145 Results Found
You know you need to invest in training, but how do you get the best return on investment (ROI) from your training dollars? To help you make smart training decisions, we've put together this guide, which illustrates some alternative and little-known payment options, the types of discounts and promotions available with training and a suggested list of courses that give you excellent value.
By using and implementing a many-to-many relationship in a cube, existing tables with user account information can be used directly to secure cube contents, rather than converting to role based security in the cube. You can also secure your analysis services more easily and access sensitive information contained within it.
In this video, instructor Glenn Weadock demonstrates how Group Policy settings can control new user interface features such as the Taskbar, and resuscitate obsolete features such as classic menus in Windows Explorer.
As a power user, find out if you're ready for the SharePoint Site Collection and Site Administration class and how it can benefit your organization.
In this video, you will learn how to a use a new feature of SQL Server 2008 called Transparent Data Encryption for enhanced security.
Many experts agree that memory is the most important resource with regard to SQL Server performance. There are hundreds of performance counters, and therefore, it can be complex to figure out just what to monitor. Here are some suggestions in understanding whether memory pressure might be the performance problem with your SQL Server.
In this video, you will learn about the High Availability options in SQL Server 2008: Server Clustering, Database Mirroring, Log Shipping and Peer-to-Peer Replication.
One of the most difficult concepts for me as I was learning database syntax was joins. Of course, I tried reading and understanding articles and books that dealt with this topic. In almost every case, I was faced with the Venn diagram examples.
Chief Technical Architect Craig Brown discusses the Windows 7 certification and skills tracks available to Global Knowledge students.
New in Windows Server 2012 is the Unified Remote Access (URA) role. In Windows Server 2008 R2, DirectAccess and Routing and Remote Access Service (RRAS) were two separate roles. In fact, they could not be co-located on the same server. In Windows Server 2012, DirectAccess and RRAS can be co-located, allowing for what is now legacy remote access VPN client connectivity (L2TP/IPsec, PPTP, and SSTP). This means that the Unified Remote Access provides DirectAccess, Remote Access VPN, and site-to-site VPN and can now serve as your complete remote access solution.