Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Show Filters
Result Filters:

22 Results Found

Results per page: 10 40 80

2020 15 Top-Paying Certifications

Article | Aug. 16, 2021

Look back at the some of the highest paying IT certifications of 2020.

Most Popular and Most Pursued IT Certifications by Women in Tech

Article | March 04, 2020

According to the Global Knowledge IT Skills and Salary Report, women make up 16% of the tech workforce, and an even smaller percentage (8%) are at the senior or executive level. Here’s an overview of the most popular and most pursued certifications by women in tech.

Top Tech Trends and Predictions for 2020

Article | Dec. 06, 2019

Global Knowledge subject matter experts predict the top trends for 2020 in IT training, Microsoft, Cisco, AWS, cybersecurity and more.

New and Emerging Certifications for 2019

Article | Aug. 10, 2019

Looking ahead at new and emerging certifications provides insight into the areas deemed valuable in the IT industry. If you are an early adopter or in a position where you need to show that you have the bleeding-edge expertise of a technology, this list of recent and upcoming certifications is for you. 

Software Problems and How Docker Addresses Them

White Paper | Jan. 12, 2016

Learn how Docker makes it easy to update, test and debug software with this white paper and gain foundational knowledge about Dockerfile, Docker images and containers.

15 Top-Paying Certifications for 2016

Special Report | Jan. 01, 2016

Which mainstay certifications should be in your list of credentials? What's the next up-and-coming certification? This article will help you answer both questions by providing a review of the 15 top-paying certifications.

IBM Cloud TechTalks (Part 4 of 4): Maximizing Business Agility with Cloud on a z System

Webinar – Recorded | Nov. 12, 2015

Cloud can be described as the ability for users to provision new environments and/or services in a self-service fashion backed by automation. z Systems use technologies that best allow us to apply the strengths of our platform to cloud methodologies while complying with industry standards and preserving the security and manageability of our platform. This enables us to use the strengths of z Systems scalable multitenant architecture for on-premise cloud deployments. z Systems can also expose valuable enterprise services in a secure manner that feels native to mobile and Web application developers, enabling organizations to use enterprise services on z Systems with a frictionless experience for distributed developers.

Technology Offers Convenience, Privacy Pays the Price

White Paper | Sep. 25, 2015

Technology is a wonderful thing, but it comes with a price: cybersecurity. Free Web browsers, social media sites and other digital services collect personal information like email addresses, phone numbers, place of employment, buying habits, mortgage data that is shared with advertisers. The availability of this information leaves us vulnerable to hackers. This white paper can help you learn more about what kind of personal data is typically collected, and how to secure your information online.

IBM Cloud TechTalks (Part 3 of 4): Taking Your Power System Higher in the Cloud

Webinar – Recorded | Sep. 17, 2015

Do you want to take your Power System to higher levels of cloud functionality but don't know what's available? Join us for this free webinar, presented by IBM and sponsored by Global Knowledge, to hear senior power cloud consultants Vess Natchev and Kyle Wurgler share an exciting new cloud solution for Power Systems. In this interactive webinar, you'll gain insight on the details and features of the new cloud solution from IBM and VMware.

Data Breaches: What Can and Cannot Be Done

White Paper | Aug. 23, 2015

Experts agree that as long as there is data, there will be people trying to steal it. For every defense mechanism put in place, there is someone who will find a way to get around it. Constant vigilance, education of the workforce, and management support are all necessary to implement effective security policies. While a well-trained IT staff is key to protecting data, all employees must understand the importance of protecting company assets, including data.