1063 Results Found
The CCNAX - CCNA Routing and Switching Boot Camp is a great option to obtain Cisco Routing and Switching skills while pursuing the CCNA Routing and Switching certification.
This Microsoft and Global Knowledge 1-hour webinar event gives you an overview to the different Microsoft solutions for managing security in your organization. Explore how Microsoft provides a holistic approach to security, helping you to protect identities, data, applications, and devices across on-premises, cloud, and mobile.
Here's an introduction to encryption. What is it? Why do we need it? It's a complicated area, so we're here to help get your started. You'll understand the general function of three categories of mathematical ciphers: Symmetric, Asymmetric and Hashing.
Learn the ITIL® concepts of accountability, boundaries, and consistency (the ABCs) and discover how ITIL helps establish, manage, and maintain the ABCs.
This paper proposes a unifying model for project plans. A distinction will be made between the outputs of project planning and the project plan itself. The significance of this distinction is to allow projects of all types to be described at a high level, in a common language, regardless of the type of analysis used to develop the plan.
Resource management is always an issue in any project, especially when the stakeholders from whom we need time have operational duties to perform. If our requirements team was at our disposal 100 percent, always completed activities on target, and worked a full eight hour day without distraction or a loss of productivity, then estimating time would be simple. Here, we explore standard approaches to time estimation, the dangers of multi-tasking, and estimation alternatives, which consider work habits and productivity norms.
The amount of data being produced does not seem to show any sign of slowing; if anything, it may in fact be exceeding projected growth rates. As these absolute limitations on raw hardware capacity begin to be felt, the importance of looking at all of the aspects of a computing infrastructure in order to tackle the future's truly large-scale computing demands, is imperative. This white paper examines how IBM's initiatives like Linux, Cloud Manager with OpenStack and the OpenPower Foundation IBM are meeting this challenge.
The National Institute of Standards and Technology (NIST) created a cloud definition that has been well-accepted across the IT industry. NIST was mandated to assist government agencies to adopt cloud computing for their IT operations. As part of their mandate, NIST created multiple working groups to define cloud computing, its architecture, and requirements. In this paper we explore the center core of NIST's cloud definition.
How can organizations in diverse industries continue to use familiar waterfall practices and at the same time be more agile? The answer is to use program management that is designed to be agile.
The process of subnetting is both a mathematical process and a network design process. Mathematics drives how subnets are calculated, identified, and assigned. The network design and requirements of the organization drive how many subnets are needed and how many hosts an individual subnet needs to support. Binary basics and IPv4 address structure were covered in part one of this two-part paper.
End of year IT project spending has a higher chance of failure. Instead, invest your funds in the resources that manage and own the technology—your people. Learn how to choose the best IT training company for you at the last minute..
Managing the change of DataStage components can often become a test of wills. Picture fitting a square peg in a round hole, and you might start to get the idea. The complexity of what is required to promote components from one environment to another during the development, testing, and eventual implementation in the production environments, should be and is often a controlled activity.
Nearly every WebSphere administrator has desired a deeper understanding of how passwords are created, used, stored, and encrypted. Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.
When a decision matters, there are certain steps you will want to follow. In this white paper, we provide guidelines for approaching decisions. The steps in this white paper are a series of interconnected techniques used in problem analysis and decision making.
You know you need to invest in training, but how do you get the best return on investment (ROI) from your training dollars? To help you make smart training decisions, we've put together this guide, which illustrates some alternative and little-known payment options, the types of discounts and promotions available with training and a suggested list of courses that give you excellent value.
You have earned a CompTIA certification. The next step is to ensure that your certification remains current and valid. Some certifications are good for life, while others require renewal. Let’s look at what certifications require renewal, the options that you have for maintaining your certifications, and steps to get it done.
This Certification Prep Guide provides an overview of the current CompTIA Cloud+ certification and offers helpful tips that you can use when preparing for your CompTIA Cloud+ certification exam.
This Certification Prep Guide provides an overview of the current AWS Certified Solutions Architect – Associate certification and offers helpful tips that you can use when preparing for your AWS Architect certification exam.
This Certification Prep Guide provides an overview of the current MCSE: Cloud Platform and Infrastructure certification and offers helpful tips that you can use when preparing for your MCSE certification exam.
This Certification Prep Guide provides an overview of the current Google Cloud Platform (GCP) Certified Data Engineer certification and offers helpful tips that you can use when preparing for your GCP certification exam.
This Certification Prep Guide provides an overview of the current Google Certified Professional Cloud Architect certification and offers helpful tips that you can use when preparing for your GCP certification exam.
This Certification Prep Guide provides an overview of the current Project Management Professional (PMP)® certification and offers helpful tips that you can use when preparing for your PMP certification exam.
This guide provides an overview of the Security+ certification, including who the certification is for, how to earn and maintain it, the positive impact that it will have on your career, and options for advancement following your Security+ certification.
Virtualization is a constantly evolving process, with new platforms introducing tools every day that are designed to make the process of moving to the cloud simpler.
Cybersecurity has matured into a complex and diverse set of functions. Each of these functional specializations represent different roles requiring different knowledge, skills, and abilities.
As an IT security leader, you understand the importance of having and following corporate policies to protect and defend your systems and the assets that they retain. You and your security team work diligently to know the latest threats, prepare for possible intrusion, and harden your network.
Those who have never trained in a virtual classroom, or haven’t trained in one for years, may have some pre-conceived notions about online training – many of which are either wrong or out-of-date. To dispel any misconceptions, let’s explore eight common myths of virtual training and the truth behind each.
As it happens, this Silicon Valley effect is now being felt right across Canada. More and more of the “right people” in technology are choosing to make Montreal, Waterloo, Toronto, and Vancouver their places to grow. Let’s look at some of the reasons why.
For a project manager (PM) who has served as a military officer on a battalion or higher staff, the parallels between the military decision-making process (MDMP), the orders production process, and project management doctrine prescribed by the Project Management Institute (PMI) are difficult to ignore. Both the MDMP and the processes outlined in A Guide to the Project Management Body of Knowledge—Fifth Edition (PMBOK® Guide) are iterative in nature, allow for the introduction of changes to the original plan, assign tasks and responsibilities, and involve the concept of managing the scope of the operation or project.
Since Google favors LinkedIn when it comes to search results, keep that in mind if you're networking or job hunting. If a potential employer considers you for a position, don't think they aren't Googling you too.
If your organization has upgraded to Office 2016 or Office 365, you now have access to Excel 2016. Now what? Are there any new features? The answer is yes, especially if you need business intelligence tools and new ways to present your data.
In this series, we are looking at six things that can trip up project managers. We’ve covered the hazards of overcommitting, how to provide feedback, the importance of taking responsibility, staying focused, and what leading from the front can actually look like. Finally, we’ll take a look at handling team input.
Aside from plenty of laughs, the 1993 film “Groundhog Day” actually delivers powerful messages about change, love and the too-often-overlooked importance of being courteous to others. Phil is unable to break the time loop until he totally changes who he is. Unless you’re as selfish and heartless as Phil, you probably don’t require this type of transformation to break the repetition. But everyone could stand to make a few smaller changes to get the most out of life and your profession.
Bad or misinformation is all over the internet. Here are six tips to ensure you’re investing your time in quality and credible resources.
VMware software and products are popular among enterprises. However, they are also highly proprietary. So, unless you have had experience with VMware products, any experience with other software can only serve as a foundation for using vSphere and other software that VMware offers.
A Project Manager Professional (PMP) is an individual who has earned an industry-recognized project manager certification from the Project Management Institute (PMI).
Behind various Google services lies the powerful Cloud AI, a neural net-based, machine learning technology that Google has perfected for use with services like image search and voice recognition. Here are five ways you could use Cloud AI to improve your business.
Gaining access is the most important phase of an attack in terms of potential damage, although attackers don’t always have to gain access to the system to cause damage. For instance, denial-of-service attacks can either exhaust resources or stop services from running on the target system.
Salesforce’s third annual developers conference, TrailheaDX 2018, kicked off on March 28 in San Francisco with two days full of keynote addresses, product releases, 150+ technical sessions and fireside chats with Salesforce Chairman and CEO Marc Benioff and co-founder and CTO Parker Harris. And did I mention Stevie Wonder was there, too?
In this hands-on demonstration, you observe the configuration of IMS, Internet, SOS, and Admin DNN objects (Data Networks Name). These DNNs will then be assigned to several slice descriptors, showing how geography enters into slice implementation. You will then watch the slice configured on a working 5G network. View slide deck>>