174 Results Found
One of the most difficult concepts for me as I was learning database syntax was joins. Of course, I tried reading and understanding articles and books that dealt with this topic. In almost every case, I was faced with the Venn diagram examples.
Chief Technical Architect Craig Brown discusses the Windows 7 certification and skills tracks available to Global Knowledge students.
New in Windows Server 2012 is the Unified Remote Access (URA) role. In Windows Server 2008 R2, DirectAccess and Routing and Remote Access Service (RRAS) were two separate roles. In fact, they could not be co-located on the same server. In Windows Server 2012, DirectAccess and RRAS can be co-located, allowing for what is now legacy remote access VPN client connectivity (L2TP/IPsec, PPTP, and SSTP). This means that the Unified Remote Access provides DirectAccess, Remote Access VPN, and site-to-site VPN and can now serve as your complete remote access solution.
There exists a need to properly read, deploy, and examine the results of Group Policy. By its architecture, Group Policy Deployment to the Clients or Servers can be erratic and latent, or even non-existent throughout your Enterprise Organization, frustrating Administrators who are rolling out the Group Policy to Client or Server computers. To help mitigate this behavior, I compiled these insights into a two part series from real-world examples, experiences, and fixes that have worked for me. I know that these Tips and Tricks will work for you, too.
Organizations that plan for and conduct supplier management according to defined processes and boundaries are more likely to receive predictable, high-quality goods and services from their suppliers in a timely manner.
Some of you might just be starting out as a database administrator and need to know what a basic Transact-SQL query is for Microsoft SQL Server 2012, others might already be creating database objects. Either way, we put together a list of a few terms regarding Microsoft SQL Server that any database administrator should know.
Previously I discussed service providers and their risks in the example of my involvement with a landscaping company. ITIL clearly states that services, “…deliver value to customers by facilitating outcomes customers want to achieve…” However, sometimes organizations and people focus on outputs as opposed to outcomes, which sacrifices some of the value of the service. This leads to a question, what is the difference between an outcome and an output?
Network security is everyone's concern, and this applies to computer security as well. Many security breaches occur due to user ignorance of basic security principles, not malicious intent. Network and computer security are like an onion - there are multiple layers. Good security begins with understanding what you can do to keep your systems safe and implementing a layered approach. If you depend on one program or feature to secure your computer, then when (not if, but when) that dependency is breached, you may have personal information stolen or even have your computer taken over.
What's the correct sequence of activities for handling an incident? Find out why categorization occurs before initial diagnosis in the ITIL incident management process flow so you can answer this common ITIL Foundation exam question.
The 'Go Further' video is an testimonial to the value of Microsoft Certification as a validation of technical skills. Whether you're just starting your IT career, or looking to advance it, certification can make a huge impact. Take a look at the video, and hear the stories of real MCPs.