Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By
Show Filters
Result Filters:

69 Results Found

Results per page: 10 40 80

Why is ITIL Important?

Video | Oct. 31, 2013

Michael Scarborough and Ryan Ballmer, co-authors of Global Knowledge ITIL courseware, discuss why ITIL is important to businesses.

Why All the Buzz About Containers on AWS, Google Cloud and Microsoft Azure?

White Paper | March 02, 2020

Examine the evolution from physical servers to VMs to containers and the driving factors behind this change. Also review the available container management solutions on AWS, Google Cloud Platform and Microsoft Azure. 

Why all the buzz about containers – AWS, Google, and Azure

Webinar – Recorded | March 09, 2020

This webinar covers the evolution from physical servers to VMs to containers and the driving factors behind this change. We explain why containers are useful in an enterprise environment and why they are so popular with developers and administrators. In addition, we list the available container solutions on AWS (Elastic Container Services – ECS, Elastic Kubernetes Services – EKS, and Fargate), GCP (Google Kubernetes Engine – GKE), and Azure (Azure Container Instances – ACI and Azure Kubernetes Service – AKS).   View the slide deck>

What You Don't Know About Cybersecurity CAN Hurt You

Webinar – Recorded | Oct. 21, 2014

The bad guys just keep getting better! No matter how much patching and tweaking we do, the bad guys' constantly changing tactics and techniques continue harming our networks, stealing and damaging data, and just generally screw things up. What motivates someone to do such terrible things in the first place? How have these hackers changed and improved? What kinds of attacks are popular now and why? In this hour-long webinar, security expert, former hacker and Global Knowledge instructor Phillip D. Shade will provide insight into understanding the latest hacking techniques, what the current threat landscape looks like, and suggested countermeasures to mitigate threats. He will include specific examples of the current threat landscape, including data mining, social engineering cyber threat terminology, man-in-the- middle attacks and Denial of Service (DoS) attacks.

Understanding the AIX Object Data Manager

White Paper | June 18, 2014

If you are coming to AIX from another UNIX system, the Object Data Manager (ODM) will be new to you. Fortunately, it is not so very complicated. This white paper explains how ODM is structured and how to use these databases in order to meet the goals the architects had for the ODM.

Understanding Google Cloud Platform: Architecture

White Paper | Nov. 20, 2017

Google Cloud Platform (GCP) is Google’s public cloud offering comparable to Amazon Web Services and Microsoft Azure. The difference is that GCP is built upon Google's massive, cutting-edge infrastructure that handles the traffic and workload of all Google users. There is a wide range of services available in GCP ranging from Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) to completely managed Software-as-a-Service (SaaS). We will discuss the available infrastructure components and how they provide a powerful and flexible foundation on which to build your applications.

Understanding AIX Logical Volume Management

White Paper | May 14, 2014

Like many UNIX operating systems, AIX uses the concepts of Logical Volume Management (LVM) in its data management architecture. This white paper explains the specifics of the AIX LVM and provides some tips and best practice recommendations to get the most from your AIX disk storage.

Types of Cloud Deployments

White Paper | June 23, 2015

Cloud computing is a big force in IT today, and it isn't going away. In fact, cloud adoption is going up geometrically, both for end users (think apps on your phone or tablet) as well as for organizations of all sizes. In fact, many smaller organizations may not have any on-premises infrastructure at all, other than networking infrastructure to get connected to the cloud. With this transformation in IT, it behooves all of us in the industry to understand it and adapt or risk being out of a job, like punch card operators.

Top Tech Trends and Predictions for 2020

Article | Dec. 06, 2019

Global Knowledge subject matter experts predict the top trends for 2020 in IT training, Microsoft, Cisco, AWS, cybersecurity and more.

Top Four Considerations When Choosing Your SoftLayer Data Center Location

White Paper | May 07, 2015

A range of factors can influence the data center you choose. You should consider all of the factors listed in this white paper before deciding where to place your servers.