Find us on Facebook Follow us on Twitter

Pass4sure Q&A of 250-700 that never turn out badly | brain dumps | 3D Visualization

Real exam Questions and Answers of 250-700 cert that you ever needed to pass 250-700 certification are provided here with practice questions - VCE and examcollection - brain dumps - 3D Visualization

Pass4sure 250-700 dumps | 250-700 real questions |

250-700 Implementation of HA Solutions for Windows using VCS 4.1

Study sheperd Prepared by Symantec Dumps Experts

Exam Questions Updated On : 250-700 Dumps and real Questions

100% real Questions - Exam Pass Guarantee with elevated Marks - Just Memorize the Answers

250-700 exam Dumps Source : Implementation of HA Solutions for Windows using VCS 4.1

Test Code : 250-700
Test name : Implementation of HA Solutions for Windows using VCS 4.1
Vendor name : Symantec
: 73 real Questions

What is needed to study for 250-700 exam?
im now 250-700 certified and it couldnt exist viable without 250-700 exam simulator. exam simulator has been tailor-made keeping in thoughts the requirements of the scholars which they confront at the time of taking 250-700 exam. This exam simulator may exist very a lot exam consciousness and each theme matter has been addressed in constituent just to sustain apprised the students from every and each records. team knows that is the way to hold college students confident and ever equipped for taking exam.

Do you necessity Latest dumps of 250-700 exam, It is perquisite place?
I am ranked very exorbitant amongst my magnificence associates at the listing of awesome students but it handiest came about after I registered on this for some exam help. It become the exorbitant ranking studying application on this that helped me in becoming a member of the exorbitant ranks along with different high-quality college students of my magnificence. The sources on this are commendable because theyre particular and extraordinarily profitable for education thru 250-700, 250-700 dumps and 250-700 books. I am satisfied to reclaim in writing these words of appreciation because this merits it. Thank you.

i've placed a terrific source contemporary 250-700 material.
It become a totally brief conclusion to devour QA as my examine associate for 250-700. I couldnt manipulate my happiness as I started out seeing the questions on array screen; they were relish copied questions from dumps, so accurate. This helped me to pass with 97% inside 65 mins into the exam.

How lots 250-700 exam fee?
My brother saden me telling me that I wasnt going to undergo the 250-700 exam. I exist alert after I appearance out of doors the window, such a lot of one of a kindhearted human beings want to exist seen and heard from and that they sincerely want the eye human beings but im able to let you know that they students can pick up this interest whilst they pass their 250-700 check and i will let you know how I cleared my 250-700 test it become handiest when I devour been given my test questions from which gave me the wish in my eyes together totality the time.

How much salary for 250-700 certified?
This is the satisfactory exam preparation I actually devour ever long past over. I passed this 250-700 companion exam bother unfastened. No shove, no anxiety, and no disappointment amid the exam. I knew totality that I required to recognise from this %. The questions are sizable, and I were given notification from my associate that their coins again surety lives as much as expectancies.

it is splendid to devour 250-700 modern-day dumps.
For entire 250-700 profession certifications, there is plenty of information available online. Yet, I was hesitant to use 250-700 free braindumps as people who reclaim this stuff online attain not feel any responsibility and post misleading info. So, I paid for the 250-700 q and a and couldnt exist happier. It is apt that they give you real exam questions and answers, this is how it was for me. I passed the 250-700 exam and didnt even stress about it much. Very icy and reliable.

All real test questions latest 250-700 exam! Are you kidding?
Wow..OMG, I simply passed my 250-700 cert with 97% marks i was unsure on how rectify the examine dump turned into. I practiced with your on-line test simulator, and studied the material and after taking the test i used to exist joyous i discovered you guys on the internet, YAHOO!! thanks Very an penniless lot! Philippines

I clearly experienced 250-700 examination questions, there's not anything relish this.
I devour to exclaim that are the best residence I will always reckon on for my future exams too. At first I used it for the 250-700 exam and passed successfully. At the scheduled time, I took half time to complete totality the questions. I am very cheerful with the study resources provided to me for my personal preparation. I believe it is the ever best material for the safe preparation. Thanks team.

proper vicinity to locate 250-700 dumps paper. Dumps web page helped me pick up access to diverse exam education material for 250-700 exam. i used to exist burdened that which one I necessity to pick out, however your specimens helped me pick the exceptional one. i purchased Dumps direction, which tremendously helped me see totality the essential ideas. I solved totality questions in due time. I am completely satisfied to devour as my tutor. much preferred

wherein devour to I test in for 250-700 exam?
I got 79% in 250-700 Exam. Your study material was very helpful. A mountainous thank you kilexams!

Symantec Implementation of HA Solutions

Symantec announces customer management reply To assist hold instruments comfortable, purchasable And Compliant With company requirements | real Questions and Pass4sure dumps

CUPERTINO, Calif. – can moreover 2, 2005 – Symantec Corp. (NASDAQ: SYMC), the global chief in advice security, announced the Symantec LiveState customer management Suite, a comprehensive configuration and lifecycle management reply for client gadgets in enormously dispensed, heterogeneous commercial enterprise environments. The suite gives companies with a group of options designed to obtain client resilience by using enabling IT administrators to profit control of the IT ambiance and assist upshot positive customer devices are relaxed, obtainable and compliant with established company necessities. additionally, the suite reduces the complexity and cost of managing the lifecycle of client contraptions, and automates sheperd initiatives, reminiscent of deploying and configuring client firewall and anti-adware software, rolling out new gadgets, managing utility patches, and retiring client gadgets.

The Symantec LiveState customer administration Suite is the latest free up in Symantec’s LiveState family of assistance availability solutions. it is a principal component of Symantec’s advice Integrity initiative, which helps organizations construct a resilient infrastructure through taking a holistic approach to protection, techniques and storage management. Symantec’s LiveState family of options is in response to the LiveState architecture, a solitary unified and extensible platform for Symantec’s customer and server management and healing solutions. The LiveState platform is designed to lop back complexity and upshot it more straightforward for agencies to installation further modular LiveState options in the future via leveraging a common console seem-and-think, management database and automatic agent deployment infrastructure.

“protection concerns, altering compliance requirements and lengthening pressure to establish a powerful ROI case for IT purchases are on properly of each IT manager’s mind,” spoke of Fred Broussard, analysis manager for workstation and device administration utility, IDC. “items relish Symantec’s LiveState customer management Suite can add value via converging security and techniques management necessities to enable automated and at ease options for administration and device recovery.”

“we are joyful that Symantec continues to offer a comprehensive client configuration management solution with the new edition of LiveState birth and the LiveState client management Suite,” observed Stefan Butter, IT carrier administration, TUI Infotech. “For TUI AG they at present manipulate more than 5,000 computers. The automatic solution makes it practicable for us the centralized management of computing devices in their headquarters, branches in airports and their trip companies totality across Europe. They discharge up to 15.000 automated software distribution jobs per thirty days and the skills discount rates due to the brand new reply are huge.”

“because it challenges swirl into more complex, companies are increasingly alert about the necessity for a balanced interplay between safety, availability and company compliance in constructing a neatly-managed, resilient infrastructure. nowadays, IT issues are crucial past solace as they could devour an repercussion on corporate efficiency, shareholder self assurance and even criminal legal responsibility,” said Thom Bailey, director of product administration, commercial enterprise administration, Symantec traffic enterprise. “The Symantec LiveState client management Suite helps corporations obtain client resilience by way of providing a solitary unified reply designed to control a client’s lifecycle from acquisition to retirement. The suite combines trade-leading technologies to champion IT companies boost effectivity, reduce complexity, downtime and cost, and comply with established company or regulatory requisites.”

The Symantec LiveState customer administration Suite readily interoperates with present lifecycle administration approaches and equipment, such as frameworks, databases and directories, minimizing the replete can saturate of owning and holding customer gadgets. The suite combines here modular components:

· Symantec LiveState dressmaker – contains trade-main Symantec Ghost and Symantec DeployCenter imaging applied sciences, Symantec LiveState kit supervisor for the introduction of custom deployment programs, Symantec client Migration for performing cozy client migration initiatives, and Gdisk for at ease retirement of client devices. Symantec LiveState dressmaker simplifies the system of growing applications by means of providing handy-to-use, automatic wizards and graphical tools for command-line enter, and the means to leverage present third-party applications. IT directors can check configuration management projects by using deploying them to a witness at various machine or virtual environment using Symantec LiveState delivery earlier than deploying them throughout the solid and into the creation ambiance.

· Symantec LiveState start – an impressive open and scalable application start and configuration management answer. Symantec LiveState delivery permits IT administrators to instantly installation programs for practically any management assignment throughout heterogeneous environments, together with cell and faraway customer instruments, cyber web kiosks and POS instruments. Symantec LiveState birth’s extensible structure allows for companies to leverage latest IT investments. It allows IT directors to comprise and set up initiatives and packages from other Symantec LiveState items or third-party equipment, corresponding to hardware/application auditing, software installing, patch deployment, troubleshooting and remediation, gadget/information healing and gadget retirement. Symantec LiveState birth additionally contains a library of pre-built configuration applications to deploy and configure applications and updates equivalent to Symantec client protection to enable virus protection, client firewall, anti-adware, intrusion prevention and VPN coverage compliance.

· Symantec LiveState Patch manager – A scalable patch management solution that gives IT directors with the gear needed to proactively and automatically execute a firm’s patch administration technique. This includes scanning for and identifying reclaim in, missing and purchasable Microsoft safety patches, packaging and deploying commandeer patches using resilient and dynamic grouping and targeting capabilities, and constructed-in reporting alternatives. Symantec LiveState Patch supervisor is interoperable with Symantec LiveState start and shares a common database offering IT directors with sooner reporting capabilities and enhanced scalability.

· Symantec pcAnywhere for Symantec LiveState – Combines comfy and feature-wealthy faraway handle with effectual file switch capabilities. Symantec pcAnywhere for Symantec LiveState is in keeping with Symantec’s business-leading remote control answer. go-platform aid enables IT administrators to handle each home windows and Linux shoppers. potent protection facets provide companies with the entry handle and encryption alternatives they require to sustain away from unauthorized entry and to promote compliance with company and regulatory standards. security points encompass default encryption of login suggestions, mandatory passwords, host tackle blocking, 13 degrees of authentication and AES encryption (as much as 256-bit cipher energy) via a FIPS 140-2 (degree 1)-validated cryptographic module.

· Symantec Discovery – an reply to totality of a sudden, silently and normally discharge asset administration tasks for finished and rectify audits throughout allotted heterogeneous environments. Symantec Discovery presents effectual tools for agentless discovery of community gadgets, agent-primarily based hardware/software stock administration, utility utilization and license administration with alerting, complete information analysis, reporting and graphing, as neatly as the entertaining capability to determine the actual region of contraptions.

· Symantec LiveState birth traffic supervisor – An not obligatory add-on constituent that's available with an expert capabilities providing to enhance the scalability and manageability of Symantec LiveState birth. Symantec LiveState delivery enterprise supervisor gives each policy-based and conventional assignment-primarily based administration capabilities in a solitary unified solution. it is used along with Symantec LiveState birth to apportion configuration rules to goal groups of contraptions and automate deployments. Symantec LiveState birth enterprise manager makes use of true-time queries from inventory information, SQL databases and listing capabilities (similar to Microsoft dynamic listing) to deliver gadgets to their desired state.

· Symantec LiveState recovery computing device – An not obligatory add-on component that gives swift and reputable healing of vital counsel and complete methods in the adventure of a system failure or statistics loss. The Symantec LiveState customer management Suite includes a limited version of Symantec LiveState healing computing device.

moreover the Symantec LiveState client administration Suite, Symantec offers standalone models of Symantec LiveState birth, Symantec LiveState Patch manager and Symantec Discovery, as well as standalone types of Symantec Ghost solution Suite and Symantec pcAnywhere. For suggestions on gadget requirements or additional Symantec LiveState household of suggestions availability options, including Symantec LiveState recuperation and Symantec LiveState restoration supervisor, talk over with

expert ServicesSymantec presents a wide array of Consulting and training capabilities to assist in the implementation of the Symantec LiveState client administration Suite, its individual components and add-on options, including other Symantec LiveState purposes. furthermore, Symantec gives professional capabilities to establish a greater resilient infrastructure through Symantec techniques Continuity provider. For extra assistance, hunt advice from

AvailabilityThe Symantec LiveState customer administration Suite and Symantec LiveState start are currently accessible through licensed Symantec traffic administration partners worldwide or at once from Symantec. For more advice on Symantec’s companion program or to find a companion, hunt advice from Symantec LiveState Patch supervisor, Symantec Discovery, Symantec Ghost solution Suite and Symantec pcAnywhere are available through Symantec’s worldwide community of distributors and resellers. To gain licensing information or to locate a reseller, visit on the totality over the world internet. For extra product tips, name (800) 745-6054 or dispute with

About SymantecSymantec is the world leader in suggestions safety proposing a broad ambit of application, home gear and capabilities designed to succor people, petite and mid-sized businesses, and great businesses cozy and manipulate their IT infrastructure. Symantec’s Norton brand of products is the global leader in buyer protection and difficulty-solving solutions. Headquartered in Cupertino, Calif., Symantec has operations in additional than 35 countries. extra assistance is attainable at

note TO EDITORS: if you'd relish additional information on Symantec agency and its products, delight view the Symantec Press focus at on Symantec’s web site. totality costs referred to are the company’s recommended retail expenses in US dollars and are telling most effectual in the u.s..

Symantec and the Symantec logo are trademarks or registered logos of Symantec supplier in the united states and positive different countries. extra traffic and product names could exist emblems or registered trademarks of the individual organizations and are respectfully stated.

Symantec mountainous records reply Makes Apache Hadoop traffic equipped | real Questions and Pass4sure dumps

MOUNTAIN VIEW, CA--(Marketwire -08/13/12)- Symantec Corp. (SYMC) today introduced an add-on solution for Symantec's Cluster File gadget that makes it practicable for customers to elope huge records analytics on their present infrastructure by using making it enormously obtainable and manageable. Apache Hadoop presents customers colossal cost to constrain salary with the aid of assisting dissect records for enterprise insights, besides the fact that children many existing statistics solutions want the records management capabilities and constructed-in resilience to beat the cost and complexity of expanding storage and server sprawl. by using working closely with Hortonworks, the new Symantec enterprise reply for Hadoop offering provides a scalable, resilient data administration reply for dealing with mountainous facts workloads to succor upshot Apache Hadoop in a position for enterprise deployment.

click to Tweet: Symantec mountainous data solution and @Hortonworks partnership upshot Apache Hadoop enterprise competent:

Symantec's Cluster File gear is a confirmed commercial enterprise reply to address mountainous records workloads. With Symantec commercial enterprise solution for Hadoop, agencies can:

  • Leverage their latest infrastructure by scaling as much as sixteen PB of facts together with structured and unstructured statistics
  • keep away from over provisioning on both storage and compute means
  • Run analytics anywhere the data sits, casting off elevated priced information strikes
  • Make Hadoop incredibly accessible devoid of a potential solitary point of failure or a efficiency bottleneck
  • examine extra designated blog posts:

    Leveraging current Infrastructure and keeping off Over ProvisioningIT directors devour spent considerable time and substances consolidating their records centers and decreasing their footprint through virtualization and cloud computing. Taking potential of great facts analytics should soundless leverage this consolidation of storage and compute elements. Symantec commercial enterprise solution for Hadoop makes it practicable for shoppers to elope Hadoop whereas minimizing investments in a parallel infrastructure -- significantly decreasing the storage footprint to lop back can saturate and complexity.

    analyzing statistics where it Resides and casting off elevated priced facts MovesThe first step in making the Hadoop infrastructure labor is to funnel information for evaluation. via enabling integration of latest storage property into the Hadoop processing framework, companies can avoid time consuming and costly records straggle actions. Symantec traffic reply for Hadoop enables directors to leave the facts where it resides and elope analytics on it with no necessity to extract, radically change and cargo it to a divorce cluster -- keeping off costly and painful statistics migrations.

    guaranteeing Hadoop is particularly AvailableIn an Apache Hadoop environment, statistics is distributed throughout nodes with just one metadata server that knows the statistics residence -- doubtlessly resulting in a efficiency bottleneck and solitary factor of failure that could lead to utility downtime. to meet the necessity for timely insights, Symantec commercial enterprise reply for Hadoop provides file device elevated availability to the metadata server whereas additionally making unavoidable analytics applications continue to elope as long as there is at least one working node in the cluster. given that the Hadoop file system is changed with Symantec's Cluster File equipment, each node in the cluster can additionally access records concurrently, eliminating each the efficiency bottleneck and solitary constituent of failure.

    Pricing, Availability and SupportThe Symantec traffic solution for Hadoop is purchasable now to latest Cluster File gadget clients at no extra charge. Symantec enterprise reply for Hadoop helps Hortonworks information Platform (HDP) 1.0 and Apache Hadoop 1.0.2. consumers working HDP 1.0 should exist capable of pick up Hadoop aid and practising from Symantec's Hadoop colleague Hortonworks, a leading traffic dealer advertising the innovation, evolution and sheperd of Apache Hadoop.

    assisting fees"consumers can't devour enough money to let the challenges of enforcing mountainous records translate into management challenges in the infrastructure they've worked so tough to build," observed Don Angspatt, vice chairman of product administration, Storage and Availability administration community, Symantec Corp. "Our enterprise reply for Hadoop helps combine Hadoop's company analytics to the existing storage environment while addressing key challenges of server sprawl and elevated availability for vital purposes. it's now absolutely viable to pick up the massive information reply you wish from the infrastructure you've got got."

    "Hortonworks is excited to companion with Symantec to provide shoppers effectual enterprise analytics with no necessity to rebuild their IT infrastructure," mentioned Mitch Ferguson, vp of enterprise development, Hortonworks. "The Hortonworks records Platform is constructed upon the most tenacious edition of Apache Hadoop and Symantec offers the market leading storage administration and exorbitant availability application with their Cluster File device to enable seamless implementation. They look ahead to offering most fulfilling-in-class sheperd and training to aid consumers elope Hadoop in their latest environment and drive their businesses ahead to the subsequent degree."

    Story continues

    "enterprises wish to leverage the power of Hadoop analytics to peer if Hadoop-supported purposes can pressure crucial enterprise decisions. for this reason, IT management will want the self credence that their Hadoop-linked infrastructure is prepared to arise to the calls for of a creation data core environment," mentioned John Webster, Senior associate of Evaluator neighborhood. "Symantec traffic solution for Hadoop is one instance of a device designed to cleanly the transition from pilot project to creation by addressing key data core challenges including exorbitant availability, safety, data insurance policy, and records governance."


    join with Symantec

    About Symantec Symantec protects the world's tips, and is the global chief in security, backup and availability options. Their ingenious products and features protect people and advice in any atmosphere -- from the smallest cellular equipment, to the traffic records center, to cloud-primarily based systems. Their business-main knowledge in protecting information, identities and interactions offers their valued clientele self credence in a related world. more tips is attainable at or by using connecting with Symantec at:

    notice TO EDITORS: if you'd relish additional info on Symantec traffic enterprise and its products, delight visit the Symantec news leeway at totality expenses famous are in U.S. dollars and are telling handiest within the united states.

    Symantec and the Symantec emblem are trademarks or registered logos of Symantec agency or its affiliates in the U.S. and different international locations. other names may exist trademarks of their respective house owners.

    ahead-searching STATEMENTS: Any ahead-searching indication of plans for products is prefatory and totality future free up dates are tentative and are realm to alternate. Any future free up of the product or planned modifications to product means, functionality, or duty are discipline to ongoing evaluation by way of Symantec, and may or may additionally no longer exist implemented and may now not exist considered company commitments by Symantec and will not exist relied upon in making paying for decisions.

    Technorati TagsSymantec, huge records, Hadoop, Apache Hadoop, Hortonworks, analytics, virtualization, cloud, guidance, storage management, exorbitant availability, calamity healing

    Iran, The european, And the US: the eu hunt (Some diploma Of) Autonomy – analysis | real Questions and Pass4sure dumps

    by using Hajnalka Vincze*

    (FPRI) — The fresh pains by means of France, the UK, and Germany to create a monetary mechanism designed to skip U.S. extraterritorial sanctions on Iran reveals an expanding want for self-statement vis-à-vis the united states. For months, Europeans were in search of the way to retain the nuclear deal despite President Donald Trump’s altenative to withdraw from it. Their efforts devour less to attain with policy against Tehran than with positioning the ecu Union in terms of the U.S., and with visions of Europe itself as a global player.

    now not that the Europeans believe the Iran problem unimportant—rather the opposite. it is exactly because the Iranian nuclear agreement is the main, if no longer the handiest, success of the european’s barely existent outlandish policy that Europeans could not devour enough money to sacrifice it to their habitual alignment with the USA—at least not with out a fight—for concern of losing the tiny international credibility they might soundless salvage.

    A Snub 2nd to None

    true to the epigram that the ecu Union is an economic mountainous however a political dwarf, the achievements of the eu’s customary international policy may moreover exist counted on the fingers of one hand—and essentially the most favourite among them is, devoid of query, the nuclear contend with Iran. So a lot in order that the daily replica of the settlement is on monitor within the office of the eu’s chief diplomat. This symbolic expense introduced to pecuniary and geopolitical pursuits explains why the Europeans could not effectively ignore what they account a blatant humiliation by using the U.S..

    The ecu used to exist Iran’s accurate buying and selling associate, a position it lost when sanctions escalated in 2010 and its participate of Iran’s international change shrank from 25% to 8%. due to the fact that the signing of the Joint finished scheme of motion (JCPOA) in 2015, which lifted most sanctions in trade for strict limitations on Iran’s nuclear software, exports to Iran devour extended by way of 70%, and several great European groups devour announced mountainous investments in the power, computer, and automobile fields. besides the fact that children, the change in scale between the $20 trillion U.S. and the $330 billion Iranian markets puts in standpoint the affliction of the economic constituent within the Europeans’ resolution to arise to President Trump.

    As for geopolitics, Europe is worried that a resumption of the Iranian nuclear application may result in widespread destabilization in a location from which, unlike the us, it isn't separated via an ocean. as a result of simple geography, Europe is the one on the frontline. It finds worrisome the specter of an Israeli armed forces intervention, which might irritate the chaos, as smartly as the prospect of an palms race where Saudi Arabia (and Egypt) would are trying to find their personal nuclear bombs. extra greatly, Europeans devour the repercussion that via dismantling the settlement with Iran, it's their nearby that the us hazards to ignite.

    additionally, Europeans see the JCPOA as a validation of their multilateral method, offered because the fruit of long years of international diplomacy beneath certainly European management. certainly, the european exorbitant consultant chairs the talks between Iran, and the P5+1 (the five permanent contributors of the UN safety Council, plus Germany). For totality these explanations—economic, geopolitical, diplomatic—Europe spared no pains to are trying to convince the American president not to give up the agreement, or—in case of U.S. exit—to at least let the other signatories recognize their End of the deal.

    For months, French, British and German diplomats made notion after concept to acclimatize the criterion coverage against Iran, without touching the JCPOA. In a latest desperate effort, the French president, on a condition consult with to Washington, used totality his charm and tried to accommodate President Trump’s calls for, even going so far as to float the possibility of a “new deal” (really the identical, but re-packaged in order to travel away leeway for negotiation on other areas of subject). Nothing helped. This sort of European subtlety would not dissuade President Trump from quitting a deal he considered “horrible.” As if to curve the knife, he no longer simplest withdrew america from the JCPOA, however did it in a means which made it just about impossible for the other signatories to preserve it alive.

    In asserting the U.S. exit from of the contract, President Trump opted for the “highest stage of pecuniary sanctions,” including those with an extraterritorial scope. These so-known as secondary sanctions would penalize any European traffic that, based on the commitments of its personal government however in violation of U.S. legal guidelines, continued to alternate with Iran. so as to add insult to damage, U.S. officials devour moreover made diverse public warnings to their European colleagues. country wide security advisor John Bolton famous that “the Europeans will see that it’s of their interests to Come along with us.” When the first circular of sanctions turned into set to retract effect, the President defined in a tweet: “any one doing enterprise with Iran will not attain enterprise with the us.” A month later he remarked: “I account the Europeans will behave very properly. Very properly. simply watch.”

    now not tremendously, this unilateralist approach became deemed unacceptable with the aid of Paris, and additionally deplored through the other parties. For Europeans, the extraterritoriality of U.S. laws amounts to denying them the commandeer to pursue their personal policies on an issue that has swirl into emblematic of their diplomacy. A joint note signed through France, the united kingdom, Germany, and the european exorbitant representative called on the U.S. now not to undermine the Europeans’ means to preserve an settlement they account criterion for their safety. They “expect that the extraterritorial results of U.S. secondary sanctions are not enforced on european entities and people, and the us will hence prize their political determination.” without a reply from Washington, the handiest query left to the Europeans changed into to Come to a conclusion no matter if they'd devour the means and the wish to implement their personal policy choices.

    The art of Half-Measures

    in accordance with the U.S. decision, Europeans devour at the start presented an strangely united entrance. totality 28 european international locations agreed to reinstate a common law to protect their businesses that could proceed to change with Iran, and the biggest Member States—with the blessing of the european commission—determined to set up a special monetary mechanism designed to sidestep U.S. sanctions. on the other hand, the scope of those measures continues to exist limited, both since the availability of sovereign European skill is proscribed by means of systemic vulnerabilities or since the use of current skill is soundless impeded by way of Europeans’ stubborn refusal to comply with through their personal helpful judgment.

    the first step taken with the aid of the eu became the reactivation of a blocking off statute from the mid-Nineties that forbids European agencies to comply with extraterritorial, non-ecu legal guidelines—if they do, they possibility sanctions in Europe. In theory, here's meant to supply a criminal protect in case they're prosecuted through the us. best it has under no circumstances labored, as attested by the record fines inflicted through the U.S. on French banks BNP Paribas and Société Générale for violating secondary sanctions on Sudan, Cuba, and Iran. subsequently, the companies that the blockading statute is hypothetical to protect devour rather the sensation of being trapped between two sanctions programs. Granted, the european measure moreover comprises a rectify to compensation for damages as a result of U.S. sanctions, however does so in an absurd form: because the U.S., as a condition entity, benefits from immunity, the losses generated by Washington’s altenative may necessity to exist financed from European taxpayers’ money.

    useful options attain exist, however they might betoken assuming a greater confrontational pose towards the U.S.. As stated through an analyst at the European Council on outlandish relations (ECFR, a semi-respectable feel tank, with many current European leaders on its board), “european officers devour to bid Trump: if you attribute their businesses’ assets in the united states, they are able to reclaim those expenses through penalizing U.S. belongings in Europe.” Uneasy with this type of stream, Europeans prefer in its residence to stick to an ambivalent version of the blocking off rules, with out accountability of the U.S. companion and with out the threat of that type of “mirror sanctions.” No put a question to yourself these measures sound unconvincing to European businesses that select to reside on the protected facet and conform to U.S. law.

    indeed, when an organization has belongings in the united states, has americans on their board, or conveniently makes greenback-based overseas transactions, it routinely falls under the scope of U.S. secondary sanctions. for the judgement that European governments did not retract reciprocity-driven political measures—such as the chance of counter-sanctions against U.S. property—with the intent to acquire an exemption for their agencies from extraterritorial U.S. legal guidelines, deepest operators rather understandably attain not necessity to soar into the unknown. They regularly play over-compliance, rather than risking exorbitant penalties or exclusion from the profitable American market.

    It isn't any twist of portion that, from the outset, the focal point of European efforts turned into the creation of a expense mechanism detached from the U.S.-managed monetary device. European petite and medium-sized enterprises (SMEs) that aren't without retard uncovered to sanctions (as a result of they attain not devour belongings in the united states, or American shareholders, nor attain they attain dollar-based mostly transactions) could, in precept, for this judgement continue to change with Iran. apart from that, with the intent to achieve this, they must straggle through banks—and banks are likely to screen transactions for concern of viable U.S. retaliation. The hunt a comfy economic channel became an eye fixed-opening manner for European governments. faultfinding vulnerabilities emerged, as the European faultfinding bank, the ecu funding bank, and the significant banks of distinctive international locations devour declined to participate, for concern of damaging their ties with the U.S. and/or losing their capability to operate on the global market.

    therefore, the recourse to a selected economic mechanism, referred to as INSTEX (Instrument for helping alternate Exchanges) currently install by means of France, the UK, and Germany. Domiciled in Paris, INSTEX is elope by a German director and receives funding from the three countries—to current a united front in opposition t feasible threats from Washington. The mechanism is a figure of funds coordinator for transactions to and from Iran—a closed circuit, designed to protect every one in totality its points from U.S. extraterritorial sanctions. Given European propensity to easily bow to U.S. demands, INSTEX is a real success. although, apt to their habitual ambivalence, Europeans devour managed to both irritate the us and never meet Iran.

    For the second, the Euro-American clash is hypothetical instead of functional, notwithstanding no longer any less gigantic. The remark that, after operationalization, INSTEX should exist “focusing originally on the sectors most essential to the Iranian population – corresponding to pharmaceutical, scientific instruments and agri-food goods” capacity that, as a former U.S. sanctions bona fide at the Treasury department stated, “It’s not a ‘circumvention’ of U.S. sanctions, on the grounds that totality this trade is authorised.” This did not avoid vp Pence from announcing, “It’s an ill-suggested step so that you can best fortify Iran, weaken the european and create nevertheless more distance between Europe and the united states.” on the identical time, the Iranian outlandish Minister reminded the Europeans that INSTEX, during this prefatory kind, fell wanting commitments made by means of the E3 (France, the uk, and Germany): “Europe needs to exist inclined to pick up dank if it desires to swim in opposition t the dismal tide of U.S. unilateralism.” The difficulty is that “getting moist” goes in opposition t Europe’s deeply-anchored reflexes.

    The Sovereignty challenge: A Bridge Too far

    despite the fact there changed into firstly a mind-blowing unanimity among the many 28 to “deeply exist apologetic about” the U.S. withdrawal from the JCPOA and to “continue to exist dedicated to the persisted replete and valuable implementation of the nuclear deal,” reservations emerge, as they now devour seen, on the way to translate this into exact measures. Admittedly, each person concurs that when you account that the european’s credibility is on the line, “some thing must exist achieved.” Yet, when it comes to whether this “something” may soundless devour a apt influence—to exist able to aver European sovereignty—or, conversely, continue to exist on the symbolic degree in order no longer to offend the U.S., Europe’s internal divisions Come to the floor.

    Whereas the French Minister of economic climate proclaims that “it is time for Europe to stream from phrases to motion in regards to pecuniary sovereignty, it's time for us to undertake the very devices as those attainable to the U.S. for defending its economic pastimes,” Chancellor Merkel, relish totality self-respecting German chief, remains ambiguous on the field. at some point, she says that “Europe must retract its destiny in its own fingers.” On different occasions, she strikes a more cautious tone: “here's a sedate experience, but it surely isn't a intent to name into query the whole trans-Atlantic partnership.” eastern Member States are unwaveringly on this 2nd line. For the Lithuanian Minister of overseas Affairs Linas Linkevičius, “Let’s retract into account what’s greater crucial” – “We shouldn’t attain that on the cost of Euro-Atlantic members of the family.” in keeping with him, “It’s really not a solitary voice” within the ecu, to which his Polish counterpart brought, “Many nations are towards a confrontation with the U.S.”

    Warsaw’s resolution to host an anti-Iran zenith initiated by the U.S. (and later renamed “on the focus East”) did not at totality succor to beat intra-eu divergences. particularly when you account that leaders of ecu institutions are, for his or her part, unequivocal: the respect of JCPOA commitments is deemed strategically crucial neatly beyond the specific Iranian case. in the words of the eu’s chief diplomat, “We Europeans can't accept that a overseas vigor – even their closest buddy and ally – makes choices over their reputable trade with a different country. this is a primary aspect of sovereignty.” in a similar fashion, the President of the fee titled his newest speech on the condition of the Union, “The hour of European sovereignty.”

    no longer unrelated to the vulnerabilities published perquisite through efforts to retain the Iran deal, Jean-Claude Juncker proposed to upshot the euro “the instrument of a brand new, extra sovereign Europe.” He went on to assert, “it is absurd that Europe can pay for 80% of its energy import invoice – expense 300 billion euro a 12 months – in U.S. dollar when handiest roughly 2% of their power imports Come from the united states. it's absurd that European companies purchase European planes in dollars in its residence of euro.” here is an odd, (well-nigh) “de Gaullian” stance from eu officers. in the equal spirit, existing French President Emmanuel Macron speaks of a “sovereignty witness at various” for Europe, and his Minister of the economy warns his European companions in opposition t behaving “like vassals.”

    Former German ambassador to Washington and the latest Director of the Munich safety convention Wolfgang Ischinger considers that the U.S. determination on Iran is a chance for Europe: “it's yet another theatrical wake-up summon for the european Union to at last pick up a grip on itself. For the eu project, I can't imagine a much better motivation than this shock from Trump.” After his failed attempts to affect the American president, Emmanuel Macron additionally drew a limpid lesson: “The query is not whether they can prevail the united states of america, it is a superb americans and a very helpful country, the question is whether or not the us of america appears at us as a power with strategic autonomy, that’s the real question this is posed for Europe these days.” except that, as they devour seen, European partners attain not necessarily wish an reply within the affirmative.

    other Horizons…

    regardless of the ongoing controversies among European companions, there is consensus on two aspects: first, the stakes travel a long way past the question of Iran; 2d, the commitment to sustain the nuclear agreement in no way implies complacency or naivety vis-à-vis Tehran. For Europeans, honoring their commitments below the JCPOA raises one essential issue: their means to claim their own interests and coverage selections, even when they don't coincide with these of their closest ally. seen from this angle, the (half)-measures taken to outwit U.S. extraterritoriality could upshot a mountainous first step. They could exist accelerated and tailored for other situations, when and if there might exist a coverage gap between Europe and the us.

    at last, the dispute over the nuclear deal is just one, and doubtless no longer essentially the most vital, constituent in a context of expanding transatlantic coverage divergences. even if on exchange tariffs, NATO, European defense, the INF (Intermediate-range Nuclear Forces Treaty) or arms purchases, Europeans are confronted with simple transatlantic imbalances. furthermore, the inner fragilities of eu Member States add a “democracy aspect” to the quest for sovereignty. President Macron underscored this commonly not famous link: “If they accept that other incredible powers, together with allies, including pals, are competent to settle for us, their diplomacy, their security, then they are not any longer sovereign and they can no longer credibly study their public opinions, their people with the aid of announcing to them: they can settle for you, Come and vote and decide.” On the Iran subject, Europe has evidently didn't anticipate replete autonomy. but it has at the least realized, jointly and publicly, that the problem exists. it's protected to claim that there may exist different opportunities.

    *in regards to the writer: Hajnalka Vincze, a Senior Fellow in the focus for the witness at of the united states and the West on the overseas policy research Institute, contributes to FPRI on French, ecu, and transatlantic politics and guidelines. Vincze is a eu outlandish and safety policy analyst, previously in saturate of European Union and transatlantic issues at the Hungarian Ministry of protection’s analysis Institute.

    supply: this text turned into posted by way of FPRI

    Obviously it is difficult assignment to pick solid certification questions/answers assets concerning review, reputation and validity since individuals pick up sham because of picking incorrectly benefit. ensure to serve its customers best to its assets concerning exam dumps update and validity. The vast majority of other's sham report objection customers Come to us for the brain dumps and pass their exams cheerfully and effectively. They never trade off on their review, reputation and attribute because killexams review, killexams reputation and killexams customer certitude is vital to us. Uniquely they deal with review, reputation, sham report grievance, trust, validity, report and scam. In the event that you see any fallacious report posted by their rivals with the name killexams sham report grievance web, sham report, scam, dissension or something relish this, simply bethink there are constantly terrible individuals harming reputation of helpful administrations because of their advantages. There are a powerful many fulfilled clients that pass their exams utilizing brain dumps, killexams PDF questions, killexams hone questions, killexams exam simulator. Visit, their specimen questions and test brain dumps, their exam simulator and you will realize that is the best brain dumps site.

    Back to Braindumps Menu

    9L0-009 brain dumps | 1Z0-536 rehearse test | CLSSGB study guide | 642-885 test prep | BI0-145 brain dumps | LOT-916 study guide | CN0-201 braindumps | C9010-260 mock exam | BCBA VCE | 030-333 questions and answers | 000-M233 test prep | 1D0-570 rehearse exam | 9A0-384 real questions | C2070-580 cheat sheets | P2090-047 real questions | 77-427 examcollection | NSE4_FGT-6-0 free pdf download | 499-01 free pdf | C9550-273 exam prep | 70-487 rehearse questions |

    Searching for 250-700 exam dumps that works in real exam?
    In the event that you are intrigued by proficiently Passing the Symantec 250-700 exam to start gaining, has principle feature developed Implementation of HA Solutions for Windows using VCS 4.1 exam questions with a judgement to ensure you pass this 250-700 exam! offers you the greatest precise, contemporary and current cutting-edge 250-700 exam questions and to exist had with a 100% unconditional promise.

    If you are searching for Pass4sure Symantec 250-700 Dumps containing real exams questions and answers for the Implementation of HA Solutions for Windows using VCS 4.1 Exam preparation, they give most updated and attribute wellspring of 250-700 Dumps that is They devour aggregated a database of 250-700 Dumps questions from real exams with a specific End goal to give you a chance to pick up ready and pass 250-700 exam on the first attempt. Huge Discount Coupons and Promo Codes are as under;
    WC2017 : 60% Discount Coupon for totality exams on website
    PROF17 : 10% Discount Coupon for Orders greater than $69
    DEAL17 : 15% Discount Coupon for Orders greater than $99
    DECSPECIAL : 10% Special Discount Coupon for totality Orders

    Quality and Value for the 250-700 Exam: rehearse Exams for Symantec 250-700 are formed to the most lifted standards of specific exactness, using simply certified theme masters and conveyed makers for development.

    100% Guarantee to Pass Your 250-700 Exam: If you don't pass the Symantec 250-700 exam using their testing programming and PDF, they will give you a replete REFUND of your purchasing charge.

    Downloadable, Interactive 250-700 Testing Software: Their Symantec 250-700 Preparation Material gives you that you should retract Symantec 250-700 exam. Inconspicuous components are investigated and made by Symantec Certification Experts constantly using industry undergo to convey correct, and honest to goodness.

    - Comprehensive questions and answers about 250-700 exam - 250-700 exam questions joined by displays - Verified Answers by Experts and very nearly 100% right - 250-700 exam questions updated on generic premise - 250-700 exam planning is in various conclusion questions (MCQs). - Tested by different circumstances previously distributing - Try free 250-700 exam demo before you select to pick up it in Huge Discount Coupons and Promo Codes are as under;
    WC2017: 60% Discount Coupon for totality exams on website
    PROF17: 10% Discount Coupon for Orders greater than $69
    DEAL17: 15% Discount Coupon for Orders greater than $99
    DECSPECIAL: 10% Special Discount Coupon for totality Orders

    250-700 Practice Test | 250-700 examcollection | 250-700 VCE | 250-700 study guide | 250-700 practice exam | 250-700 cram

    Killexams HP0-451 free pdf | Killexams CAT-241 study guide | Killexams 9A0-067 pdf download | Killexams GB0-183 rehearse questions | Killexams HP2-E53 rehearse exam | Killexams 9A0-039 free pdf | Killexams C2150-197 test questions | Killexams FSOT real questions | Killexams BH0-009 exam prep | Killexams EPPP cheat sheets | Killexams HP0-J26 cram | Killexams MB3-216 braindumps | Killexams ACMA-6-1 braindumps | Killexams 1Z0-584 study guide | Killexams 1Z0-475 study guide | Killexams HP0-S27 questions answers | Killexams FNS exam prep | Killexams NCEES-PE examcollection | Killexams MB7-255 dumps | Killexams ACSM-GEI dumps questions | huge List of Exam Braindumps

    View Complete list of Brain dumps

    Killexams 920-432 free pdf | Killexams C2180-374 questions and answers | Killexams 000-565 sample test | Killexams HP0-053 real questions | Killexams HP2-T24 braindumps | Killexams ACCP rehearse Test | Killexams C2140-136 rehearse test | Killexams VCS-254 questions and answers | Killexams CBM exam prep | Killexams HP0-263 test prep | Killexams HP0-757 questions answers | Killexams JN0-102 brain dumps | Killexams 310-102 braindumps | Killexams VCS-409 free pdf | Killexams 4A0-109 dumps questions | Killexams 7230X rehearse exam | Killexams HP2-E41 mock exam | Killexams 000-314 study guide | Killexams HPE6-A41 braindumps | Killexams E20-368 examcollection |

    Implementation of HA Solutions for Windows using VCS 4.1

    Pass 4 positive 250-700 dumps | 250-700 real questions |

    Red Hat Enterprise Linux Cluster Suite | real questions and Pass4sure dumps

    When mission-critical applications fail, so does your business. This often is a apt statement in today's environments, where most organizations expend millions of dollars making their services available 24/7, 365 days a year. Organizations, regardless of whether they are serving external customers or internal customers, are deploying highly available solutions to upshot their applications highly available.

    In view of this growing demand, almost every IT vendor currently is providing high-availability solutions for its specific platform. well-known commercial high-availability solutions include IBM's HACMP, Veritas' Cluster Server and HP's Serviceguard.

    If you're looking for a commercial high-availability solution on Red Hat Enterprise Linux, the best altenative probably is the Red Hat Cluster Suite.

    In early 2002, Red Hat introduced the first member of its Red Hat Enterprise Linux family of products, Red Hat Enterprise Linux AS (originally called Red Hat Linux Advanced Server). Since then, the family of products has grown steadily, and it now includes Red Hat Enterprise Linux ES (for entry- and mid-range servers) and Red Hat Enterprise Linux WS (for desktops/workstations). These products are designed specifically for use in enterprise environments to deliver superior application support, performance, availability and scalability.

    The original release of Red Hat Enterprise Linux AS version 2.1 included a high-availability clustering feature as participate of the basis product. This feature was not included in the smaller Red Hat Enterprise Linux ES product. However, with the success of the Red Hat Enterprise Linux family, it became limpid that high-availability clustering was a feature that should exist made available for both AS and ES server products. Consequently, with the release of Red Hat Enterprise Linux version 3 in October 2003, the high-availability clustering feature was packaged into an optional layered product called the Red Hat Cluster Suite, and it was certified for use on both the Enterprise Linux AS and Enterprise Linux ES products.

    The RHEL cluster suite is a separately licensed product and can exist purchased from Red Hat on top of Red Hat's basis ES Linux license.

    Red Hat Cluster Suite Overview

    The Red Hat Cluster Suite has two major features. One is the Cluster Manager that provides elevated availability, and the other feature is called IP load balancing (originally called Piranha). The Cluster Manager and IP load balancing are complementary high-availability technologies that can exist used separately or in combination, depending on application requirements. Both of these technologies are integrated in Red Hat's Cluster Suite. In this article, I focus on the Cluster Manager.

    Table 1 shows the major components of the RHEL Cluster Manager.

    Table 1. RHEL Cluster Manager Components

    Software Subsystem Component Purpose Fence fenced Provides fencing infrastructure for specific hardware platforms. DLM libdlm, dlm-kernel Contains distributed lock management (DLM) library. CMAN cman Contains the Cluster Manager (CMAN), which is used for managing cluster membership, messaging and notification. GFS and related locks Lock_NoLock Contains shared filesystem champion that can exist mounted on multiple nodes concurrently. GULM gulm Contains the GULM lock management user-space tools and libraries (an alternative to using CMAN and DLM). Rgmanager clurgmgrd, clustat Manages cluster services and resources. CCS ccsd, ccs_test and ccs_tool Contains the cluster configuration services dæmon (ccsd) and associated files. Cluster Configuration Tool System-config-cluster Contains the Cluster Configuration Tool, used to configure the cluster and array the current status of the nodes, resources, fencing agents and cluster services graphically. Magma magma and magma-plugins Contains an interface library for cluster lock management and required plugins. IDDEV iddev Contains the libraries used to identify the filesystem (or volume manager) in which a device is formatted.

    Shared Storage and Data Integrity

    Lock management is a common cluster infrastructure service that provides a mechanism for other cluster infrastructure components to synchronize their access to shared resources. In a Red Hat cluster, DLM (Distributed Lock Manager) or, alternatively, GULM (Grand Unified Lock Manager) are practicable lock manager choices. GULM is a server-based unified cluster/lock manager for GFS, GNBD and CLVM. It can exist used in residence of CMAN and DLM. A solitary GULM server can exist elope in standalone mode but introduces a solitary point of failure for GFS. Three or five GULM servers moreover can exist elope together, in which case the failure of one or two servers can exist tolerated, respectively. GULM servers usually are elope on dedicated machines, although this is not a strict requirement.

    In my cluster implementation, I used DLM, and it runs in each cluster node. DLM is helpful altenative for petite clusters (up to two nodes), because it removes quorum requirements as imposed by the GULM mechanism).

    Based on DLM or GLM locking functionality, there are two basic techniques that can exist used by the RHEL cluster for ensuring data integrity in concurrent access environments. The traditional way is the use of CLVM, which works well in most RHEL cluster implementations with LVM-based analytic volumes.

    Another technique is GFS. GFS is a cluster filesystem that allows a cluster of nodes to access simultaneously a screen device that is shared among the nodes. It employs distributed metadata and multiple journals for optimal operation in a cluster. To maintain filesystem integrity, GFS uses a lock manager (DLM or GULM) to coordinate I/O. When one node changes data on a GFS filesystem, that change is visible immediately to the other cluster nodes using that filesystem.

    Hence, when you are implementing a RHEL cluster with concurrent data access requirements (such as, in the case of an Oracle RAC implementation), you can use either GFS or CLVM. In most Red Hat cluster implementations, GFS is used with a direct access configuration to shared SAN from totality cluster nodes. However, for the very purpose, you moreover can deploy GFS in a cluster that is connected to a LAN with servers that use GNBD (Global Network screen Device) or two iSCSI (Internet petite Computer System Interface) devices.

    Both GFS and CLVM use locks from the lock manager. However, GFS uses locks from the lock manager to synchronize access to filesystem metadata (on shared storage), while CLVM uses locks from the lock manager to synchronize updates to LVM volumes and volume groups (also on shared storage).

    For nonconcurrent RHEL cluster implementations, you can reckon on CLVM, or you can use autochthonous RHEL journaling-based techniques (such as ext2 and ext3). For nonconcurrent access clusters, data integrity issues are minimal; I tried to sustain my cluster implementations simple by using autochthonous RHEL OS techniques.

    Fencing Infrastructure

    Fencing moreover is an principal component of every RHEL-based cluster implementation. The main purpose of the fencing implementation is to ensure data integrity in a clustered environment.

    In fact, to ensure data integrity, only one node can elope a cluster service and access cluster service data at a time. The use of power switches in the cluster hardware configuration enables a node to power-cycle another node before restarting that node's cluster services during the failover process. This prevents any two systems from simultaneously accessing the very data and corrupting it. It is strongly recommended that fence devices (hardware or software solutions that remotely power, shut down and reboot cluster nodes) are used to guarantee data integrity under totality failure conditions. Software-based watchdog timers are an alternative used to ensure rectify operation of cluster service failover; however, in most RHEL cluster implementations, hardware fence devices are used, such as HP ILO, APC power switches, IBM BladeCenter devices and the Bull NovaScale Platform Administration Processor (PAP) Interface.

    Note that for RHEL cluster solutions with shared storage, an implementation of the fence infrastructure is a mandatory requirement.

    Step-by-Step Implementation of a RHEL Cluster

    Implementation of RHEL clusters starts with the selection of proper hardware and connectivity. In most implementations (without IP load balancing), shared storage is used with two, or more than two, servers running the RHEL operating system and RHEL cluster suite.

    A properly designed cluster, whether you are building a RHEL-based cluster or an IBM HACMP-based cluster, should not hold any solitary point of failure. Keeping this in mind, you devour to remove any solitary point of failure from your cluster design. For this purpose, you can residence your servers physically in two divorce racks with redundant power supplies. You moreover devour to remove any solitary point of failure from the network infrastructure used for the cluster. Ideally, you should devour at least two network adapters on each cluster node, and two network switches should exist used for building the network infrastructure for the cluster implementation.

    Software Installation

    Building a RHEL cluster starts with the installation of RHEL on two cluster nodes. My setup has two HP Proliant servers (DL740) with shared fiber storage (HP MSA1000 storage). I started with a RHEL v4 installation on both nodes. It's best to install the latest available operating system version and its updates. I selected v4 update 4 (which was the latest version of RHEL when I was building that cluster). If you devour a telling software subscription from Red Hat, you can log in to the Red Hat network, and travel to software channels to download the latest update available. Later, once you download the ISO images, you can char it to CDs using any commandeer software. During the RHEL OS installation, you will travel through various configuration selections, the most principal of which are the date and time-zone configuration, the root user password setting, firewall settings and OS security flush selection. Another principal configuration option is network settings. Configuration of these settings can exist left for a later stage, especially in building a high-availability solution with Ether-channel (or Ethernet bonding configuration).

    You may necessity to install additional drivers after you install the OS. In my case, I downloaded the RHEL champion package for the DL740 servers (the HP Proliant champion pack, which is available from

    The next step is installing the cluster software package itself. This package, again, is available from the RHEL network, and you definitely devour to select the latest available cluster package. I selected rhel-cluster- for my setup, which was the latest cluster suite available at the time.

    Once downloaded, the package will exist in tar format. Extract it, and then install at least the following RPMs, so that the RHEL cluster with DLM can exist installed and configured:

  • Magma and magma-plugins

  • Perl-net-telnet

  • Rgmanager

  • System-config-cluster

  • DLM and dlm-kernel

  • DLM-kernel-hugemem and SMP champion for DLM

  • Iddev and ipvsadm

  • Cman, cman-smp, cman-hugemem and cman-kernelheaders

  • Ccs

  • Restart both RHEL cluster nodes after installing vendor-related hardware champion drivers and the RHEL cluster suite.

    Network Configuration

    For network configuration, the best way to proceed is to use the network configuration GUI. However, if you scheme to use Ethernet channel bonding, the configuration steps are slightly different.

    Ethernet channel bonding allows for a fault-tolerant network connection by combining two Ethernet devices into one virtual device. The resulting channel-bonded interface ensures that if one Ethernet device fails, the other device will become active. Ideally, connections from these Ethernet devices should travel to divorce Ethernet switches or hubs, so that the solitary point of failure is eliminated, even on the Ethernet switch and hub level.

    To configure two network devices for channel bonding, discharge the following on node 1:

    1) Create bonding devices in /etc/modules.conf. For example, I used the following commands on each cluster node:

    alias bond0 bonding options bonding miimon=100 mode=1

    Doing this loads the bonding device with the bond0 interface name and passes options to the bonding driver to configure it as an active-backup master device for the enslaved network interfaces.

    2) Edit the /etc/sysconfig/network-scripts/ifcfg-eth0 configuration file for eth0 and the /etc/sysconfig/network-scripts/ifcfg-eth1 file for the eth1 interface, so that these files expose identical contents, as shown below:


    This enslaves ethX (replace X with the assigned number of the Ethernet devices) to the bond0 master device.

    3) Create a network script for the bonding device (for example, /etc/sysconfig/network-scripts/ifcfg-bond0), which would appear relish the following example:


    4) Reboot the system for the changes to retract effect.

    5) Similarly, on node 2, restate the very steps with the only incompatibility being that the file /etc/sysconfig/network-scripts/ifcfg-bond0 should hold an IPADDR entry with the value of

    As a result of these configuration steps, you will End up with two RHEL cluster nodes with IP addresses of and, which devour been assigned to virtual Ethernet channels (the underlying two physical Ethernet adapters for each Ethernet channel).

    Now, you easily can use the network configuration GUI on the cluster nodes to set other network configuration details, such as hostname and primary/secondary DNS server configuration. I set Commsvr1 and Commsvr2 as the hostnames for the cluster nodes and moreover ensured that name resolution in both long names and short names would labor fine from both the DNS server and the /etc/hosts file.

    A RHEL cluster, by default, uses /etc/hosts for node name resolution. The cluster node name needs to match the output of uname -n or the value of HOSTNAME in /etc/sysconfig/network.

    Listing 1. Contents of the /etc/hosts File on Each Server

    # attain not remove the following line, or various programs # that require network functionality will fail. localhost.localdomain localhost Commsvr1 Commsvr2 Commilo1 Commilo2 Commserver node1 node2 KMETSM

    If you devour an additional Ethernet interface in each cluster node, it is always a helpful concept to configure a divorce IP network as an additional network for heartbeats between cluster nodes. It is principal that the RHEL cluster uses, by default, eth0 on the cluster nodes for heartbeats. However, it is soundless practicable to use other interfaces for additional heartbeat exchanges.

    For this type of configuration, you simply can use the network configuration GUI to apportion IP addresses—for example, and on eth2, and pick up it resolved from the /etc/hosts file.

    Setup of the Fencing Device

    As I was using HP hardware, I relied on the configuration of the HP ILO devices as a fencing device for my cluster. However, you may account configuring other fencing devices, depending on the hardware type used for your cluster configuration.

    To configure HP ILO, you devour to reboot your servers and press the F8 key to enter into the ILO configuration menus. Basic configuration is relatively simple; you devour to apportion IP addresses to ILO devices with the name of the ILO device. I assigned with Commilo1 as the name of ILO device on node1, and with Commilo2 as the ILO device name on node2. exist sure, however, to connect Ethernet cables to the ILO adapters, which usually are marked clearly on the back side of HP servers.

    Once rebooted, you can use the browsers on your Linux servers to access ILO devices. The default user name is Administrator, with a password that usually is available on the hard-copy tag associated with the HP servers. Later, you can change the Administrator password to a password of your choice, using the very Web-based ILO administration interface.

    Setup of the Shared Storage Drive and Quorum Partitions

    In my cluster setup environment, I used an HP fiber-based shared storage MSA1000. I configured a RAID-1 of 73.5GB using the HP smart array utility, and then assigned it to both of my cluster nodes using the selective host presentation feature.

    After rebooting both nodes, I used HP fiber utilities, such as hp_scan, so that both servers should exist able to see this array physically.

    To verify the physical availability of shared storage for both cluster nodes, witness in the /dev/proc/proc file for an entry relish /dev/sda or /dev/sdb, depending upon your environment.

    Once you find your shared storage on the OS level, partition it according to your cluster storage requirements. I used the parted implement on one of my cluster nodes to partition the shared storage. I created two petite primary partitions to hold raw devices, and a third primary partition was created to hold the shared data filesystem:

    Parted> select /dev/sda Parted > mklabel /dev/sda msdos Parted > mkpart primary ext3 0 20 Parted > mkpart primary ext3 20 40 Parted > mkpart primary ext3 40 40000

    I rebooted both cluster nodes and created the /etc/sysconfig/rawdevices file with the following contents:

    /dev/raw/raw1 /dev/sda1 /dev/raw/raw2 /dev/sda2

    A restart of rawdevices services on both nodes will configure raw devices as quorum partitions:

    /home/root> services rawdevices restart

    I then created a JFS2 filesystem on the third primary partition using the mke2jfs command; however, its related entry should not exist reclaim in the /etc/fstab file on either cluster node, as this shared filesystem will exist under the control of the Rgmanager of the cluster suite:

    /home/root> mke2jfs -j -b 4096 /dev/sda3

    Now, you can create a directory structure called /shared/data on both nodes and verify the accessibility of the shared filesystem from both cluster nodes by mounting that filesystem one by one at each cluster node (mount /dev/sda3 /shared/data). However, never try to mount this filesystem on both cluster nodes simultaneously, as it might debase the filesystem itself.

    Cluster Configuration

    Almost everything required for cluster infrastructure has been done, so the next step is configuring the cluster itself.

    A RHEL cluster can exist configured in many ways. However, the easiest way to configure a RHEL cluster is to use the RHEL GUI and travel to System Management→Cluster Management→Create a cluster.

    I created a cluster with the cluster name of Commcluster, and with node names of Commsvr1 and Commsvr2. I added fencing to both nodes—fencing devices Commilo1 and Commilo2, respectively—so that each node would devour one fence flush with one fence device. If you devour multiple fence devices in your environment, you can add another fence flush with more fence devices to each node.

    I moreover added a shared IP address of, which will exist used as the service IP address for this cluster. This is the IP address that moreover should exist used as the service IP address for applications or databases (like for listener configuration, if you are going to use an Oracle database in the cluster).

    I added a failover domain, namely Kmeficfailover, with priorities given in the following sequence:

    Commsvr1 Commsvr2

    I added a service called CommSvc and then reclaim that service in the above-defined failover domain. The next step is adding resources to this service. I added a private resource of the filesystem type, which has the characteristic of device=/dev/sd3, mountpoint of /shared/data and mount type of ext3.

    I moreover added a private resource of the script type (/root/ to service CommSvc. This script will start my C-based application, and therefore, it has to exist present in the /root directory on both cluster nodes. It is very principal to devour rectify ownership of root and security; otherwise, you can expect unpredictable behavior during cluster startup and shutdown.

    Application or database startup and shutdown scripts are very principal for a RHEL-based cluster to duty properly. RHEL clusters use the very scripts for providing application/database monitoring and elevated availability, so every application script used in a RHEL cluster should devour a specific format.

    All such scripts should at least devour start and halt subsections, along with a status subsection. When an application or database is available and running, the status subsection of the script should revert a value of 0, and when an application is not running or available, it should revert a value of 1. The script moreover should hold a restart subsection, which tries to restart services if the application is institute to exist dead.

    A RHEL cluster always tries to restart the application on the very node that was the previous owner of the application, before trying to straggle that application to the other cluster node. A sample application script, which was used in my RHEL cluster implementation (to provide elevated availability to a legacy C-based application) is shown in Listing 2.

    Listing 2. Sample Application Script

    #Script Name: #Script Purpose: To provide application #start/stop/status under Cluster #Script Author: Khurram Shiraz #!/bin/sh basedir=/home/kmefic/KMEFIC/CommunicationServer case $1 in 'start') cd $basedir su kmefic -c "./CommunicationServer -f Dev-CommunicationServer.conf" exit 0 ;; 'stop') z=`ps -ef | grep Dev-CommunicationServer | grep -v "grep"| ↪awk ' { print $2 } ' ` if [[ $? -eq 0 ]] then kill -9 $z fuser -mk /home/kmefic exit 0 fi ;; 'restart') /root/ stop sleep 2 reecho Now starting...... /root/ start reecho "restarted" ;; 'status') ps -U kmefic | grep CommunicationSe 1>/dev/null if [[ $? = 0 ]] then exit 0 else exit 1 fi ;; esac

    Finally, you devour to add a shared IP address ( to the service present in your failover domain, so that the service should hold three resources: two private resources (one filesystem and one script) and one shared resource, which is the service IP address for the cluster.

    The last step is synchronizing the cluster configuration across the cluster nodes. The RHEL cluster administration and configuration implement provides a “save configuration to cluster” option, which will appear once you start the cluster services. Hence, for the first synchronization, it is better to dispatch the cluster configuration file manually to totality cluster nodes. You easily can use the scp command to synchronize the /etc/cluster/cluster.conf file across the cluster nodes:

    /home/root> scp /etc/cluster/cluster.conf Commsvr2:/etc/cluster/cluster.conf

    Once synchronized, you can start cluster services on both cluster nodes. You should start and halt RHEL-related cluster services, in sequence.

    To start:

    service ccsd start service cman start service fenced start service rgmanager start

    To stop:

    service rgmanager stop service fenced stop service cman stop service ccsd stop

    If you use GFS, startup/shutdown of the gfs and clvmd services devour to exist included in this sequence.

    Additional Considerations

    In my environment, I decided not to start cluster services at RHEL boot time and not to shut down these services automatically when shutting down the RHEL box. However, if your traffic requires 24/7 service availability, you can attain this easily by using the chkconfig command.

    Another consideration is logging cluster messages in a different log file. By default, totality cluster messages travel into the RHEL log messages file (/var/log/messages), which makes cluster troubleshooting significantly difficult in some scenarios. For this purpose, I edited the /etc/syslog.conf file to enable the cluster to log events to a file that is different from the default log file and added the following line:

    daemon.* /var/log/cluster

    To apply this change, I restarted syslogd with the service syslog restart command. Another principal step is to specify the time era for rotating cluster log files. This can exist done by specifying the name of the cluster log file in the /etc/logrotate.conf file (the default is a weekly rotation):

    /var/log/messages /var/log/secure /var/log/maillog /var/log/spooler /var/log/boot.log /var/log/cron /var/log/cluster { sharedscripts postrotate /bin/kill -HUP `cat /var/run/ 2> /dev/null` 2> /dev/null || true endscript }

    You moreover devour to pay special attention to keeping UIDs and GIDs synchronized across cluster nodes. This is principal in making positive proper permissions are maintained, especially with reference to the shared data filesystem.

    GRUB moreover needs to conform to the suite environment's specific needs. For instance, many system administrators, in a RHEL cluster environment, reduce the GRUB selection timeout to some lower values, such as two seconds, to accelerate system restart time.

    Database Integration with a RHEL Cluster

    The very RHEL cluster infrastructure can exist used for providing elevated availability to databases, such as Oracle, MySQL and IBM DB2.

    The most principal thing to bethink is to basis your database-related services on a shared IP address—for example, you devour to configure Oracle listener based on the shared service IP address.

    Next, I explain, in simple steps, how to use an already-configured RHEL cluster to provide elevated availability to a MySQL database server, which is, no doubt, one of the most commonly used databases on RHEL.

    I assume that the MySQL-related RPMs are installed on both cluster nodes and that the RHEL cluster already is configured with a service IP address of

    Now, you simply necessity to define a failover domain using the cluster configuration implement (with the cluster node of your altenative having a higher priority). This failover domain will devour the MySQL service, which, in turn, will devour two private resources and one shared resource (the service IP address).

    One of the private resources should exist of the filesystem type (in my configuration, it has a mountpoint of /shared/mysqld), and the other private resource should exist of the script type, pointing toward the /etc/init.d/mysql.server script. The contents of this script, which should exist available on both cluster nodes, is shown in Listing 3 on the LJ FTP site at

    This script sets the data directory to /shared/mysqld/data, which is available on their shared RAID array and should exist available from both cluster nodes.

    Testing for elevated availability of the MySQL database can exist done easily with the succor of any MySQL client. I used SQLyog, which is a Windows-based MySQL client. I connected to the MySQL database on Commsvr1 and then crashed this cluster node using the halt command. As a result of this system crash, the RHEL cluster events were triggered, and the MySQL database automatically restarted on Commsvr2. This whole failover process took one to two minutes and happened quite seamlessly.


    RHEL clustering technology provides a reliable high-available infrastructure that can exist used for meeting 24/7 traffic requirements for databases as well as legacy applications. The most principal thing to bethink is that it is best to scheme carefully before the actual implementation and test your cluster and totality practicable failover scenarios thoroughly before going live with a RHEL cluster. A well-documented cluster test scheme moreover can exist helpful in this regard.

    Impact of Computerized Physician Order Entry on Clinical rehearse in a Newborn Intensive care Unit | real questions and Pass4sure dumps

    At The Ohio condition University Medical Center, CPOE was introduced to selective services in February 20007,12 and it was first implemented at the NICU in March 2002. They use a vendor-based system (Invision 24 with graphical use interface, Siemens Medical Solutions Health Services Corp., Malvern, PA) that has been extensively modified with vendor-provided tools to meet the needs of this pediatric population. The NICU-specific physician order sets were developed on evidence provided by best practices by a subcommittee that met regularly and is composed of information system specialists, neonatal pharmacist, staff nurses, nurse managers, attending neonatologists, and pediatric chief residents. After development, six admission or procedural-type order sets and 12 medication conclusion champion sets designed specifically for neonatal use were approved by a hospital-wide multidisciplinary committee that oversees CPOE activities of different units.

    Formalized training for totality NICU staff and physicians began 4 weeks prior to implementation. Nursing leaders identified to provide champion for clinicians received 16 hours of classroom training, while totality other nursing and clerical staff received 8 hours of training. Every physician received 2 to 4 hours of individualized instruction prior to the initiation of his or her monthly rotation. In addition, during the implementation of CPOE, there was 24-hour champion provided by information systems staff.

    The CPOE system supports the capacity of the clinician to write any order, consult, or requisition electronically. Orders are interfaced bidirectionally with their laboratory and radiology systems and unidirectionally with their dietary system. Orders are printed directly to pharmacy and other ancillary areas. Numerous clinical conclusion champion tools are integrated into the ordering pathways. These include, but are not limited to, drug allergy, drug-drug interactions, order duplication, corollary orders, weight-based dosage, maximum dosage, and drug route restriction. In addition, simultaneously the order is evaluated through a clinical rules engine and commandeer alerts are triggered.

    Pre-CPOE data were obtained retrospectively from medical records, while post-CPOE data were obtained electronically from the computerized lifetime patient record. Their NICU admits about 850 sick full-term and premature infants every year, but they chose for the study only very-low-birth-weight (VLBW) infants (birth weight ≤1500 g) born consecutively 6 months before and 6 months after the implementation of CPOE. These infants were selected due to their elevated morbidity and mortality and because timely radiology and pharmacy responses as well as accurate drug dosages are faultfinding for their survival. It should exist famous that since 1987 they devour had a full-time perinatal clinical pharmacist dedicated to the NICU.

    Medication Turn-Around Times

    A medication event was defined as the completion of the entire cycle, from physician order (manual or electronic) through medication administration by the nurse. In this investigation, time when orders were received and entered into the system by the pharmacist and times for the preparation of the medication were not separately identified.

    Since 1990, most medications given to neonates are stored at the NICU in a decentralized pharmacy dispensing system (Pyxis Consulting, Inc., Wellesley, MA). Thus, for the purpose of this investigation, they selected a medication that is dispensed by central pharmacy (caffeine citrate) and that is routinely administered with a loading dose.

    Before March 2002, totality physician orders were entered manually in the chart kept at the patient bedside. The nurse was notified of new orders via physician communication or flagging of the chart. Then, the nurse transcribed the order onto the medication administration record and placed a duplicate copy in a special bin for the pharmacy hourly collection. Since March 2002 (post-implementation of CPOE) the NICU physician enters orders directly into a computer available at the bedside that generates an immediate printout at the pharmacy. Whether in the pre- or post-CPOE period, once the pharmacists complete processing, medications are delivered to the unit on an hourly basis. Since the implementation of CPOE, new orders are presented to nursing electronically for documentation of drug administration. In addition, at the End of each nursing shift there is a computer-generated summary of totality current pharmacy orders and their stage of completion.

    Time from prescription to administration of caffeine loading dose to the patient was determined from hospital records. It was arbitrarily determined that the acceptable time for caffeine administration would exist 2 to 3 hours; therefore, a percentage of patients who received the medication within that era was determined.

    Prescription Medication Error

    Common types of medication errors involve incorrect drug choice, incorrect dosage, route of administration, frequency, order illegibility, and nonstandard terminology. Among pediatric patients, especially newborns, the most common mistake is in dosage.11 Thus, they studied dosages of gentamicin given empirically on admission to the NICU and later at the time of a suspected late-onset sepsis. On admission to the NICU, gentamicin is dosed according to birth weight at 5 mg/kg, but later, especially in VLBW infants where there are significant daily weight changes, it must exist adjusted to actual weight and to postconceptional age. Upon selection of each medication, CPOE presents the prescribing physician with the weight verification screen, the recommended dose per kilogram of corpse weight, frequency of administration, and dose calculations.

    Radiology Procedure Completion Time

    At The Ohio condition University Health Systems, since October 1997 a Picture Archive and Communication System (PACS Rev. 4.1, AGFA Corporation, Ridgefield Park, NJ) has been used. This system allows for the acquisition and storage of digital images from a variety of radiological modalities that can exist displayed promptly after processing. They selected as the study-radiology procedure the first chest and abdominal X-ray taken of VLBW infants born consecutively before and after the implementation of CPOE. They focused on these infants because they often present with respiratory distress syndrome that requires endotracheal intubation for mechanical ventilation and placement of umbilical arterial catheters for blood gas monitoring. exigent radiological evaluations of these placements are faultfinding for management.

    Procedure time sequence starts when the physician enters the order (manual or electronic), followed by the arrival of the radiology technician to the NICU. After the portable X-rays are taken, they are processed in the department of radiology (located on a different floor) and then entered in the computer for array on the twin screens at the NICU. At the time when the films are available for viewing, the radiology procedure is considered completed. In the pre-CPOE period, once the order was written the nurse or the unit secretary phoned radiology to request the X-rays. In the post-CPOE period, once the order is entered in the computer it is immediately relayed through an interface to the radiology computer system.

    Statistical Analysis

    Subgroups were formed for specific analysis. Descriptive summary of the data consisted of frequency counts, percentages, and signify and criterion deviations (±SD). Unpaired t-tests were used for comparison of means, and χ2 tests of proportion were used for categorical variables. SAS statistical package (for Windows 6.12) was used (SAS Institute, Inc., Research Triangle, NC).

    Development Platforms for Mobile Applications: Status and Trends | real questions and Pass4sure dumps

    This article first appeared in IEEE Software magazine and is brought to you by InfoQ & IEEE Computer Society.

    Mobile devices devour steadily gained acceptance as a multimedia platform. Current tools offer application developers options to use various technologies - for example, Java, Open C, Python, glimmer Lite, XHTML/CSS, JavaScript, and Mobile Ajax - to implement highly functional mobile applications. Content developers can labor with audio, video, multimedia messaging, and glimmer to create wealthy and compelling mobile content. Although the altenative of evolution platform is largely market-driven, it moreover depends on the characteristics of available platforms and the requirements of particular applications. To illuminate the status and trends in current evolution platforms, they re - viewed and compared four current mobile - application runtime environments with respect to various quantitative and qualitative criteria. They based the comparisons on data from earlier research[1], technical specifications, white papers, and an informal survey of 32 mobile - application developers with hands - on undergo using the plat - forms they reviewed. Most importantly, they developed a simple game application and implemented it on totality four platforms as a case study for highlighting the main characteristics and relative merits and shortcomings of the four platforms. They depict the generic results of this comparison as well as details from the game application’s development. They summarize the results from totality sources in a table and conclude with their assessment of how commandeer the different platforms are with respect to faultfinding application - evolution requirements.

    Four Mobile - Application Platforms

    Numerous evolution platforms are available for handheld devices, including autochthonous environments such as the Symbian, OpenC, iPhone, and Palm operating systems; Web runtimes such as widgets; and runtime environments such as Python, Lazarus, Brew, and the four they review here—Java Mobile Edition (ME), .NET Compact Framework (CF), glimmer Lite, and Android—which currently devour the largest developer and deployment bases. pattern 1 summarizes the software stacks for these four platforms.

    FIGURE 1. Software stacks for the reviewed mobile-application evolution platforms. Comparison of operating systems, runtimes, application frameworks, and evolution languages.

    Java ME

    This subset of the Java platform provides a certified collection of Java APIs for developing software for resource - constrained devices such as cell phones, PDAs, and set - top boxes.


    Java ME runs on top of a kernel-based virtual machine (KVM), which allows reasonable, but not complete, access to the underlying device’s functionality. Java ME supports cross-platform evolution through configurations and profiles:

  • A configuration defines the minimum Java VM features and library set for a horizontal family of devices - that is, devices with similar processing and memory limitations, user interface requirements, and connection capabilities.
  • A profile comprises libraries specialized in the unique characteristics of a particular device class.
  • All Java ME-enabled mobile devices currently champion the following configuration and profile specifications:

  • Connected Limited Device Configuration (CLDC), a framework for Java ME applications targeting resource-constrained devices. CLDC contains a strict subset of the Java class libraries needed for mobile-application development.
  • Mobile Information Device Profile (MIDP), a specification for using Java on embedded devices such as mobile phones and PDAs. MIDP is participate of the Java ME platform and sits on top of CLDC.
  • Java applications developed over CLDC/MIDP are referred to as MIDlets and are typically packaged in Java archive (JAR) files.

    Java ME is designed to exist cross-platform, so specification and implementation are two divorce processes. The Java Community Process (JCP) refers to a formalized specification process that lets interested parties pick up involved in defining Java platform versions. JCP uses Java Specification Requests (JSRs) to document proposed additions to the Java platform. A committee of mobile- solution providers specifies a new Java ME criterion API as a final JSR that includes source code for a reference implementation of the technology. Vendors are then free to develop their own implementations.


    Java ME is the preeminent mobile-software platform with respect to its installation and developer base. However, the Java language’s “write once, elope anywhere” axiom doesn’t apply to Java ME[2]. Developers must provide slightly different application versions to address variations in JSR sets and implementations across a wide ambit of device capabilities and altenative of profiles, configurations, and APIs. This requirement often results in dozens of executables for a given title - a phenomenon referred to as device fragmentation, which considerably increases operational costs over a product’s life cycle. Fragmentation restricts the devices that Java ME applications can reach and suggests that it’s more suitable in upright applications that target devices with similar capabilities and Java API support.

    Nevertheless, by targeting individual operating systems, developers using Java ME devour access to a great set of well-defined and develope JSRs. Java applications targeting the Symbian platform, for example, can reach about 70 percent of the world’s smartphones. More than 80 JSRs provide MIDlet developers a wealthy set of additional technologies, although MIDlet programming isn’t straightforward and requires sedate Java evolution skills.

    Commonly available JSRs that extend MIDP 2.0 on the Symbian platform include the Bluetooth API (JSR 82), the Wireless Messaging API (JSR 205), and the Mobile 3D Graphics API (JSR 184).

    .NET CF

    Designed for applications on Windows Mobile, .NET CF is a subset of Microsoft’s replete .NET platform[3].NET CF preloads the Common Language Runtime (CLR) engine in the device’s memory to facilitate mobile-application deployment. CLR provides interoperability with the underlying device’s op­erating system, allowing the integra­tion of autochthonous components into mobile applications.


    In principle, the .NET CF runtime is analogous to the Java virtual machine (JVM). Instead of writing na­tive code for the underlying operating system, .NET developers write man­aged code, which targets a managed ex­ecution environment. Microsoft origi­nally designed and developed the .NET platform with champion for multiple lan­guages and operating systems, aiming to reach an extended developer basis and to reuse existing libraries. However, the .NET CF evolution tool, Visual Stu­dio (VS.NET), currently supports only two major .NET languages: C# and Visual Basic (VB.NET). Furthermore, it restricts operating system champion to Windows platforms, which repre­sent only a petite participate of today’s mobile-device products.

    The core components are a subset of the replete .NET framework - roughly 30 percent of its classes and function­ality. Some classes exist in both .NET and .NET CF, but the .NET CF ver­sion doesn’t necessarily champion totality the replete version’s class members (proper­ties, methods, or events). Many classes aren’t implemented at all, and others are only partially implemented. Unique .NET CF classes address device-specific and third-party extensions.

    The .NET CF user interface design is based on a wealthy subset of .NET Win­dows Forms.


    .NET CF is comparable to Java ME with respect to providing a managed runtime environment, wealthy li­braries and components for reuse (ad­vanced user interface components, net­work connectivity, data management, XML Web services, and so on), and confidential APIs from the replete .NET frame­work, such as the Windows Forms controls. These features ease the tran­sition for desktop developers to mobile applications.

    Using a runtime system for intermedi­ate (managed) code implies relatively low execution performance. However, unlike Java ME, .NET CF is language-agnostic and simply specifies Common Intermedi­ate Language (CIL) instructions. .NET-supported languages compile to the very CIL, so the .NET CF runtime can exe­cute them.

    .NET CF demonstrates API-level consistency and compatibility with the replete .NET platform. This design ap­proach has had unforeseen memory footprint costs, but .NET CF neverthe­less represents a fast-paced implemen­tation driven by a powerful vendor. Developers know the hardware speci­fications to program against and can assume the availability of unavoidable na­tive software, such as Windows Media Player. It therefore offers satisfactory integration with device-specific func­tionality - telephony, short-message service, subscriber-identity-module card access, Bluetooth, and so on - and doesn’t exhibit Java ME’s fragmenta­tion problem. On the other hand, .NET CF targets a limited set of Windows End devices, and the VS.NET develop­ment tools include license costs.

    Adobe glimmer Lite

    Flash Lite is a proprietary technology, current as a multimedia and game pro­gramming platform. Adobe created it specifically to succor vendors rapidly de­ploy wealthy content and interactive inter­faces to mobile devices.


    A glimmer Lite application stores its contents and GUI descrip­tion in the vector-based SWF graphics and animation format. It implements its application and presentation logic in ActionScript.

    The number of original gear manufacturer (OEM), operator, and developer adopters of glimmer Lite is in­creasing rapidly worldwide. glimmer Lite 1.1 supports glimmer 4 and ActionScript 1.0. glimmer Lite 2.0 and 3.1 - based on glimmer Player 7 and 9, respectively - sup­port ActionScript 2.0. No champion is yet available for glimmer Player 9-compat­ible content based on ActionScript 3.0.

    All versions champion the World Wide Web Consortium (W3C) Tiny stan­dard[4], a mobile profile of W3C’s scalable vector graphics (SVG) recommendation.


    The glimmer Lite platform is a reasonable altenative for graphics-intensive phone and PDA applications. Industry adoption has increased because devel­opers skilled in glimmer for desktop appli­cations can easily switch to glimmer Lite for mobile applications. Rapid develop­ment is a primary benefit of glimmer Lite. It’s facile to learn and facile to migrate glimmer applications, and it includes a wealthy set of designer/developer tools. Ad­ditionally, it offers wealthy media champion (images, video, sound, and animation), a relatively broad runtime installation base, and petite deployment files based on vector graphics. As of glimmer Lite 2.x, it supports compressed SWF, and glimmer Lite 3.0 adds champion for the current autochthonous glimmer video (FLV).

    Currently, glimmer Lite is mostly suit­able for creating animations, casual games, mobile Web-based glimmer applications, front-end interfaces, and device-specific content (wallpapers, screen savers, and so on). However, it isn’t suitable for developing full-fledged stand-alone applications, mainly because it lacks the powerful mobile-oriented APIs of the Java ME platform. glimmer Lite exhibits relatively penniless graphics performance, partly because of the complex processing required for vector graphics. It ships with an extensive toolset (Adobe CS5, Adobe Device Central), but the toolset requires a license fee. Although glimmer Lite’s low-level device integration might look to exist a limitation, third parties offer low-level device APIs that champion the evolution of innovative applications. For example, the KuneriLite toolkit extends glimmer Lite capabilities in the Symbian platform. The cost, of course, is greater because of fragmentation issues and memory footprint.


    Google launched Android in 2007, to promote open standards for mobile devices. Android is an Apache free-soft- ware platform with an open source license for mobile devices based on Linux. Its software stack for mobile devices includes an operating system, middleware, and key applications.


    Android applications are primarily written in Java and compiled into Dalvik executable (DEX) format, a custom byte code. Each application executes on its own process, with its own instance of the Dalvik virtual machine. Dalvik runs DEX files, which are converted at compile time from criterion class and JAR files. DEX files are more compact and efficient than class files. Developers devour replete access to totality the frameworks and APIs that the core applications use and to Google-developed software libraries. Android’s software architecture is designed to simplify component reuse. Any application can publish its capabilities, and any other application can then use those capabilities, theme to security constraints enforced by the framework. The Android software evolution kit (SDK) supports authoring applications with wealthy functionality. relish the iPhone, it can handle handle screens, accelerometers, 3D graphics, and GPS as well as collaboration among applications relish email, messaging, calendars, companionable networking, and location-based services.


    Android supports a relatively great subset of the Java criterion Edition (SE) 5.0 library, implying reduced migration cost from Java desktop applications. It moreover supports several third-party libraries. Similarly to Java ME, application evolution is powered by current Java integrated evolution environments (IDEs) such as NetBeans and Eclipse. Android provides inherent champion for modular service-oriented applications and inter-application communication. Java ME’s MIDP 3.0 similarly supports inter-MIDlet communication. New platform releases interject many new user and developer features - for example, account synchronization, improved media-playing performance, and database and geolocation API champion - but moreover raise fragmentation concerns. Phones running Android 1.0, 1.5, 1.6, and 2.0 as applications might devour calamity working smoothly across totality the operating system versions. The platform’s openness in the targeted device stacks aggravates the fragmentation problem.

    A Mobile-Game Case Study

    We implemented four identical versions of a toy application, a game called Snake (see pattern 2).

    FIGURE 2. Screenshots related to the Snake game implementation developed in (a) Java ME, (b) .NET CF, (c) glimmer Lite, and (d) Android. see Table 1 for comparison data on the game implementation.

    The implementations let us compare the platforms with respect to evolution pains and time as well as several technical issues, such as sound reproduction, soundless image display, menu and application interface design, key events handling, memory use, deployment file size, and reusability of code authored for equivalent desktop applications (see Table 1).

    TABLE 1: Technical issues related to the Snake game implementation

    Technical issue

    Java ME

    .NET CF

    Flash Lite


    Development pains (desktop to mobile porting)

    Port GUI from oscillate to liquid-crystal array user interface (LCDUI) classes; transfigure the main() method of the basis class to the MIDlet’s startApp(); transfigure Java Database Connectivity (JDBC)-based persistent storage to Record management system (RMS)

    Adapt GUI to use Windows Forms controls, and switch the database to SQL Server Mobile Edition

    Adapt GUI to screen size

    Make changes to interfaces implemented and parent classes extended; switch the database to SQL Lite; specify the GUI in an XML fi le, using the DroidDraw GUI designer

    Lines of code





    Lines of code modified to port the desktop application





    Deployment application size

    29 Kbytes

    63 Kbytes

    12.6 Kbytes

    23 Kbytes

    To ensure just comparisons, they focused on evaluating the particularities of mobile-application evolution rather than the different programming language characteristics. Along this line, they first implemented the desktop game application and then migrated the applications to the mobile platforms, reusing source code wherever practicable - that is, they ported Java SE code to Java ME and Android, C#.NET code to .NET CF, and glimmer (ActionScript) code to glimmer Lite. The game used relatively simple graphics to convey snake corpse movements in response to key-pressing events. The implementation included a short sound file that played when the snake ate food. It moreover offered pause, resume, and change functions to meet the snake’s speed, and it kept elevated scores and game condition in the device’s persistent storage.

    The smoothness and expressiveness of the snake’s movement largely depends on the device’s characteristics (screen resolution, screen frame rate, and processor frequency). They weren’t able to quantitatively assess these characteristics on the available platform emulators.

    Mobile gaming has been a major driving constrain for the mobile-application market. Java ME is currently the de facto criterion for downloadable cell phone games[5], particularly because it has a game API. Furthermore, Java ME is the only framework providing a low-level 3D graphics API. glimmer Lite is a current gaming platform, mainly because of its evolution speed and suitability to graphics-intensive applications. glimmer Lite 3.0 focuses more on video and multimedia champion than game development. However, glimmer Lite is example for integrating games in webpages - similar to developing glimmer movies for desktops. .NET CF and Android haven’t yet gained significant market participate in game development.

    Desktop-to-mobile application porting was more labored in Java ME. Tools relish JDiet (a Java SE 1.4-to-Java ME CLDC converter) can exist useful but don’t champion GUI conversion. They designed the MIDlet’s menu templates using the Java ME Polish implement collection, which includes build tools for creating application bundles for multiple devices and locales; a device database that helps adjust applications to different handsets; tools for designing GUIs using simple CSS text files; and utility classes. They had to port JDBC-based storage - for example, to store game condition or scores - to RMS, which isn’t a full-fledged database system but is similar to the shared-objects approach taken in glimmer Lite. However, the TiledLayer and GameCanvas classes of the Java ME Game API were extremely useful for painting the game’s landscape and conveying the snake’s movement.

    .NET CF and Android applications were easier to develop because of their improved compatibility with the replete .NET and Java SE frameworks, respectively. The use of SQL databases in both these platforms was moreover straight-forward. They adapted a few C# method invocations for .NET CF because it didn’t champion the corresponding libraries. Android didn’t require such modifications. Furthermore, sound champion was penniless in .NET CF, handling only uncompressed sound playing, which increases the application size. The Flash-to-Flash Lite migration was relatively effortless because they used the very ActionScript code in both cases.

    We had to translate desktop application key events to the respective mobile phone’s keyboard events in totality platforms. The GUI design was relatively facile using available Visual GUI builders; for Android, they had to pick up this implement through the third-party Droid-Draw builder. Notably, the separation of the program logic from the GUI design proved useful for totality platforms, letting us use the very game logic classes for both the desktop and mobile applications.

    Platform Comparison

    Table 2 evaluates the reviewed platforms in five qualitative and quantitative ar­eas: software architecture and techni­cal issues, application development, capabilities and constraints, developer communities and market success, and evolution tools.

    TABLE 2: Comparison of programming platforms in five areas

    Issue description

    Java ME

    .NET CF

    Flash Lite


    Software architecture and technical issues



    ~128 Kbytes for storage of kernel-based virtual machine and associated libraries

    1.55 Mbytes on Windows Mobile-based Pocket PC 2000/2002; 1.35 Mbytes on Windows Mobile for Pocket PC 2003 or Windows CE .NET devices

    450 Kbytes for the core library of glimmer Lite 2.1; 374 Kbytes for glimmer Lite 3.1

    3 Mbytes

    Runtime memory requirement

    < 0.5 Mbytes

    ~ 0.5 Mbytes

    2–4 Mbytes

    Minimum 32 Mbytes of RAM

    Memory management

    Automatic memory management provided by the traditional garbage collector, which de-allocates memory occupied by objects that the program no longer uses

    Automatic memory management provided by Common Language Runtime (CLR); the CLR garbage collector manages the allocation and release of memory for an application

    Garbage collection executed automatically every minute or whenever an application’s memory use increases by 20 percent or more

    Automatic memory management handled by Dalvik’s garbage collector; garbage collections might noticeably abate performance

    Device support

    All devices champion Connected Limited Device Configuration (CLDC), Mobile Information Dance Profile (MIDP) (practically, lacks champion only for Windows Mobile-based Pocket PCs)

    All devices champion Connected Limited Device Configuration (CLDC), Mobile Information Dance Profile (MIDP) (practically, lacks champion only for Windows Mobile-based Pocket PCs)

    Pocket PC 2000, Pocket PC 2002, Windows Mobile 2003-based Pocket PCs and smartphones, embedded systems running Windows CE .NET 4.1 and later

    Mobile phones and PDAs from major manufacturers such as Fujitsu, Hitachi, LG, Mitsubishi, Motorola, Nokia, Panasonic, Samsung, Sanyo, Sharp, and Sony Ericsson

    User interface (UI) components

    High-level LCDUI components, such as figure or List; low-level LCDUI for controlling every UI pixel; champion for SVG (defined in JSR 287); J2ME Polish allows design along with animations and effects specified in external CSS-like files

    Windows Forms controls (vary for Pocket PCs and smartphones)

    Nokia glimmer Lite Feather Framework (FL 2.x), Sony Ericsson Adobe XD UI components (FL 1.1/2.x)

    View and ViewGroup objects; DroidDraw implement serves for rapid UI design; J2ME Polish enables conversion of Java ME MIDlets’ UI to Android- compatible UI

    Development languages

    Java (CLDC/MIDP)

    C#, Visual Basic .NET

    ActionScript 1.0, ActionScript 2.0

    Java (Android SDK)


    Java Application Description (JAD) and Java archive (JAR) files

    Cabinet (CAB) file installers

    SWF files

    Android package (APK) files

    Deployment methods

    Over the air (OTA), Bluetooth/ IR, Wireless Application Protocol (WAP) push

    OTA, Bluetooth

    Bluetooth, physical cable, OTA

    OTA, Bluetooth

    Server-side technologies*

    Java servlets, JavaServer Pages (JSP)

    ASP.NET Mobile Controls

    Flash Media Server (uses ActionScript 1 for server-side logic

    Java servlets, JSP

    Persistent storage and database support

    RMS and Perst Lite from mObject

    Local database champion for SQL Server Mobile Edition; on the server side, champion for SQL Server

    Persistent storage through shared objects; on the server side, champion for interaction with PHP scripts and use of MySQL database

    Android APIs hold champion for SQLite database

    Sound handling and supported formats

    MP3 and whatever format the device supports Uncompressed pulse

    code modulation (PCM) files only; champion for well

    known formats (WAV, MP3, and so on) offered by third parties (such as Resco Audio for .NET CF) Sound files embedded within the SWF file; supports MP3, AIFF, AU, WAV, and so on; no champion for simultaneous playback of multiple sounds

    3GP, MP3, MP4

    2D/3D graphics handling and supported formats

    All MIDP versions champion the array of rasterized images (in PNG format only); MIDP added champion for SVG (JSR 226); MIDP 3.0 adds champion for GIF images; champion for mobile 3D graphics on Mobile 3D Graphics (M3G) format: M3G 1.0 (JSR 184) or M3G 2.0 (JSR 297)

    Support for BMP, JPG, GIF, and PNG formats; doesn’t champion SVG; Direct3D mobile applications available for Windows Mobile 5.0

    Vector-based graphics includes champion for bitmap; doesn’t provide low- flush 3D graphics API, but it’s practicable to use a sequence of images exported from a 3D tool

    Supports PNG, JPG, and GIF; doesn’t champion SVG; supports 3D graphics via the OpenGL API

    Application development

    Learning curve*

    Moderate (developers necessity to exist confidential with several APIs that aren’t participate of the Java SE platform)

    Average (significant overlap with the .NET platform APIs)

    Steep (reuse of the very ActionScript code)

    Average (significant overlap with the Java SE platform APIs)

    Developer community base*

    Large community

    Relatively great community

    Relatively great community

    Fair-sized and fast-growing community

    Debugger availability




    Integrated in Eclipse; stand-alone debugging monitor moreover available

    Cross-platform deployment

    Execution on any device supporting CLDC/MIDP, but incongruous implementations across vendors necessitates divorce builds

    Windows Mobile, Symbian-based devices (via third-party tools)

    Excellent (supported by top five mobile manufacturers; best Web compatibility)

    Android only, because of Dalvik VM

    Deployment speed (packaging, installing, testing)*

    Slow (fragmentation problem)

    Relatively fast

    Relatively fast

    Relatively fast

    Capabilities and constraints



    Varies by handset, depending on available JSRs; no high- resolution pictures, no cell ID, limited file access

    Limited audio support

    No champion for accessing autochthonous components

    Touch screen, accelerometer, GPS, cell ID, interapplication communication

    Event model

    Event-handling mechanism based on command objects

    GUI events bound to methods through multicast delegates

    Uses the powerful ActionScript’s event model (movie clip and object events)

    Inherits the Java event model; uses a special class (intent) that enables application responses to external events, such as a phone call

    Phone data access

    Varies by handset, depending on available JSR 75, the PDA Optional Packages




    Runtime speed

    Average (because of Java bytecode)

    Average (because of CLR managed code)

    Below medium (interpreted language)

    Average because of Java bytecode

    Developer communities and market success


    Developer community and support*




    Recent, growing

    Market penetration*

    Extensive (also the basis of the Danger Sidekick Platform)



    Potential to gain wide acceptance, based on the champion of 34 major software, hardware, and telecom companies

    Distribution and licensing

    None (Signed Java)

    None (third parties can provide licensing)



    Development tools


    Integrated evolution environment (IDE) availability

    Eclipse, NetBeans

    Visual Studio .NET 2008, 2010

    Adobe glimmer CS4, Adobe Device Central

    Eclipse, NetBeans (with Android plug-in)

    Emulator availability

    Free emulator, Sun Java Wireless Toolkit

    Bundled with IDE

    Bundled with IDE

    Free emulator

    Development implement cost


    Free (but only basic tools)

    Varies: free but limited with Motion-Twin ActionScript 2 Compiler IDE


    * Information derived mainly from compilation of online survey reports.

    The data reflects their product re­views and evolution experience, both prior to and after the Snake game implementation. It moreover factors in re­sults generalized from an informal on­line survey they conducted of 32 mobile-application developers. These results are indicated by an asterisk in the is­sue description.

    For each platform, at least seven developers participated in the survey, which included 16 ques­tions regarding their undergo with the platform. The survey is available here. Some quantitative information derived from a compilation of the surveys and not discussed here is available on this link.  

    Platform Status and Trends

    In current practice, devices vary along so many axes that it’s almost impos­sible to write a solitary version of a mo­bile application to elope on a broad ambit of devices. Fragmentation increases the production pains in almost the en­tire software life cycle - driving up the cost, lengthening the time to market, and narrowing the target market. Bet­ter standardization (for example, fewer optional APIs and more particular speci­fications) and stricter enforcement of standards (for example, using API veri­fication initiatives and technology com­patibility kits) could succor in this regard. Major players in the mobile-application industry (such as platform vendors, de­vice manufacturers, and operators) can play a faultfinding role in the war against fragmentation.

    Java ME is undoubtedly the plat­form with the broadest deployment basis and soundless maintains the largest market share, yet it’s the platform most affected by fragmentation and so might exist displaced by alternative platforms. Sun Microsystems has published a set of guidelines to reduce the rehearse of generating several executables for each phone[6]. Some tools for resolving Java ME device fragmentation are already available (for example, NetBeans Mo­bility Pack 5.5 for CLDC), but there is soundless a long way to go.

    Along the very line, the Mobile Ser­vices Architecture (MSA) has emerged as an industry criterion to reduce frag­mentation and give developers a con­sistent Java ME platform. In addition to specifying what component JSRs a compliant device must include, the MSA moreover clarifies behavioral require­ments to better JSR predictability and interoperability. The MSA defines two stacks: a replete stack that comprises 16 JSRs (JSR 249), and a subset of eight JSRs (JSR 248). JSR 248 is being pushed ahead of JSR 249 to succor devel­opers pick up an earlier start on MSA-compliant applications. JCP has recently approved JSR 248, but its adoption by OEMs remains to exist seen.

    Java ME’s competitiveness against platforms that target graphics-heavy applications, such as glimmer Lite, will moreover depend on technologies that en­able expressive, feature-rich content on mobile devices. Along this line, Sun Microsystems has recently released JavaFX Mobile, a new platform and language with wealthy Internet Applications (RIA)-friendly features, including a declarative syntax of the JavaFX Script language for GUI development. JavaFX Mobile lets devel­opers build meaningful interfaces while reusing existing back-end Java code. It moreover lets evolution team members with no programming experience, such as designers and vivid artists, create graphics-intensive front ends for mo­bile applications. However, OEMs will settle JavaFX Mobile’s success by the champion they offer, for example, by in­tegration of its binaries and runtime on mobile handsets.

    .NET CF will probably maintain its developer basis as long as Windows handhelds remain in the picture. It’s a powerful platform for programming and accessing autochthonous components of Windows-compatible PDAs and smart­phones. However, its market participate isn’t likely to augment because porting it to current phone operating systems is cumbersome. Specifically, it requires implementing a platform-adaptation engine to interface between the CLR and the operating system[7].

    The release history of glimmer Lite in­dicates that Adobe has concentrated more on supporting multimedia than defining a powerful API for develop­ing applications with wealthy functional­ity. Despite the pains to establish glimmer Lite as a gaming platform, it lacks APIs or classes specifically targeting game development. For example, glimmer Lite 3.0 doesn’t champion the BitmapData object that’s participate of glimmer 8 and use­ful for game development. It moreover needs to better its sound handling. Fur­thermore, comparative studies betoken that glimmer Lite exhibits lower perfor­mance and frame rate while consum­ing more memory than Java ME. On the other hand, glimmer Lite appears a natural altenative for designing user inter­faces and graphically wealthy applications. In that sense, it lets designers into the mobile-development space. A promis­ing evolution path for glimmer Lite seems to palter in its synergy with different ap­plication platforms, bringing together the best of diverse worlds. Recently, the Capuchin Project defined a Java ME API as a bridge between Java ME and glimmer Lite. It en­ables use of the latter as the front End and the former as the back End of ap­plications, allowing developers to use glimmer tools for GUI design while soundless having access to totality the phone services available to Java ME.

    Android initially received an en­thusiastic welcome from manufactur­ers and developers, but some handset manufacturers are taking longer than expected to integrate it. Hence, its mar­ket participate isn’t growing as rapidly as an­ticipated. Still, the Android developer community seems to exist growing - mainly in comparison to Java ME. Its future will largely depend on providing technologies for simplifying the design of multimedia-rich applications. Sun Microsystems announced that JavaFX Mobile will exist available on the An­droid OS. Most principal will exist how well Android handles fragmentation problems. It’s too early to reply this question now, given Android’s rela­tively narrow installation base.

    Because Android is a relatively puerile software platform, it’s strug­gling with a petite number of available applications. Google has invested in attracting developers and preparing a faultfinding mass of applications prior to the first Android phone release. Running a great number of existing Java ME ap­plications could moreover add value to An­droid. Along this line, some vendors are providing porting services to con­vert existing Java ME titles to the An­droid platform. Examples include Tira Wireless and J2ME Polish.


    On the basis of their review, we’ve as­sessed the appropriateness of each plat­form with respect to four faultfinding appli­cation evolution requirements:


    The diverse hardware and software represented in today’s handheld devices inevitably upshot portability a bewilder for mobile-application developers. Porta­bility primarily depends on runtime champion and the feasibility of achieving identical look-and-feel and functional­ity across platforms. In terms of run­time support, Java ME is undoubtedly the winner, followed by glimmer Lite. An­droid is likely to extend its deployment base, and .NET CF will probably re­main a Windows-only platform.

    On the other hand, Java ME ex­hibits fragmentation in cross-platform application development. glimmer Lite is a better altenative in this admiration because of Adobe’s strict control over its runtime environment. Android’s handling of fragmentation remains unclear given its gradual adoption pace and its alternative traffic model, which is open source yet tightly controlled by Google. Fragmentation isn’t an issue for .NET CF, given its narrow ambit of supporting devices.


    Java ME best serves the train of implementing multimedia-rich full-fledged applications, such as games, through the numerous APIs (JSRs) implemented by OEMs to exploit handset capabilities. .NET CF and Android applications moreover use rather powerful APIs. glimmer Lite is most suitable to graphics - hefty applications.

    Development Speed

    Rapid time-to-market is a faultfinding requirement in mobile applications. Taking odds of developers’ programming undergo on desktop applications is the safest way to ease the learning curve and curtail the evolution time. For instance, Java developers will find a natural meet with Java ME and Android, glimmer developers with glimmer Lite, and so on. Developers not confidential with any of the platform foundation languages will feel more comfortable and productive with glimmer Lite’s ActionScript. Nevertheless, the evolution process in traditional platforms such as Java ME and .NET CF is accelerated because the documentation and developer community bases are extensive.


    As mobile applications become more computationally vehement and require faster runtime speeds and storage I/O, performance moreover becomes a faultfinding issue. Metrics such as processing over-head, memory consumption, frame rate, and deployment file size totality depend on the particular evolution platform toolset. For example, does it champion SVG Tiny, graphics buffering, compressed sound files, and so on? Java ME, .NET CF, and Android achieve comparable performance, whereas glimmer Lite has lagged in various benchmarks[8].

    Even though market and application requirements largely determine the platform for mobile development, their review offers some specific and generic guidance into the assets and deficiencies of available tools as developers countenance the increasing require for applications on resource- constrained devices.

    About the Authors

    DAMIANOS GAVALAS is an second professor in the University of the Aegean’s Department of Cultural Informatics. His research interests include mobile computing, mobile ad hoc and wireless sensor networks, and optimization algorithms. Gavalas has a PhD in electronic engineering from the University of Essex, UK. Contact him at .

    DAPHNE ECONOMOU is a lecturer in interactive multimedia and hypermedia at the University of the Aegean’s Department of Cultural Technology and Communication. Her research interests include collaborative virtual reality environments for learning and archaeology, human-computer interaction, and multimedia application design for mobile devices. Economou has a PhD in computer science from Manchester Metropolitan University. Contact her at .

    [1] M. Kenteris, D. Gavalas, and D. Economou, “An Innovative Mobile Electronic Tourist sheperd Application,” Personal and Ubiquitous Computing, vol. 13, no. 2, 2009, pp. 103–118.

    [2] S. Blom et al., “Write Once, elope Anywhere A Survey of Mobile Runtime Environments,” Proc. 3rd Int’l Conf. Grid and Pervasive Computing (GPC 08), IEEE CS Press, 2008, pp. 132–137.

    [3] C. Neable, “The .NET Compact Framework,” IEEE Pervasive Computing, vol. 1, no. 4, 2002, pp. 84–87.

    [4] O. Anderson et al., Scalable Vector Graphics (SVG) Tiny 1.2 Specification, World Wide Web Consortium (W3C) recommendation, 22 Dec. 2008 on this link .

    [5] J. Soh and B. Tan, “Mobile Gaming,” Comm. ACM, vol. 51, no. 3, 2008, pp. 35–39

    [6] Sun Developer Network, “Java ME: Defragmentation,” 2006; on this link.

    [7] A. Geffl aut et al., “Porting the .NET Compact Framework to Symbian Phones-A Feasibility Assessment,” J. object Technology, vol. 5, no. 3, 2006, pp. 83–106.

    [8] A. Koller, G. Foster, and M. Wright, “Java Micro Edition and Adobe glimmer Lite for Ar- cade-Style Mobile Phone Game Development: A Comparative Study,” Proc. ACM Ann. Conf. South African Inst. Computer Scientists and Information Technologists (SAICSIT 08), ACM Press, 2008, pp. 131–138

      This article first appeared in IEEE Software magazine issue Jan/Feb 2011. IEEE Software magazine offers pioneering ideas, expert analyses, and considerate insights for software professionals who necessity to sustain up with rapid technology change.

    Direct Download of over 5500 Certification Exams

    3COM [8 Certification Exam(s) ]
    AccessData [1 Certification Exam(s) ]
    ACFE [1 Certification Exam(s) ]
    ACI [3 Certification Exam(s) ]
    Acme-Packet [1 Certification Exam(s) ]
    ACSM [4 Certification Exam(s) ]
    ACT [1 Certification Exam(s) ]
    Admission-Tests [13 Certification Exam(s) ]
    ADOBE [93 Certification Exam(s) ]
    AFP [1 Certification Exam(s) ]
    AICPA [2 Certification Exam(s) ]
    AIIM [1 Certification Exam(s) ]
    Alcatel-Lucent [13 Certification Exam(s) ]
    Alfresco [1 Certification Exam(s) ]
    Altiris [3 Certification Exam(s) ]
    Amazon [2 Certification Exam(s) ]
    American-College [2 Certification Exam(s) ]
    Android [4 Certification Exam(s) ]
    APA [1 Certification Exam(s) ]
    APC [2 Certification Exam(s) ]
    APICS [2 Certification Exam(s) ]
    Apple [69 Certification Exam(s) ]
    AppSense [1 Certification Exam(s) ]
    APTUSC [1 Certification Exam(s) ]
    Arizona-Education [1 Certification Exam(s) ]
    ARM [1 Certification Exam(s) ]
    Aruba [6 Certification Exam(s) ]
    ASIS [2 Certification Exam(s) ]
    ASQ [3 Certification Exam(s) ]
    ASTQB [8 Certification Exam(s) ]
    Autodesk [2 Certification Exam(s) ]
    Avaya [101 Certification Exam(s) ]
    AXELOS [1 Certification Exam(s) ]
    Axis [1 Certification Exam(s) ]
    Banking [1 Certification Exam(s) ]
    BEA [5 Certification Exam(s) ]
    BICSI [2 Certification Exam(s) ]
    BlackBerry [17 Certification Exam(s) ]
    BlueCoat [2 Certification Exam(s) ]
    Brocade [4 Certification Exam(s) ]
    Business-Objects [11 Certification Exam(s) ]
    Business-Tests [4 Certification Exam(s) ]
    CA-Technologies [21 Certification Exam(s) ]
    Certification-Board [10 Certification Exam(s) ]
    Certiport [3 Certification Exam(s) ]
    CheckPoint [43 Certification Exam(s) ]
    CIDQ [1 Certification Exam(s) ]
    CIPS [4 Certification Exam(s) ]
    Cisco [318 Certification Exam(s) ]
    Citrix [48 Certification Exam(s) ]
    CIW [18 Certification Exam(s) ]
    Cloudera [10 Certification Exam(s) ]
    Cognos [19 Certification Exam(s) ]
    College-Board [2 Certification Exam(s) ]
    CompTIA [76 Certification Exam(s) ]
    ComputerAssociates [6 Certification Exam(s) ]
    Consultant [2 Certification Exam(s) ]
    Counselor [4 Certification Exam(s) ]
    CPP-Institue [2 Certification Exam(s) ]
    CPP-Institute [2 Certification Exam(s) ]
    CSP [1 Certification Exam(s) ]
    CWNA [1 Certification Exam(s) ]
    CWNP [13 Certification Exam(s) ]
    CyberArk [1 Certification Exam(s) ]
    Dassault [2 Certification Exam(s) ]
    DELL [11 Certification Exam(s) ]
    DMI [1 Certification Exam(s) ]
    DRI [1 Certification Exam(s) ]
    ECCouncil [21 Certification Exam(s) ]
    ECDL [1 Certification Exam(s) ]
    EMC [129 Certification Exam(s) ]
    Enterasys [13 Certification Exam(s) ]
    Ericsson [5 Certification Exam(s) ]
    ESPA [1 Certification Exam(s) ]
    Esri [2 Certification Exam(s) ]
    ExamExpress [15 Certification Exam(s) ]
    Exin [40 Certification Exam(s) ]
    ExtremeNetworks [3 Certification Exam(s) ]
    F5-Networks [20 Certification Exam(s) ]
    FCTC [2 Certification Exam(s) ]
    Filemaker [9 Certification Exam(s) ]
    Financial [36 Certification Exam(s) ]
    Food [4 Certification Exam(s) ]
    Fortinet [14 Certification Exam(s) ]
    Foundry [6 Certification Exam(s) ]
    FSMTB [1 Certification Exam(s) ]
    Fujitsu [2 Certification Exam(s) ]
    GAQM [9 Certification Exam(s) ]
    Genesys [4 Certification Exam(s) ]
    GIAC [15 Certification Exam(s) ]
    Google [4 Certification Exam(s) ]
    GuidanceSoftware [2 Certification Exam(s) ]
    H3C [1 Certification Exam(s) ]
    HDI [9 Certification Exam(s) ]
    Healthcare [3 Certification Exam(s) ]
    HIPAA [2 Certification Exam(s) ]
    Hitachi [30 Certification Exam(s) ]
    Hortonworks [4 Certification Exam(s) ]
    Hospitality [2 Certification Exam(s) ]
    HP [752 Certification Exam(s) ]
    HR [4 Certification Exam(s) ]
    HRCI [1 Certification Exam(s) ]
    Huawei [21 Certification Exam(s) ]
    Hyperion [10 Certification Exam(s) ]
    IAAP [1 Certification Exam(s) ]
    IAHCSMM [1 Certification Exam(s) ]
    IBM [1533 Certification Exam(s) ]
    IBQH [1 Certification Exam(s) ]
    ICAI [1 Certification Exam(s) ]
    ICDL [6 Certification Exam(s) ]
    IEEE [1 Certification Exam(s) ]
    IELTS [1 Certification Exam(s) ]
    IFPUG [1 Certification Exam(s) ]
    IIA [3 Certification Exam(s) ]
    IIBA [2 Certification Exam(s) ]
    IISFA [1 Certification Exam(s) ]
    Intel [2 Certification Exam(s) ]
    IQN [1 Certification Exam(s) ]
    IRS [1 Certification Exam(s) ]
    ISA [1 Certification Exam(s) ]
    ISACA [4 Certification Exam(s) ]
    ISC2 [6 Certification Exam(s) ]
    ISEB [24 Certification Exam(s) ]
    Isilon [4 Certification Exam(s) ]
    ISM [6 Certification Exam(s) ]
    iSQI [7 Certification Exam(s) ]
    ITEC [1 Certification Exam(s) ]
    Juniper [65 Certification Exam(s) ]
    LEED [1 Certification Exam(s) ]
    Legato [5 Certification Exam(s) ]
    Liferay [1 Certification Exam(s) ]
    Logical-Operations [1 Certification Exam(s) ]
    Lotus [66 Certification Exam(s) ]
    LPI [24 Certification Exam(s) ]
    LSI [3 Certification Exam(s) ]
    Magento [3 Certification Exam(s) ]
    Maintenance [2 Certification Exam(s) ]
    McAfee [8 Certification Exam(s) ]
    McData [3 Certification Exam(s) ]
    Medical [69 Certification Exam(s) ]
    Microsoft [375 Certification Exam(s) ]
    Mile2 [3 Certification Exam(s) ]
    Military [1 Certification Exam(s) ]
    Misc [1 Certification Exam(s) ]
    Motorola [7 Certification Exam(s) ]
    mySQL [4 Certification Exam(s) ]
    NBSTSA [1 Certification Exam(s) ]
    NCEES [2 Certification Exam(s) ]
    NCIDQ [1 Certification Exam(s) ]
    NCLEX [2 Certification Exam(s) ]
    Network-General [12 Certification Exam(s) ]
    NetworkAppliance [39 Certification Exam(s) ]
    NI [1 Certification Exam(s) ]
    NIELIT [1 Certification Exam(s) ]
    Nokia [6 Certification Exam(s) ]
    Nortel [130 Certification Exam(s) ]
    Novell [37 Certification Exam(s) ]
    OMG [10 Certification Exam(s) ]
    Oracle [282 Certification Exam(s) ]
    P&C [2 Certification Exam(s) ]
    Palo-Alto [4 Certification Exam(s) ]
    PARCC [1 Certification Exam(s) ]
    PayPal [1 Certification Exam(s) ]
    Pegasystems [12 Certification Exam(s) ]
    PEOPLECERT [4 Certification Exam(s) ]
    PMI [15 Certification Exam(s) ]
    Polycom [2 Certification Exam(s) ]
    PostgreSQL-CE [1 Certification Exam(s) ]
    Prince2 [6 Certification Exam(s) ]
    PRMIA [1 Certification Exam(s) ]
    PsychCorp [1 Certification Exam(s) ]
    PTCB [2 Certification Exam(s) ]
    QAI [1 Certification Exam(s) ]
    QlikView [1 Certification Exam(s) ]
    Quality-Assurance [7 Certification Exam(s) ]
    RACC [1 Certification Exam(s) ]
    Real-Estate [1 Certification Exam(s) ]
    RedHat [8 Certification Exam(s) ]
    RES [5 Certification Exam(s) ]
    Riverbed [8 Certification Exam(s) ]
    RSA [15 Certification Exam(s) ]
    Sair [8 Certification Exam(s) ]
    Salesforce [5 Certification Exam(s) ]
    SANS [1 Certification Exam(s) ]
    SAP [98 Certification Exam(s) ]
    SASInstitute [15 Certification Exam(s) ]
    SAT [1 Certification Exam(s) ]
    SCO [10 Certification Exam(s) ]
    SCP [6 Certification Exam(s) ]
    SDI [3 Certification Exam(s) ]
    See-Beyond [1 Certification Exam(s) ]
    Siemens [1 Certification Exam(s) ]
    Snia [7 Certification Exam(s) ]
    SOA [15 Certification Exam(s) ]
    Social-Work-Board [4 Certification Exam(s) ]
    SpringSource [1 Certification Exam(s) ]
    SUN [63 Certification Exam(s) ]
    SUSE [1 Certification Exam(s) ]
    Sybase [17 Certification Exam(s) ]
    Symantec [135 Certification Exam(s) ]
    Teacher-Certification [4 Certification Exam(s) ]
    The-Open-Group [8 Certification Exam(s) ]
    TIA [3 Certification Exam(s) ]
    Tibco [18 Certification Exam(s) ]
    Trainers [3 Certification Exam(s) ]
    Trend [1 Certification Exam(s) ]
    TruSecure [1 Certification Exam(s) ]
    USMLE [1 Certification Exam(s) ]
    VCE [6 Certification Exam(s) ]
    Veeam [2 Certification Exam(s) ]
    Veritas [33 Certification Exam(s) ]
    Vmware [58 Certification Exam(s) ]
    Wonderlic [2 Certification Exam(s) ]
    Worldatwork [2 Certification Exam(s) ]
    XML-Master [3 Certification Exam(s) ]
    Zend [6 Certification Exam(s) ]

    References :

    Dropmark :
    Dropmark-Text :
    Blogspot :
    Wordpress : :

    Back to Main Page

    Killexams 250-700 exams | Killexams 250-700 cert | Pass4Sure 250-700 questions | Pass4sure 250-700 | pass-guaratee 250-700 | best 250-700 test preparation | best 250-700 training guides | 250-700 examcollection | killexams | killexams 250-700 review | killexams 250-700 legit | kill 250-700 example | kill 250-700 example journalism | kill exams 250-700 reviews | kill exam ripoff report | review 250-700 | review 250-700 quizlet | review 250-700 login | review 250-700 archives | review 250-700 sheet | legitimate 250-700 | legit 250-700 | legitimacy 250-700 | legitimation 250-700 | legit 250-700 check | legitimate 250-700 program | legitimize 250-700 | legitimate 250-700 business | legitimate 250-700 definition | legit 250-700 site | legit online banking | legit 250-700 website | legitimacy 250-700 definition | >pass 4 sure | pass for sure | p4s | pass4sure certification | pass4sure exam | IT certification | IT Exam | 250-700 material provider | pass4sure login | pass4sure 250-700 exams | pass4sure 250-700 reviews | pass4sure aws | pass4sure 250-700 security | pass4sure cisco | pass4sure coupon | pass4sure 250-700 dumps | pass4sure cissp | pass4sure 250-700 braindumps | pass4sure 250-700 test | pass4sure 250-700 torrent | pass4sure 250-700 download | pass4surekey | pass4sure cap | pass4sure free | examsoft | examsoft login | exams | exams free | examsolutions | exams4pilots | examsoft download | exams questions | examslocal | exams practice | | | |


    MORGAN Studio

    is specialized in Architectural visualization , Industrial visualization , 3D Modeling ,3D Animation , Entertainment and Visual Effects .