361 Results Found
Whether you’re a beginner or intermediate Python developer, you’ll want to keep this guide close to your keyboard and Python editors. In it, you’ll find sample use cases for many of the most common language constructs and tasks that you’ll likely need to perform, such as reading a file or working with a database.
Experience a new way to master official Microsoft skills Watch the video above to see why the Microsoft On-Demand experience outperforms other self-paced learning options on the market. In less than 90 seconds, view a demonstration of all Microsoft On-Demand features including HD-quality streaming videos, hands-on live labs, assessments and 24/7 mentoring. Microsoft On-Demand is available as individual digital training courses for three months or as the complete Microsoft Total Access Collection of all applicable courses for 12 months.
Critical thinking allows us to take control of our thinking rather than letting it become hijacked by convenience, mindset, assumptions and bias. This white paper will walk you through understanding the implications of inputs (data) and influences (bias) to the reasoning process. You will learn how to develop a questioning outlook and quality standards that will lead you to make more effective decisions.
Cyber resilience is becoming a bigger issue for all organizations. But what does “good cyber resilience” look like? And how do you get there?
The annual Global Knowledge IT Skills and Salary Report is here. Our comprehensive report draws data from over 10,000 North American respondents where we provide insight into salary trends, must-have skills and sought-after certifications. Don't miss an opportunity to start future-proofing your career today.
Analyzing data in real-time can seem impossible – yet real-time data is often where the value lies for Internet of Things (IoT) businesses. How do we harness that value? Cisco Fog Computing. Fog provides real-time visibility into the data collected and the cloud, where that information is archived, substantially reducing the amount of time required to gather and analyze data. It’s an example of efficiency and automation working together. Join the Cisco IoT Pathfinder webinar on Cloud and Fog Computing for a free interactive training session on how it is used within the IoT.
Leadership is evolving beyond traditional leadership skills, and it has never been so important. In an era of constant change, digital disruption, increased employee expectations and rising business complexity, today’s leaders require more than the fundamentals. In years past, leadership development focused on helping leaders set performance expectations, communicate effectively, provide feedback, coach and motivate their employees. While these skills remain important, they are no longer sufficient to meet the business requirements of the 21st century. Leaders now require skills and competencies to ensure that they also build highly productive teams, accelerate organizational results and transform customer experiences in a fast-paced, highly competitive and global working environment. In this hour-long webinar, leadership consultant Kim Caughlin will reveal and discuss the new high-demand skills and competencies required to lead effectively in the 21st century.
The Internet of Things (IoT) isn’t primarily about things, it’s about data. Huge amounts of data. The key is turning that data into actionable insights. With those insights companies are able to better operate their systems, streamline automation, and respond to threats seamlessly. Success requires new workforce skills and Global Knowledge and Cisco are providing a unique opportunity for you to learn about the increasing needs of IoT professionals focusing on data and analytics.
In the digital age, people and intellectual property have supplanted physical assets as the most important criteria for determining the value of an organization. It is the employees who develop the next big product or improve the practices, processes, services and internal culture that add significant value to an organization.
Everything from wearables and smart homes to drones and ad blockers could be increasingly susceptible to hackers in 2016, according to cybersecurity expert James Michael Stewart. In this white paper, Stewart predicts that a wide range of disastrous data breaches will occur this year as hackers have adapted to the latest technologies to automate attacks on today's devices and software.