12 Results Found
The learning solution covered IBM InfoSphere Discovery, FastTrack and DataStage, with two tailored courses each.
Our training solution put our instructor, a former military officer, aboard their ship. He flew halfway around the world with the course equipment to a U.S. Navy ship.
Global Knowledge's live labs allowed the University of Ottawa's IT team to apply skills they learned in training in hands-on lab settings to the same equipment deployed in their network.
International oil company needed to train 80,000+ end-users and 4,000 IT support personnel. These professionals were located at more than 1,300 locations in over 100 countries. There wasn't a corporate learning and development office. Each office site, or regional operating unit, made its own training decisions.
International Insurance Organization (IIO) needed a program that would acclimate new hires to a varied technology landscape that includes Cisco, Citrix, Microsoft, VMware and IBM products.
The training solution's main goal was to maximize the experience of each attendee regardless of their prerequisite knowledge. Training needed to be delivered on three continents.
Customized Microsoft Certification Training Increases Help Desk Efficiency. Read out case study with Teleperformance's experience with GK.
In this Case Study, learn how customized network security training helps prevent hacker attacks. Learn more about the situations, solution and results.
By implementing SharePoint, a worldwide gas corporation sought to improve workplace efficiency, enhance collaborative opportunities, and advance document management capabilities while maintaining a high level of security and control.
Through its partnership with Global Knowledge, Mantech was able to quickly align its workforce skill sets with increasingly sophisticated customer needs.
Big data is changing industries. A new application made possible by cloud computing, data is about patterns and trends and forward-looking business intelligence.
How do you Manage Public Cloud Security? What's a sound approach to minimizing security risk when using public cloud services? Everything you need to know.