174 Results Found
SOA is all about architecture-after all, it's right there in the acronym-yet most organizations think it is about turning existing software components into web services. When you adopt SOA, remember that it is all about design and governing that design. It's about how you design your service interfaces, your services, your data model, and your business processes. It's about how you keep track of your services, how you control the design, definition, deployment, and distribution of your services and their artifacts, how you define a service contract and service level agreement for your service consumers, how to secure your services, and how to react when things go wrong with them.
One of the most difficult concepts for me as I was learning database syntax was joins. Of course, I tried reading and understanding articles and books that dealt with this topic. In almost every case, I was faced with the Venn diagram examples.
Chief Technical Architect Craig Brown discusses the Windows 7 certification and skills tracks available to Global Knowledge students.
Course director Jim Thomas explains how our custom labs, which utilize external hosts, ISR routers, and DMZ, provide a real-world environment for students.
New in Windows Server 2012 is the Unified Remote Access (URA) role. In Windows Server 2008 R2, DirectAccess and Routing and Remote Access Service (RRAS) were two separate roles. In fact, they could not be co-located on the same server. In Windows Server 2012, DirectAccess and RRAS can be co-located, allowing for what is now legacy remote access VPN client connectivity (L2TP/IPsec, PPTP, and SSTP). This means that the Unified Remote Access provides DirectAccess, Remote Access VPN, and site-to-site VPN and can now serve as your complete remote access solution.
There exists a need to properly read, deploy, and examine the results of Group Policy. By its architecture, Group Policy Deployment to the Clients or Servers can be erratic and latent, or even non-existent throughout your Enterprise Organization, frustrating Administrators who are rolling out the Group Policy to Client or Server computers. To help mitigate this behavior, I compiled these insights into a two part series from real-world examples, experiences, and fixes that have worked for me. I know that these Tips and Tricks will work for you, too.
Learning how to program and develop for the Hadoop platform can lead to lucrative new career opportunities in Big Data. But like the problems it solves, the Hadoop framework can be quite complex and challenging. Join Global Knowledge instructor and Technology Consultant Rich Morrow as he leads you through some of the hurdles and pitfalls students encounter on the Hadoop learning path. Building a strong foundation, leveraging online resources, and focusing on the basics with professional training can help neophytes across the Hadoop finish line.
Some of you might just be starting out as a database administrator and need to know what a basic Transact-SQL query is for Microsoft SQL Server 2012, others might already be creating database objects. Either way, we put together a list of a few terms regarding Microsoft SQL Server that any database administrator should know.
Network security is everyone's concern, and this applies to computer security as well. Many security breaches occur due to user ignorance of basic security principles, not malicious intent. Network and computer security are like an onion - there are multiple layers. Good security begins with understanding what you can do to keep your systems safe and implementing a layered approach. If you depend on one program or feature to secure your computer, then when (not if, but when) that dependency is breached, you may have personal information stolen or even have your computer taken over.
IT departments have multiple opportunities and challenges as a result of the Bring Your Own Device (BYOD) invasion. The most common opportunity is to reinforce enterprise network security from both the inside and the outside. Supporting BYOD also offers more monitoring and tracking of activities that provide a more detailed view of network traffic flow. Alternatively, it will be a challenge for some IT departments to give up control over which devices may access their enterprise network. Another challenge will be to have the users doing configurations for network access, which adds human error to a crucial part of the process. The opportunities and challenges BYOD represents are real. Enterprises must make their network infrastructure BYOD ready to meet the onslaught.