Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By
Show Filters
Result Filters:

13 Results Found

Results per page: 10 40 80

An Introduction to Agile: The New Mainstream Approach to Software Delivery

Webinar – Recorded | July 10, 2014

With Forrester Research declaring "Waterfall processes have become obstacles to speed, quality and predictability," and more than 85% of CIO's surveyed by CIO Magazine using or planning to pursue Agile practices in 2014, this one-hour webinar will explore the basics of Agile and why so many organizations are adopting Agile methods.

An Introduction to TOGAF®, The Open Group Architecture Framework

Webinar – Recorded | Aug. 11, 2015

In this hour-long webinar, IT service management expert Nasser El-Batal will introduce you to the TOGAF framework. You will learn about its business benefits, critical factors for implementation success, and TOGAF's relationship to and integration with other best practices.

Can Use Cases Really be Used in an Agile Environment?

Webinar – Recorded | Oct. 17, 2013

Agile is a set of principles requiring a significant cultural shift, new paradigms in thinking and team organization. Over the years, Agile has become "productized" or in many cases "institutionalized", creating different flavours and levels of commitment among teams and organizations. Along the way, managers and team members have lost sight of Agile's principles and tried to enforce the use of certain tools and structure where they may not belong. In this one hour webinar, Perry McLeod will explain how tools such as use cases can be successful in an agile environment, provided the principles of agile are always active in the minds of the managers and the team members that are using them. Join Perry to determine whether or not making the cultural shift towards the use case method in an agile environment is the right move for you and your organization.

DevOps: The Future of ITSM and ITIL

Webinar – Recorded | June 19, 2014

Cloud computing enables development teams to get applications into production faster. IT Service Management (ITSM) leaders must adopt new strategies and change existing processes or risk becoming a barrier to success. Cloud computing requires DevOps-the blending of development and operations with the goal of accelerating time-to-market and reducing time-to-value. The good news is that ITIL® is uniquely positioned to accelerate DevOps, but it requires changes to existing ITSM processes.

Enhancing the Value of ITIL® and TOGAF®

Webinar – Recorded | Aug. 29, 2013

Traditionally, ITIL and TOGAF professionals have been part of different teams within an organization. Due to the ongoing alignment of business and IT, these professionals now often find themselves on the same team. Because of this crossover, there is a growing trend towards organization of work based on multiple best practice models. 

Get Your Best Practices in Order: ITSM and Your Organization

Webinar – Recorded | June 24, 2014

Nasser El-Batal will walk you through the most useful, recognized, and mandated ITSM best practices in the industry: TOGAF, COBIT and ITIL®. He will highlight the benefits of integrating them into a single implementation program to avoid project disaster. Discussions are focused on "Getting Your House in Order" and how to establish your own organization-specific business transformation program, while increasing your organization maturity.

Insider Tips on Microsoft SQL Server 2016

Webinar – Recorded | Aug. 20, 2015

In this hour-long webinar, Global Knowledge course director Brian Egler will examine key new features of Microsoft SQL Server 2016 that demonstrate how it provides automatic end-to-end security, seamless generation of business analytics and elastic integration of data in the cloud.

Protect Software Applications with IBM Security AppScan

Webinar – Recorded | May 28, 2015

Nowadays, you can read weekly articles about security attacks and stolen data. Even leading companies and organizations are victims of cybercrime. Attacks can include breaches at three levels: the physical level, which includes social engineering, system and network and applications (e.g., web and mobile). In this complimentary webinar, you will discover the benefits of using automated solutions to detect application vulnerabilities, provide steps to remediate them and avoid costly compliance violation.

Python – The World’s Most Useful Language

Webinar – Recorded | Jan. 21, 2020

This webinar will discuss our Python offerings and how it is proving to be the language of Data Science, Artificial Intelligence and Deep Learning. View the slide deck>

Secure Your SQL Server Today!

Webinar – Recorded | Feb. 05, 2014

Your Microsoft SQL Server database often contains the most valuable information in your organization. Get tips for securing it properly and effectively in this free, information-packed webinar with Microsoft SQL Server expert Gidget Pryor. In just an hour, Gidget will demonstrate the layered security approach used by SQL Server. She will step you through the process and best practices of setting up logins, users, roles, schemas, and permissions, and she will review the security model changes that have taken place from SQL Server 2005 through SQL Server 2012. She will also review SQL Server 2012 training and certifications.