Your browser is incompatible with this site. Upgrade to a different browser like Google Chrome or Mozilla Firefox to experience this site.
1127 Results Found
With blockchain constantly in the news, business leaders are not only asking themselves what it is but most importantly, what’s in it for me and my business. If you’ve asked those questions, this webinar is for you! In it you will not only learn what blockchain is, but understand its impact and potential for your business. We will demonstrate some of its immediate use cases in technology, business, and enterprise products and institutions.
Global Knowledge Course Director and Lab Topology Architect Joey DeWiele, a specialist in Unified Communications, discusses Cisco Unity, Unity Connection & Unity Express.
Learn about Cloud Computing with AWS and the benefits AWS provides to hundreds of thousands of customers globally.
Driven by recent increases in cryptocurrency values, Cryptojacking is poised to be the center of conversation in 2018. It’s one of the latest innovations in hacking in which a victim’s computer is enlisted to mine cryptocurrency. Unlike ransomware, this attack steals processor cycles in an attempt to mine Monero and other currencies, typically without the user’s knowledge or consent. Watch this timely 1-hour webinar where we will discuss – A quick overview of cryptocurrencies. A walk-through of a typical attack. The economics of the attackers. Possible mitigation strategies to keep you and your organization safe. With miners trying to take advantage of the rising cryptocurrency industry, join us as we investigate this cyber-crime and learn how you can protect yourself and your organization. View our complete Cybersecurity curriculum for courses that help you build fundamental to advanced cybersecurity techniques, prepare for top industry-recognized certifications or master product-specific skills.
Networks are under attack as hackers try to access systems to compromise or steal sensitive data and information. Understand the threats posed by malware, ransomware and social engineering.
Project quality management is the process of determining the quality standards that are applicable to a project and devising a way to satisfy them. Learn more here.
Software-defined networking (SDN) is a solution that will enable your organization to meet the demands of network programmability and automation. The result will be greater network agility to support new applications while complying with increasing security needs.
Organizations that plan for and conduct supplier management according to defined processes and boundaries are more likely to receive predictable, high-quality goods and services from their suppliers in a timely manner.
To understand the difference between Ethernet II and 802.3, you first must know how Ethernet works. While Ethernet cables transmit data, their role is relatively simple compared to that of the Ethernet card — also referred to as an adapter. It’s within the function of this card that you find the differences between Ethernet II and 802.3.
Let's start with defining the job of a cloud architect. You are responsible for planning, designing, migrating, and implementing cloud-based infrastructures, but the effectiveness of these specialists is not guaranteed.