Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By
Show Filters
Result Filters:

178 Results Found

Results per page: 10 40 80

Cisco Call Manager vs. Call Manager Express

Video | July 05, 2012

Global Knowledge Course Director and Lab Topology Architect Joey DeWiele, a specialist in Unified Communications, explains the difference between Cisco's Call Manager Express & Call Manager.

Seven Security Myths of Windows 7

White Paper | May 10, 2012

Network security is everyone's concern, and this applies to computer security as well. Many security breaches occur due to user ignorance of basic security principles, not malicious intent. Network and computer security are like an onion - there are multiple layers. Good security begins with understanding what you can do to keep your systems safe and implementing a layered approach. If you depend on one program or feature to secure your computer, then when (not if, but when) that dependency is breached, you may have personal information stolen or even have your computer taken over.

Incident Management Process Flow – Which Comes First, Categorization or Initial Diagnosis?

Article | April 18, 2012

What's the correct sequence of activities for handling an incident? Find out why categorization occurs before initial diagnosis in the ITIL incident management process flow so you can answer this common ITIL Foundation exam question.

Defining QOS (Quality of Service)

Video | March 15, 2012

Global Knowledge Course Director and Lab Topology Architect Joey DeWiele, a specialist in Unified Communications, explains QoS.

Go Further with Microsoft Certification

Video | March 15, 2012

The 'Go Further' video is an testimonial to the value of Microsoft Certification as a validation of technical skills. Whether you're just starting your IT career, or looking to advance it, certification can make a huge impact. Take a look at the video, and hear the stories of real MCPs.

ITIL 2011: How Many Processes?

Article | Jan. 11, 2012

As long as I've been involved in service management, one of the perennial debates that's really never been resolved focuses around how many discrete processes ITIL describes. No such single list exists in the ITIL core books. However, section 4.1 of each of the ITIL 2011 core books shows the processes described within that specific book. When we deliver accredited ITIL training, if it is describe in section 4.1 of any of the ITIL core books, then it is considered a "process".

T-SQL Basics: Anatomy of the Select Statement

Article | Sep. 19, 2011

Relational databases are important not only because of the information they store but, more importantly, for the data we retrieve from them. The select statement allows us to ask the database a question. It’s the way we retrieve information from the database system.

ACUCW1 or ACUCW2 - Which Course is Right for You?

Video | July 21, 2011

Global Knowledge Course Director and Lab Topology Architect Joey DeWiele, a specialist in Unified Communications, explains the difference between our Cisco Unified Communications courses - ACUCW1 & ACUCW2.

Troubleshoot Domain Controllers with Dcdiag.exe

Article | Feb. 15, 2011

Dcdiag is an often overlooked tool that can discover problems in a domain controller’s configuration. If client computers can't locate a domain controller or if domain controllers can't replicate Active Directory, you can run tests with Dcdiag to look for a solution.

Djoin.exe Simplifies and Automates Joining Computers to a Domain

Article | Sep. 14, 2010

Adding a new computer to an Active Directory domain can be a disruptive process, particularly if that computer is part of a large, high-speed deployment. Djoin.exe is a command line tool that permits the joining of a Windows 7 or Server 2008 R2 computer to Active Dir...