9 Results Found
The 2021 revised and updated version CISSP (Certified Information System Security Practitioner) certification exam will be released on May 1, 2021. This new version of the popular CISSP exam will include a modest revision and re-organization of previously included topics, but will integrate a significant number of new topics.
Watch this recorded webinar to understand the basics of the Risk Management Framework (prescribed by NIST Standards) and how to begin to apply it.
It’s inevitable. At some point in your career, you’ll find yourself working alongside individuals who fall into the general category of “Difficult People.” The effects these people can have on an organization vary greatly but usually involve many problems for the team. This white paper describes some of the more common types of difficult people and provides you with tips on how to handle them.
The key difference between hubs, switches and bridges is that hubs operate at Layer 1 of the OSI model, while bridges and switches work with MAC addresses at Layer 2 of the OSI model.
Kubernetes automates container management. The process of container orchestration is so complex that trying to manage containers by hand has become impossible. There are many, components to container orchestration, but one of the most misunderstood is networking. In this 1-hour webinar we’ll explore how k8s actually performs IP networking and service discovery, two of the most critical components for successfully delivering microservices. We’ll examine how kubernetes carries the burden of cloud networking and lastly what it takes to pass the CKAD/CKA Certifications.
IT Professionalism Europe (ITPE) and Global Knowledge jointly hosted online public “Tech Talk” on Ethics and Artificial Intelligence. Two leading speakers in the field, Dr. Anna Jobin of the Health Ethics & Policy Lab at ETH Zurich and Dr. Lorien Pratt, Chief Scientist and co-founder of Quantellia in Silicon Valley will be sharing their insights. The discussion includes ethical dimensions to artificial intelligence (AI) and why ethics are fundamental to AI research and implementation. They also explore ethical requirements, standards, and best practices that underpin the future of AI.
Whether you’re a beginner or intermediate Python developer, you’ll want to keep this guide close to your keyboard and Python editors. In it, you’ll find sample use cases for many of the most common language constructs and tasks that you’ll likely need to perform, such as reading a file or working with a database.
If any of the following reminiscences ring true to you, have you moved beyond them? If not, it might be time to make some new discoveries.
The process of learning how to subnet IP addresses begins with understanding binary numbers and decimal conversions along with the basic structure of IPv4 addresses. This paper focuses on the mathematics of binary numbering and IP address structure.