cisco 646-967 Exam
Exam 646-967: Cisco Data Center Networking Sales Specialist (CDCNSS)
Related Certification: Cisco Data Center Networking Sales Specialist
Number of Questions: 55
Duration: 75 minutes

Main Exam Topics Include:
• Describe the business value of a data center networking (DCN) solution
• Identify and describe the capabilities of Cisco DCN technologies
• Gather and analyze customer business requirements
• Describe and recommend the appropriate Cisco DCN solution and services

The 646-967 CDCNSS Cisco Data Center Networking Sales Specialist exam is associated with the Data Center Sales Specialist. This exam indicates a professional knowledge of selling solutions within the Cisco Data Center networking infrastructure.

QUESTION 1
A Virus brought down the network of your client of three hours. Immediate, complete
deployment of an embedded, self-defending network has been mandated. Which three
solutions would you suggest? (Choose three.)

A. Cisco ACE
B. Cisco AVS
C. Cisco VFrame
D. Cisco FWSM
E. Cisco GSS

Answer: A,B,D QUESTION 2
Which Storage Technology Groups arrays of disks to increase throughput, reliability or
both?

A. iSCSI
B. SCSI
C. Fiber Channel
D. RAID

Answer: D QUESTION 3
Which deployment is best suited to the Cisco Catalyst 4948 Switch?

A. A Small Number of servers requiring connections in close proximity to the servers
B. High-Bandwidth Connectivity, such as 10-GPS XENPAKs
C. Top-Of-Rack Connectivity with high-speed uplinks to core switches
D. A Large numbers of servers requiring connections in close proximity to the servers

Answer: C

QUESTION 4
DRAG DROP
You work as a network technician at Certkiller .com. Your boss, Mrs. Certkiller, is
interested in Cisco resources. Match each Cisco resource with its appropriate functionQUESTION 5
A Customer is concerned about application deployment disruption. What would be the
impact of an upgrade from CSS to ACE and ANM?

A. Network infrastructure overhead will be reduced
B. The ACE in the Cisco Catalyst 6500 Series will cost more to power than an external
CSS device
C. Load Balancing and firewall service provisioning for new applications will be cut by
66%
D. Role-Based Application rules will be more complex to implement

Answer: C

QUESTION 6
Which two Network Infrastructure modules provide aid in communication between users
and servers? (Choose two.)

A. ASA 5540
B. NAM
C. FWSM
D. PIX
E. 510
F. Catalyst 4948
G. FlexWAN

Answer: B,C QUESTION 7
Which two services does Cisco provide to assist in Business Continuity? (Choose two.)

A. Power Backup Testing
B. Cooling Airflow assessments
C. Data Replication and Migration strategy, Deployment and testing support
D. Physical Security Strategy, Deployment and Testing Support
E. Network Failover Testing

Answer: C,E QUESTION 8
Which two technology areas cover all aspects of data center operations? (Choose two.)

A. Applications
B. Security
C. Virtualization
D. Management

Answer: B,D
QUESTION 9
Typically, data centers are challenged by:CostApplication Service levelBusiness
Responsiveness
Which technology or service can best help a customer address these key issues?

A. VLANs
B. Business Continuity
C. Cisco SONA
D. Cisco VFrame

Answer: C
testking cisco 646-967

25 February, 2010

testking HPO-087 dumps

HP Certified Professional
Planning and Designing HP Enterprise Solutions
# HPO-087
Exam Preparation Guide

Purpose of the Exam Prep Guide

The intent of this guide is to set expectations about the content and the context
of the exam and to help candidates prepare for the exam. In this guide, you will find recommended HP training courses, reference and study material to assist you in preparing for the exam.

Studies conducted by HP and Prometric show that a combination of course attendance and self-study maximizes the likelihood of passing the exam on the first attempt.

Audience

This exam is for anyone who designs enterprise class solutions based upon HP
technologies and services. The exam is targeted for individuals with 18
months of industry experience designing enterprise class solutions and at least
6 months of designing HP based solutions. Examples of job roles:
• Solution Architects

• Solution Designers

• System Engineers

• System Integrators

• IT Consultants

General areas of content include: Describing Customer Business Challenges and Drivers, Gathering Customer Requirements, Describing the Adaptive Enterprise philosophy and elements, Determining the elements of a solution, Developing the solution, and Preparing the solution for implementation.

Certification Requirements

This exam, Planning and Designing HP Enterprise Solutions HPO 087, is one
of the core requirements to be certified as an Accredited Presales Professional
(APP) – HP Enterprise Solutions. The Accredited Presales Professional credential is designed for account-aligned technical presales generalists to design and justify HP based solutions for their customers with elements from across the HP enterprise portfolio. APP measures the ability to apply a broad knowledge of business requirements, products, technologies and solutions within a customer sales engagement.

Rev. 1.00 1 -1

Planning and Designing HP Enterprise solutions Exam Preparation Guide

Prerequisites:

? None

Exam Details

At the beginning of the exam, you will be asked to answer several survey questions. The survey has been designed to assist the exam development team define the final exam forms and set the passing score. Your honest responses will assist the exam team in properly tailoring this exam to the appropriate audience.

? Number of items: 70

? Item types: Multiple choice and drag-and-drop

? Time commitment: 105 minutes

? Passing Score: 68%

? Reference Material: No on-line or hard copy reference material will be allowed at the testing site.

Registration

This exam is available at Prometric.

Comments on the Exam

During the exam you will be able to make specific comments about the test items (i.e., accuracy, appropriateness to audience, etc). HP welcomes these comments as part of our continuous improvement process.

Exam Content

The following outline represents the specific areas of content covered in the exam. Use this outline to guide your study and to check your readiness for the exam. The exam measures your understanding of these areas. The
approximate percentage of exam questions dedicated to each major content
area is included in parenthesis. The higher the percentage, the more questions will be on the exam.

1 -2 Rev. 1.00

Planning and Designing HP Enterprise solutions Exam Preparation Guide Exam Preparation Guide

Planning and Designing HP Enterprise Solutions

(HPO 087) Exam Content

1.0 Selling in the Adaptive Enterprise (15%)

1.1 Explain business and technology trends

1.2 Discuss the AE philosophy & components

1.4 Discuss cross-GBU alignment & associated initiatives around AE sales &
delivery — CSG service/product lines, IPG & PSG

1.5 Discuss AE market competition

2.0 Business Context (17%)

2.1 Recognize business challenges and drivers

2.3 Recognize and evaluate opportunity indicators of prospective customers and assess their purchase readiness

2.4 Identify customer’s infrastructure and application requirements

2.5 Identify the opportunity

2.6 Identify potential customer sponsors or interested parties

2.7 Determine key value propositions and benefit messages tailored to decision- making levels & priorities

2.8 Define target market criteria — characterize market segments and identify typical server and storage sales opportunities

2.9 Sales methodology

3.0 Delivering the HP Solution (33%)

3.1 Develop a solution framework for mapping product/service components and identifying and addressing gaps

3.2 Specify and configure solution components

3.3 Describe product/service/solution features & benefits

3.4 Determine OS appropriate to HP product

3.5 Map solution components to product roadmap–what is being introduced, what discontinued, what it replaces, how it fits within a solution, etc

3.6 Identify competition

3.7 Evaluate and adapt solution proposals and messaging to opportunity

4.0 Solution Interface (26%)

4.5 Identify and evaluate licensing issues & support options associated with products

4.6 Relate key Adaptive Management concepts to parameters of opportunity

Rev. 1.00 1 -3

Planning and Designing HP Enterprise solutions Exam Preparation Guide

4.7 Recognize underlying technologies (e.g., virtualization) and their use in
customer environments

4.8 Describe how products are positioned with regard to each other

4.9 Advance a sale

5.0 Implementation (9%)

5.1 Identify marketing initiatives and incentives associated with products (i.e., real-time — ongoing/quarterly)

5.2 Explain how HP marketing strategy supports opportunity and relates to solution framework — direction, priorities and major initiatives

5.3 Use configuration tools to ensure accurate configuration purchases — storage, management s/w, etc

5.4 Define and size opportunity in terms of customer requirements & technical resources/expertise needed to build an effective solution

5.5 Evaluate pricing & financing alternatives

1 -4 Rev. 1.00

Planning and Designing HP Enterprise solutions Exam Preparation Guide Exam Preparation Guide

Recommended Training and Study References

This section lists training courses and documents that can help you acquire a majority of the knowledge and skills needed to pass the exam. You must also gain the practical experience outlined in this guide

You are not required to take the courses listed in this section. However, HP strongly recommends that you attend the classes, participate in class labs, and thoroughly review all course material and documents before taking the exam, even if you believe you have sufficient on-the-job experience.

Use the information in this guide and the practical experience you have gained
to determine your need for training. There are two courses that are highly recommended prior to taking this exam. One is a Web Based, online course. The other is a 5 day Instructor led Course.

Title How to Enroll
Technical Essentials of HP Enterprise Products WBT
Web-based Training (24
hours)
ELMS: 20041 HP Learning Center www.hp.com/go/onlinelearning
Planning and Designing HP Enterprise Solutions Instructor-led Training (5 days)
ELMS: 20039

NOTE: Candidates must have passed the HP2-978 exam prior to signing up for this instructor-led course. Use WW training website:

http://www.hp.com/certification/training.html

Rev. 1.00 1 -5

Planning and Designing HP Enterprise solutions Exam Preparation Guide

Sample Test Items

The sample test items give you a preview of what the actual test items will
look like. It is important to note that these items WILL NOT be on the exam itself. However, they are representative of the actual items, and they should
help you become familiar with the format and complexity of the test items. These sample test items are not a check for readiness.

1. An energy services company preparing for an initial public offering (IPO) has asked for your assistance in complying with the Sarbanes-Oxley Act. They need to implement policies and procedures regarding the data used
to compile their financial reports. Which HP offering helps store and manage electronic documentation, including emails and instant messaging?

A. Darwin Reference Architecture

B. Adaptive Application Architecture C. Information Lifecycle Management D. Adaptive Network Architecture

2. What question would you ask a customer to determine their reliability/availability needs?

A. What is your planned uptime and downtime? B. What is your infrastructure budget?
C. What kind of business growth do you expect?

D. What are your requirements for backup storage capacity?

3. What are the main reasons why IT managers might enlist outside assistance for their next storage area network (SAN)? Select TWO.

A. supplement configuration and implementation services

B. customize solutions

C. reduce risk of data loss

D. increase coverage for technical support

E. use management options more effectively

1 -6 Rev. 1.00

Planning and Designing HP Enterprise solutions Exam Preparation Guide Exam Preparation Guide

4. Match the HP competitor with its weakness in the multiple operating
system environment.

5. Which architectural layers does HP OpenView Storage Data Protector use? Select TWO.

A. Manager of Managers (MOM) B. Cell Client layers
C. Distributed graphical user interface (GUI) D. OpenView Operations (OVO)
E. Cell Manager

6. Which components allow a networked HP storage environment to provide virtual connections between networked clients, application servers, and storage? Select THREE.

A. SecurePath

B. Data migration service

C. HP-UX Workload Manager

D. HP Partitioning Continuum

E. Switch management software

F. Built-in storage array redundancy

Rev. 1.00 1 -7

Planning and Designing HP Enterprise solutions Exam Preparation Guide

Conclusion

HP wishes you success in the HP Certified Professional Program and in passing the exam for which you are preparing.

1 -8 Rev. 1.00

Planning and Designing HP Enterprise solutions Exam Preparation Guide Exam Preparation Guide

Answer Key

1. An energy services company preparing for an initial public offering (IPO) has asked for your assistance in complying with the Sarbanes-Oxley Act. They need to implement policies and procedures regarding the data used to compile their financial reports. Which HP offering helps store and manage electronic documentation, including emails and instant messaging?

A. Darwin Reference Architecture

B. Adaptive Application Architecture

*C. Information Lifecycle Management

D. Adaptive Network Architecture

2. What question would you ask a customer to determine their reliability/availability needs?

*A. What is your planned uptime and downtime? B. What is your infrastructure budget?
C. What kind of business growth do you expect?

D. What are your requirements for backup storage capacity?

3. What are the main reasons why IT managers might enlist outside assistance for their next storage area network (SAN)? Select TWO.

A. supplement configuration and implementation services

B. customize solutions

*C. reduce risk of data loss

D. increase coverage for technical support

*E. use management options more effectively

Rev. 1.00 1 -9

Planning and Designing HP Enterprise solutions Exam Preparation Guide

4. Match the HP competitor with its weakness in the multiple operating
system environment.

5. Which architectural layers does HP OpenView Storage Data Protector use? Select TWO.

A. Manager of Managers (MOM)

*B. Cell Client layers

C. Distributed graphical user interface (GUI) D. OpenView Operations (OVO)
*E. Cell Manager

6. Which components allow a networked HP storage environment to provide virtual connections between networked clients, application servers, and storage? Select THREE.

*A. SecurePath

B. Data migration service

C. HP-UX Workload Manager

D. HP Partitioning Continuum

*E. Switch management software

*F. Built-in storage array redundancy

The HP HPO-087 certificates give you possibility to work in any country of the world because they are acknowledged in all countries equally. This HP HPO-087 torrent certificate helps
not only to improve your knowledge and skills, but it also helps your career, gives a possibility for qualified usage of HP HPO-087 exam products under different conditions. The
majority of companies in the sphere of information technologies require the presence of HP HPO-087 exams for the work in the company, and that makes obtaining this HP 050-649-(606a)
certificate necessary. Many IT specialists were not able to obtain the real HP HPO-087 certificate from the first attempt, which was the result of poor preparation for the
examination, using preparatory HP HPO-087 study guide of poor quality.

The leader among the providers of HP HPO-087 preparatory materials is products such as HP HPO-087 vce pdf Braindumps, HP HPO-087 Tutorial, HP HPO-087 Exam Questions with Answers, HP HPO-087
Trainings, HP HPO-087 Test Online Simulations Course and free PDF. It obtained its leadership and trust of the users from the very beginning of its work on the HP HPO-087 training
materials market. All the HP HPO-087 value pack aids have been created by people who are personally familiar with actualtests HP HPO-087 Preparation Labs and who know all the
difficulties and popular mistakes made by those who take a HP HPO-087 . The entire material is logically composed in such a way that everything becomes easy to understand for
anyone. full download Many HP HPO-087 guides include audio and video material. It is really easy to acquire HP HPO-087 exams because of great variety of methods of payment.

Ordinary measures to obtain CompTIA CompTIA Network+

To be authentificated by CompTIA, you have to spend enough time in working hard on the preparation.Although there are some differences between every certifications, the folowing steps are generally the same. We will take CompTIA Network+ for example.In the event that you are interested in the CompTIA Network+ or CompTIA certificate and in the process to get one then you should be alert.

Firstly, select and decide on a certificate. Some people think that this step does not matter; in fact, they are wrong, because only by making your direction clear can you send off.

Measure you capacity and experience. Find out the gap between your ability with that requested by CompTIA Network+.

  • We cannot ignore the study and preparation at the same time. You can do as the follows, first of all, book is the best teacher. It's the first thing to get a good understanding of books. Textbooks are always cheap and practical.
  • 2)Visit the CompTIA Network+ message board frequently, where people along with textual research can share the exam experience, in IT Forum.
  • 3, If you have enough time and money, attending a training course is a good choice.
  • 4, Tring to do some online tests. On the internet, you can find similar JK0-016 exmation question easily. The more you practice, the more familiar with the examination process.
  • (5) You may also have to visit the official website of CompTIA regularly, because the latest information about the test are always released there.

Register for the test. It is so convenient now to register for a test. And most people choose to sign up online.

Go on to prepare for more certificates. It quite unwise to think that it over as soon as you get CompTIA CompTIA Network+. You better continue to find something else authentical which can be favourable to enhance your ability.

Finally, we should emphasize that taking examinations and getting the certification are only with the purpose of learning more knowledge, so don try to take the examination easily unless you have got ready for it.

10 February, 2010

free actualtest microsoft 74-133 vce

Microsoft 74-133 Exam
Exam 74-133: Customizing Portal Solutions with Microsoft SharePoint Products and Technologies (Including Microsoft Content Management Server)

This exam is for experienced programmers who have a minimum of six months programming experience using Microsoft Visual Studio .NET. This individual works on a team in a medium or large development environment that uses Visual Studio .NET and that team has a need to create customized Microsoft SharePoint Portal Solutions.

Exam Topics Include:
• Develop code that allows for portal and application integration
• Incorporate security into portal applications
• Create and manage custom Web Parts for a portal solution
• Configure content and site management
• Customize Content and Site Management by using code

Give your career a boost and start earning your Microsoft certification today! The TestKing 74-133 exam products are designed to maximize your learning productivity and focus only on the important aspects that will help you pass your exam the first time. We provide you with questions and verified answers accompanied by detailed explanations. These questions and answers, supplied by our industry experts, provide you with an experience like taking the actual test and ensure that you fully understand the questions, as well as the concepts behind the questions.

Pass4sure > Microsoft > Microsoft Partner Competency exam > Exam 74-133
Customizing Portal Solutions with Microsoft SharePoint Products and Technologies : 74-133 Exam

Exam Number/Code: 74-133
Exam Name: Customizing Portal Solutions with Microsoft SharePoint Products and Technologies
VUE Code: 74-133
Questions Type: Multiple choice,
Exam Language(s): English

“Customizing Portal Solutions with Microsoft SharePoint Products and Technologies”, also known as 74-133 exam, is a Microsoft certification.
Preparing for the 74-133 exam? Searching 74-133 Test Questions, 74-133 Practice Exam, 74-133 Dumps?

With the complete collection of questions and answers, Pass4sure has assembled to take you through 75 questions to your 74-133 Exam preparation. In the 74-133 exam resources, you will cover every field and category in Microsoft Partner Competency exam helping to ready you for your successful Microsoft Certification.

Questions and Answers : 75 questions
Updated: 2008-2-10
Market Price: $69.99
Member Price: $59.99

This exam is for experienced programmers who have a minimum of six months programming experience using Microsoft Visual Studio .NET. This individual works on a team in a medium or large development environment that uses Visual Studio .NET and that team has a need to create customized Microsoft SharePoint Portal Solutions.

Practice exams in VCE format:

File Size Last Modified
Microsoft ActualTests 74-133 v 07 27 2006 by Bruno.vce 781.51 KB 13-Feb-2007

Files from PDF Store available for converting:

File Size Last Modified
Microsoft ActualTests 74-133 v2006 07 27.pdf 1.35 MB 26-Oct-2006

QUESTION 1
You are creating a Web site for Certkiller . You receive product lists in the form of XML documents. You
are creating a procedure to extract information from these XML documents according to criteria that
your users will select.
When a user makes a request, you want the results of these requests to be returned as quickly as possible.
What should you do?
A. Create an XmlDataDocument object and load it with the XML data.
Use the DataSet property of the object to create a DataSet object.
Use a SQL SELECT statement to extract the requested data.
B. Create an XmlDataDocument object and load it with the XML data.
Use the SelectNodes method of the object to extract the requested data.
C. Create an XPathDocument object and load it with the XML data.
Call the CreateNavigator method to create an XPathNavigator object.
Call the Select method of the XPathNavigator object to run an XPath query that extracts the requested
data.
D. Create an XmlReader object.
Use the Read method of the object to stream through the XML data and to apply an XPath expression to
extract the requested data.

Actualtests.org – The Power of Knowing
Answer: C
Explanation: The XPathDocument class provides a fast read-only cache for XML document processing using
XSLT. XPath (XML Path Language) is a graph navigation language. XPath is used to select a set of nodes from
an XML document.
Reference: .NET Framework Class Library, XPathDocument Class
QUESTION 2
You are creating an ASP.NET application for Certkiller . The application will be used to identify potential
customers.
Your application will call an XML Web service run by Wide World Importers. The XML Web service
will return an ADO.NET DataSet object containing a list of companies that purchase wine. You want to
merge this DataSet object into a DataSet object containing a list of companies that are potential
customers.
You specify wideWorld as the name of the DataSet object form Wide World Importers, and you specify
customerProspects as the name of the DataSet object containing potential customers. After the merge,
customerProspects will include the company names in wideWorld.
The two DataSet objects contain tables that have the same names and primary keys. The tables in the two
DataSet objects contain columns that have the same names and data types. A table in wideWorld also
contains additional columns that you do not want to add to customerProspects. If customerProspects
included any tables containing rows with pending changes, you want to preserve the current values in
those rows when the merge occurs.
Which lime of code should you use to merge the wideWorld DataSet object into customerProspects
DataSet object?
A. customerProspects.Merge (wideWorld, true,
MissingSchemaAction.Ignore);
B. customerProspects.Merge (wideWorld, true,
MissingSchemaAction.AddWithKey);
C. wideWorld.Merge (customerProspects, true,
MissingSchemaAction.Ignore);
D. wideWorld.Merge (customerProspects, true,
MissingSchemaAction.Add);
Answer: A
Explanation: The DataSet.Merge (DataTable, Boolean, MissingSchemaAction) method merges this DataTable
with a specified DataTable preserving changes according to the specified argument, and handling an
incompatible schema according to the specified argument.
As we want to merge the DataSets into the wideWorld DataSet we should apply the merge method on
wideWorld.
The Ignore MissingSchemaAction ignores the extra columns. This meets the requirement not to add the extra
columns from the table in wideWorld that contains additional columns.
Reference: .NET Framework Class Library, DataSet.Merge Method (DataTable, Boolean,
MissingSchemaAction) [C#]

Actualtests.org – The Power of Knowing
.NET Framework Class Library, MissingSchemaAction Enumeration [C#]
Incorrect Answers
B: The AddWithKey MissingSchemaAction adds the necessary columns and primary key information to
complete the schema. However, we do not want to add any extra columns.
C, D: As we want to merge the DataSets into the customerProspects DataSet we should apply the merge
method on customerProspects, not on wideWorld .
QUESTION 3
You are creating an ASP.NET page that contains a Label control named specialsLabel. A text file named
Specials.txt contains a list of products. Specials.txt is located in the application directory. Each product
name listed in Specials.txt is followed by a carriage return.
You need to display a list of featured products in specialsLabel. You need to retrieve the lost of products
from Specials.txt.
Which code segment should you use?
A. System.IO.StreamReader reader =
System.IO.File.OpenText(
Server.MapPath(”Specials.txt”));
string inout = “”;
while (input !=null)
{
specialsLabel.Text =
string.Format(”{0}
{1} “,
specialsLabel.Text, input);
input = reader.BaseStream.ToString();
}
reader.Close();
B. System.IO.StreamReader reader =
System.IO.File.OpenText(
Server.MapPath(”Specials.txt”));
string inout = “”;
input = reader.ReadLine();
while (input != null)
{
specialsLabel.Text =
string.Format(”{0}
{1} “,
specialsLabel.Text, input);
input = reader.ReadLine();
}
reader.Close()
C. System.IO.Stream strm = System.IO.File.OpenRead(
Server.MapPath(”Specials.txt”));
byte[] b 0 new byte[1024];
string input;
input = strm.Read(b, 0, b.Length).ToString();

Actualtests.org – The Power of Knowing
specialsLabel.Text = input
strm.Close();
D. System.IO.Stream strm = System.IO.File.OpenRead(
Server.MapPath(”Specials.txt”));
string input;
input = strm.ToString();
specialsLabel.Text = input;
strm.Close();
Answer: B
Explanation: We create a StreamReader. We then read one line at a time and display each line appropriately,
until the stream is empty.
Reference: .NET Framework Developer’s Guide, Reading Text from a File [C#]
Incorrect Answers
A: The StreamReader.BaseStream property Returns the underlying stream. We cannot use the ToString
method on a stream. The following command is incorrect:
input = reader.BaseStream.ToString()
C: We should read a line a time, not a byte.
D: We cannot use the ToString method on a FileStream.
Free download:pass4sure Microsoft 74-133
Free download:testking Microsoft 74-133

20 January, 2010

SAP ABAP Certification Review: SAP ABAP Interview Questions, Answers, And Explanations



It’ s clear that SAP ABAP is one of the most important areas in SAP. Mastering technical details is difficult. SAP ABAP Interview Questions, Answers, and Explanations guides you through your learning process. From helping you to assess your ABAP skills to evaluating candidates for a job, SAP ABAP Certification and Interview book will help you understand what you really need to know. The book is organized around eight areas of SAP ABAP: Databases, Lists, Tables, Dialog, ABAP Objects, Basis, and others. Each question includes everything you need to know to master the interview or properly evaluate a candidate. More than just a rehash of SAP documentation and sales presentations, each question is based on project knowledge and experience gained on successful high-profile SAP implementations.


Key certification and interview topics include:


- Database Updates and Changing the Standard

- List Processing

- Internal Tables, and ALV Grid Control


- Dialog Programming

- ABAP Objects

- Data Transfer

- Basis Administration

- ABAP Development reference updated for 2006!

- Everything an ABAP resource needs to know before an interview


http://www.megaupload.com/?d=NLECK8EX

10 January, 2010

MCSE Self-Paced Training Kit (Exam 70-293): Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure, Second Edition

Announcing an all-new MCSA/MCSE Training Kit designed to help maximize your performance on Exam 70-293, a core exam for the new Windows Server 2003 certification. This kit packs the tools and features that exam candidates want mostincluding in-depth, self-paced training based on final exam content; rigorous, objective-by-objective review; exam tips from expert, exam-certified authors; and a robust testing suite. It also provides real-world scenarios, case study examples, and troubleshooting labs for skills and expertise that you can apply to the job.

QUESTION 1
You work as a software developer at Certkiller .com. You develop an application that
includes a Contact Class, which is defined by the following code:
Public Class Contact
Private name As String
Public Event ContactSaved()
Public Property Name()
Get
Return name
End Get
Set(ByVal Value)
name = Value
End Set
End Property
Public Sub Save()
‘Insert Save Code.
RaiseEvent ContactSaved()
End Sub
End Class
You create a form named MainForm. This form must include code to handle the
ContactSaved event raised by the Contact object. The Contact object will be
initialized by a procedure named CreateContact.
Which code segment should you use?
A. Public Class MainForm
Private oContact As New Contact()
Private Sub HandleContactSave()
‘Insert event handling code.
End Sub
Private Sub CreateContact()
oContact.Name = “Certkiller”
oContact.Save()
End Sub
End Class
B. Public Class MainForm
Private WithEvents oContact As New Contact()
Private Sub HandleContactSave()
‘Insert event handling code.
End Sub
Private Sub CreateContact ()
oContact.Name = “Certkiller”
oContact.Save()

Actualtests.org – The Power of Knowing
End Sub
End Class
C. Public Class MainForm
Private WithEvents oContact AsNew Contact()
Private Sub HandleContactSave()
Handles oContact.ContactSaved
‘Insert Event handling code.
End Sub
Private Sub CreateContact ()
oContact.Name = “Certkiller”
oContact.Save()
End Sub
End Class
D. Public Class MainForm
Private WithEvents oContact As New Contact()
Private Sub HandleContactSave() _
Handles oContact.ContactSaved
‘Insert event handling code.
End Sub
Private Sub CreateContact ()
Dim oContact As New Contact()
oContact.Name = “Certkiller”
oContact.Save()
End Sub
End Class
Answer: C
Explanation:
Not D: Public Class Main Form
Private WithEvents oContact As New Contant()
Private Sub HandleContactSave() Handles oContact.ContactSaved
‘Insert event handling code.
End Sub
Private Sub CreateContact()
Dim oContact as New Contact()
oContact.Name = “Certkiller”
oContact.Save()
End Sub
End Class
The problem with this code is that the Class Level oContact that is specified WithEvents,
is hidden by the Method Level variable of the same name inside the CreateContact
procedure. Therefore the save method call will not have any effect as there is no event
handler for the method level variable.
There fore the correct answer is C

Actualtests.org – The Power of Knowing
QUESTION 2
You work as a software developer at Certkiller .com. You create a form in your
Windows-based application. The form contains a command button named
check Certkiller Button. When check Certkiller Button is clicked, the application must
call a procedure named Get Certkiller .
Which two actions should you take? (Each correct answer presents part of the
solution. Choose two)
A. Add arguments to the Get Certkiller declaration to accept System.Object and
System.EventArgs.
B. Add arguments to the check Certkiller Button_Click declaration to accept
System.Object and System.EventArgs.
C. Add code to Get Certkiller to call check Certkiller Button_Click.
D. Add the following code segment at the end of the Get Certkiller declaration:
Handles check Certkiller Button.Click
E. Add the following code segment at the end of the check Certkiller Button_Click
procedure:
Handles Get Certkiller
Answer: A, D
Explanation: Get Certkiller is the name of the method handling the button click.
QUESTION 3
You develop a Windows-based application by using Visual Studio .NET. The
application includes a form named MainForm and a class named Certkiller .
MainForm includes a button named create Certkiller Button. You must ensure that
your application creates an instance of Certkiller when a user clicks this button. You
want to write the most efficient code possible.
Which code segment should you use?
A. Dim con As Certkiller = New Object()
B. Dim con As New Certkiller
C. Dim con As Object
con = New Certkiller ()
D. Dim con As Certkiller
con = New Object()
Answer: B

06 January, 2010

The PMP Certification

One of the most intensive certifications available is the PMP (Project Management Professional) certification. Offered by PMI (Project Management Institute), the PMP demonstrates advanced knowledge of and experience with Project Management concepts. When it comes to finding internet resources and practice exams, it is also one of the most difficult and obscure certifications. As a result of several emails asking for this information, and quite a bit of research, here are the best places to find information on the PMP cert.
PMP Training

Most training for the PMP certification is both intensive and costly, but the PMP is generally considered a good investment. According to my 2002 certification salary survey, individuals with a PMI cert averaged $90,000 per year. Fortunately, good practice questions are just beginning to appear on popular training sites so you can get an idea of where your strengths and weaknesses lay before taking the exam

03 January, 2010

Information Technology Infrastructure Library itil

The Information Technology Infrastructure Library (ITIL) is a set of concepts and techniques for managing information technology (IT) infrastructure, development, and operations.

ITIL is published in a series of books, each of which cover an IT management topic. The names ITIL and IT Infrastructure Library are registered trademarks of the United Kingdom’s Office of Government Commerce (OGC). ITIL gives a detailed description of a number of important IT practices with comprehensive checklists, tasks and procedures that can be tailored to any IT organization.

Contents [hide]
1 Certification
2 ITIL History
2.1 Precursors
2.2 Development
3 ITIL alternatives
4 Overview of the ITIL 2 library
5 Overview of the ITIL v3 library
6 Details of the ITIL v2 framework
6.1 Service Support
6.1.1 Service Desk / Service Request Management
6.1.2 Incident Management
6.1.3 Software Asset Management
6.1.4 Problem Management
6.1.5 Configuration Management
6.1.6 Change Management
6.1.6.1 Change Management Terminology
6.1.7 Release Management
6.2 Service Delivery
6.2.1 Service Level Management
6.2.2 Capacity Management
6.2.3 IT Service Continuity Management
6.2.4 Availability Management
6.2.5 Financial Management for IT Services
6.3 Planning to implement service management
6.4 Security Management
6.5 ICT Infrastructure Management
6.5.1 ICT Design and Planning
6.5.2 ICT Deployment Management
6.5.3 ICT Operations Management
6.5.4 ICT Technical Support
6.6 The Business Perspective
6.7 Application Management
6.8 Small-Scale Implementation
7 Criticisms of ITIL
8 See also
9 References
10 External links

[edit] Certification

An ITIL Foundation certificate pin.ITIL certifications are managed by the ITIL Certification Management Board (ICMB) which is composed of the OGC, IT Service Management Forum (itSMF) International and two examinations institutes: EXIN (based in the Netherlands) and ISEB (based in the UK).

The EXIN and ISEB administer exams and award qualifications at Foundation, Practitioner and Manager/Masters level currently in ‘ITIL Service Management’, ‘ITIL Application Management’ and ‘ICT Infrastructure Management’ respectively.

A voluntary registry of ITIL-certified practitioners is operated by the ITIL Certification Register.

Organizations or a management system may not be certified as “ITIL-compliant”. However an organization that has implemented ITIL guidance in ITSM may be able to achieve compliance with and seek certification under ISO/IEC 20000.

On July 20, 2006, the OGC signed a contract with the APM Group to be its commercial partner for ITIL accreditation from January 1, 2007.[1] The OGC’s failure to further formalize institutional relationships with the itSMF as part of these activities has been controversial.[citation needed]
[edit] ITIL History

[edit] Precursors
Many of the concepts did not originate within the original UK Government’s Central Computer and Telecommunications Agency (CCTA) project to develop ITIL. According to IBM:

In the early 1980s, IBM documented the original Systems Management concepts in a four-volume series called A Management System for Information Systems. These widely accepted yellow books, … were key inputs to the original set of ITIL books.”[2][3]

The primary author of the IBM yellow books was Edward A. Van Schaik, who compiled them into the 1985 book A Management System for the Information Business[4] (since updated with a 2006 re-issue by Red Swan Publishing[5]). In the 1985 work, Van Schaik in turn references a 1974 Richard L. Nolan work, Managing the Data Resource Function[6] which may be the earliest known systematic English-language treatment of the topic of large scale IT management (as opposed to technological implementation).
[edit] Development
What is now called ITIL version 1, developed under the auspices of the CCTA, was titled “Government Information Technology Infrastructure Management Methodology” (GITMM) and over several years eventually expanded to 31 volumes in a project initially directed by Peter Skinner and John Stewart at the CCTA. The publications were retitled primarily as a result of the desire (by Roy Dibble of CCTA) that the publications be seen as guidance and not as a formal method and as a result of growing interest from outside of the UK Government.

During the late 1980s the CCTA was under sustained attack, both from IT companies who wanted to take over the central Government consultancy service it provided, and from other Government departments who wanted to break free of its oversight. Eventually CCTA succumbed and the concept of a central driving IT authority for the UK Government was lost. This meant that adoption of CCTA guidance such as ITIL was delayed, as various other departments fought to take over new responsibilities.

In some cases this guidance was lost permanently. For instance, the CCTA IT Security and Privacy group provided the CCTA IT Security Library input to GITMM, but when CCTA was broken up the security service appropriated this work and suppressed it as part of their turf war over security responsibilities.

Although developed during the 1980s, for the reasons mentioned above ITIL was not widely adopted until the mid 1990s. This wider adoption and awareness has led to a number of standards, including ISO/IEC 20000 which is an international standard covering the IT Service Management elements of ITIL. ITIL is often considered alongside other best practice frameworks such as the Information Services Procurement Library (ISPL), the Application Services Library (ASL), Dynamic Systems Development Method (DSDM), the Capability Maturity Model (CMM/CMMI), and is often linked with IT governance through Control Objectives for Information and related Technology (COBIT).

In December 2005, the OGC issued notice of an ITIL refresh,[7] commonly known as ITIL v3, which became available in May 2007. ITIL v3 initially includes five core texts:

Service Strategy
Service Design
Service Transition
Service Operation
Continual Service Improvement
These publications update much of the current v2 and extend the scope of ITIL in the domain of service management.
[edit] ITIL alternatives
IT Service Management as a concept is related but not equivalent to ITIL which, in Version 2, contained a subsection specifically entitled IT Service Management (ITSM). (The five volumes of version 3 have no such demarcated subsection). The combination of the Service Support and Service Delivery volumes are generally equivalent to the scope of the ISO/IEC 20000 standard (previously BS 15000).

Outside of ITIL, other IT Service Management approaches and frameworks exist, including the Enterprise Computing Institute’s library covering general issues of large scale IT management, including various Service Management subjects.

The British Educational Communications and Technology Agency (BECTA) has developed the Framework for ICT Technical Support (FITS) and is based on ITIL, but it is slimmed down for UK primary and secondary schools (which often have very small IT departments). Similarly, The Visible OPS Handbook: Implementing ITIL in 4 Practical and Auditable Steps claims to be based on ITIL but to focus specifically on the biggest “bang for the buck” elements of ITIL.

Organizations that need to understand how ITIL processes link to a broader range of IT processes or need task level detail to guide their service management implementation can use the IBM Tivoli Unified Process (ITUP). Like MOF, ITUP is aligned with ITIL, but is presented as a complete, integrated process model.

Smaller organizations that cannot justify a full ITIL program and materials can gain insight into ITIL from a review of the Microsoft Operations Framework which is based on ITIL but defines a more limited implementation.

The enhanced Telecom Operations Map eTOM published by the TeleManagement Forum offers an alternative framework aimed at telecommunications service providers.
[edit] Overview of the ITIL 2 library
The IT Infrastructure Library originated as a collection of books each covering a specific practice within IT Service Management. After the initial publication, the number of books quickly grew within ITIL v1 to over 30 volumes. In order to make ITIL more accessible (and affordable) to those wishing to explore it, one of the aims of ITIL v2 was to consolidate the publications into logical ’sets’ that grouped related process guidelines into the different aspects of IT management, applications and services.

While the Service Management sets (Service Support and Service Delivery) are by far the most widely used, circulated and understood of ITIL publications, ITIL provides a more comprehensive set of practices as a whole. Proponents believe that using the broader library provides a comprehensive set of guidance to link the technical implementation, operations guidelines and requirements with the strategic management, operations management and financial management of a modern business.

The eight ITIL version 2 books and their disciplines are:

The IT Service Management sets

1. Service Delivery
2. Service Support
Other operational guidance

3. ICT Infrastructure Management
4. Security Management
5. The Business Perspective
6. Application Management
7. Software Asset Management
To assist with the implementation of ITIL practices a further book was published providing guidance on implementation (mainly of Service Management):

8. Planning to Implement Service Management
And this has more recently been supplemented with guidelines for smaller IT units, not included in the original eight publications:

9. ITIL Small-Scale Implementation
ITIL is built around a process-model based view of controlling and managing operations often credited to W. Edwards Deming[citation needed]. The ITIL recommendations were developed in the 1980s by the UK Government’s CCTA in response to the growing dependence on IT and a recognition that without standard practices, government agencies and private sector contracts were independently creating their own IT management practices and duplicating effort within their Information and Communications Technology (ICT) projects resulting in common mistakes and increased costs.[citation needed] In April 2001 the CCTA was merged into the Office of Government Commerce (OGC), an office of the UK Treasury.[8]

One of the primary benefits claimed by proponents of ITIL within the IT community is its provision of common vocabulary, consisting of a glossary of tightly defined and widely agreed terms. A new and enhanced glossary has been developed as a key deliverable of the ITIL v3 (also known as the ITIL Refresh Project).
[edit] Overview of the ITIL v3 library
ITIL v3, published in May 2007, comprises 5 key volumes:

1. Service Strategy
a) Value Creation
-Service Utility
-Service Warrenty
b)Service Assets
-Capabilities
-Resources
c) Service Provider Types
-Type 1-Internal Service Provider
-Type 2-Shared Service Group
-Type 3-External Service Provider
d) Service Structures
e) Service Strategy Funditmentals
2. Service Design
3. Service Transition
4. Service Operation
5. Continual Service Improvement

[edit] Details of the ITIL v2 framework

[edit] Service Support
The Service Support[9] ITIL discipline is focused on the User of the ICT services and is primarily concerned with ensuring that they have access to the appropriate services to support the business functions.

To a business, customers and users are the entry point to the process model. They get involved in service support by:

Asking for changes
Needing communication, updates
Having difficulties, queries.
The service desk is the single contact point for the customers to record their problems. It will try to resolve it, if there is a direct solution or will create an incident. Incidents initiate a chain of processes: Incident Management, Problem Management, Change Management, Release Management and Configuration Management (see following sections for details). This chain of processes is tracked using the Configuration Management Database (CMDB), which records each process, and creates output documents for traceability (Quality Management).
[edit] Service Desk / Service Request Management
The Service Desk function is the single point of contact between users and IT Service Management.

Main article: Service Desk (ITSM)
Tasks include handling incidents and requests, and providing an interface for other ITSM processes.

Single Point of Contact (SPOC) and not necessarily the First Point of Contact (FPOC)
There is a single point of entry and exit
Easier for Customers
Data Integrity
Communication channel is streamlined
The primary functions of the Service Desk are:

Incident Control: life cycle management of all Service Requests
Communication: keeping the customer informed of progress and advising on workarounds
The Service Desk function is known under various names .

Call Centre: main emphasis on professionally handling large call volumes of telephone-based transactions
Help Desk: manage, co-ordinate and resolve incidents as quickly as possible
Service Desk: not only handles incidents, problems and questions but also provides an interface for other activities such as change requests, maintenance contracts, software licenses, Service Level Management, Configuration Management, Availability Management, Financial Management and IT Services Continuity Management
The three types of structure that can be considered are:

Local Service Desk: to meet local business needs – is practical only until multiple locations requiring support services are involved
Central Service Desk: for organizations having multiple locations – reduces operational costs and improves usage of available resources
Virtual Service Desk: for organizations having multi-country locations – can be situated and accessed from anywhere in the world due to advances in network performance and telecommunications, reducing operational costs and improving usage of available resources

[edit] Incident Management
The goal of Incident Management is to restore normal service operation as quickly as possible and minimize the adverse effect on business operations, thus ensuring that the best possible levels of service quality and availability are maintained. ‘Normal service operation’ is defined here as service operation within Service Level Agreement (SLA) limits.
Main article: Incident Management (ITSM)

[edit] Software Asset Management
Software asset management (SAM) is the practice of integrating people, processes and technology to allow software licenses and usage to be systematically tracked, evaluated and managed. The goal of SAM is to reduce IT expenditures, human resource overhead and risks inherent in owning and managing software assets.

SAM includes maintaining software license compliance; tracking the inventory and usage of software assets; and maintaining standard policies and procedures surrounding the definition, deployment, configuration, use and retirement of software assets. SAM represents the software component of IT asset management, which also includes hardware asset management (to which SAM is intrinsicly linked by the concept that without effective inventory hardware controls, efforts to control the software thereon will be significantly inhibited).
Main article: Software Asset Management

[edit] Problem Management
The goal of ‘Problem Management’ is to resolve the root cause of incidents and thus to minimize the adverse impact of incidents and problems on business that are caused by errors within the IT infrastructure, and to prevent recurrence of incidents related to these errors. A `problem’ is an unknown underlying cause of one or more incidents, and a `known error’ is a problem that is successfully diagnosed and for which either a work-around or a permanent resolution has been identified. The CCTA defines problems and known errors as follows:

A problem is a condition often identified as a result of multiple Incidents that exhibit common symptoms. Problems can also be identified from a single significant Incident, indicative of a single error, for which the cause is unknown, but for which the impact is significant.
A known error is a condition identified by successful diagnosis of the root cause of a problem, and the subsequent development of a Work-around.
Problem management is different from incident management. The principal purpose of problem management is to find and resolve the root cause of a problem and prevention of incidents; the purpose of incident management is to return the service to normal level as soon as possible, with smallest possible business impact.
The problem management process is intended to reduce the number and severity of incidents and problems on the business, and report it in documentation to be available for the first-line and second line of the help desk. The proactive process identifies and resolves problems before incidents occur. These activities are:

Trend analysis;
Targeting support action;
Providing information to the organization.
The Error Control Process is an iterative process to diagnose known errors until they are eliminated by the successful implementation of a change under the control of the Change Management process.

The Problem Control Process aims to handle problems in an efficient way. Problem control identifies the root cause of incidents and reports it to the service desk. Other activities are:

Problem identification and recording;
Problem classification;
Problem investigation and diagnosis.
The standard technique for identifying the root cause of a problem is to use an Ishikawa diagram, also referred to as a cause-and-effect diagram, tree diagram, or fishbone diagram. An Ishikawa diagram is typically the result of a brainstorming session in which members of a group offer ideas to improve a product. For problem-solving, the goal will be to find the cause and effect of the problem.

Ishikawa diagrams can be defined in a meta-model.

First there is the main subject, which is the backbone of the diagram that we are trying to solve or improve. The main subject is derived from a cause. The relationship between a cause and an effect is a double relation: an effect is a result of a cause, and the cause is the root of an effect. But there is just one effect for several causes and one cause for several effects.

[edit] Configuration Management
Configuration Management is a process that tracks all of the individual Configuration Items (CI) in a system.

Main article: Configuration Management (ITSM)

[edit] Change Management
The goal of Change Management is to ensure that standardized methods and procedures are used for efficient handling of all changes, in order to minimize the impact of change-related incidents and to improve day-to-day operations.

Main article: Change Management (ITSM)
A change is �an event that results in a new status of one or more configuration items (CI’s)� approved by management, cost effective, enhances business process changes (fixes) – with a minimum risk to IT infrastructure.

The main aims of Change Management are:

Minimal disruption of services
Reduction in back-out activities
Economic utilization of resources involved in the change

[edit] Change Management Terminology
Change: the addition, modification or removal of CIs
Request for Change (RFC): form used to record details of a request for a change and is sent as an input to Change Management by the Change Requestor
Forward Schedule of Changes (FSC): schedule that contains details of all the forthcoming Changes

[edit] Release Management
Release Management is used for platform-independent and automated distribution of software and hardware, including license controls across the entire IT infrastructure. Proper software and hardware control ensures the availability of licensed, tested, and version-certified software and hardware, which will function as intended when introduced into the existing infrastructure. Quality control during the development and implementation of new hardware and software is also the responsibility of Release Management. This guarantees that all software meets the demands of the business processes. The goals of release management are:

Plan the rollout of software
Design and implement procedures for the distribution and installation of changes to IT systems
Effectively communicate and manage expectations of the customer during the planning and rollout of new releases
Control the distribution and installation of changes to IT systems
The focus of release management is the protection of the live environment and its services through the use of formal procedures and checks.

Release Categories
A Release consists of the new or changed software and/or hardware required to implement approved changes
Releases are categorized as:

Major software releases and hardware upgrades, normally containing large amounts of new functionality, some of which may make intervening fixes to problems redundant. A major upgrade or release usually supersedes all preceding minor upgrades, releases and emergency fixes.
Minor software releases and hardware upgrades, normally containing small enhancements and fixes, some of which may have already been issued as emergency fixes. A minor upgrade or release usually supersedes all preceding emergency fixes.
Emergency software and hardware fixes, normally containing the corrections to a small number of known problems.

Releases can be divided based on the release unit into:
Delta Release: is a release of only that part of the software which has been changed. For example, security patches.
Full Release: means that the entire software program will be deployed. For example, a new version of an existing application.
Packaged Release: is a combination of many changes. For example, an operating system image which also contains specific applications.

[edit] Service Delivery
The Service Delivery [10] discipline is primarily concerned with the proactive and forward-looking services that the business requires of its ICT provider in order to provide adequate support to the business users. It is focused on the business as the customer of the ICT services (compare with: Service Support). The discipline consists of the following processes, explained in subsections below:

Service Level Management
Capacity Management
IT Service Continuity Management
Availability Management
Financial Management
[edit] Service Level Management
Service Level Management provides for continual identification, monitoring and review of the levels of IT services specified in the service level agreements (SLAs). Service Level Management ensures that arrangements are in place with internal IT Support Providers and external suppliers in the form of Operational Level Agreements (OLAs) and Underpinning Contracts (UCs). The process involves assessing the impact of change upon service quality and SLAs. The service level management process is in close relation with the operational processes to control their activities. The central role of Service Level Management makes it the natural place for metrics to be established and monitored against a benchmark.

Service Level Management is the primary interface with the customer (as opposed to the user, who is serviced by the Service Desk). Service Level Management is responsible for

ensuring that the agreed IT services are delivered when and where they are supposed to be
liaising with Availability Management, Capacity Management, Incident Management and Problem Management to ensure that the required levels and quality of service are achieved within the resources agreed with Financial Management
producing and maintaining a Service Catalog (a list of standard IT service options and agreements made available to customers)
ensuring that appropriate IT Service Continuity plans have been made to support the business and its continuity requirements.
The Service Level Manager relies on all the other areas of the Service Delivery process to provide the necessary support which ensures the agreed services are provided in a cost effective, secure and efficient manner.
[edit] Capacity Management
Capacity Management supports the optimum and cost effective provision of IT services by helping organizations match their IT resources to the business demands. The high-level activities are Application Sizing, Workload Management, Demand Management, Modeling, Capacity Planning, Resource Management, and Performance Management.
[edit] IT Service Continuity Management
IT Service Continuity Management helps to ensure the availability and rapid restoration of IT services in the event of a disaster. The high level activities are Risk Analysis, Contingency Plan Management, Contingency Plan Testing, and Risk Management.
[edit] Availability Management
Availability Management allows organizations to sustain the IT service availability in order to support the business at a justifiable cost. The high-level activities are Realize Availability Requirements, Compile Availability Plan, Monitor Availability, and Monitor Maintenance Obligations.

Availability Management is the ability of an IT component to perform at an agreed level over a period of time.

Reliability: how reliable is the service? Ability of an IT component to perform at an agreed level at described conditions.
Maintainability: The ability of an IT Component to remain in, or be restored to an operational state.
Serviceability: The ability for an external supplier to maintain the availability of component or function under a third party contract.
Resilience: A measure of freedom from operational failure and a method of keeping services reliable. One popular method of resilience is redundancy.
Security: A service may have associated data. Security refers to the confidentiality, integrity, and availability of that data. Availability gives us the clear overview of the end to -end availability of the system

[edit] Financial Management for IT Services
Main article: Financial Management

[edit] Planning to implement service management
Main article: ITIL Planning to implement service management
The ITIL discipline – Planning To Implement Service Management [11] attempts to provide practitioners with a framework for the alignment of business needs and IT provision requirements. The processes and approaches incorporated within the guidelines suggest the development of a Continuous Service Improvement Programme (CSIP) as the basis for implementing other ITIL disciplines as projects within a controlled programme of work. Planning To Implement Service Management is mainly focused on the Service Management processes, but is also generically applicable to other ITIL disciplines.

create vision
analyze organization
set goals
implement IT service management

[edit] Security Management
Main article: ITIL Security Management
The ITIL-process Security Management [12] describes the structured fitting of information security in the management organization. ITIL Security Management is based on the code of practice for information security management also known as ISO/IEC 17799.

A basic concept of the Security Management is the information security. The primary goal of information security is to guarantee safety of the information. Safety is to be protected against risks. Security is the means to be safe against risks. When protecting information it is the value of the information that has to be protected. These values are stipulated by the confidentiality, integrity and availability. Inferred aspects are privacy, anonymity and verifiability.

The current move towards ISO/IEC 27001 may require some revision to the ITIL Security Management best practices which are often claimed to be rich in content for physical security but weak in areas such as software/application security and logical security in the ICT infrastructure.
[edit] ICT Infrastructure Management
ICT Infrastructure Management [13] processes recommend best practice for requirements analysis, planning, design, deployment and ongoing operations management and technical support of an ICT Infrastructure. (”ICT” is an acronym for “Information and Communication Technology”.)

The Infrastructure Management processes describe those processes within ITIL that directly relate to the ICT equipment and software that is involved in providing ICT services to customers.

ICT Design and Planning
ICT Deployment
ICT Operations
ICT Technical Support
These disciplines are less well understood than those of Service Management and therefore often some of their content is believed to be covered ‘by implication’ in Service Management disciplines.
[edit] ICT Design and Planning
ICT Design and Planning provides a framework and approach for the Strategic and Technical Design and Planning of ICT infrastructures. It includes the necessary combination of Business (and overall IS) strategy, with technical design and architecture. ICT Design and Planning drives both the Procurement of new ICT solutions through the production of Statements of Requirement (”SOR”) and Invitations to Tender (”ITT”) and is responsible for the initiation and management of ICT Programmes for strategic business change. Key Outputs from Design and Planning are:

ICT Strategies, Policies and Plans
The ICT Overall Architecture & Management Architecture
Business Cases, Feasibility Studies, ITTs and SORs

[edit] ICT Deployment Management
ICT Deployment provides a framework for the successful management of design, build, test and roll-out (deploy) projects within an overall ICT programme. It includes many project management disciplines in common with PRINCE2, but has a broader focus to include the necessary integration of Release Management and both functional and non functional testing.
[edit] ICT Operations Management
ICT Operations Management provides the day-to-day technical supervision of the ICT infrastructure. Often confused with the role of Incident Management from Service Support, Operations is more technical and is concerned not solely with Incidents reported by users, but with Events generated by or recorded by the Infrastructure. ICT Operations may often work closely alongside Incident Management and the Service Desk, which are not-necessarily technical in order to provide an ‘Operations Bridge’. Operations, however should primarily work from documented processes and procedures and should be concerned with a number of specific sub-processes, such as: Output Management, Job Scheduling, Backup and Restore, Network Monitoring/Management, System Monitoring/Management, Database Monitoring/Management Storage Monitoring/Management. Operations are responsible for:

A stable, secure ICT infrastructure
A current, up to date Operational Documentation Library (”ODL”)
A log of all operational Events
Maintenance of operational monitoring and management tools.
Operational Scripts
Operational Procedures

[edit] ICT Technical Support
ICT Technical Support is the specialist technical function for infrastructure within ICT. Primarily as a support to other processes, both in Infrastructure Management and Service Management, Technical Support provides a number of specialist functions: Research and Evaluation, Market Intelligence (particularly for Design and Planning and Capacity Management), Proof of Concept and Pilot engineering, specialist technical expertise (particularly to Operations and Problem Management), creation of documentation (perhaps for the Operational Documentation Library or Known Error Database).
[edit] The Business Perspective
The Business Perspective is the name given to the collection of best practices[14] that is suggested to address some of the issues often encountered in understanding and improving IT service provision, as a part of the entire business requirement for high IS quality management. These issues are:

Business Continuity Management describes the responsibilities and opportunities available to the business manager to improve what is, in most organizations one of the key contributing services to business efficiency and effectiveness.
Surviving Change. IT infrastructure changes can impact the manner in which business is conducted or the continuity of business operations. It is important that business managers take notice of these changes and ensure that steps are taken to safeguard the business from adverse side effects.
Transformation of business practice through radical change helps to control IT and to integrate it with the business.
Partnerships and outsourcing
This volume is related to the topics of IT Governance and IT Portfolio Management.
[edit] Application Management
ITIL Application Management[15] set encompasses a set of best practices proposed to improve the overall quality of IT software development and support through the life-cycle of software development projects, with particular attention to gathering and defining requirements that meet business objectives.

This volume is related to the topics of Software Engineering and IT Portfolio Management.
[edit] Small-Scale Implementation
ITIL Small-Scale Implementation [16] provides an approach to the implementation of the ITIL framework for those with smaller IT units or departments. It is primarily an auxiliary work, covering many of the same best practice guidelines as Planning To Implement Service Management, Service Support and Service Delivery but provides additional guidance on the combination of roles and responsibilities and avoiding conflict between ITIL priorities.
[edit] Criticisms of ITIL
ITIL has been criticized on several fronts, including:

The books are not affordable for non-commercial users
Accusations that many ITIL advocates think ITIL is “a holistic, all-encompassing framework for IT governance”;
Accusations that proponents of ITIL indoctrinate the methodology with ‘religious zeal’ at the expense of pragmatism.
As Jan van Bon (author and editor of many IT Service Management publications) notes,

There is a lot of confusion about ITIL, stemming from all kinds of misunderstandings about its nature. ITIL is, as the OGC states, a set of best practices. The OGC doesn�t claim that ITIL�s best practices describe pure processes. The OGC also doesn�t claim that ITIL is a framework, designed as one coherent model. That is what most of its users make of it, probably because they have such a great need for such a model…[17]
CIO Magazine columnist Dean Meyer has also presented some cautionary views of ITIL,[18] including five pitfalls such as “becoming a slave to outdated definitions” and “Letting ITIL become religion.” As he notes, “…it doesn’t describe the complete range of processes needed to be world class. It’s focused on … managing ongoing services.”

The quality of the library’s volumes is seen to be uneven. For example, van Herwaarden and Grift note, �the consistency that characterized the service support processes � is largely missing in the service delivery books.”[19]

In a 2004 survey designed by Noel Bruton (author of ‘How to Manage the IT Helpdesk’ and ‘Managing the IT Services Process’), ITIL adopting organizations were asked to relate their actual experiences in having implemented ITIL. Seventy-seven percent of survey respondents either agreed or strongly agreed that “ITIL does not have all the answers”. ITIL exponents accept this, citing ITIL’s stated intention to be non-prescriptive, expecting that organizations will have to engage ITIL processes with their existing overall process model. Bruton notes that the claim to non-prescriptiveness must be at best one of scale rather than absolute intention, for the very description of a certain set of processes is in itself a form of prescription. (Survey “The ITIL Experience – Has It Been Worth It”, author Bruton Consultancy 2004, published by Helpdesk Institute Europe, The Helpdesk and IT Support Show and Hornbill Software.)

The BOFH notes that ITIL manuals are like kryptonite to enthusiasm.” [20]
[edit] See also
Business Application Optimization (BAO, Macro 4)
Enterprise Architecture
IT Governance
IT Service Management
IBM Tivoli Unified Process (ITUP)
Microsoft Operations Framework (MOF)
Run Book Automation (RBA)
Stratavia Data Palette
Performance engineering
enhanced Telecom Operations Map (eTOM)
Grey Area Diagnosis
PRINCE2

[edit] References
^ Office of Government Commerce (2006). Best Practice portfolio: new contracts awarded for publishing and accreditation services (HTML). Retrieved on 2006-09-19.
^ IBM Global Services (2004). IBM and the IT Infrastructure Library (PDF). Retrieved on 2006-05-31.
^ IBM Global Services (2003). IBM’s commitment to ITIL (archived) (HTML). Retrieved on 2007-03-04.
^ Van Schaik, E. A. (1985). A Management System for the Information Business. Englewood Cliffs, NJ, Prentice-Hall, Inc. ISBN 0-13-549965-8
^ Van Schaik, E. A. (2006 2nd Ed.). A Management system for the Information Business. Red Swan Publishing. ISBN 1933703032
^ Nolan, Richard, 1974, 1982. Managing the Data Resource Function. St. Paul, Minnesota, West Publishing. ISBN 0829900039 (1982 ed.)
^ Office of Government Commerce. ITIL Refresh Statement. Retrieved February 13, 2006.
^ Office of Government Commerce (UK)CCTA and OGC. Retrieved May 5, 2005.
^ Office of Government Commerce (2000). Service Support. The Stationery Office. ISBN 0-11-330015-8.
^ Office of Government Commerce (2001). Service Delivery, IT Infrastructure Library. The Stationery Office. ISBN 0-11-330017-4.
^ Office of Government Commerce (2002). Planning To Implement Service Management. The Stationery Office. ISBN 0-11-330877-9.
^ Cazemier, Jacques A.; Overbeek, Paul L.; Peters, Louk M. (2000). Security Management. The Stationery Office. ISBN 0-11-330014-X.
^ Office of Government Commerce (2002). ICT Infrastructure Management. The Stationery Office. ISBN 0-11-330865-5.
^ Office of Government Commerce (2005). The Business Perspective. The Stationery Office. ISBN 0-11-330894-9.
^ Office of Government Commerce (2002). Application Management. The Stationery Office. ISBN 0-11-330866-3.
^ Office of Government Commerce (2005). ITIL Small Scale Implementation. The Stationery Office. ISBN 0-11-330980-5.
^ van Bon, J.(Editor) (2002). The guide to IT service management. Addison Wesley. ISBN 0-201-73792-2.
^ Meyer, Dean, 2005. “Beneath the Buzz: ITIL”, CIO Magazine, March 31, 2005
^ van Herwaarden, H. and F. Grift (2002). “IPW(tm) and the IPW Stadia Model(tm) (IPWSM)”. The guide to IT service management. J. Van Bon. London, Addison-Wesley: 97-115.
^ BOFH, Episode 34 “BOFH: Skip diplomacy”, The Register October 5, 2005