Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Brands

Show Filters
Result Filters:

19 Results Found

Results per page: 10 40 80

Develop Your Skills with Unlimited Access to Red Hat Online Learning

Webinar – Recorded | Jan. 31, 2019

The Red Hat® Learning Subscription delivers 12-months of unlimited access to all Red Hat Online Training courses. The Standard RHLS subscription is a higher tier with access to 5 certification exams and up to 2 retakes.

Cisco Products that Strengthen Software-Defined Network Solutions

Article | Jan. 22, 2019

In support of software-defined networking, Cisco has introduced several products to strengthen networks and meet the increased demand for flexible and cost-efficient solutions. The Cisco SDN solution in the data center is ACI. Outside the data center the primary Cisco solution is DNA.

What is Software-Defined Networking?

Article | Jan. 15, 2019

Software-defined networking (SDN) is a solution that will enable your organization to meet the demands of network programmability and automation. The result will be greater network agility to support new applications while complying with increasing security needs.

Manage Your Time and Team with Microsoft Teams

Webinar – Recorded | Nov. 28, 2018

Watch this recorded webinar to learn about Microsoft Teams. Our industry expert will show you what Microsoft Teams can do for your team and how it can help you manage your time more effectively. In this 45 minute webinar, you will see what Microsoft Teams can offer you and your organization and how you can use it.  

Cisco Unified Collaboration Solutions Infrastructure Overview

White Paper | Sep. 25, 2015

The Cisco Unified Collaboration solutions offer anytime, anywhere access for organizations who need instant access to clients, vendors and remote employees. Cisco products enable authorized external users to connect to corporate resources, create different user groups and manage large scale deployments. Learn how Cisco Unified Collaboration infrastructure products can help you provide everything from call control which provides signaling and dial plan support to the expressway series providing firewall traversal for external access.

Cisco Collaboration Endpoints

White Paper | Sep. 17, 2015

Your clients, vendors and workforce don't always operate in the same building, state or country. Cisco Collaboration Endpoint products make communicating with your counterparts across town or on the other side of the world easy. This white paper provides you with product specifications and capabilities for Cisco's phone, desktop, and large screen immersive videoconferencing options.

Collaboration Systems Release 10.6 Features Overview

White Paper | June 19, 2015

Cisco Collaboration Systems Release (CSR) 10.6, along with CUCM 10.5(2), enhances the user and administrator experiences and interactions. In many cases, a change to one product may necessitate changes to other products. For example, where the deployment options for video conference control changed to place all control behind the Telepresence Conductor, Cisco Prime Collaboration management tools had to be updated to reflect this new deployment approach. As new endpoints are added, CUCM and Prime Collaboration both needed to be updated to reflect the new endpoints.

Cisco Collaboration Certifications Overview

White Paper | June 09, 2015

On February 17, 2015, Cisco announced changes to the existing voice and video certifications and detailed the new collaboration certification portfolio. This white paper provides an overview of the changes to Cisco certifications with respect to voice and video, outlining dates, and deadlines that may affect your certification process.

Protect Software Applications with IBM Security AppScan

Webinar – Recorded | May 28, 2015

Nowadays, you can read weekly articles about security attacks and stolen data. Even leading companies and organizations are victims of cybercrime. Attacks can include breaches at three levels: the physical level, which includes social engineering, system and network and applications (e.g., web and mobile). In this complimentary webinar, you will discover the benefits of using automated solutions to detect application vulnerabilities, provide steps to remediate them and avoid costly compliance violation.

What You Don't Know About Cybersecurity CAN Hurt You

Webinar – Recorded | Oct. 21, 2014

The bad guys just keep getting better! No matter how much patching and tweaking we do, the bad guys' constantly changing tactics and techniques continue harming our networks, stealing and damaging data, and just generally screw things up. What motivates someone to do such terrible things in the first place? How have these hackers changed and improved? What kinds of attacks are popular now and why? In this hour-long webinar, security expert, former hacker and Global Knowledge instructor Phillip D. Shade will provide insight into understanding the latest hacking techniques, what the current threat landscape looks like, and suggested countermeasures to mitigate threats. He will include specific examples of the current threat landscape, including data mining, social engineering cyber threat terminology, man-in-the- middle attacks and Denial of Service (DoS) attacks.