Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Topics

Show Filters
Result Filters:

25 Results Found

Results per page: 10 40 80

The Basics of Computer Networking

Webinar – Recorded | May 17, 2019

Networks are as different as the people and organizations that use them. Despite those differences, there are some foundational components that all networks share. This session will explore different types of networks and the common components that must exist in these networks.

Cisco LAN Switching Fundamentals

Webinar – Recorded | May 09, 2019

This recorded webinar will help you understand the basics of switch functionality in Cisco networks. In this setting, a SWITCH is functioning at OSI Layer 2. Before SWITCHES we used BRIDGES to segment within the same network.

Four Reasons Why a DevOps Approach Complements ITIL

Article | Dec. 07, 2017

Unlike ITIL, DevOps is more of a philosophy than a formal framework. DevOps, which is short for Collaboration between Development and Operations, arose as a movement within IT best practices when IT managers began to realize that something needed to be done to close the communications and collaboration gap between development groups and support operations staff. After some time and examination, it became clear that there was no inherent conflict between the DevOps movement and ITIL—the two, in fact, are quite complementary.

How Data is Delivered

Article | Sep. 21, 2017

Every second of every day, data is being sent and received. Billions of data packets are processed by your company’s network every day. In fact, you received dozens of packets just to read this article, but the vast majority of us have no idea how this works. People have no clue as to what goes on behind the scenes to ensure data actually gets to the right device.

Cloud, DevOps and IoT Trends to Watch for in 2017

Article | May 01, 2017

Get an insider’s take on 2017 cloud computing, DevOps, and Internet of Things (IoT) trends from an industry expert.

Global Knowledge Guide to Python

Special Report | Aug. 08, 2016

Whether you’re a beginner or intermediate Python developer, you’ll want to keep this guide close to your keyboard and Python editors. In it, you’ll find sample use cases for many of the most common language constructs and tasks that you’ll likely need to perform, such as reading a file or working with a database.

Business Process Modeling: From Macro to Micro

Webinar – Recorded | Nov. 12, 2015

Business processes are complicated, and mapping them is not a trivial task. Modelling standards give us the tools to model complex processes, but they do not tell us the best way to approach a model or effectively use the tool. In this hour-long webinar, Global Knowledge instructor Rod Fage will guide you through the best way to develop a model, from determining the goal and scope of the process and measuring its effectiveness, to modelling the process in a hierarchical top-down approach, enabling business analyst to continuously validate the model.

Insider Tips on Microsoft SQL Server 2016

Webinar – Recorded | Aug. 20, 2015

In this hour-long webinar, Global Knowledge course director Brian Egler will examine key new features of Microsoft SQL Server 2016 that demonstrate how it provides automatic end-to-end security, seamless generation of business analytics and elastic integration of data in the cloud.

Are You Ready for Microsoft SQL Server 2016?

White Paper | Aug. 19, 2015

With Microsoft SQL Server 2016, you can distribute your data to the cloud using the Stretch Database feature to improve local access while allowing cloud access to large amounts of historical data. You can also provide transparent end-to-end security using Always Encrypted technology and track changes automatically through temporal data. Download this white paper to learn why these features and more make SQL Server 2016 Microsoft's most important release to date.

How To Protect Data in Flight

Article | April 28, 2015

Accessing cloud-based resources, whether they be IaaS/PaaS/SaaS-based, is very convenient. With a browser and Internet connection, you are up and running. No driving to your work office, no need to log into the corporate network. Just open up your web browser and go. This convenience, however, comes with a security risk. All of your business work is conducted over an insecure communication network. Unlike your office network, where the network link between you and the data center is under corporate control and is physically secure, the cloud access link is over the Internet.