Thursday, 30 April 2015

Why everyone hates DevOps

Even though DevOps is widely seen as a powerful way to create better software faster and more efficiently, it puts new pressures on all parts of the organization.

The IEEE's DevOps Unleashed symposium last week was dedicated to providing "expert advice on how to innovate faster by accelerating software delivery across the enterprise." The implication was clearly that DevOps is a great way to do that, and I totally buy into that assumption.

But the presenters at the event at Mountain View's Computer History Museum spent a fair amount of time talking about the origins of the widespread resistance to many real-world DevOps implementations, and how to overcome people's perfectly understandable fears that DevOps will turn out to mean harder work for everyone—and more of it, too!

"It's only natural," said presenter Jez Humble, vice president at Chef and co-author of a pair of DevOps-related books (Lean Enterprise: How High Performance Organizations Innovate at Scale, and Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation), because DevOps puts new demands on all parts of the organization.
042815 devops symposium ieee

How DevOps affects business people
In a DevOps environment, business people suddenly have to spend a lot more time talking to engineers, Humble said, a task that they may not always appreciate. Busy marketers, for example, may not be inclined to spend their time worrying about technical matters that they used to be able to ignore.

How DevOps affects developers

Software engineers, meanwhile, now have to talk to the business people. And in many cases, Humble noted, the whole reason people became engineers is so they wouldn't have to talk to other people.

And that's only the beginning of the changes that developers face. In many organizations, developers are typically measured on simple (if often silly) metrics like how many lines of code they write, Humble said. DevOps presents a new and much more complex set of developer metrics.

How DevOps affects IT operations
The folks who work in IT ops in a waterfall development environment are probably used to have "something nasty coming over the wall every 18 months," Humble said. In a DevOps environment, "now it comes over all the time." Even though those releases should be profoundly different than a waterfall release, the most common reaction from ops people, he noted, is, "Please make it stop!"

What to do about it

For most people, the natural reaction is to create a barrier—which in many organizations takes the form of the change management practice. "The goal of which is to make sure that change never happens," Humble claimed. That resistance is easy to understand: People are afraid of failing, of losing their jobs, Humble said, and a lot of companies have used lean principles (including DevOps) as a "metaphor for firing a lot of people."

If people are afraid, Humble said, "they do everything they can to block you, to bring the whole thing to a halt." To keep that from happening, he said, you have to make it clear that this kind of change is not about firing people or reducing headcount, but about learning new skills and taking responsibility for what you do.

The symposium presenters noted that developers like to whine about how DevOps makes them spend all their time testing and leaves them no time to write any code. That can be an issue, Humble noted. "But it's better than developers writing code without caring how it works in the real world."

"Devs aren't stupid or evil," he concluded. "But if they never experience the consequences of their actions, they can't get better at it."

Monday, 20 April 2015

4 lessons the iPhone should learn from the Apple Watch

For the past eight years, the iPhone has been the innovator. Whether we’re talking about hardware breakthroughs, software solutions, or just plain good looks, the iPhone has always taken the lead, ushering in the latest technologies and design shifts before any other device: the Retina screen, Siri, Lightning, Touch ID, Apple Pay—even the new MacBook’s shiny gold case owes a debt to the iPhone 5s.
For the first time since its debut, the iPhone isn’t the most cutting-edge piece of technology in Apple’s lineup. While Apple Watch borrowed some of the iPhone 6’s style and smarts, it also brings a host of new features and technologies made possible by the uniqueness of the device. So while I wouldn’t expect the next iPhone to sport a Digital Crown or a dedicated Friends button, there are still plenty of tricks it can learn from the new kid on the block.

Apple Watch is the rare product that’s built to be used as little as possible. Its design and functionality is meant to get you in and out without dawdling or distraction, and the sum total of one’s interaction—whether it’s sending a message, tracking steps, or just checking the time—is meant to be measured in seconds, not minutes. In the time it takes to unlock my iPhones, in fact, I would likely already be putting down my wrist.

It’s a fundamentally different way of thinking, and one I’d like to see make its way to the iPhone. Apple has thus far been reluctant to allow us to do much of anything without unlocking our phones first, and despite Touch ID speeding that up, I’d love a Glances-style system for the iPhone’s lock screen.

I thought iOS 8’s Notification Center widgets would suffice as an iOS version of Android’s customizable home screen widgets. But after a relatively brief honeymoon period, I found myself ignoring widgets as much as I did iOS 7’s Today view. The iPhone 6’s larger screen requires a change in grip (or my left hand) just to access the Notification Center, where the jumbled, cluttered interface isn’t conducive to getting things done quickly.

But Glances is perfect. It could easily replace the iPhone Control Center—in fact, as John Gruber notes in his review at Daring Fireball, the leftmost Glance already includes many of the same quick settings buttons. And Glances would give developers a true outlet for delivering quick bits of information far beyond the capabilities of the current set of cramped widgets.

Notifications decentralized
For all that Apple Watch is able to do, its biggest selling point is still the ability to deliver timely alerts to our wrists. But rather than simply beam every alert and alarm from a particular app, Apple allows users to be a bit more discerning with Apple Watch, more than the iPhone’s mostly all-or-nothing approach.
apple watch american airlines

The iPhone notifications system needs a revamp. Aside from an occasional extra setting, every app has the same basic options—apply a badge, set a sound, show on the lock screen—and if you’re not keeping track fanatically, they can pile up into a worthless heap. But Apple Watch could spur Apple to rethink its delivery system, allowing for more customized notifications, like choosing which contacts you’d like to hear from.

Apple Watch also adds a bit of intelligence to our notifications. When you lift your wrist to see one, a “Short Look” will initially show a brief bit of information, but if you tap that screen or keep your wrist raised, the display shifts to a “Long Look,” which offers a bit more data and some interaction. And when you take you watch off, notifications are cut off completely.

Apple added actionable notifications in iOS 8, but an Apple Watch-style system of long and short looks would help give our notifications an extra level of usefulness, and pave the way for a smarter alert system of smarter alerts that learns our habits, saves our batteries, and pushes the right notifications when we need them.

May the Force be with you

The Digital Crown is getting plenty of attention, but even more interesting is how Apple solved the problem of manipulating the screen itself. The iPhone has trained us to think of all screens in terms of multitouch, but the Apple Watch’s screen is just too small for more than one finger at a time. Instead of pinches and gestures, Apple introduced Force Touch, an invisible layer of the interface accessible by a deeper press on the screen. It’s already made it to the MacBook’s new trackpad, and it would be foolish not to think it’s coming to the iPhone, too.

iPhone 7 rumor rollup: Killer camera on the way?
Using Force Touch for the first time is one of those eureka moments, simplifying the way our fingers interact with the screen while also adding functionality. It’s not unlike how the right mouse click further simplified the GUI on our computers, but on the iPhone it could be even more than a quicker way to access extra controls and menus, giving developers another gesture to work with besides taps, holds, and swipes.

Imagine accessing Evernote’s web clipper or VSCO’s filters with just a press, or calling up Spotlight search or the Notification Center without swipes. Force Touch is something of a necessity on Apple Watch, but on the iPhone (much like the MacBooks), it could open up the interface in powerful new ways.

Reach out and Touch someone

One of Apple Watch’s three main functions is connectivity, and to that end, it utilizes a propriety method of communication that lets users contact each other with taps, sketches, and heartbeats. It’s a neat way to add an extra level of exclusivity to Apple Watch, but if Apple is serious about Digital Touch as a new generation of messaging, it needs to bring it to the iPhone.

It seems like a no-brainier—Digital Touch isn’t the kind of killer feature like Siri or FaceTime that’s necessarily going to compel anyone to buy an Apple Watch, but added to the existing iMessage juggernaut it very well could be. Apple Watch would still be the only way to send your heartbeat and SOS-style taps, but expanding the sketching function of Digital Touch to the iPhone would only make Apple Watch that much more useful.
apple watch heartbeat

Just like the “Sent from my iPhone” email signature acted as a sort of advertisement back in its early days, Apple would surely distinguish between Apple Watch and iPhone doodles, increasing mindshare while still letting people know which of their friends are the coolest. But perhaps more importantly, it would turn Digital Touch into a useable feature for any Apple Watch owner who doesn’t know another person who has one.

It didn’t take long for the iPhone to make its impact felt on the Mac, and we’re likely to see a similar sphere of influence with Apple Watch. Which is good, because by the time all of the preorders are filled, the next iPhone will probably already be shipping.


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Thursday, 16 April 2015

Computer Technician Degrees Frequently Asked Questions

1) What Types of Computer Technician Degrees Exist and What are They Called?

Because the field of computer technology is ever evolving and changing, so too is the computer technician degree. With entries ranging from certificates to doctorate degrees, students can spend as little as a few weeks to eight years obtaining the degree that is right for them. To help narrow your search, we have included a wide range of degrees available in the area below.

Associate of Science in Computer Technology (A.S. Comp Tech): This undergraduate degree takes two years to earn and focuses on general aspects of computer technology. A good choice for the non-specified computer technician.

Associate in Information Technology (A.I.T.):
Information technology is a rapidly growing field and often involves the creation and management of databases, as well as other technical aspects. This degree is usually thought of as the starter to information technology.

Associate of Computer Engineering (A.S. Comp Eng):
A beginning entry level degree, this is for technicians who want to go into the entry level aspects of engineering.

Certification in Comp TIA A+:
The Comp TIA is one of the most recognized and utilized forms of computer technician certificates. It measures the skills learned and education of an entry level technology professional and even offers specialties in other areas such as security, server, and Linux.

Certification in Cisco:
Cisco remains one of the leaders in the computer technology field and is often utilized by many employers. The provider itself offers five different levels of certification from entry to architect.

Certification in Apple:
If looking to work with an employer that uses some, mostly, or all Mac computers, this is the certification for you. Computer technicians can choose to support the operating systems, servers, and much more.

Bachelor in Computer Science (B. Comp S.):
This four year undergraduate degree is another choice that covers general areas of science and computers. Several sub-specialties are also available.

Bachelor of Science in Computer Information Systems (B.S.C.I.S.):
Computer Information Systems is also another large area of computer technology. The bachelor’s is currently the most common offered undergraduate degree in the area.

Masters in Information Technology (M.I.T.):
The graduate degree takes six years to earn and focuses heavily on information systems. A benefit of the degree is that it is offered by many schools both online and in person.

Doctorate in Computer Science (Ph.D. Comp S.):
If looking to become a computer technician at the highest level, this degree may be for you. Taking six to eight years to complete, a Ph.D. is the only degree that can earn you the title of “Dr.”

Each degree can go onto have one or even several specialties. For example a Bachelor of Science in computers can be for networking, database administration, security, web development, and communications. Most schools are likely to offer several degrees and programs in computer technician, so it is important to do some digging before choosing the one that is right for you.

2) Where Can I Find Computer Technician Rankings?

Rankings for computer technician schools vary by what type of degree is being earned and at what level. For example, there are various standards for undergraduate degrees when being ranked by an entity such as “U.S. News and World Report.” They often use a cost versus quality of education but can overlook aspects such as demand for the degree in the private and public sectors. Be sure to identify the factors that are most important to you when looking through rankings, as those who do the ranking may not have the same priorities.

Graduate programs that offer a masters or doctorate degrees in computer technology are also capable of confusing potential students by offering online programs. Because a graduate degree is such a complex education to obtain, some feel that only an in-person program will do. However, with the growth of online schools, a degree obtained over the internet is becoming more and more accepted.

It is ultimately up to the student which degree or program they will choose by ranking schools according to their needs. Cost, time spent studying, appropriate learning facilities, and even student to teacher ratio can all be deciding factors when ranking a computer technician education.

3) Can I Transfer Computer Technician School Credits?

If you already have a college level degree or completed courses, transferring them to the appropriate school is of great importance. This can allow you to move along faster in a computer technician degree while saving hundreds to thousands of dollars. The trick is knowing what credits can transfer and where they can transfer to.

The easiest way to know the answer to the above is to speak with a counselor at the school in which you have earned the credits. It is their job to keep up to date with who is accepting what, what courses to transfer, and how many will transfer. For example, someone who wants to obtain a Bachelor of Science in Computer Technology from a university can begin at a junior or community college. Basics courses such as math, science, and history are taken at a fraction of the cost and then transferred to the university for the same degree given to those who took first and/or second year classes there.

Another option for transferring computer technician school credits is using one degree to supplement another. Someone with an associate’s degree in the sciences can apply that towards a bachelor in science or even vice versa and between specialties. If looking to get a masters or doctorate degree, having a four year undergraduate cannot only cut time spent studying by years but is sometimes a requirement. Generally, if one has an applicable bachelor’s degree, it takes two years to get a master’s or four years to get a doctorate depending on the degree or program.

Finally, the difference between nationally and regionally accredited computer technician schools can often be a point of contention. The U.S. Department of Education has a widely used database of accredited schools and agencies. When clicking on the search by institutional accrediting agency, note that there are two sections: national and regional. Know that just because a school is regionally accredited doesn’t mean that it is necessarily accredited nationally, which means that credits may or may not be transferred. Ultimately, the best way to avoid surprises when transferring credits is to contact the school beforehand so you can make an informed decision before taking a class.

4) What sorts of careers are common for students with this degree?

Upon completing a computer technician degree or program, there are literally hundreds of careers to choose from. Below, we have gathered just a few of them.

Computer Repair Technician: Ever had a computer freeze or break down on you? These are the professionals that fix them. The job usually requires an associate’s degree or certification.
Computer Technical Support Specialist: These techs work on a more full time basis and are often employed in the information technology side of a business. Support may come in the form of in person, over the phone, or over the web.

Network Support Technician:
The entire computer system is the focus of this tech. Servers, security, and more are often part of the job.

System Administrator:
They ensure the efficient operation of a computer system and often anticipate problems before they happen. Design, software, security, and more are involved in this career.

Computer Security Specialist:
Stopping hackers, viruses, etc. is the main focus of this career. They are responsible for installing the security software, monitoring for break-ins, and even identifying vulnerabilities in the system.

Web Developer:
Because even mom and pop stores have a website nowadays, web developers are more in demand. They plan and implement the entire website from homepage to the latest updates.

Database Administrators:
These computer technicians determine ways to store, organize, analyze, use, and present data. Switching from old to new databases or maintaining internet access are just some of the tasks assigned to them.

Computer Engineer:
They work on the more mechanical aspect of computers. Often having the ability to pull them apart and put them back together, computer engineers can also be tasked with designing and building a computer from the ground up.

Computer Systems Programmer:
Once a computer has been built, it must be programmed. Different from an engineer, the programmer actually writes software and programs it into the computer.

Computer Developer:
If a computer is built fine, the software is okay, but it needs to be updated, a developer may be tasked with this. The upgrading and cost control aspects of the job are often found.

As the technology changes, so too will the careers available. With Microsoft, Apple, and Linux constantly competing with each other, a computer technician who knows more than one can also move ahead of the others. Most employers require some form of education, typically an associate’s degree, for entry level positions. Those looking to start in a more managerial or developmental role can often be asked for a graduate degree. Certifications in one or many areas may also be asked of by a potential employer.

5) How Do I Become a Computer Technician?
If you want to be a computer technician, a degree is usually required at the associate level or higher. In order to obtain this or any undergraduate degree, students must apply to a postsecondary institution, college, or university. The application almost always requires a high school diploma or equivalent, entry level exams, or even a minimum grade point average.

Certification in a relevant computer technician area can also be an important step. One of the most common certifications is the Comp TIA A+. It requires the passing of the Essentials and Practical Application exams, each of which consist of 100 questions and take about 90 minutes each to complete. They recommend the candidate have a relevant education and 500 hours of hands on experience in the field or laboratory. Visit the site to get more information, such as pricing or to look at practice questions. You can also view information on the other ten certifications they offer.

The above is by no means the only certification offered in computer technology. Another popular choice is the Cisco Certification. Everyone from engineers to security administrators may be asked to obtain this certification. They offer them in the entry, associate, professional, expert, architect, and specialist level. Take the “Is it for you?” quiz to learn more. If you know which certification you need, check with the vendor itself.

If you know what kind of computer technician career you would like, research it a little more. Look over those who are hiring in the area you would like to work in and see what their requirements are. They may ask for anywhere from a certification for entry level positions to a doctorate degree for the managerial. If you currently are employed in an area of computer technology or have a department and can make a lateral move, check with your supervisor. The cost of an advanced education or relevant certification may be shouldered if not paid for entirely by them.

6) What is the Average Salary for a Computer Technician?
As with all careers, whether or not you work full or part time hugely affects pay. Those who work as a computer repair technician on a part time basis in a superstore, as a sub-contractor, or other area usually make $13.35 per hour according to Payscale. They are also eligible for overtime pay and bonuses for completing work on or ahead of schedules. Although many full time employees may not qualify for overtime pay, bonuses, health insurance, and other benefits can be factored in.

Another common career for someone with an education as a computer technician is network support technician. Their median pay ranges from $30,315 to $47,384 with the average at $38,849. Other similar careers include computer technical support specialist and system administrator with average annual salaries of $41,782 and $51,584, respectively. Factors such as experience, employer, and location are most likely to influence how much a career can pay.

The United States Bureau of Labor Statistics includes this sort of data when factoring in their average salaries for computer network, systems, and database administrators. The highest paying employers for administrators were management and computer system design companies with offerings a little higher than $70,000. Collegiate, elementary, and secondary schools were the lowest paying employers offering an average annual salary of about $56,500.

If looking to learn more about the highest paying computer technician jobs, check out security, engineer, or chief information officer. Often earning over six figures per year in average annual salary, they are required to have everything from a Ph.D. to the ability to hack into a well-guarded system. Security computer technicians can work exclusively for one company or hire themselves out as individuals to test the systems of those who hire them. Because computer engineers are involved in both the designing and building of a system, the time and knowledge they put into their work is invaluable. The chief information officer often runs the entire information technology department of a company and is tasked with the overall performance of the computer systems, which requires loads of education and experience, but can also pay very well.

Paying for college can be a daunting task, but don’t let that stop you from pursuing an education in a field you truly want to go into. The best course of action is to apply to many schools, even if they have an application fee, to see which ones you get into. After being accepted, fill out the FAFSA and any other financial aid forms asked of you. If turned in by deadline, the school will tell you how much tuition will cost out of pocket, which can make choosing one far easier.

Many new students can feel overwhelmed by the process, but the counseling and financial aid offices at just about every school are tasked with easing student’s fears and answering questions. If you need help filling out a form, contact them or visit the website associated with the form. Do not pay anyone for their help in filling out a FAFSA or other government form, as many professionals will do it for free.

Also use caution when and if taking out a student loan. Unlike a scholarship or grant, it is money that does have to be paid back. Once qualified, a student can receive money to be applied towards tuition, books, and other expenses. It does not have to be repaid until graduation and can often have a low interest rate. However, many are dependent upon graduation and can also require a minimum grade point average.

Computer Technician is the only resource dedicated to providing individuals interested in becoming a computer technician with unbiased information about different degree and school options as well as career, job and salary information. To that end, we provide an updated FAQ as well as the only comprehensive database of computer technician schools on the web.

Thursday, 9 April 2015

How Connecticut set itself up to be the first gigabit state

Connecticut is moving ahead with a statewide gigabit broadband initiative after resolving a surprisingly simple, but common, issue standing in the way of fiber deployment.

Connecticut needed this. Lately, the only noteworthy contribution my home state has made to the national news is Aaron Hernandez, an apparent psychopath who earned millions of dollars playing football while (allegedly) murdering anyone who looked at him the wrong way.

But it looks like the third smallest state in the country is on its way to becoming the first to offer ubiquitous 1-Gigabit internet to its residents. The website EfficientGov.com has a pretty comprehensive breakdown on the project: 46 municipalities that make up about half of the state's population have agreed to endorse a plan for public/private partnerships to expand 1-Gig broadband internet access.

The "pubic/private partnerships" part of the plan likely makes it more achievable. In other areas, attempts at municipal-run broadband projects have created mountains of debt in their worst cases and have led to heated legislative battles in their best.

Chattanooga, Tennessee, is a good example of how difficult municipal broadband can be. The city's broadband is among the fastest in the country, and its network was built and operated by the city after it had difficulty attracting investment from private ISPs. When the city looked to expand its 1-Gig service to other regions, state lawmakers imposed strict regulations, ultimately culminating in the state of Tennessee filing a lawsuit against the FCC late last month.

The Connecticut State Broadband Initiative attempts to side step the messy political issues by paving the way for private companies to lay the fiber throughout the state and allowing ISPs to use it to provide services.

"It's like building the road — and anyone can drive their cars on it," Connecticut's consumer counsel Elin Katz recently told Backchannel.

It's not always that simple, though. What's different about the Connecticut plan is how it handled what Backchannel contributor Susan Crawford called "the unbelievably difficult issue of attaching wires to poles." She briefly explained how Connecticut addressed this issue:

"Rather than letting pole owners hold up every requestor by creating delays and making demands for special payments (seriously: pole-attachment scuffles are the long-running soap operas of telecom), Connecticut requires pole owners to obey a Single Pole Administrator, adhere to uniform pricing agreements, and act to make way for new wires in a set time. Dramatic stuff. And Connecticut already had passed a statute giving municipalities the right to use a part of a pole, or 'gain,' for any purpose. These two elements made Connecticut an extremely attractive place to string a network."

In fact, the obstacles that pole owners can create for projects like fiber deployment have been well-documented. An article published last May at BroadbandLawAdvisor.com provides detailed instructions on how to deal with pole owners who maybe imposing "fees and charges that are not permitted or exceed permitted regulated levels."

The FCC's National Broadband Plan includes a section that warns that "delays can also result from existing attachers' action (or inaction) to move equipment to accommodate a new attacher, potentially a competitor." Basically, those who own the utility poles can levy fees on any company or organization that tries to work on them, or they can just flat out deny access. The FCC acknowledged that reform is needed in how access to poles is handled.

Connecticut may be an example of how to implement this reform. A Request for Qualifications issued in September explained how the state accomplished this:

"All the utility poles across the state are subject to the central statutory jurisdiction of the Connecticut Public Utilities Regulatory Authority," the RFQ read, according to BroadbandAndBreakfast.com. "The established and firm timelines for the entire pole attachment process that the Connecticut regulator has ordered and manages … thus facilitat[es] the deployment of broadband."

Of course, Connecticut faces the same kinds of pushback seen in the states that are embroiled in legal battles over municipal broadband, i.e. lobbyist groups highlighting the risks and occasionally stepping into propaganda territory to sway public opinion. But, as Backchannel's Crawford pointed out, the initiative has already garnered majority support in the state, and it is designed to facilitate competition between private companies, rather than to threaten competition from the state. When pro-business lobbyists argue against a pro-business plan, few people are going to bother listening.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Wednesday, 1 April 2015

70-467 Designing Business Intelligence Solutions with Microsoft SQL Server 2012

QUESTION 1
You are using SQL Server Management Studio (SSMS) to configure the backup for ABC
Solutions. You need to meet the technical requirements.
Which two backup options should you configure? (Choose two).

A. Enable encryption of the backup file.
B. Enable compression of the backup file.
C. Disable encryption of the backup file.
D. Disable compression of the backup file.

Answer: B,C

Explanation:


QUESTION 2
You need to convert the Production, Sales, Customers and Human Resources databases to
tabular BI Semantic Models (BISMs).
Which two of the following actions should you perform? (Choose two)

A. You should select the tabular mode option when upgrading the databases using the Database
Synchronization Wizard.
B. You should select the tabular mode destination option when copying the databases using SQL
Server Integration Services (SSIS).
C. You should select the tabular mode option during the installation of SQL Server Analysis
Services.
D. You should redevelop the projects and deploy them using SQL Server Data Tools (SSDT).

Answer: A,D

Explanation:


QUESTION 3
ABC users report that they are not receiving report subscriptions from SQLReporting01.
You confirm that the report subscriptions are not being delivered.
Which of the following actions should you perform to resolve the issue?

A. You should run the SQL Server 2012 Setup executable on SQLReporting01 to generate a
configuration file.
B. You should reset the password of the SQL Server Service account.
C. You should manually fail over the SSAS cluster.
D. You should restore the ReportServer database on SQLReporting01.

Answer: C

Explanation:


QUESTION 4
ABC users report that they are not receiving report subscriptions from SQLReporting01.
You confirm that the report subscriptions are not being delivered.
Which of the following actions should you perform to resolve the issue?

A. You should run the SQL Server 2012 Upgrade Wizard to upgrade the active node of the
SSAS cluster.
B. You should start the SQL Server Agent on the active node of the SSAS cluster.
C. You should restore the ReportServerTempDB database on SQLReporting01.
D. You should start the SQL Server Agent on SQLReporting01.

Answer: D

Explanation:


QUESTION 5
You need to make the SSAS databases available on SSAS2012 to enable testing from client
applications. Your solution must minimize server downtime and maximize database
availability.
What should you do?

A. You should detach the databases from the SSAS cluster by using SQL Server Management
Studio (SSMS) then attach the databases on SSAS2012.
B. You should copy the database files from the SSAS cluster to SSAS2012.
C. You should export the databases from the SSAS cluster by using SQL Server Management
Studio (SSMS) then import the databases on SSAS2012.
D. You should restore a copy of the databases from the most recent backup.

Answer: D

Explanation: