17 Results Found
This article addresses non-technical skills you need to do to be a success in IT.
General character attributes every IT pro should have and on the things that every IT pro should know or do.
Every second of every day, data is being sent and received. Billions of data packets are processed by your company’s network every day. In fact, you received dozens of packets just to read this article, but the vast majority of us have no idea how this works. People have no clue as to what goes on behind the scenes to ensure data actually gets to the right device.
To help you stay ahead of the game, here are ten IT skills that are on the brink of extinction.
It’s inevitable. At some point in your career, you’ll find yourself working alongside individuals who fall into the general category of “Difficult People.” The effects these people can have on an organization vary greatly but usually involve many problems for the team. This white paper describes some of the more common types of difficult people and provides you with tips on how to handle them.
Resource management is always an issue in any project, especially when the stakeholders from whom we need time have operational duties to perform. If our requirements team was at our disposal 100 percent, always completed activities on target, and worked a full eight hour day without distraction or a loss of productivity, then estimating time would be simple. In this paper, we explore standard approaches to time estimation, the dangers of multi-tasking, and estimation alternatives, which consider work habits and productivity norms.
The Toronto Chapter of the Association of Change Management Professionals (ACMP), in partnership with Global Knowledge, welcomes Kelly Norgate to share information about her success in leading change with powerful change communication strategies. In this hour-long webinar, Norgate will examine the link between creative change communication solutions and great corporate culture. You will learn practical change communications strategies and tactics that generate the energy and commitment required to get employees on board with transformational change. Take your next change communication plan from good – to great.
Business processes are complicated, and mapping them is not a trivial task. Modelling standards give us the tools to model complex processes, but they do not tell us the best way to approach a model or effectively use the tool. In this hour-long webinar, Global Knowledge instructor Rod Fage will guide you through the best way to develop a model, from determining the goal and scope of the process and measuring its effectiveness, to modelling the process in a hierarchical top-down approach, enabling business analyst to continuously validate the model.
If any of the following reminiscences ring true to you, have you moved beyond them? If not, it might be time to make some new discoveries.
Accessing cloud-based resources, whether they be IaaS/PaaS/SaaS-based, is very convenient. With a browser and Internet connection, you are up and running. No driving to your work office, no need to log into the corporate network. Just open up your web browser and go. This convenience, however, comes with a security risk. All of your business work is conducted over an insecure communication network. Unlike your office network, where the network link between you and the data center is under corporate control and is physically secure, the cloud access link is over the Internet.