Monday, December 18, 2017

WHY ARTIFICIAL INTELLIGENCE IS BASICALLY DIFFERENT FROM HUMAN INTELLIGENCE



Recently, Dubai announced a minister of Artificial Intelligence. The 27-year-old Omar Bin Sultan Al Olama is the UAE's first State Minister of AI. A remarkable move by UAE Vice-President and Prime Minister Shaikh Mohammad Bin Rashid Al Maktoum, who said: "we want the UAE to become the world's most prepared country for artificial intelligence". The role focuses on future skills, future sciences and future technology and offers Dubai a chance to be ready for an AI-driven future. The move by Dubai is a great showcase of vision and dare to take risk, since artificial intelligence will increasingly define our future.

In fact, I would recommend any country that takes digitalisation serious to follow Dubai's example and appoint a minister of Artificial Intelligence. Even more, I believe that every organisation should employ a Chief AI within their organisation to understand how AI will impact the business and how it will affect organisations and societies. Why? Simply because Artificial Intelligence will be fundamentally different from human intelligence and understanding this can bring you a competitive advantage and can help us mitigate risks.

Why AI Will Be Different

Intelligence is "the complex expression of a complex set of principles", consisting of various interdependent subsystems all linked together. Intelligence exists because of evolution and it enables humans to model, predict and manipulate reality. This unique ability allows us to reason backwards and forwards from a mental image and reason on possible (un)desired future outcomes. Evolution created our intelligence, but evolution is an inherently dumb process. It achieves its goal by trial and error and does not possess the foresight capabilities that we humans have.

In fact, the unintelligent process of evolution has resulted in flaws in human intelligence. Due to various constraints such as food availability, trade-offs with other organs, biological materials it is possible that our brains have not evolved in the most optimised way. Artificial Intelligence, on the other hand, will be developed by (artificial) intelligent beings/things who do possess the foresight capabilities that evolution misses. As such, it is better capable to understand which materials and what processes work best for intelligence. In addition, it can apply the knowledge of others to improve (initial) designs and as such improve artificial intelligence. Consequently, artificial intelligence will look and act in ways unfamiliar to mankind today and, hence, requires a different approach.

Examples of Unexpected Actions by AI 

The best example to show how this works is AlphaGo Zero, the new and improved version of the AlphaGo algorithm developed by Google's Deepmind. While previous versions of AlphaGo had been trained using human data, this version of the algorithm is completely self-trained, without human intervention or historical data. A mind-blowing feature, especially because within three days of teaching itself how to play the game, it beat the version that beat Lee Sedol in 2016. It did so using a new form of reinforcement learning where the algorithm became its own teacher. It played against itself, hence it always had a component of equal strength, and learned from every move it made. While the previous version that beat Lee Sedol already surprised the world champion with moves he had never seen or thought about, the new version applies completely unknown strategies that it had taught itself. As a result, after 40 days it surpassed all previous versions of AlphaGo and, arguably, became the past Go player in the world.

Unexpected moves and strategies as developed by AlphaGo Zero increasingly start to appear in AI development. For example, AI developers from Google recently build algorithms that had to compete for scarce resources, resulting in increasingly advanced strategies to beat the component. Another project from Google Brain developed algorithms that created new encryption methods, unlike any seen before developed by humans, to protect information from other neural networks. Finally, Facebook recently developed two algorithms that created its own secret language, unsolicited and used advanced strategies to get what it wanted. Consequently, Facebook had to shut down its algorithms.

AI Policies to Understand Advanced Artificial Intelligence

These four examples clearly show that Artificial Intelligence is increasingly becoming more advanced, especially when not limited by human knowledge. In this process, it is adopting new tactics or strategies that humans have not seen before or could not imagine. In addition, as AlphaGo Zero shows, removing the need for human intervention and/or historical data makes algorithms much more powerful and efficient, so it is likely to see more of such developments. Bringing us ever closer to the holy grail of Artificial Intelligence; Artificial General Intelligence (AGI). These AI systems have autonomous self-control and self-understanding and the ability to learn new things to solve a wide variety of problems in different contexts using unknown tactics and strategies.

Although AGI is still years, if not decades, away, the more advanced AI will become, the bigger the impact on organisations and societies. The examples of Google and Facebook show that when that happens, humans might not always understand what happens or how an AI arrives at a certain strategy or outcome. Therefore, if we wish to remain in control, and not be surprised by increasingly advanced AI, organisations and countries should follow Dubai's example of appointing a senior leader responsible for Artificial Intelligence. Those leaders can then form overarching committees, similar to the Eurogroup that holds informal meetings of the finance ministers of the Eurozone to exercise political control over the Euro, to establish guidelines and policies in terms of AI development. Although such AI regulation should not hinder technical developments, it should also advocate measures to ensure safe AI and to help organisations and societies understand the impact of a fundamentally different form of intelligence.

WHY IS BLOCKCHAIN GAINING SO MUCH POPULARITY?

   


Blockchain is the latest buzzword with almost all the Fintech people and enthusiast talking about its potential globally. The technology, originally devised for the digital currency, Bitcoin, is gaining a lot of popularity and traction. It was invented by Satoshi Nakamoto, a secretive internet user in 2008, before it went online in 2009. Several attempts to identify Satoshi have been made without any conclusive proof.

According to blockchain.info, about 16.5 million of bitcoins have been mined till date with a CAGR of 34% since 2009. The website quotes an aggregate bitcoin transaction of over 200,000 taking place every day, and the number is increasing with each passing minute. In March 2017, the value of a Bitcoin, at US$1,268, exceeded that of an ounce of gold ($1,233) for the first time. And then there is no looking back. Currently, a Bitcoin is valued at over US$4,500. That's quite impressive!

But what makes Bitcoin and the technology backed by it the preferred choice to perform transactions? Let's delve more deeply into it to understand this. Every business is based on transactions. These transactions are routed through third-party intermediaries such as banks, brokers, and lawyers. The process to complete a business transaction thus takes a lot of time and is often expensive. Blockchain technology facilitates the process without third-party facilitators in a business network thereby saving time and cutting the cost involved.

Blockchain is a shared, distributed public ledger of records arranged in data blocks interconnected and distributed on multiple computers. The ledger keeps a record of all transactions concluded across the peer-to-peer network. It is run by "miners "whose powerful computers crunch the transactions. The below infographic shows how transactions are carried out in a blockchain setup.

Blockchain can support a wide range of applications in different industries including retail, supply chain and the ones mentioned in the above infographic. Most importantly, the technology has many advantages, a few of which include:

Cryptographically secure

The technology applies a digital signature to create transactions which reduce fraud. Blockchain makes it virtually impossible to remove or change data without being detected by other users.

Decentralized

Today, most of the transactions require approval from a regulatory authority such as banks and the government. In blockchain technology, the verification comes from the consensus of different users.

Improves security

The distributed and encrypted characteristic of blockchain means that it is difficult to hack by evil intentions. Since all the users have a copy of the blockchain, any tampering made gets alerted

Faster processing

Now that, it excludes third-party intermediaries in transactions, the speed to perform the same automatically improves. Also, this comes with round the clock service and does completely away with the 9 to 5 working hours.

Brings automation

The technology is completely programmable and can trigger actions, events, and payments once the conditions are met.

All these advantages make blockchain an emerging way of making and verifying transaction in businesses, industries, and public organizations. However, as with every new technology, blockchain will have to face a lot of hurdles before it gets widely adopted and graced with open arms by businesses and organizations globally.

Conclusion

Blockchain is still new but its potential is huge. Technology companies which are eyeing to offer "Blockchain-as-a-Service" will make a good ROI if they start early. Major players have already initiated it. According to a World Economic Forum report, 10% of global gross domestic product (GDP) will be stored on blockchain technology by 2027. As we go further, we are likely to see a lot of strategic partnerships that will support blockchain in real-world production and drive the market forward.

HOW CAN BLOCKCHAIN REVOLUTIONIZE MOBILE APP SECURITY?


     


Have you heard of Blockchain? That's already an obsolete question for many of us who closely followed the way data-centric security measures have evolved in the past few years. Yes, you have guessed it right. The blockchain is about data and is also about security. The blockchain is also about collaboration and transaction.

But Blockchain is never a server full of data locked to prevent any unwanted access. With Blockchain the opposite is the case. An open for all database that cannot be rewritten or tampered while remaining open for any subsequent addition, that's Blockchain for you.

But what relation does it have with mobility and app market? As envisaged from the core competence of Blockchain, it can safeguard data from any misuse or tampering while making it always accessible for all.

It all started with the cryptocurrency called Bitcoin followed by its popularity in the financial sector as a high-tech measure to protect transaction and finally, it is knocking the door of mobile apps. Yes, with such promising features for data protection Blockchain can well revolutionize the mobile app security.

Distributed database powers blockchain

The concept of a distributed open source database was coined long ago, but it was shaped by a relevant technology for real-world uses only by Blockchain when it was introduced as the backbone protocol for cryptocurrency Bitcoin. The entire transactional database remains open to all, and any new layer of information can be added to it without restriction. But this distributed and open source database just does not allow any change of the registered data. That makes this database full proofed from tampering and misuse while making it accessible and open to use for all.

Technically speaking, the architecture of Blockchain is characteristically peering to peering instead of client/server. This gives Blockchain the lead as a distributed data system with uninhibited access for everyone. This architecture is ideal for carrying out transactions without requiring any help from third parties. But beyond the transaction, for any exchange of information Blockchain can be contextualized to deliver an open to all database independent of third party roles.

The properties mentioned above are quintessential to the Blockchain when used as the background technology for Bitcoin. But whether the technology can be well suited for your app depends on several factors. How far can you make your app database behave as a distributed one? Yes, if you do not require opening up your database for wider access, your app may not require Blockchain at all. Considering outwardly, if your app boasts of a transactional database similar to Bitcoin the technology can prove essential for your purpose.

Do you have a multifaceted peer-to-peer transaction system in place? In such case, Blockchain can be an ideal security solution for your app. But in any case, don't have an impression that your app needs to have similar requirements as Bitcoin. The design elements and implementation of the technology will entirely be specific to your app's core purpose.

Using blockchain for mobile security 

So far, we have understood that blockchain can be a big value addition to the security strategy concerning your mobile apps. But how really it can be incorporated into the app security strategy? Precisely, when the activities around an app require stricter authentication to safeguard data, you need Blockchain. You have to designate certain transactions that will be safeguarded by Blockchain.

Remember, Blockchain either will mediate among several parties on the ownership value of a shared resource as in the case of Bitcoin or will record data of transaction carried out among several parties as happens in the event of bill payment or bidding in an auction.

IoT Security and Blockchain

For some time the connected devices sharing the networked IoT platform gave rise to a whole range of concerns concerning device-level security. The absence of a common protocol for all these devices and low-security arrangements for most devices make IoT vulnerable to a lot of security threats. Fortunately, Blockchain can also play a great role in battling the security concerns of IoT devices.

While we were thinking how Blockchain can be implemented to enhance the device-level security of connected gadgets we have ADEPT (Autonomous Decentralized Peer-to-Peer Telemetry) which refers to the latest initiative by Samsung and IBM that can ensure easy, secure and low-cost interaction among devices. Blockchain will power the framework which is still in its nascent conceptual state. ADEPT will create highly distributed device networks to help secure transaction and communication among devices.

Digital agreements and contracts

Every multi-party legal agreement and contract risks face the risk of data tampering and information loss. Moreover, several printed documents with notarisation and other layers of authenticated signatories offers a big challenge concerning preservation and safekeeping. Blockchain can deliver a multi-party database with easy to access and impossible to tamper features to safeguard safe keep such data in digital formats.

By digitising such valuable data like agreements and contracts Blockchain will also enhance the usability of information with ease of access. In addition to the digitisation with Blockchain database each document can further be encrypted and authentication protocol added to it for allowing access to only designated people.

Finally, Blockchain as an innovative database technology can add value to business process with more efficiency, ease of access and security features. As business is extremely becoming mobile-centric, the implementation of Blockchain cannot be indifferent to the mobile strategy. The distributed database of blockchain will give more power to businesses in initiating multi-party transactions and collaborations without any security threat to their database.

As of now, we have mainly seen financial companies and banks to express their interest in implementing Blockchain, though several of global companies across the niches already expressed their delight about the security arrangements that Blockchain can provide to make their enterprise IT more powerful than ever before. While businesses will continue to grapple with the idea of Blockchain and how it can be successfully implemented, we can see several global corporations to set the standard with their innovative Blockchain mobile integration.

HOW CAN BLOCKCHAIN REVOLUTIONIZE MOBILE APP SECURITY?

        



Have you heard of Blockchain? That's already an obsolete question for many of us who closely followed the way data-centric security measures have evolved in the past few years. Yes, you have guessed it right. The blockchain is about data and is also about security. The blockchain is also about collaboration and transaction.

But Blockchain is never a server full of data locked to prevent any unwanted access. With Blockchain the opposite is the case. An open for all database that cannot be rewritten or tampered while remaining open for any subsequent addition, that's Blockchain for you.

But what relation does it have with mobility and app market? As envisaged from the core competence of Blockchain, it can safeguard data from any misuse or tampering while making it always accessible for all.

It all started with the cryptocurrency called Bitcoin followed by its popularity in the financial sector as a high-tech measure to protect transaction and finally, it is knocking the door of mobile apps. Yes, with such promising features for data protection Blockchain can well revolutionize the mobile app security.

Distributed database powers blockchain

The concept of a distributed open source database was coined long ago, but it was shaped by a relevant technology for real-world uses only by Blockchain when it was introduced as the backbone protocol for cryptocurrency Bitcoin. The entire transactional database remains open to all, and any new layer of information can be added to it without restriction. But this distributed and open source database just does not allow any change of the registered data. That makes this database full proofed from tampering and misuse while making it accessible and open to use for all.

Technically speaking, the architecture of Blockchain is characteristically peering to peering instead of client/server. This gives Blockchain the lead as a distributed data system with uninhibited access for everyone. This architecture is ideal for carrying out transactions without requiring any help from third parties. But beyond the transaction, for any exchange of information Blockchain can be contextualized to deliver an open to all database independent of third party roles.

The properties mentioned above are quintessential to the Blockchain when used as the background technology for Bitcoin. But whether the technology can be well suited for your app depends on several factors. How far can you make your app database behave as a distributed one? Yes, if you do not require opening up your database for wider access, your app may not require Blockchain at all. Considering outwardly, if your app boasts of a transactional database similar to Bitcoin the technology can prove essential for your purpose.

Do you have a multifaceted peer-to-peer transaction system in place? In such case, Blockchain can be an ideal security solution for your app. But in any case, don't have an impression that your app needs to have similar requirements as Bitcoin. The design elements and implementation of the technology will entirely be specific to your app's core purpose.

Using blockchain for mobile security 

So far, we have understood that blockchain can be a big value addition to the security strategy concerning your mobile apps. But how really it can be incorporated into the app security strategy? Precisely, when the activities around an app require stricter authentication to safeguard data, you need Blockchain. You have to designate certain transactions that will be safeguarded by Blockchain.

Remember, Blockchain either will mediate among several parties on the ownership value of a shared resource as in the case of Bitcoin or will record data of transaction carried out among several parties as happens in the event of bill payment or bidding in an auction.

IoT Security and Blockchain

For some time the connected devices sharing the networked IoT platform gave rise to a whole range of concerns concerning device-level security. The absence of a common protocol for all these devices and low-security arrangements for most devices make IoT vulnerable to a lot of security threats. Fortunately, Blockchain can also play a great role in battling the security concerns of IoT devices.

While we were thinking how Blockchain can be implemented to enhance the device-level security of connected gadgets we have ADEPT (Autonomous Decentralized Peer-to-Peer Telemetry) which refers to the latest initiative by Samsung and IBM that can ensure easy, secure and low-cost interaction among devices. Blockchain will power the framework which is still in its nascent conceptual state. ADEPT will create highly distributed device networks to help secure transaction and communication among devices.

Digital agreements and contracts

Every multi-party legal agreement and contract risks face the risk of data tampering and information loss. Moreover, several printed documents with notarisation and other layers of authenticated signatories offers a big challenge concerning preservation and safekeeping. Blockchain can deliver a multi-party database with easy to access and impossible to tamper features to safeguard safe keep such data in digital formats.

By digitising such valuable data like agreements and contracts Blockchain will also enhance the usability of information with ease of access. In addition to the digitisation with Blockchain database each document can further be encrypted and authentication protocol added to it for allowing access to only designated people.

Finally, Blockchain as an innovative database technology can add value to business process with more efficiency, ease of access and security features. As business is extremely becoming mobile-centric, the implementation of Blockchain cannot be indifferent to the mobile strategy. The distributed database of blockchain will give more power to businesses in initiating multi-party transactions and collaborations without any security threat to their database.

As of now, we have mainly seen financial companies and banks to express their interest in implementing Blockchain, though several of global companies across the niches already expressed their delight about the security arrangements that Blockchain can provide to make their enterprise IT more powerful than ever before. While businesses will continue to grapple with the idea of Blockchain and how it can be successfully implemented, we can see several global corporations to set the standard with their innovative Blockchain mobile integration

BLOCKCHAIN AND THE FUTURE OF BANKING TECHNOLOGY



Blockchain technology is gaining traction and changing the finance industry as we know it. Banks have long held on to traditional banking methods, but to survive in a digital future, they need to implement new banking technology. This is the only way to give a better banking experience to their customers while staying afloat in this new technological era. 

What is Blockchain?

Created in 2008, Blockchain is an encrypted digital ledger that stores linked 'blocks' of data. Blockchain's open ledger framework can store a variety of information in these blocks such as account data, transaction processing, contracts, and more. Since the blocks cannot be altered once they have been stored, blockchain offers a very secure and incorruptible system.

Blockchain technology was developed alongside one of the first and most popular crypto-currencies, Bitcoin. Bitcoin is like digital cash, with each Bitcoin's data stored on the blockchain. Since it's decentralised, Bitcoin has solved the double spending issue without involving a third party or central server.

While Bitcoin is the most popular crypto-currency running on the blockchain, there are other crypto-currencies in use. Etherium is another well-known alt-currency that runs on blockchain technology and offers additional features like smart contracts.

Why is blockchain one of the most important new technologies today?

1. Offers fast and efficient banking processes

While traditional, legacy-based banking systems can be tedious and lengthy, blockchain offers fast and efficient banking processes. There are fewer participants required for each transaction making it very cost effective.

2. Blockchain technology is decentralised

This means that there is no middleman or third party involved, which makes blockchain a very secure banking option since it's impossible for computer systems to be hacked leaving sensitive data vulnerable.

3. Impossible to duplicate sensitive data

The blockchain 'ledger' offers transparent banking while keeping the data incorruptible. Since it's impossible to duplicate sensitive data on the blockchain, it's become one of the most important innovations in the banking sector.

4. The benefit of optimising regulations

Banks are obligated to comply with Know your Customer (KYC) regulations to prevent money laundering and fraudulent activity. Compliance with KYC can be very costly for banks and blockchain can reduce fees and administration time significantly. Since the verification of a client can be processed by a single organisation and then stored on the blockchain, this verification can be accessed by any other organisation without having to complete the KYC procedure again.

Are banks using blocking blockchain technology yet?

Yes. Some of the world's biggest banking institutions such as JP Morgan Chase have recently announced the launch of blockchain-based technology into their systems. Blockchain's ability to provide transparent, speedy, and secure cheap transfer has made it one of the hottest banking trends in 2017.

Additionally, many banks have begun to invest in Fintech companies to help assist in the creation and implementation of blockchain based systems. Bank of America and JP Morgan Chase are just two of the major banks to partner with tech companies to develop blockchain-based systems. As an efficient alternative to traditional banking methods, blockchain can play a critical role in the future of banking technology.

Thursday, December 7, 2017

Save Image in Sql Server Using C#


In this blog I will tell you that how to save image in Sql Server using c#. Here I will give you necessary steps to store image in sql server.

1)      Before we are starting to make application in C# firstly we need to create a table in sql server where we store out image. Here I will create a table named ImageTable in which I will store image. ImageTable contains two column one is imageID which will store id of image in image table. And other column which have name imageData is stored image in format of binary.

Here I will provide a sample sql code snippet to create ImageTable

create table ImageTable

(

     imageID int,

     imageData image

)

2)      Now import System.Data.SqlClient namespace in your project. This namespace provide you all necessary classes and interfaces which is necessary to establish connection to SqlServer.

3)      Create following methods and call it according to your requiremnt.

/// <summary>

        /// On click event of browse button write down following code. This

        /// Will display a open file dialog box which will ask to choose you

        /// image and will store path of image in textbox.

        /// </summary>

        /// <param name="sender"></param>

        /// <param name="e"></param>

        private void button1_Click(object sender, EventArgs e)

        {

            OpenFileDialog ofd = new OpenFileDialog();

            if (DialogResult.OK == ofd.ShowDialog())

            {

                textBox1.Text = ofd.FileName;   //storing path of image in textbox.

            }

        }

        /// <summary>

        /// On the click of SaveButton call saveImageInDataBase(int imgId) method

        /// which will save image in database.

        /// </summary>

        /// <param name="sender"></param>

        /// <param name="e"></param>

        private void button2_Click(object sender, EventArgs e)

        {

            saveImageInDataBase(1);

        }

        /// <summary>

        /// This is a required method which will save image in database.

        /// </summary>

        /// <param name="imageID"></param>

        public void saveImageInDataBase(int imageID)

        {

            byte[] imageData = ReadImageFile(textBox1.Text);    //This nethod returns image in byte array format.

            SqlConnection con = new SqlConnection();

            con.ConnectionString = "Data Source=aaaa;User ID=sa;Password=abcd;Initial Catalog=Workbook";  //provide connection string of your server.

            con.Open();   //open connection to server.

            string query = "insert into ImageTable values(@imageId,@imageData)";     //create a query variable.

            SqlCommand cmd = new SqlCommand(query, con);          //create a sqlcommand object.

            cmd.Parameters.Add(new SqlParameter("@imageId", imageID));    //add first parameters.

            cmd.Parameters.Add(new SqlParameter("@imageData", imageData));    //add second parameters.

            int rows = cmd.ExecuteNonQuery();         //execute query.

            if (rows > 0)

                MessageBox.Show("Image saved.");

            else

                MessageBox.Show("Unable to save image.");

            con.Close();

        }

        /// <summary>

        /// This method will converts image in byte array format and returns to its caller.

        /// use System.IO namespace regarding streaming concept.

        /// </summary>

        /// <param name="imageLocation"></param>

        /// <returns></returns>

        public byte[] ReadImageFile(string imageLocation)

        {

            byte[] imageData = null;

            FileInfo fileInfo = new FileInfo(imageLocation);

            long imageFileLength = fileInfo.Length;

            FileStream fs = new FileStream(imageLocation, FileMode.Open, FileAccess.Read);

            BinaryReader br = new BinaryReader(fs);

            imageData = br.ReadBytes((int)imageFileLength);

            return imageData;

        }

    }

Tuesday, December 5, 2017

Enhancing the power of SharePoint Foundation Search with Microsoft Search Server Express

Problem

SharePoint Foundation 2010 is a great FREE product from Microsoft which often fulfils many businesses needs. However, in my opinion, what lets us down is the Search functionality. Businesses expect and want more out of Search but aren't always prepared to deploy Microsoft SharePoint Server, which includes more a powerful Search functionality.

Solution

The solution is quick, easy and FREE! Installing Microsoft Search Server Express 2010 within your SharePoint farm will give you the following search connectors:

  • SharePoint sites
  • Windows file shares
  • Exchange public folders
  • Lotus Notes
  • Web sites
  • IFilters for additional repositories
  • Structured content in databases
  • Federation object model

The two most common ones are the ability to search your current SharePoint install and a Windows file server share at the same time.

Installation

The following deployment steps and screen shots are taken from a single server SharePoint Foundation 2010 environment, running on Windows Server 2008.

1. On your SharePoint 2010 Foundation server, install Microsoft Search server 2010 (download here)

2. After the installation is complete the Configuration Wizard will appear, just like the SharePoint installation.

3. Select "No, do not create a default site" this is because you already have a SharePoint site.

4. The Configuration Wizard will now continue through 11 steps.

5. Note task 10 can take a while to complete but there is a additional percentage complete indicator.

6. Once the Configuration Wizard has finished you will receive the Configuration Successful message. Note you are also informed you need to access SharePoint Central Administration to finish the installation.

Configuration

1. Open SharePoint Central Administration and browse to Services on Server, click the new "SharePoint Server Search"

2. Click the Search Service Application to configure the new search service

3. Note the Default Content access account, you will need to change this if you want to crawl file shares, to an account which has permission to read the files. Also note the crawl will be in progress.

4. Browse to your SharePoint web application and create a new site.

5. On the new site form enter the following making sure you select the "Basic Search Center" option from the new Enterprise tab in the Template Selection section.

6. Once the new site creation wizard has completed you should be able to browse to your newly created Search Center

7. Enter a word in the search box and hit return to test the new search service. Note the refinement area shown below.

 

Installing SharePoint Foundation 2010 – Step by Step

We are always fall in problem to install SharePoint 2010 for the first time. Here is the step by step approach to install SharePoint 2010. This article is very much handy to install SharePoint Foundation 2010. Installation of other version of SharePoint is almost same. Here I have installed Windows 2008 Server in VMWare Workstation with 4GB of RAM. Below is the step by step approach to install SharePoint 2010.

Step 1: Install Windows 2008 Server R2

Step 2: Configure Windows Server 2008 R2 to install SharePoint 2010

Step 3: Create Domain Controller

Step 4: Install SQL Server – 2008 R2

Step 5: Install Prerequisites

There are two ways to install prerequisite –

i)        First way – Download the following prerequisites according to your Server Requirements and install it's to the server. Keep in mind, some are already installed in your computer so don't worry about installation problem. May be all prerequisite is not necessary for your server.
a.  Windows 2008 R2 and Windows Server 2008 KB971831
b. WCF Fix article for Windows 2008 R2 and Windows 7 KB976462
c. Microsoft SQL Server 2008 Native Client
d. Microsoft "Geneva" Framework Runtime
e. Microsoft Sync Framework Runtime v1.0 (x64)
f. Microsoft Chart Controls for Microsoft .NET Framework 3.5
g. Microsoft SQL Server 2008 Analysis Services ADOMD.NET
h. PowerShell V2 RTM
i. SQL Server 2008 SP1
j. .NET Framework 3.5 Service Pack 1 (Full Package)
k. Microsoft Filter Pack x64 for sharepoint

ii)       Second way – This is the very easy way. Just click executable file (SharePointFoundation.exe). Click "Install software prerequisite" of the screen.

1

Click "Next" to start installation of pre requisites

1-1

Mark for license Agreement and Click Next

1-2Pre requisites is installing.

1-3

Click Finish to complete installation of Pre requisites.

1-4

Step 6: Start SharePoint 2010 Foundation installation – Click Executable file (SharePointFoundation.exe). Click "Install SharePoint Foundation" in the splash screen.

2

Step 7: Mark to the license agreement and click Continue.

3

Step – 8: Browse data location and Click "Install Now"

4Installation Progress…

5

Step 9: Mark "Run the SharePoint Product Configuration Wizard now" and click "Close".

6

Step 10: Click "Next" of the SharePoint Products Configuration Wizard.

7

Step 11: Click "Yes" of the following pop up screen and then click "Next".

8

Step 12: Select "Create a new server farm" and then click "Next" of the following screen.

9

Step -13: Type your database server name, database Name (default: SharePoint_Config), user name (domain name\User name) and password in the following Database Settings screen.

10

Step 14: Type Passphrase and confirm passphrase in the Farm Security Settings screen and click "Next"

11

Step 15: To specify port of Central administration we application – Mark specify port number and type your desired port. Select NTLM as default as authentication provider for Web application.

12

Step 16: Click "Next" in following SharePoint Product Configuration Wizard. If required click Advanced Settings for advanced configuration

13

Configuring SharePoint Products…..

14Step 17: You will see the following screen after configuring SharePoint Server successfully. Necessary information is given here. Click "Finish" to continue.

15

Step 18: Type username (my user name: Administrator) and password to enter the server.

16

Step 19: Select "No, I don't wish to participate" and click "ok" in the following screen.

17

Step – 20: Click "Start the Wizard" in the following screen.

18

Step -21: Select "Use existing managed account" and click "Next"

19Processing…

20Step -22: Type site title and description, select template as Team site and click Ok.

21

Step – 23: Farm configuration completed. Click "Finish" in the Farm Configuration wizard.

22

Step – 24: Now you will see the central administration. If you see in the closer look, you will see it uses port -2010(read circle) which you configured at step – 15.

23

Step – 25: If you want to see the site which you already created just type "htttp://yourservername:80" in the url.

24Yes! You have successfully installed and configured SharePoint 2010. Thanks for your patience.