|Exam Name||:||xSeries - Windows 2000 Installation/Performance Optimization|
|Questions and Answers||:||68 Q & A|
|Updated On||:||February 19, 2019|
|PDF Download Mirror||:||Pass4sure 000-674 Dump|
|Get Full Version||:||Pass4sure 000-674 Full Version|
000-674 exam Dumps Source : xSeries - Windows 2000 Installation/Performance Optimization
Test Code : 000-674
Test Name : xSeries - Windows 2000 Installation/Performance Optimization
Vendor Name : IBM
Q&A : 68 Real Questions
it's miles incredible to have 000-674 question bank and study guide.
Im ranked very excessive among my class buddies at the listing of extraordinary students however it high-quality passed off once I registered on this killexams.com for a few exam assist. It changed into the excessive ranking studying software in this killexams.com that helped me in turning into a member of the high ranks at the facet of various amazing students of my elegance. The assets on this killexams.com are commendable because of the truth they may be precise and incredibly useful for preparation via 000-674 pdf, 000-674 dumps and 000-674 books. I am glad to jot down these phrases of appreciation because this killexams.com deserves it. Thanks.
these 000-674 questions and solutions works in the real test.
The short answers made my preparation more convenient. I completed 75 questions out off 80 well under the stipulated time and managed 80%. My aspiration to be a Certified take the exam 000-674. I got the killexams.com Q&A guide just 2 weeks before the exam. Thanks.
what is easiest manner to bypass 000-674 examination?
Hats down the fine 000-674 exam preparation option. I passed my 000-674 exam ultimate week, and this set of exam questions and solutions has been very helpful. these items from killexams.com is actual. before creating a purchase, I contacted customer support with questions on how up to date their material are, and they showed that they update all exams on almost every day basis. They add updates where vital, or honestly double check the content to make certain its updated. It justifies buying an exam brain sell off. With killexams.com, I recognise that i will rely on the cutting-edge exam material, now not some e book which can emerge as obsolete a week after its posted. So I assume this is the quality exam preparation option. I suppose im able to expand my certification portfolio into a few different providers, Im just not positive which of them but. but what Im sure approximately is that I may be the use of killexams.com as my predominant training resource.
Where can I download 000-674 dumps?
I used to be alluded to the killexams.com dumps as brisk reference for my exam. In fact they finished a excellenttask, i in reality like their overall performance and fashion of running. The short-duration solutions had been tons less worrying to take into account. I dealt with 98% questions scoring 80% marks. The exam 000-674 became a noteworthy challenge for my IT profession. At the same time, I didnt contribute a whole lot time to installation my-self rightly for this exam.
Can I find actual test questions Q & A of 000-674 exam?
All in all, killexams.com become a terrific way for me to put together for this exam. I passed, however become a littledisenchanted that now all questions on the exam had been 100% similar to what killexams.com gave me. Over 70% were the equal and the rest turned into very similar - Im now not sure if this is a good component. I controlled to skip, so I suppose this counts as a terrific result. however understand that even with killexams.com you continue to want to analyzeand use your brain.
000-674 exam isn't any extra difficult to pass with those Q&A.
My buddies informed me I ought to count on killexams.com for 000-674 exam coaching, and this time I did. The brain dumps are very handy to apply, i actually like how they may be installation. The question order facilitates you memorize things higher. I passedwith 89% marks.
it's miles first-rate best to prepare 000-674 examination with real test questions.
it is amazing experience for the 000-674 exam. With now not a whole lot stuff available on line, Im glad I were givenkillexams.com. The questions/solutions are just top class. With killexams.com, the exam become very easy, extraordinary.
take delivery of as proper with it or no longer, simply try 000-674 look at questions as soon as!
Im very masses happy along with your test papers particularly with the solved issues. Your test papers gave me courage to seem in the 000-674 paper with self assurance. The end result is seventy seven.25%. Over again I complete heartedly thank the killexams.com employer. No other manner to pass the 000-674 exam apart from killexams.com model papers. I in my view cleared distinct test with the help of killexams.com question economic organization. I suggest it to each one. If you need to pass the 000-674 exam then take killexams.com help.
proper area to discover 000-674 dumps paper.
Fine one, it made the 000-674 smooth for me. I used killexams.com and handed my 000-674 exam.
you already know the exceptional and quickest way to clean 000-674 exam? I have been given it.
I passed the 000-674 exam last week and fully relied on this dump from killexams.com for my preparation. This is a great way to get certified as somehow the questions come from the real pool of exam questions used by vendor. This way, almost all questions I got on the exam looked familiar, and I knew answers to them. This is very reliable and trustworthy, especially given their money back guarantee (I have a friend who somehow failed an Architect level exam and got his money back, so this is for real).
newsIBM Presses ahead with Scale-Out Benchmark on Datacenter
IBM ran home windows 2000 Datacenter Server and SQL Server 2000 on 32 of its new eight-processor IBM eServer xSeries 370 servers, that have been unveiled on Friday. IBM also ran a junior edition of the examine -- the equal configuration with sixteen nodes and a yield of 363,129 tpmC.
Analyst Tom Manter of the Aberdeen community calls the effects excellent.
"IBM has taken a lot of their event and expertise from the high-conclusion mainframe techniques and midrange techniques and introduced that down into their xSeries. We're starting to see some of the effects and they're very fantastic and extraordinary," Manter says.
The outcomes are entertaining for 2 reasons. they are the first clustered outcomes run using windows 2000 Datacenter Server. They additionally represent a departure for IBM Corp. in using Microsoft's SQL database as opposed to IBM's personal DB2.
Jay Bretzmann, IBM's supervisor of product advertising for the xSeries, calls the database resolution an "openness aspect."
"ultimate time we used DB2. subsequent time we may additionally use DB2 once more. We don't want to appear to be a one database corporation," Bretzmann says.
Manter says one rationale IBM may have switched databases changed into to get Microsoft's aid. Microsoft issued a information release Monday morning merchandising IBM's results, but Redmond turned into normally silent over the summer season when IBM produced what became then a record benchmark on windows 2000 advanced Server the use of DB2.
IBM's present configuration used 256 of Intel's newest Xeon processor, the 900 MHz launched closing week.
The precise influence puts IBM forward of Compaq's 505,302 tpmC from October for the no 1 spot. Compaq and IBM had been enjoying leapfrog with the dimensions-out programs in view that Compaq and Microsoft teamed on the first windows 2000 scale-out result in February 2000.
these clustered programs had been controversial, spurring the TPC to create a new division within the means it publishes its consequences: one checklist for clustered results, one for non-clustered results. not one of the providers -- Microsoft, IBM and Compaq -- has pushed ahead a reference consumer who is implementing their clustered databases yet, however Microsoft facets out that Tandem shoppers were using clustered programs for years.
The cost efficiency of $28.89/tmpC works out to a total system can charge of $19,884,668. it's essentially twice the $10 million of the second place Compaq system ($19.ninety eight/tpmC) and considerably greater than the nearly $12 million price tag of the maximum rating non-clustered gadget on the checklist, Fujitsu's seventh-ranked PrimePower 2000 that hits 222,772 tpmC ($50.34/tpmC).
The rate efficiency compared with Compaq's consequences stems partly from using Datacenter Server as hostile to superior Server. The hardened Datacenter OS prices more and should always encompass a carrier component.
IBM's examine methods are scheduled for availability in late may also. --
Scott Bekker is editor in chief of Redmond Channel companion magazine.
newsIBM shows its Hand in excessive-conclusion home windows Hardware
massive Blue unveiled its IBM eServer xSeries 430 on Friday, a sixty four-processor NUMA equipment constructed for 32-bit Intel processors. The systems, an outgrowth of the NUMA-Q line IBM acquired 18 months in the past when it bought Sequent laptop programs, aid Linux and mainframe functions immediately. they will start supporting Datacenter Server in the Whistler timeframe. Microsoft at present says its Whistler servers will likely ship within the fourth quarter.
Ian Miller, vice president for marketing of the eServer xSeries, says that over time home windows and Whistler represent the biggest single market for the xSeries 430. For now, IBM executives do not consider they are lacking an incredible opportunity by using now not having stronger-than-eight-processor hardware purchasable for home windows 2000 Datacenter Server.
"The scalability that home windows has at this element when it comes to basically starting to be to a full 32-processor system, there are boundaries in how a long way you could go," Miller says. IBM will aspect valued clientele to scaling out on their new eight-processor servers, the IBM eServer xSeries 370. "i would argue that the x370, frankly, represents a stronger expense-efficiency message for the windows Datacenter market than the CMP desktop," Miller says.
Analyst Tom Manter with the Aberdeen group says IBM will ought to reveal compelling price to compete successfully in the Datacenter market with the x430.
"nowadays you have a Unisys CMP system, which is being offered by all of the major suppliers aside from IBM. they have got an opportunity to set up a de facto normal. Then IBM is going to have reasonably a problem when Whistler server comes out one year later to then come into the industry with a different architecture," Manter says.
however Manter is on no account writing IBM off: "They've shocked us during the past, too."
Unisys faces challenges of its personal in preserving its CMP coalition together. company executives are already advertising the next generation of the mobile MultiProcessing structure to retain companions committed. but companies with their own R&D operations like Compaq and Hewlett-Packard may additionally decide to boost their own architectures. --
Scott Bekker is editor in chief of Redmond Channel associate magazine.
IBM's servers are value paying extra for, some say, because it has main expertise and service; others grumble that massive Blue runs like a forms.
IBM gets nods of acclaim for Intel-primarily based servers designed with a keen eye for engineering element, although its systems tend to be pricier than competitors'.
The relevant Bucks school District in Doylestown, Pa., swapped out Compaq servers two years in the past in favor of IBM's. Ray Kase, the district's director of tips technology, says his team evaluated IBM and Hewlett-Packard. The figuring out elements, he says: IBM provided better integration between the servers and its personal FastT networked storage techniques, and the business gave the impression extra technically astute.
View the PDF -- flip off pop-up blockers!
"We felt very respectable about the experience we had with the IBM engineers," he says. "They have been in reality trying to get to grasp our environment, asking very specific questions." Kase says the district's 46 IBM servers have had "well-nigh no downtime, and we now have 25,000 students and faculty who hammer those programs pretty decent."
however some grumble that massive Blue nevertheless services like an impenetrable bureaucracy. or not it's on occasion difficult to find the right individuals at an organization with about as many employees (319,273 at last count) because the inhabitants of Tampa, Fla. "there have been a couple of times after I had to scream at somebody to get provider," says André Mendes, chief technology integration officer at the Public Broadcasting service, which became an early adopter of IBM's BladeCenter. provides a proper tips-know-how govt at a Fortune 500 business, who asked not to be recognized: "coping with IBM is like coping with the IRS. they're completely unresponsive."
now not everyone is of the same opinion with such assessments. actually, IBM's particularly responsive carrier places it forward of opponents, says Brendan Carlton, programs manager on the U.S. division of Huhtamaki, a Finnish packaging business. Huhtamaki's servers, as an example, are installation to alert IBM of impending hardware screw ups. "just a few times I've come into the workplace and there's an IBM man there with a replacement complicated pressure," Carlton says. "and that i didn't even know I had a problem." As for pricing, he enables that IBM is continually "a little bit further. but i'd fairly pay greater as a result of IBM provider is 2d to none."
in the meantime, Leo Hurtado, CIO of furnishings retailer W.S. Badcock, which operates 330 shops within the southeastern U.S., says the IBM servers his business purchased final year have been below 10% more expensive than those from Dell or HP: "We're very happy with the expense aspect."
IBMNew Orchard Rd.,Armonk, new york 10504(914) 499-1900www.ibm.com/servers
Ticker: IBM (NYSE)
invoice ZeitlerSenior VP & group executive, programs GroupThe IBM lifer (he joined the business in 1969 as a programmer) become put in cost of all storage and server items in January 2003.
Susan M. WhitneyGeneral manager, eServer xSeriesResponsible for Intel-primarily based server development, sales, marketing and manufacturing organizations.
ProductsThe xSeries contains x200 servers (up to four processors each and every), available as towers or in rack-mountable chassis; x300 servers designed for statistics facilities; and the x445, obtainable with as much as 32 processors. BladeCenter methods can fit up to 84 two-processor server blades in a 7-foot rack. administration application comprises Director, which tracks hardware configuration of far flung programs and screens accessories akin to processors and disks.
Cendant go back and forth Distribution ServicesRobert WisemanCTOrobert.firstname.lastname@example.orgProject: commute-functions company remaining 12 months migrated its fare-pricing equipment from an IBM mainframe to about a hundred xSeries servers.
imperative Bucks school DistrictRay KaseDir., I.T.(267) 893-2100Project: The 24-school district in Pennsylvania spent about $250,000 in 2002 for sixteen x300-series servers, plus 1.8 terabytes of storage. It now runs 46 servers, together with a BladeCenter gadget with 14 server blades.
HuhtamakiBrendan CarltonSystems supervisor(913) 583-8744Project: Finnish packaging company's U.S. division, based mostly in De Soto, Kan., runs about 65 xSeries windows 2000 servers in 10 plants and distribution centers.
J&B GroupKurt AndersonVP, I.T.(763) 497-3913Project: Wholesale food distributor this yr replaced seven Dell servers with an IBM x400 eight-processor equipment operating Microsoft's exchange and SQL Server, and different functions.
W.S. BadcockLeo HurtadoVP, I.T. & CIO(863) 425-7527Project: furniture retailer in Mulberry, Fla., consolidated applications on 47 servers—offered by using eight distinct vendors—onto sixteen IBM xSeries techniques.
Asian art Museum of san franciscoJames HorioDir., I.T.(415) 581-3580Project: Museum runs eight xSeries server blades running home windows 2000 in one AS/four hundred-based iSeries midrange equipment. Three standalone xSeries servers run an online Protocol telephony system from Cisco techniques.
Executives listed listed here are all users of IBM's products. Their willingness to speak has been confirmed by way of Baseline.2004YTD 2003 2002 income $forty five.40B $89.13B $81.19B Gross margin 36.4% 37.0% 37.three% working income $5.13B $10.09B $6.80B net earnings $three.59B $7.58B $three.58B internet margin 7.9% 8.5% four.four% salary per share $2.08 $4.32 $2.06 R&D expenditure $2.79B $5.08B $four.75B
* Fiscal 12 months ends Dec. 31; YTD reflects first six monthsSource: enterprise experiences
total assets - $99.58BStockholders' equity - $28.83BCash and equivalents - $7.72BLong-time period debt - $14.42BShares miraculous - 1.71BMarket cost as of 8/25 - $142.51B
**As of June 30, 2004, except as noted
Obviously it is hard assignment to pick solid certification questions/answers assets concerning review, reputation and validity since individuals get sham because of picking incorrectly benefit. Killexams.com ensure to serve its customers best to its assets concerning exam dumps update and validity. The vast majority of other's sham report objection customers come to us for the brain dumps and pass their exams cheerfully and effectively. We never trade off on our review, reputation and quality because killexams review, killexams reputation and killexams customer certainty is vital to us. Uniquely we deal with killexams.com review, killexams.com reputation, killexams.com sham report grievance, killexams.com trust, killexams.com validity, killexams.com report and killexams.com scam. In the event that you see any false report posted by our rivals with the name killexams sham report grievance web, killexams.com sham report, killexams.com scam, killexams.com dissension or something like this, simply remember there are constantly terrible individuals harming reputation of good administrations because of their advantages. There are a great many fulfilled clients that pass their exams utilizing killexams.com brain dumps, killexams PDF questions, killexams hone questions, killexams exam simulator. Visit Killexams.com, our specimen questions and test brain dumps, our exam simulator and you will realize that killexams.com is the best brain dumps site.
COG-701 brain dumps | 000-N19 practice questions | C2150-006 brain dumps | HP0-751 VCE | 000-434 exam prep | HP2-B118 dumps questions | 000-552 braindumps | CPIM-MPR dump | HPE0-J80 exam prep | HP5-H01D test prep | 1Z0-820 practice test | 1Z0-265 cheat sheets | A2090-558 free pdf | 412-79v8 test questions | 646-206 braindumps | CCM exam questions | 7691X mock exam | 310-810 questions and answers | 9L0-314 real questions | 3306 questions and answers |
Exactly same 000-674 questions as in real test, WTF!
At killexams.com, we give completely tested IBM 000-674 actual Questions and Answers that are recently required for Passing 000-674 test. We truly enable individuals to enhance their knowledge to remember the Q&A and guarantee. It is a best decision to speed up your position as an expert in the Industry.
IBM 000-674 exam has given another bearing to the IT business. It is presently needed to certify beAs the stage that prompts a brighter future. Be that because it could, you have got to place extraordinary labour in IBM xSeries - Windows 2000 Installation/Performance Optimization test, in lightweight of the actual fact that there's no escape out of poring over. killexams.com have created your straightforward, currently your test coming up with for 000-674 xSeries - Windows 2000 Installation/Performance Optimization is not intense any further. Click http://killexams.com/pass4sure/exam-detail/000-674 killexams.com Discount Coupons and Promo Codes are as under; WC2017 : 60% Discount Coupon for all exams on website PROF17 : 10% Discount Coupon for Orders larger than $69 DEAL17 : 15% Discount Coupon for Orders larger than $99 SEPSPECIAL : 10% Special Discount Coupon for All Orders As, the killexams.com will be a solid and reliable source of 000-674 exam questions with 100 percent pass guarantee. you have got to hone questions for a minimum of one day at least to attain well in the test. Your real trip to success in 000-674 exam, extremely begins with killexams.com test questions that's the glorious and examined wellspring of your centered on position.
At killexams.com, we give considered IBM 000-674 preparing sources the lovely to pass 000-674 exam, and to get certified by method for IBM. It is a fine decision to vitalize your work as a pro in the Information Technology industry. We are happy with our notoriety of supporting individuals pass the 000-674 exam of their first endeavors. Our flourishing charges inside the past two years have been exceptional, on account of our happy customers presently arranged to result in their vocations in the most extreme advanced arrangement of strike. killexams.com is the essential decision among IT pros, specifically those who're making arrangements to climb the development extends quicker in their individual organizations. IBM is the business undertaking pioneer in data advancement, and getting declared by them is a guaranteed approach to adapt to win with IT employments. We enable you to do strongly that with our remarkable IBM 000-674 preparing materials.
IBM 000-674 is inescapable all around the worldwide, and the business and programming productions of activity gave by methods for them are gotten an oversee on by method for each one of the organizations. They have helped in utilizing an inside and out amount of relationship on the shot technique for progress. Broad acing of IBM matters are viewed as an essential capacity, and the specialists certified through them are remarkably appeared in all organizations.
We give genuine to goodness 000-674 pdf exam question and arrangements braindumps in two designs. Download PDF and Practice Tests. Pass IBM 000-674 Exam quick and suitably. The 000-674 braindumps PDF kind is to be had for examining and printing. You can print relentlessly and practice more often than not. Our pass rate is high to ninety eight.9% and the likeness expense among our 000-674 syllabus remember oversee and genuine exam is ninety% in mellow of our seven-yr training premise. Do you require accomplishments inside the 000-674 exam in only an unmarried endeavor? I am at the current time breaking down for the IBM 000-674 genuine exam.
As the guideline factor in any way basic here is passing the 000-674 - xSeries - Windows 2000 Installation/Performance Optimization exam. As all that you require is an unreasonable rating of IBM 000-674 exam. The best a singular component you have to do is downloading braindumps of 000-674 exam bear thinking organizes now. We won't can enable you to down with our unlimited assurance. The specialists in like way keep pace with the greatest best in style exam to give most extreme of updated materials. Three months free access to can possibly them through the date of procurement. Each competitor may moreover persevere through the cost of the 000-674 exam dumps through killexams.com expecting almost no exertion. Routinely markdown for everybody all.
Inside observing the real exam material of the brain dumps at killexams.com you can without a mess of an increase widen your proclaim to notoriety. For the IT experts, it's miles fundamental to upgrade their abilities as appeared with the guide of their work require. We make it basic for our clients to hold certification exam with the assistance of killexams.com certified and genuine to goodness exam fabric. For a marvelous fate in its region, our brain dumps are the Great choice.
A Great dumps developing is a fundamental section that makes it reliable a decent method to take IBM certifications. Regardless, 000-674 braindumps PDF offers settlement for hopefuls. The IT presentation is an imperative intense endeavor on the off chance that one doesn't find genuine course as obvious asset material. In this manner, we have appropriate and updated material for the organizing of certification exam.
It is fundamental to obtain to the manual material if one wishes toward shop time. As you require packs of time to search for restored and genuine exam material for taking the IT certification exam. On the off chance that you find that at one locale, what might be higher than this? Its truly killexams.com that has what you require. You can spare time and keep a key separation from inconvenience if you buy Adobe IT certification from our site.
You have to get the greatest resuscitated IBM 000-674 Braindumps with the real answers, which can be set up by method for killexams.com experts, enabling the probability to capture discovering roughly their 000-674 exam course inside the five star, you won't find 000-674 results of such acceptable wherever inside the commercial center. Our IBM 000-674 Practice Dumps are given to candidates at acting 100% in their exam. Our IBM 000-674 exam dumps are present day inside the market, allowing you to plan on your 000-674 exam in the correct way.
if you are had with reasonably Passing the IBM 000-674 exam to begin acquiring? killexams.com has riding region made IBM exam tends to to promise you pass this 000-674 exam! killexams.com passes on you the most extreme right, blessing and front line restored 000-674 exam inquiries and open with 100% genuine guarantee. several establishments that give 000-674 mind dumps however the ones are not certified and front line ones. Course of movement with killexams.com 000-674 new demand is an absolute best approach to manage pass this certification exam in essential way.
killexams.com Huge Discount Coupons and Promo Codes are as under;
WC2017: 60% Discount Coupon for all exams on website
PROF17: 10% Discount Coupon for Orders greater than $69
DEAL17: 15% Discount Coupon for Orders greater than $99
DECSPECIAL: 10% Special Discount Coupon for All Orders
We are normally exceptionally careful that a basic trouble inside the IT business is that inaccessibility of gigantic well worth bear thinking materials. Our exam preparation material gives every one of you that you should take a certification exam. Our IBM 000-674 Exam will give you exam question with certified answers that mirror the genuine exam. These ask for and answers furnish you with the delight in of taking the true blue test. High bore and stimulus for the 000-674 Exam. 100% certification to pass your IBM 000-674 exam and get your IBM verification. We at killexams.com are made arrangements to engage you to pass your 000-674 exam with over the top appraisals. The odds of you neglect to finish your 000-674 test, after experiencing our general exam dumps are for all aims and capacities nothing.
Killexams 000-348 real questions | Killexams 98-349 sample test | Killexams 3C00120A study guide | Killexams TB0-106 Practice Test | Killexams C2090-423 study guide | Killexams C2010-577 real questions | Killexams M9550-752 practice questions | Killexams 72-640 brain dumps | Killexams 000-N19 test prep | Killexams MOS-OXP brain dumps | Killexams EE0-502 free pdf download | Killexams 000-430 VCE | Killexams C4060-156 free pdf | Killexams FM1-306 mock exam | Killexams HP0-704 braindumps | Killexams 156-215.13 practice test | Killexams 70-773 cheat sheets | Killexams 301 free pdf | Killexams 000-875 real questions | Killexams 1Z0-034 dumps questions |
Killexams P2060-001 questions and answers | Killexams 650-302 test prep | Killexams 650-175 braindumps | Killexams 000-646 real questions | Killexams HP2-H31 questions and answers | Killexams VCA410-DT Practice test | Killexams 00M-227 cram | Killexams HPE2-E68 study guide | Killexams 646-393 mock exam | Killexams 70-779 free pdf | Killexams ST0-151 practice exam | Killexams 400-351 exam prep | Killexams FD0-510 brain dumps | Killexams 000-962 real questions | Killexams A2090-610 test prep | Killexams 1Z0-628 braindumps | Killexams HP0-830 dumps questions | Killexams 2B0-018 study guide | Killexams IREB questions answers | Killexams 412-79 braindumps |
Symantec Corp.'s Norton Speed Disk 5.0 for Windows NT claims to be the first tool to be able to optimize Windows NT volumes while keeping the system online. Norton Speed Disk for Windows NT enables full optimization of NT File System (NTFS) drives -- not just defragmentation of data files. It deals with all NTFS data and data structures, including files, directories, the Master File Table (MFT), the Virtual Memory PageFile, and other metadata structures.
Symantec puts emphasis on its optimization of the MFT and the PageFile because these files play key roles in overall system performance. All files and their attributes are referenced and stored in the MFT by the operating system. Windows NT uses the MFT when it boots up and each time a file is created, modified, or accessed. Norton Speed Disk places files in a specific order -- grouping directories and subdirectories, program and data files, page files, metadata, the MFT, and other files by how often they are accessed and modified. The sorting works from the beginning of the drive to the end of the drive. It adds a small amount of extra space after each main group to allow for future growth, thereby reducing fragmentation.
Administrators can set Norton Speed Disk 5.0 to perform a number of tasks: automatic optimization of volumes based on threshold of fragmentation and record optimization events to the Windows NT Event Log; customizing the optimization for each disk volume and for each scheduled task, including how the product places files on each drive; and automatic optimization from a schedule created in Norton Speed Disk.
System requirements for running the 5.0 version include Windows NT 4.0 with Service Pack 3, 4, or 5 installed, an Intel 80486/66 or higher processor, at least 32 MB RAM, 41 MB of hard disk space, and NTFS and FAT16 partitions.
We installed Norton Speed Disk 5.0 on Windows NT 4.0 Server with Service Pack 5 installed and Workstation. The product installs quickly and easily, although it does require a reboot at the end of the installation process. The installer provides the option to install "without user interface." This is useful if you plan to run Norton Speed Disk from a central console, such as Norton System Center. This option gives the administrator greater control by preventing users from changing the configuration and schedule settings. Norton System Center is included on the CD for Norton Speed Disk for Windows NT.
Our testing of Norton Speed Disk 5.0 proved that defragmentation can be a simple process. Only a few mouse clicks were needed to begin defragmenting and optimizing all the files on a 6 GB drive. The optimization was complete in less than two hours. Speed Disk's hard disk optimization technology arranged files on the drive based on information type and usage frequency. Frequently accessed files, such as the MFT, were moved to the outermost track of the disk -- closest to the drive head -- for quicker access. After the optimization process, Windows NT performed noticeably faster. Setting up a scheduled run of Speed Disk also was simple. The scheduler worked flawlessly from the first time we ran it.
This product boosts the disk defragmentation marketplace and adds another strong competitive player to the Windows NT arena. A future update for Norton Speed Disk 5.0 will enable it to run on Windows 2000. Users upgrading to Windows 2000 will question the need to run a third-party disk defragmenter/optimizer when Windows 2000 includes a disk defragmentation utility. The answer is simple: Windows 2000 includes a defragmenter, not an optimize. Norton Speed Disk 5.0 is both in a single tool. Defragmentation is part of the puzzle; Norton Speed Disk's optimizer makes the additional cost worthwhile, especially for highly used disks. As with all Symantec Products, Norton Speed Disk 5.0 also includes LiveUpdate, Symantec’s online software update.
Norton Speed Disk 5.0 for Windows NT Symantec Corp.Cupertino, Calif.(408) 253-9600www.symantec.com
Price: For workstations, $33 per node for 100 licenses; for servers, $249 per server for 10 server licenses.
+ Finely tuned optimization of NTFS disks+ Manageable from a central network server
- Windows 2000 includes a defragmentation utility
January 24, 2000Web posted at: 12:11 p.m. EST (1711 GMT)
by John Bass and James Robinson, Network World Test Alliance
(IDG) -- It all boils down to what you're looking for in a network operating system (NOS).
Do you want it lean and flexible so you can install it any way you please? Perhaps administration bells and management whistles are what you need so you can deploy several hundred servers. Or maybe you want an operating system that's robust enough so that you sleep like a baby at night?
The good news is that there is a NOS waiting just for you. After the rash of recent software revisions, we took an in-depth look at four of the major NOSes on the market: Microsoft's Windows 2000 Advanced Server, Novell's NetWare 5.1, Red Hat Software's Linux 6.1 and The Santa Cruz Operation's (SCO) UnixWare 7.1.1. Sun declined our invitation to submit Solaris because the company says it's working on a new version.
Microsoft's Windows 2000 edges out NetWare for the Network World Blue Ribbon Award. Windows 2000 tops the field with its management interface, server monitoring tools, storage management facilities and security measures.
However, if it's performance you're after, no product came close to Novell's NetWare 5.1's numbers in our exhaustive file service and network benchmarks. With its lightning-fast engine and Novell's directory-based administration, NetWare offers a great base for an enterprise network.
We found the latest release of Red Hat's commercial Linux bundle led the list for flexibility because its modular design lets you pare down the operating system to suit the task at hand. Additionally, you can create scripts out of multiple Linux commands to automate tasks across a distributed environment.
While SCO's UnixWare seemed to lag behind the pack in terms of file service performance and NOS-based administration features, its scalability features make it a strong candidate for running enterprise applications.The numbers are in
Regardless of the job you saddle your server with, it has to perform well at reading and writing files and sending them across the network. We designed two benchmark suites to measure each NOS in these two categories. To reflect the real world, our benchmark tests consider a wide range of server conditions.
NetWare was the hands-down leader in our performance benchmarking, taking first place in two-thirds of the file tests and earning top billing in the network tests.
Red Hat Linux followed NetWare in file performance overall and even outpaced the leader in file tests where the read/write loads were small. However, Linux did not perform well handling large loads - those tests in which there were more than 100 users. Under heavier user loads, Linux had a tendency to stop servicing file requests for a short period and then start up again.
Windows 2000 demonstrated poor write performance across all our file tests. In fact, we found that its write performance was about 10% of its read performance. After consulting with both Microsoft and Client/Server Solutions, the author of the Benchmark Factory testing tool we used, we determined that the poor write performance could be due to two factors. One, which we were unable to verify, might be a possible performance problem with the SCSI driver for the hardware we used.
More significant, though, was an issue with our test software. Benchmark Factory sends a write-through flag in each of its write requests that is supposed to cause the server to update cache, if appropriate, and then force a write to disk. When the write to disk occurs, the write call is released and the next request can be sent.
At first glance, it appeared as if Windows 2000 was the only operating system to honor this write-through flag because its write performance was so poor. Therefore, we ran a second round of write tests with the flag turned off.
With the flag turned off, NetWare's write performance increased by 30%. This test proved that Novell does indeed honor the write-through flag and will write to disk for each write request when that flag is set. But when the write-through flag is disabled, NetWare writes to disk in a more efficient manner by batching together contiguous blocks of data on the cache and writing all those blocks to disk at once.
Likewise, Red Hat Linux's performance increased by 10% to 15% when the write-through flag was turned off. When we examined the Samba file system code, we found that it too honors the write-through flag. The Samba code then finds an optimum time during the read/write sequence to write to disk.
This second round of file testing proves that Windows 2000 is dependent on its file system cache to optimize write performance. The results of the testing with the write-through flag off were much higher - as much as 20 times faster. However, Windows 2000 still fell behind both NetWare and RedHat Linux in the file write tests when the write-through flag was off.
SCO honors the write-through flag by default, since its journaling file system is constructed to maximize data integrity by writing to disk for all write requests. The results in the write tests with the write-through flag on were very similar to the test results with the write-through flag turned off.
For the network benchmark, we developed two tests. Our long TCP transaction test measured the bandwidth each server can sustain, while our short TCP transaction test measured each server's ability to handle large numbers of network sessions with small file transactions.
Despite a poor showing in the file benchmark, Windows 2000 came out on top in the long TCP transaction test. Windows 2000 is the only NOS with a multithreaded IP stack, which allows it to handle network requests with multiple processors. Novell and Red Hat say they are working on integrating this capability into their products.
NetWare and Linux also registered strong long TCP test results, coming in second and third, respectively.
In the short TCP transaction test, NetWare came out the clear winner. Linux earned second place in spite of its lack of support for abortive TCP closes, a method by which an operating system can quickly tear down TCP connections. Our testing software, Ganymede Software's Chariot, uses abortive closes in its TCP tests.Moving into management
As enterprise networks grow to require more servers and support more end users, NOS management tools become crucial elements in keeping networks under control. We looked at the management interfaces of each product and drilled down into how each handled server monitoring, client administration, file and print management, and storage management.
We found Windows 2000 and NetWare provide equally useful management interfaces.
Microsoft Management Console (MMC) is the glue that holds most of the Windows 2000 management functionality together. This configurable graphical user interface (GUI) lets you snap in Microsoft and third-party applets that customize its functionality. It's a two-paned interface, much like Windows Explorer, with a nested list on the left and selection details on the right. The console is easy to use and lets you configure many local server elements, including users, disks, and system settings such as time and date.
MMC also lets you implement management policies for groups of users and computers using Active Directory, Microsoft's new directory service. From the Active Directory management tool inside MMC, you can configure users and change policies.
The network configuration tools are found in a separate application that opens when you click on the Network Places icon on the desktop. Each network interface is listed inside this window. You can add and change protocols and configure, enable and disable interfaces from here without rebooting.
NetWare offers several interfaces for server configuration and management. These tools offer duplicate functionality, but each is useful depending from where you are trying to manage the system. The System Console offers a number of tools for server configuration. One of the most useful is NWConfig, which lets you change start-up files, install system modules and configure the storage subsystem. NWConfig is simple, intuitive and predictable.
ConsoleOne is a Java-based interface with a few graphical tools for managing and configuring NetWare. Third-party administration tools can plug into ConsoleOne and let you manage multiple services. We think ConsoleOne's interface is a bit unsophisticated, but it works well enough for those who must have a Windows- based manager.
Novell also offers a Web-accessible management application called NetWare Management Portal, which lets you manage NetWare servers remotely from a browser, and NWAdmin32, a relatively simple client-side tool for administering Novell Directory Services (NDS) from a Windows 95, 98 or NT client.
Red Hat's overall systems management interface is called LinuxConf and can run as a graphical or text-based application. The graphical interface, which resembles that of MMC, works well but has some layout issues that make it difficult to use at times. For example, when you run a setup application that takes up a lot of the screen, the system resizes the application larger than the desktop size.
Still, you can manage pretty much anything on the server from LinuxConf, and you can use it locally or remotely over the Web or via telnet. You can configure system parameters such as network addresses; file system settings and user accounts; and set up add-on services such as Samba - which is a service that lets Windows clients get to files residing on a Linux server - and FTP and Web servers. You can apply changes without rebooting the system.
Overall, Red Hat's interface is useful and the underlying tools are powerful and flexible, but LinuxConf lacks the polish of the other vendors' tools.
SCO Admin is a GUI-based front end for about 50 SCO UnixWare configuration and management tools in one window. When you click on a tool, it brings up the application to manage that item in a separate window.
Some of SCO's tools are GUI-based while others are text-based. The server required a reboot to apply many of the changes. On the plus side, you can manage multiple UnixWare servers from SCOAdmin.
SCO also offers a useful Java-based remote administration tool called WebTop that works from your browser.An eye on the servers and clients
One important administration task is monitoring the server itself. Microsoft leads the pack in how well you can keep an eye on your server's internals.
The Windows 2000 System Monitor lets you view a real-time, running graph of system operations, such as CPU and network utilization, and memory and disk usage. We used these tools extensively to determine the effect of our benchmark tests on the operating system. Another tool called Network Monitor has a basic network packet analyzer that lets you see the types of packets coming into the server. Together, these Microsoft utilities can be used to compare performance and capacity across multiple Windows 2000 servers.
NetWare's Monitor utility displays processor utilization, memory usage and buffer utilization on a local server. If you know what to look for, it can be a powerful tool for diagnosing bottlenecks in the system. Learning the meaning of each of the monitored parameters is a bit of a challenge, though.
If you want to look at performance statistics across multiple servers, you can tap into Novell's Web Management Portal.
Red Hat offers the standard Linux command-line tools for monitoring the server, such as iostat and vmstat. It has no graphical monitoring tools.
As with any Unix operating system, you can write scripts to automate these tools across Linux servers. However, these tools are typically cryptic and require a high level of proficiency to use effectively. A suite of graphical monitoring tools would be a great addition to Red Hat's Linux distribution.
UnixWare also offers a number of monitoring tools. System Monitor is UnixWare's simple but limited GUI for monitoring processor and memory utilization. The sar and rtpm command-line tools together list real-time system utilization of buffer, CPUs and disks. Together, these tools give you a good overall idea of the load on the server.Client administration
Along with managing the server, you must manage its users. It's no surprise that the two NOSes that ship with an integrated directory service topped the field in client administration tools.
We were able to configure user permissions via Microsoft's Active Directory and the directory administration tool in MMC. You can group users and computers into organizational units and apply policies to them.
You can manage Novell's NDS and NetWare clients with ConsoleOne, NWAdmin or NetWare Management Portal. Each can create users, manage file space, and set permissions and rights. Additionally, NetWare ships with a five-user version of Novell's ZENworks tool, which offers desktop administration services such as hardware and software inventory, software distribution and remote control services.
Red Hat Linux doesn't offer much in the way of client administration features. You must control local users through Unix permission configuration mechanisms.
UnixWare is similar to Red Hat Linux in terms of client administration, but SCO provides some Windows binaries on the server to remotely set file and directory permissions from a Windows client, as well as create and change users and their settings. SCO and Red Hat offer support for the Unix-based Network Information Service (NIS). NIS is a store for network information like logon names, passwords and home directories. This integration helps with client administration.Handling the staples: File and print
A NOS is nothing without the ability to share file storage and printers. Novell and Microsoft collected top honors in these areas.
You can easily add and maintain printers in Windows 2000 using the print administration wizard, and you can add file shares using Active Directory management tools. Windows 2000 also offers Distributed File Services, which let you combine files on more than one server into a single share.
Novell Distributed Print Services (NDPS) let you quickly incorporate printers into the network. When NDPS senses a new printer on the network, it defines a Printer Agent that runs on the printer and communicates with NDS. You then use NDS to define the policies for the new printer.
You define NetWare file services by creating and then mounting a disk volume, which also manages volume policies.
Red Hat includes Linux's printtool utility for setting up server-connected and networks printers. You can also use this GUI to create printcap entries to define printer access.
Linux has a set of command-line file system configuration tools for mounting and unmounting partitions. Samba ships with the product and provides some integration for Windows clients. You can configure Samba only through a cryptic configuration ASCII file - a serious drawback.
UnixWare provides a flexible GUI-based printer setup tool called Printer SetUp Manager. For file and volume management, SCO offers a tool called VisionFS for interoperability with Windows clients. We used VisionFS to allow our NT clients to access the UnixWare server. This service was easy to configure and use.Storage management
Windows 2000 provides the best tools for storage management. Its graphical Manage Disks tool for local disk configuration includes software RAID management; you can dynamically add disks to a volume set without having to reboot the system. Additionally, a signature is written to each of the disks in an array so that they can be moved to another 2000 server without having to configure the volume on the new server. The new server recognizes the drives as members of a RAID set and adds the volume to the file system dynamically.
NetWare's volume management tool, NWConfig, is easy to use, but it can be a little confusing to set up a RAID volume. Once we knew what we were doing, we had no problems formatting drives and creating a RAID volume. The tool looks a little primitive, but we give it high marks for functionality and ease of use.
Red Hat Linux offers no graphical RAID configuration tools, but its command line tools made RAID configuration easy.
To configure disks on the UnixWare server, we used the Veritas Volume Manager graphical disk and volume administration tool that ships with UnixWare. We had some problems initially getting the tool to recognize the drives so they could be formatted. We managed to work around the disk configuration problem using an assortment of command line tools, after which Volume Manager worked well.Security
While we did not probe these NOSes extensively to expose any security weaknesses, we did look at what they offered in security features.
Microsoft has made significant strides with Windows 2000 security. Windows 2000 supports Kerberos public key certificates as its primary authentication mechanism within a domain, and allows additional authentication with smart cards. Microsoft provides a Security Configuration Tool that integrates with MMC for easy management of security objects in the Active Directory Services system, and a new Encrypting File System that lets you designate volumes on which files are automatically stored using encryption.
Novell added support for a public-key infrastructure into NetWare 5 using a public certificate schema developed by RSA Security that lets you tap into NDS to generate certificates.
Red Hat offers a basic Kerberos authentication mechanism. With Red Hat Linux, as with most Unix operating systems, the network services can be individually controlled to increase security. Red Hat offers Pluggable Authentication Modules as a way of allowing you to set authentication policies across programs running on the server. Passwords are protected with a shadow file. Red Hat also bundles firewall and VPN services.
UnixWare has a set of security tools called Security Manager that lets you set up varying degrees of intrusion protection across your network services, from no restriction to turning all network services off. It's a good management time saver, though you could manually modify the services to achieve the same result.Stability and fault tolerance
The most feature-rich NOS is of little value if it can't keep a server up and running. Windows 2000 offers software RAID 0, 1 and 5 configurations to provide fault tolerance for onboard disk drives, and has a built-in network load-balancing feature that allows a group of servers to look like one server and share the same network name and IP address. The group decides which server will service each request. This not only distributes the network load across several servers, it also provides fault tolerance in case a server goes down. On a lesser scale, you can use Microsoft's Failover Clustering to provide basic failover services between two servers.
As with NT 4.0, Windows 2000 provides memory protection, which means that each process runs in its own segment.
There are also backup and restore capabilities bundled with Windows 2000.
Novell has an add-on product for NetWare called Novell Cluster Services that allows you to cluster as many as eight servers, all managed from one location using ConsoleOne, NetWare Management Portal or NWAdmin32. But Novell presently offers no clustering products to provide load balancing for applications or file services. NetWare has an elaborate memory protection scheme to segregate the memory used for the kernel and applications, and a Storage Management Services module to provide a highly flexible backup and restore facility. Backups can be all-inclusive, cover parts of a volume or store a differential snapshot.
Red Hat provides a load-balancing product called piranha with its Linux. This package provides TCP load balancing between servers in a cluster. There is no hard limit to the number of servers you can configure in a cluster. Red Hat Linux also provides software RAID support through command line tools, has memory protection capabilities and provides a rudimentary backup facility.
SCO provides an optional feature to cluster several servers in a load-balancing environment with Non-Stop Clustering for a high level of fault-tolerance. Currently, Non-Stop Clustering supports six servers in a cluster. UnixWare provides software RAID support that is managed using SCO's On-Line Data Manager feature. All the standard RAID levels are supported. Computer Associates' bundled ArcServeIT 6.6 provides backup and restore capabilities. UnixWare has memory protection capabilities.Documentation
Because our testing was conducted before Windows 2000's general availability ship date, we were not able to evaluate its hard-copy documentation. The online documentation provided on a CD is extensive, useful and well-organized, although a Web interface would be much easier to use if it gave more than a couple of sentences at a time for a particular help topic.
NetWare 5 comes with two manuals: a detailed manual for installing and configuring the NOS with good explanations of concepts and features along with an overview of how to configure them, and a small spiral-bound booklet of quick start cards. Novell's online documentation is very helpful.
Red Hat Linux comes with three manuals - an installation guide, a getting started guide and a reference manual - all of which are easy to follow.
Despite being the most difficult product to install, UnixWare offers the best documentation. It comes with two manuals: a system handbook and a getting started guide. The system handbook is a reference for conducting the installation of the operating system. It does a good job of reflecting this painful experience. The getting started guide is well-written and well-organized. It covers many of the tools needed to configure and maintain the operating system. SCO's online documentation looks nice and is easy to follow.Wrapping up
The bottom line is that these NOSes offer a wide range of characteristics and provide enterprise customers with a great deal of choice regarding how each can be used in any given corporate network.
If you want a good, general purpose NOS that can deliver enterprise-class services with all the bells and whistles imaginable, then Windows 2000 is the strongest contender. However, for high performance, enterprise file and print services, our tests show that Novell leads the pack. If you're willing to pay a higher price for scalability and reliability, SCO UnixWare would be a safe bet. But if you need an inexpensive alternative that will give you bare-bones network services with decent performance, Red Hat Linux can certainly fit the bill.
The choice is yours.
Bass is the technical director and Robinson is a senior technical staff member at Centennial Networking Labs (CNL) at North Carolina State University in Raleigh. CNL focuses on performance, capacity and features of networking and server technologies and equipment.RELATED STORIES:
Debate will focus on Linux vs. LinuxJanuary 20, 2000Some Windows 2000 PCs will jump the gunJanuary 19, 2000IBM throws Linux lovefestJanuary 19, 2000Corel Linux will run Windows appsJanuary 10, 2000Novell's eDirectory spans platformsNovember 16, 1999New NetWare embraces Web appsNovember 2, 1999Microsoft sets a date for Windows 2000October 28, 1999RELATED IDG.net STORIES:
Fusion's Forum: Square off with the vendors over who has the best NOS(Network World Fusion)How we did it: Details of the testing(Network World Fusion)Find out the tuning parameters(Network World Fusion)Download the Config files(Network World Fusion)The Shootout results(Network World Fusion)Fusion's NOS resources(Network World Fusion)With Windows 2000, NT grows up(Network World Fusion)Fireworks expected at NOS showdown(Network World Fusion)
Note: Pages will open in a new browser windowExternal sites are not endorsed by CNN Interactive. RELATED SITES:
Novell, Inc.Microsoft Corp.The Santa Cruz Operation, Inc. (SCO)Red Hat, Inc.
Note: Pages will open in a new browser windowExternal sites are not endorsed by CNN Interactive.
You can optimize ISA Server performance and tune the ISA Server cache. The ISA Server performance settings that you can tune to optimize the performance of the ISA Server computer exist on the Performance tab of the Array Properties dialog box.
ISA Server caches objects to RAM and on disk. The default ISA Server configuration caches objects that are below 12,800 bytes in size in RAM. An object that is stored in RAM is retrieved faster by ISA Server than an object which is stored on disk. The default configuration caches objects which are larger than 12,800 bytes in size on disk.
You can use the settings on the Cache Configuration Properties dialog box (Advanced tab) to change the size of objects which are stored in memory. ISA Server cache performance is tuned by manipulating the percentage of available RAM for cache space. A high percentage of available RAM for cache space leads to an improvement in cache response time. More content can be stored in faster physical memory than on disk. Before setting a high percentage of available RAM for cache space, you have to bear in mind that less memory would be available for other activities of the operating system and for other applications' activities as well.How to optimize ISA Server performance
Open ISA Management.
Right-click the ISA Server array and select Properties from the shortcut menu.
Click the Performance tab.
Move the slider to More Than 1000 when more than 1, 000 users are anticipated daily.
Move the slider to Fewer Than 1000 when less than 1, 000 users are anticipated daily.
Move the slider to Fewer Than 100 when less than 100 users are anticipated daily.
Open the ISA Management console.
Navigate to the Cache Configuration node in the console tree.
Right-click the Cache Configuration node and then select Properties from the shortcut menu.
The Cache Configuration Properties dialog box opens.
Click the Advanced tab.
Enter the percentage of free memory to use for caching in the Percentage Of Free Memory To Use For Caching textbox.
A few elements that should be included in a server monitoring plan are:
Identify those server events which should be monitored.
Determine and set up monitors and alerts to inspect the events.
Determine whether filters are necessary to reduce the quantity of monitoring information which you want to collect and then configure any necessary filters.
Establish a logging strategy to log event data that should be analyzed. Alternatively, you can monitor and analyze server activity when it occurs.
View and analyze data collected by events in the Performance console.
Another key component to monitoring server performance is to identify bottlenecks. A bottleneck can be described as a condition which is created by a particular resource which in turn prevents other resources from operating optimally.
Bottlenecks usually occur when:
Certain settings are not configured correctly.
A resource is faulty and not functioning as it should be.
Insufficient resources exist, and a resource is being overused.
Where many instances of the same particular resource exist, the resources may not be handling load equally or efficiently.
A particular application(s) is hogging a resource.
Server and system performance is usually impacted by the following:
Resources are configured incorrectly which are causing resources to be intensely utilized.
Resources are unable to handle the load it is configured to handle. In this case, itis usually necessary to upgrade the particular resource or add any additional components that would improve the capability of the resource.
Resources that are malfunctioning impair performance.
The workload is not configured to be evenly handled by multiple instances of the identical resource.
Resources are ineffectually allocated to an application(s).
You can use System Monitor to collect and analyze performance data for both the local computer and remote computer, and to track various processes running on a Windows Server 2003 or Windows 2000 system. The System Monitor utility is located within the Performance MMC snap-in.
A few key activities that can be performed using System Monitor and the main features of System Monitor are listed below:
View and monitor real-time performance data or view data from a log file.
Choose which data you want to collect by selecting between various objects and counters.
Collect data from multiple computers simultaneously.
Choose the format or view in which you want to examine collected data:
Monitor processes and components that you want to optimize
Monitor the results of your optimization efforts
View trends in workloads and the effect being realized on resource usage.
Plan for upgrades
The subsystems which should be monitored when monitoring and optimizing system performance are listed below. These subsystems should be monitored and optimized to tune server performance:
Memory subsystem: When it comes to determining the memory that is being used, you need to examine physical memory, and the page file. Physical memory pertains to physical RAM. The page file pertains to logical memory on the hard drive.
The most important performance counters which you should monitor to detect memory specific issues are:
MemoryAvailable Bytes: The counter indicates what your available memory capacity is. To efficiently run a server, you need to have at least 4MB of memory available. When the memory drops below 4MB, you might need to consider immediately adding more memory.
MemoryPages/Sec: With a recommended counter threshold of 20, this counter indicates the rate at which pages are written to disk, or read from disk. The counter should generally be beneath 20
Network subsystem: You can assess the performance of a computer on the network by monitoring the network interface and the network protocols installed on the computer. You can improve network performance by unbinding network adapters that are not frequently used, and then upgrading these to high performance network adapters. Alternatively, you can install multiple network adapters.
The important counters which should be tracked to monitor the performance of the network for possible bottlenecks are:
Network InterfaceBytes Total/sec; Bytes Sent/sec; Bytes Received/sec: These counters indicate the manner in which your network adapters are performing in relation to network traffic.
ServerBytes Total/sec; Bytes Received/sec; Bytes Sent/sec: These set of counters indicates the manner in which the server is utilizing the network to send data and receive data.
ServerPool Paged Peak: This counter shows the amount of physical memory and the maximum paging file size. A threshold of the amount of physical RAM is fine.
Processor subsystem: You should monitor the processors to ensure that processor utilization maintains an acceptable level. The factors that need to be kept in mind when monitoring processor activity are the role of the server and the type of work being performed on the server. Consider using less processor intensive applicatios, or upgrading the processor when a processor bottleneck exists. You can add a processor if the computer supports multiple processors.
A few performance counters that should be tracked to monitor the processor subsystem of the server for bottlenecks are:
Processor% Interrupt Time: The counter indicates how often devices such as network adapters and disk drives generate interrupts by showing the time duration for which the processor receives and services hardware interrupts in the sample interval.
Processor Interrupts/Sec: This counter shows the number of interrupts which are being received from devices. An increase in the counter's value should be accompanied by an increase in system activity. If not, you could have an existing hardware issue that needs to be resolved.
System Processor Queue Length: This counter shows the number of requests waiting in queue to be processed. If you constantly have a queue length of over 10 for a processor, you may have an existing bottleneck.
Disk subsystem: You can use the PhysicalDisk object or the LogicalDisk object to monitor disk access. The PhysicalDisk object relates to the logical drives on a physical drive, while the LogicalDisk object relates to a particular logical disk. The speed of the disk controller and the average disk access time has on impact on the speed at which system requests are handled. Disk access can be described as the time it takes to service requests.
A few important counters which you should monitor to track disk performance of a server are:
Physical Disk Current Disk Queue Length: The counter indicates the number of requests which are in queue for disk access. The counter should be consistently at 1.5 to 2 times the number of spindles which comprise of the physical disk.
Physical Disk % Disk Time and % Idle Time: These counters indicate the percentage of time that a drive is active, and the percentage of time for which the drive is idle. The recommended threshold for both counters is 90 percent.
Physical Disk Disk Reads/Sec and Disk Writes/Sec: These counters show the speed at which data is written to disk, and read from disk. The information of these counters could assist you in more efficiently balancing the load of your servers. A lengthy delay could be indicative of a hard disk issue. When usage is close to the defined transfer rate of the physical disk, you might need to consider decreasing the load of the server. You could also upgrade to RAID.
Physical Disk Bytes/sec: The Physical Disk Bytes/sec counter indicates throughput of disk activity.
Physical Disk Avg. Disk Bytes/Transfer: This counter tracks the average number of bytes which are either moved to or from a disk when disk reads and writes occur. A program is typically accessing the drive ineffectually when the counter's value is over 2KB.
ISA Server provides the ISA Server Performance Monitor tool to analyze ISA Server performance. The ISA Server Performance Monitor is installed when you install ISA Server.
When you access the ISA Server Performance Monitor, the following tools are displayed:
System Monitor can be displayed in a graph, histogram, or report format. System Monitor uses objects, counters and instances to monitor the system. An object can be described as a collection of counters that is associated with a system resource or service which produce the data you can assess. When an object executes a function, its associated counters are updated. A counter can be regarded as a data reporting component in an object. The counter represents data for a particular component of the system or service. Each object therefore has a set of counters that track particular information on the performance object.
The ISA Server Performance Monitor is preconfigured with the ISA Server objects and counters listed below:
ISA Server Cache object contains 6 counters.
ISA Server Firewall Service object contains 8 counters.
ISA Server Packet Filter object contains 1 counter.
Web Proxy Service performance object contains 6 counters.
The ISA Server Bandwidth Control performance object contains the counters listed below. None of these counters are preloaded in System Monitor:
Actual Inbound Bandwidth; tracks and indicates actual inbound bandwidth.
Actual Outbound Bandwidth; tracks and indicates actual outbound bandwidth.
Assigned Connections; monitors the number of connections that have an assigned bandwidth priority.
Assigned Inbound Bandwidth; monitors assigned inbound bandwidth.
Assigned Outbound Bandwidth; monitors assigned outbound bandwidth.
The ISA Server Cache performance object contains the counters listed below. Some are preloaded in System Monitor and others are not.
Active Refresh Bytes Rate (KB/ Sec); for active caching, the object tracks the rate at which bytes of data are retrieved from the Internet to refresh URLs in the cache.
Active URL Refresh Rate (URL/ Sec); for active caching, the object tracks the rate at which cached URLs are retrieved from the Internet to refresh cache content.
Disk Bytes Retrieved Rate (KB/ sec); tracks the rate at which bytes of data are retrieved from the disk cache.
Disk Cache Allocated Space (KB); tracks the space used by the disk cache.
Disk Content Write Rate (Writes/ Sec); tracks the number of writes, to the disk cache to store URL content.
Disk Failure Rate (Fail/Sec); tracks the number of input/output (I/O) failures per second.
Disk URL Retrieve Rate (URL/ Sec); tracks the number of URLs per second, sent to clients from the disk cache.
Max URLs Cached; tracks the maximum number of URLs stored in the cache.
Memory Bytes Retrieved Rate(KB/Sec); tracks the rate at which bytes of data are retrieved from the memory cache.
Memory Cache Allocated Space(KB); tracks the space used by the memory cache.
Memory URL Retrieve Rate (URL/ Sec); tracks the number of URLs per second, sent to clients from the memory cache.
Memory Usage Ratio Percent (%); indicates the ratio between the amount of cache fetches from the memory cache as a percentage of total cache fetches.
Total Actively Refreshed URLs; indicates active caching performance by showing the collective number of URLs in the cache that have been actively refreshed from the Internet.
Total Bytes Actively Refreshed (KB); indicates active caching performance by showing the collective number of bytes in the cache that have been actively refreshed from the Internet.
Total Disk Bytes Retrieved (KB); indicates the collective number of disk bytes that have been retrieved from the disk cache.
Total Disk Failures; indicates the number of times that the Web Proxy service failed to read/write to the disk cache because to an input/output (I/O) failure.
Total Disk URLs Retrieved; tracks the collective number of URLs that have been retrieved from the disk cache.
Total Memory Bytes Retrieved (KB); tracks the collective number of memory bytes that have been retrieved from the memory cache.
Total Memory URLs Retrieved; tracks the collective number of URLs that have been retrieved from the memory cache.
Total URLs Cached; tracks the collective number of URLs that have been cached.
URL Commit Rate (URL/Sec); shows the speed at which URLs are cached.
URLs in Cache; tracks the current number of URLs in the cache.
The ISA Server Firewall service performance object contains th counters listed below. Some are preloaded in System Monitor and others are not.
Accepting TCP Connections; tracks the number of connection objects waiting for TCP connections from Firewall clients.
Active Sessions; tracks the number of active sessions for the Firewall service.
Active TCP Connections; tracks the number of active TCP connections sending data.
Active UDP Connections; tracks the number of active UDP connections sending data.
Available Worker Threads; tracks the number of Firewall worker threads.
Back-connecting TCP Connections; tracks the number of TCP connections waiting for an inbound connect call to complete.
Bytes Read/sec; tracks the number of bytes per second, read by the data-pump.
Bytes Written/sec; tracks the number of bytes per second, written by the data-pump.
Connecting TCP Connections; tracks the number of pending TCP connections.
DNS Cache Entries; tracks the current number of DNS domain name entries cached due to the Firewall service.
DNS Cache Flushes; tracks how many times the DNS domain name cache was flushed by the Firewall service.
DNS Cache Hits; tracks the number of times a DNS domain name was located by the Firewall service in the DNS cache.
DNS Cache Hits %; tracks the DNS domain names serviced by the DNS cache as a percentage of the total DNS entries retrieved by the Firewall service.
DNS Retrievals; indicates the total number of DNS domain names which were retrieved by the Firewall service.
Failed DNS Resolutions; shows the number of failures for gethostbyname and gethostbyaddr application programming interface (API) calls.
Kernel Mode Data Pumps; tracks the number of Kernel mode data pumps created by the Firewall service.
Listening TCP Connections; tracks the number of connection objects which are waiting for TCP connections from remote Internet computers.
Non-connected UDP mappings; tracks and shows the number of mappings available for UDP connections.
Pending DNS Resolutions; indicates the number of pending gethostbyname and gethostbyaddr API calls.
SecureNAT Mappings; shows the number of mappings created by SecureNAT.
Successful DNS Resolutions; indicates the number of successfully returned gethostbyname and gethostbyaddr API calls.
TCP Bytes Transferred/sec by Kernel Mode Data Pump; indicates the number of TCP bytes transferred by the Kernel mode data-pump.
UDP Bytes Transferred/sec by Kernel mode Data Pump; indicates the number of UDP bytes transferred by the Kernel mode data-pump.
Worker Threads; shows the number of active Firewall worker threads.
The ISA Server Packet Filter performance object contains the counters listed below. Some are preloaded in System Monitor and others are not.
Packets Dropped Due to Filter Denial; monitors the total number of packets dropped due to dynamic packet filtering rejecting the data.
Packets Dropped Due to Protocol Violations; monitors the total number of packets dropped due to protocol violation.
Total Dropped Packets; tracks the total number of dropped packets.
Total incoming connections; indicates the total number of connections made through filtered interfaces.
Total Lost Logging Packets; tracks and shows the number of dropped packets which could not be logged.
The ISA Server Web Proxy service performance object contains the counters listed below. Some are preloaded in System Monitor and others are not.
Array Bytes Received/Sec (Enterprise); monitors the rate that data bytes are received from the other ISA Server computers in the same ISA Server array.
Array Bytes Sent/Sec (Enterprise); monitors the rate that data bytes are sent to the other ISA Server computers in the same ISA Serverarray.
Array Bytes Total/Sec (Enterprise); shows the total rate for all data bytes passed between the ISA Server computer and the other members of the same ISA Server array.
Cache Hit Ratio %; shows the number of Web Proxy client requests served from the cached as a percentage of the total number of the Web Proxy client requests passed to the ISA Server computer. This counter measures Web Proxy client requests serviced from when the Web Proxy service was last started.
Cache Running Hit Ratio (%); shows the requests served from the cache as a percentage of total successful requests serviced. This counter measures the last 10,000 requests serviced.
Client Bytes Received/sec; indicates the rate that data bytes are being received from Web Proxy clients.
Client Bytes Sent/Sec; indicates the rate at which data bytes are being transmitted to Web Proxy clients.
Client Bytes Total/Sec; shows the total rate for all data bytes passed between the ISA Server computer and Web Proxy clients.
Current Array Fetches Average (Milliseconds/Request); indicates, in milliseconds, the time needed to service a Web Proxy client request that is fetched through a different array member server.
Current Average Milliseconds/Request; indicates, in milliseconds, the average time needed to service a Web Proxy client request.
Current Cache Fetches Average (Milliseconds/Request); shows in milliseconds, the time needed to service a Web Proxy client request.
Current Direct Fetches Average (Milliseconds/Request); shows in milliseconds, the time needed to service a Web Proxy client request to the Web server or upstream proxy.
Current Users; shows the clients currently using the Web Proxy service.
DNS Cache Entries; indicates the number of DNS domain name entries cached by the Web Proxy service.
DNS Cache Flushes; shows the number of times that the Web Proxy service cleared/flushed the DNS domain name cache.
DNS Cache Hits; shows the number of times that the DNS domain name was located in the DNS cache by the Web Proxy service.
DNS Cache Hits %; tracks the number of DNS domain names serviced by the DNS cache as a percentage of the total DNS entries retrieved by the Web Proxy service.
Failing Requests/Sec; tracks the rate at which Web Proxy client requests have some form of error.
FTP Requests; indicates the number of FTP requests which have been passed to the Web Proxy service.
Gopher Requests; indicates the number of Gopher requests which have been passed to the Web Proxy service.
HTTP Requests; indicates the number of HTTP requests which have been passed to the Web Proxy service.
HTTPS Sessions; indicates the number of HTTPS secured sessions serviced by a SSL tunnel.
Maximum Users; shows the maximum number of users that have simultaneously connected to the Web Proxy service.
Requests/Sec; shows the rate of incoming requests made to the Web Proxy service.
Reverse Bytes Received/sec; shows the rate at which data bytes are received by the Web Proxy service from Web publishing servers for incoming requests.
Reverse Bytes Sent/sec; shows the rate at which data bytes are sent by the Web Proxy service to Web publishing servers for incoming requests.
Reverse Bytes Total/sec; shows the total rate at which data bytes are being passed between the Web Proxy service and Web publishing servers for incoming requests.
Site Access Denied; indicates the number of Internet sites to which the Web Proxy service was denied access.
Site Access Granted; indicates the number of Internet sites to which the Web Proxy service was granted access.
SNEWS Sessions; shows the number of SNEWS sessions serviced by the SSL tunnel.
SSL Client Bytes Received/Sec; indicates the rate that SSL data bytes are being received from secured Web Proxy clients by the Web Proxy service.
SSL Client Bytes Sent/Sec indicates the rate that SSL data bytes are being sent to secured Web Proxy clients from the Web Proxy service.
SSL Client Bytes Total/Sec; indicates the total rate for all bytes passed between the Web Proxy service and secured Web Proxy clients.
Thread Pool Active Sessions; indicates the number of sessions being serviced by the thread pool threads.
Thread Pool Failures; indicates the number of requests being rejected due to the thread pool being full.
Thread Pool Size; indicates the current number of threads in the thread pool.
Total Array Fetches (Enterprise); indicates the total number of Web Proxy client requests which was served by requesting the data from a different ISA server in the ISA Server array.
Total Cache Fetches; shows the total number of Web Proxy client requests that have been served through cached data.
Total Failed Requests; shows the total number of requests which were not processed by the Web Proxy service because of errors.
Total Pending Connects; indicates the total number of pending connections to the Web Proxy service.
Total Reverse Fetches; indicates the total number of incoming requests to the Web Proxy service that was served by requesting data from Web publishing servers.
Total SSL Sessions; indicates the total number of SSL sessions serviced by the SSL tunnel.
Total Successful Requests; indicates the total number of requests which have successfully been processed by the Web Proxy service.
Total Upstream Fetches; indicates the total number of requests which was served through Internet data or from a chained proxy computer.
Total Users; shows the total number of users which connected to the Web Proxy service.
Unknown SSL Sessions; indicates the total number of unknown SSL sessions serviced by a SSL tunnel.
Upstream Bytes Received/Sec; indicates the rate that data bytes are being received by the Web Proxy service from servers residing the Internet or from a chained proxy computer to service requests.
Upstream Bytes Sent/Sec; indicates the rate that data bytes which are being transmitted from the Web Proxy service to servers residing the Internet or to a chained proxy computer to service requests.
Upstream Bytes Total/Sec; indicates the rate that data bytes are being passed between the Web Proxy service and servers residing the Internet or the chained proxy computer.
The H.323 Filter performance object contains the counters listed below. None are preloaded in System Monitor.
Active H.323 Calls; indicates the number of active H.323 calls.
Total H.323 Calls; indicates total the number of active H.323 calls processed by the H.323 filter from when the ISA Server computer last started.
The SOCKS Filter performance object contains the counters listed below. None are preloaded in System Monitor.
Active Connections; indicates the number of existing active connections passing data.
Active Sessions; indicates the number of active SOCKS sessions.
Bytes Read/sec; indicates in seconds, the number of bytes read on SOCKS connections.
Bytes Written/sec; indicates in seconds, the number of bytes written on SOCKS connections.
Connecting Connections; indicates the number of SOCKS connections waiting for a remote computer connection.
Listening Connections; indicates the number of SOCKS connection objects waiting for a remote computer connection.
Pending DNS Resolutions; indicates the pending DNS name resolution requests.
Successful DNS Resolutions; indicates the number of name resolution requests being resolved per second.
Open ISA Server Performance Monitor.
Right-click the System Monitor node and select Add Counters.
Select which object you want to monitor in the Performnce Object box.
If you want to monitor all counters for the object which you have selected, select the All Counters option.
If you want to only monitor specific counters, select the Select Counter option and then choose the counter.
If you want to monitor all instances of the object, select the All Instances option.
If you want to only monitor specific instances, select the Select Instances option and then choose the instance.
Click the Add button.
Open ISA Server Performance Monitor.
Select the System Monitor node
Select the View Log File data button.
Select the log file you want to view and then click Open.
Open ISA Server Performance Monitor.
Expand the Performance Log and Alerts node.
Select the Counter Logs folder.
Right-click in the details pane and then select New Log Settings from the shortcut menu.
Enter a name for the log in the Name textbox.
On the General tab, click the Add button.
Choose the counter to add, click Add and then click Close.
Click the Log Files tab.
Specify the location for storing log data.
Click the Schedule tab.
Define the schedule for logging.
To start logging immediately, right-click the specific counter log and click Start from the shortcut menu.
To stop logging, right-click the counter log again and select Stop from the shortcut menu.
3COM [8 Certification Exam(s) ]
AccessData [1 Certification Exam(s) ]
ACFE [1 Certification Exam(s) ]
ACI [3 Certification Exam(s) ]
Acme-Packet [1 Certification Exam(s) ]
ACSM [4 Certification Exam(s) ]
ACT [1 Certification Exam(s) ]
Admission-Tests [13 Certification Exam(s) ]
ADOBE [93 Certification Exam(s) ]
AFP [1 Certification Exam(s) ]
AICPA [2 Certification Exam(s) ]
AIIM [1 Certification Exam(s) ]
Alcatel-Lucent [13 Certification Exam(s) ]
Alfresco [1 Certification Exam(s) ]
Altiris [3 Certification Exam(s) ]
Amazon [2 Certification Exam(s) ]
American-College [2 Certification Exam(s) ]
Android [4 Certification Exam(s) ]
APA [1 Certification Exam(s) ]
APC [2 Certification Exam(s) ]
APICS [2 Certification Exam(s) ]
Apple [69 Certification Exam(s) ]
AppSense [1 Certification Exam(s) ]
APTUSC [1 Certification Exam(s) ]
Arizona-Education [1 Certification Exam(s) ]
ARM [1 Certification Exam(s) ]
Aruba [6 Certification Exam(s) ]
ASIS [2 Certification Exam(s) ]
ASQ [3 Certification Exam(s) ]
ASTQB [8 Certification Exam(s) ]
Autodesk [2 Certification Exam(s) ]
Avaya [96 Certification Exam(s) ]
AXELOS [1 Certification Exam(s) ]
Axis [1 Certification Exam(s) ]
Banking [1 Certification Exam(s) ]
BEA [5 Certification Exam(s) ]
BICSI [2 Certification Exam(s) ]
BlackBerry [17 Certification Exam(s) ]
BlueCoat [2 Certification Exam(s) ]
Brocade [4 Certification Exam(s) ]
Business-Objects [11 Certification Exam(s) ]
Business-Tests [4 Certification Exam(s) ]
CA-Technologies [21 Certification Exam(s) ]
Certification-Board [10 Certification Exam(s) ]
Certiport [3 Certification Exam(s) ]
CheckPoint [41 Certification Exam(s) ]
CIDQ [1 Certification Exam(s) ]
CIPS [4 Certification Exam(s) ]
Cisco [318 Certification Exam(s) ]
Citrix [48 Certification Exam(s) ]
CIW [18 Certification Exam(s) ]
Cloudera [10 Certification Exam(s) ]
Cognos [19 Certification Exam(s) ]
College-Board [2 Certification Exam(s) ]
CompTIA [76 Certification Exam(s) ]
ComputerAssociates [6 Certification Exam(s) ]
Consultant [2 Certification Exam(s) ]
Counselor [4 Certification Exam(s) ]
CPP-Institue [2 Certification Exam(s) ]
CPP-Institute [1 Certification Exam(s) ]
CSP [1 Certification Exam(s) ]
CWNA [1 Certification Exam(s) ]
CWNP [13 Certification Exam(s) ]
Dassault [2 Certification Exam(s) ]
DELL [9 Certification Exam(s) ]
DMI [1 Certification Exam(s) ]
DRI [1 Certification Exam(s) ]
ECCouncil [21 Certification Exam(s) ]
ECDL [1 Certification Exam(s) ]
EMC [129 Certification Exam(s) ]
Enterasys [13 Certification Exam(s) ]
Ericsson [5 Certification Exam(s) ]
ESPA [1 Certification Exam(s) ]
Esri [2 Certification Exam(s) ]
ExamExpress [15 Certification Exam(s) ]
Exin [40 Certification Exam(s) ]
ExtremeNetworks [3 Certification Exam(s) ]
F5-Networks [20 Certification Exam(s) ]
FCTC [2 Certification Exam(s) ]
Filemaker [9 Certification Exam(s) ]
Financial [36 Certification Exam(s) ]
Food [4 Certification Exam(s) ]
Fortinet [13 Certification Exam(s) ]
Foundry [6 Certification Exam(s) ]
FSMTB [1 Certification Exam(s) ]
Fujitsu [2 Certification Exam(s) ]
GAQM [9 Certification Exam(s) ]
Genesys [4 Certification Exam(s) ]
GIAC [15 Certification Exam(s) ]
Google [4 Certification Exam(s) ]
GuidanceSoftware [2 Certification Exam(s) ]
H3C [1 Certification Exam(s) ]
HDI [9 Certification Exam(s) ]
Healthcare [3 Certification Exam(s) ]
HIPAA [2 Certification Exam(s) ]
Hitachi [30 Certification Exam(s) ]
Hortonworks [4 Certification Exam(s) ]
Hospitality [2 Certification Exam(s) ]
HP [750 Certification Exam(s) ]
HR [4 Certification Exam(s) ]
HRCI [1 Certification Exam(s) ]
Huawei [21 Certification Exam(s) ]
Hyperion [10 Certification Exam(s) ]
IAAP [1 Certification Exam(s) ]
IAHCSMM [1 Certification Exam(s) ]
IBM [1532 Certification Exam(s) ]
IBQH [1 Certification Exam(s) ]
ICAI [1 Certification Exam(s) ]
ICDL [6 Certification Exam(s) ]
IEEE [1 Certification Exam(s) ]
IELTS [1 Certification Exam(s) ]
IFPUG [1 Certification Exam(s) ]
IIA [3 Certification Exam(s) ]
IIBA [2 Certification Exam(s) ]
IISFA [1 Certification Exam(s) ]
Intel [2 Certification Exam(s) ]
IQN [1 Certification Exam(s) ]
IRS [1 Certification Exam(s) ]
ISA [1 Certification Exam(s) ]
ISACA [4 Certification Exam(s) ]
ISC2 [6 Certification Exam(s) ]
ISEB [24 Certification Exam(s) ]
Isilon [4 Certification Exam(s) ]
ISM [6 Certification Exam(s) ]
iSQI [7 Certification Exam(s) ]
ITEC [1 Certification Exam(s) ]
Juniper [64 Certification Exam(s) ]
LEED [1 Certification Exam(s) ]
Legato [5 Certification Exam(s) ]
Liferay [1 Certification Exam(s) ]
Logical-Operations [1 Certification Exam(s) ]
Lotus [66 Certification Exam(s) ]
LPI [24 Certification Exam(s) ]
LSI [3 Certification Exam(s) ]
Magento [3 Certification Exam(s) ]
Maintenance [2 Certification Exam(s) ]
McAfee [8 Certification Exam(s) ]
McData [3 Certification Exam(s) ]
Medical [69 Certification Exam(s) ]
Microsoft [374 Certification Exam(s) ]
Mile2 [3 Certification Exam(s) ]
Military [1 Certification Exam(s) ]
Misc [1 Certification Exam(s) ]
Motorola [7 Certification Exam(s) ]
mySQL [4 Certification Exam(s) ]
NBSTSA [1 Certification Exam(s) ]
NCEES [2 Certification Exam(s) ]
NCIDQ [1 Certification Exam(s) ]
NCLEX [2 Certification Exam(s) ]
Network-General [12 Certification Exam(s) ]
NetworkAppliance [39 Certification Exam(s) ]
NI [1 Certification Exam(s) ]
NIELIT [1 Certification Exam(s) ]
Nokia [6 Certification Exam(s) ]
Nortel [130 Certification Exam(s) ]
Novell [37 Certification Exam(s) ]
OMG [10 Certification Exam(s) ]
Oracle [279 Certification Exam(s) ]
P&C [2 Certification Exam(s) ]
Palo-Alto [4 Certification Exam(s) ]
PARCC [1 Certification Exam(s) ]
PayPal [1 Certification Exam(s) ]
Pegasystems [12 Certification Exam(s) ]
PEOPLECERT [4 Certification Exam(s) ]
PMI [15 Certification Exam(s) ]
Polycom [2 Certification Exam(s) ]
PostgreSQL-CE [1 Certification Exam(s) ]
Prince2 [6 Certification Exam(s) ]
PRMIA [1 Certification Exam(s) ]
PsychCorp [1 Certification Exam(s) ]
PTCB [2 Certification Exam(s) ]
QAI [1 Certification Exam(s) ]
QlikView [1 Certification Exam(s) ]
Quality-Assurance [7 Certification Exam(s) ]
RACC [1 Certification Exam(s) ]
Real-Estate [1 Certification Exam(s) ]
RedHat [8 Certification Exam(s) ]
RES [5 Certification Exam(s) ]
Riverbed [8 Certification Exam(s) ]
RSA [15 Certification Exam(s) ]
Sair [8 Certification Exam(s) ]
Salesforce [5 Certification Exam(s) ]
SANS [1 Certification Exam(s) ]
SAP [98 Certification Exam(s) ]
SASInstitute [15 Certification Exam(s) ]
SAT [1 Certification Exam(s) ]
SCO [10 Certification Exam(s) ]
SCP [6 Certification Exam(s) ]
SDI [3 Certification Exam(s) ]
See-Beyond [1 Certification Exam(s) ]
Siemens [1 Certification Exam(s) ]
Snia [7 Certification Exam(s) ]
SOA [15 Certification Exam(s) ]
Social-Work-Board [4 Certification Exam(s) ]
SpringSource [1 Certification Exam(s) ]
SUN [63 Certification Exam(s) ]
SUSE [1 Certification Exam(s) ]
Sybase [17 Certification Exam(s) ]
Symantec [134 Certification Exam(s) ]
Teacher-Certification [4 Certification Exam(s) ]
The-Open-Group [8 Certification Exam(s) ]
TIA [3 Certification Exam(s) ]
Tibco [18 Certification Exam(s) ]
Trainers [3 Certification Exam(s) ]
Trend [1 Certification Exam(s) ]
TruSecure [1 Certification Exam(s) ]
USMLE [1 Certification Exam(s) ]
VCE [6 Certification Exam(s) ]
Veeam [2 Certification Exam(s) ]
Veritas [33 Certification Exam(s) ]
Vmware [58 Certification Exam(s) ]
Wonderlic [2 Certification Exam(s) ]
Worldatwork [2 Certification Exam(s) ]
XML-Master [3 Certification Exam(s) ]
Zend [6 Certification Exam(s) ]
Dropmark : http://killexams.dropmark.com/367904/11925179
Dropmark-Text : http://killexams.dropmark.com/367904/12893977
Blogspot : http://killexamsbraindump.blogspot.com/2017/12/kill-your-000-674-exam-at-first-attempt.html
Wordpress : https://wp.me/p7SJ6L-2fU
RSS Feed : http://feeds.feedburner.com/ExactlySame000-674QuestionsAsInRealTestWtf
Box.net : https://app.box.com/s/7moz4sm8g98x2thd7qkvrbuoslr0ms2u