128 Results Found
The results are in from the 2nd Annual Global Knowledge and TechRepublic IT salary survey. With over 14,150 responses, our 2009 report is one of the industry's most relevant and revealing IT salary surveys. Our 2009 salary search revealed an average increase of 10% nationally over our 2008 salary study. Learn the top paying salaries for IT jobs based on state, industry, certification, and more.
If you create presentations using the notes feature in PowerPoint, you probably have found yourself wanting to print multiple slides on one page (handouts) with the notes associated with those slides displayed on the same page. This layout can often help you better p...
Exchange 2010 builds upon the significant changes to the transport that were made in Exchange 2007. In this article, I'll review the transport pipeline and routing components and list some of the new architectural and administrative enhancements to the Exchange 2010...
Microsoft SQL Server has evolved over the years as a scalable, robust database management system and is now competing in the VLDB (Very Large Database) space with Oracle and IBM. The market share for the product continues to grow, based on total cost of ownership and ease of use. This white paper outlines some of the important fundamentals of Microsoft SQL Server 2008 that every DBA should know.
Recently, I was asked the following question: “We plan to implement Windows 7 in our network very soon. We want to use Windows 2003 Domain Controllers for the next couple of years. Can we make the hundreds of new Group Policy setting available to Windows 7 Windows Server 2003 DCs?” This is not an unusual situation. Some organizations find they need to replace their desktop computers immediately because of age or obsolescence and others wish to upgrade to Windows 7 because of its superior security and performance. But there may be no budget or desire to upgrade to Windows 2008 or 2008 R2. Luckily, it is not difficult to adapt Server 2003 to work with Windows 7.
Windows 7 can be a good file server on very small workgroup networks. Although Windows 7 is limited to only 10 concurrent client connections as a file server it can do a good job making files accessible over a network. Windows 7 shares a great deal of code with Windo...
Even in professionally managed network environments it is still possible for mistakes to happen. If an Active Directory object such as a user or computer account is accidentally deleted network access will be lost. Worker productivity will decline until the account...
Windows Vista introduced AERO, a desktop experience that had four major elements; Windows Flip, Windows Filmstrip, AERO Glass transparency and fully realized thumbnail views on the Taskbar. Windows 7 added several new features to AERO, including AERO Snap, AERO Shake...
Windows Software Update Services (WSUS) is commonly used to distribute security patches and updates for Windows operating systems and Microsoft applications. WSUS is a web application that runs within Internet Information Services (IIS) on Windows Server. When client...
Adding a new computer to an Active Directory domain can be a disruptive process, particularly if that computer is part of a large, high-speed deployment. Djoin.exe is a command line tool that permits the joining of a Windows 7 or Server 2008 R2 computer to Active Dir...
Your company has finally migrated to Windows 7. Congratulations! And now you have your first support call. This Microsoft white paper will tell you all you need to know about the new troubleshooting tools that are bundled with Windows 7 and provide you with the knowledge to quickly figure out what's happening "under the hood" on a Windows 7 computer. The selected tools described in this Microsoft white paper are a subset of the tools available on Windows 7. The focus of this white paper is on timely troubleshooting of the operating system and software applications.
Dcdiag is an often overlooked tool that can discover problems in a domain controller’s configuration. If client computers can't locate a domain controller or if domain controllers can't replicate Active Directory, you can run tests with Dcdiag to look for a solution.
For the fourth year in a row, Global Knowledge and TechRepublic have partnered to create a comprehensive IT salary survey. With over 12,000 responses, the 2011 report has turned out to be one of this year's most relevant and revealing salary surveys in the industry. Below is our complete list of Salaries by Popular Certifications and Salaries by State.
Relational databases are important not only because of the information they store but, more importantly, for the data we retrieve from them. The select statement allows us to ask the database a question. It’s the way we retrieve information from the database system.
Find out the advantages and disadvantages of SQL indexing from the experts at Global Knowledge. The real value of indexing is to help retrieve data quickly, but you must consider the negative impact on the server when data is modified.
The 'Go Further' video is an testimonial to the value of Microsoft Certification as a validation of technical skills. Whether you're just starting your IT career, or looking to advance it, certification can make a huge impact. Take a look at the video, and hear the stories of real MCPs.
The results are in from the fifth annual IT Skills and Salary Survey by Global Knowledge and TechRepublic, and there are finally reasons for optimism. The average salary of this year's respondents was up 6.2% from last year's and, in fact, is the highest in the history of the survey. While salary is a key component of the study, we also examined other factors such as job satisfaction, impact of acquiring new skills and certifications, and trends in pay, including base pay, bonuses, benefits, and geographic impact.
Network security is everyone's concern, and this applies to computer security as well. Many security breaches occur due to user ignorance of basic security principles, not malicious intent. Network and computer security are like an onion - there are multiple layers. Good security begins with understanding what you can do to keep your systems safe and implementing a layered approach. If you depend on one program or feature to secure your computer, then when (not if, but when) that dependency is breached, you may have personal information stolen or even have your computer taken over.
Some of you might just be starting out as a database administrator and need to know what a basic Transact-SQL query is for Microsoft SQL Server 2012, others might already be creating database objects. Either way, we put together a list of a few terms regarding Microsoft SQL Server that any database administrator should know.
There exists a need to properly read, deploy, and examine the results of Group Policy. By its architecture, Group Policy Deployment to the Clients or Servers can be erratic and latent, or even non-existent throughout your Enterprise Organization, frustrating Administrators who are rolling out the Group Policy to Client or Server computers. To help mitigate this behavior, I compiled these insights into a two part series from real-world examples, experiences, and fixes that have worked for me. I know that these Tips and Tricks will work for you, too.
New in Windows Server 2012 is the Unified Remote Access (URA) role. In Windows Server 2008 R2, DirectAccess and Routing and Remote Access Service (RRAS) were two separate roles. In fact, they could not be co-located on the same server. In Windows Server 2012, DirectAccess and RRAS can be co-located, allowing for what is now legacy remote access VPN client connectivity (L2TP/IPsec, PPTP, and SSTP). This means that the Unified Remote Access provides DirectAccess, Remote Access VPN, and site-to-site VPN and can now serve as your complete remote access solution.
Chief Technical Architect Craig Brown discusses the Windows 7 certification and skills tracks available to Global Knowledge students.
Get a look at how your numbers compare to your peers and neighbors with our comprehensive lists below. A Note About Our Certification List For the condensed list of certifications in our 2013 IT Skills & Salary Report, we included only certifications that received enough responses to be statistically relevant. The list below is more inclusive. Certification data is for informational purposes only, as the values of some of the more exclusive certifications are based on few responses and, therefore, are less reliable.
Organizations of all sizes have identified the benefits of cloud-based computing, whether it’s implementing a private or hybrid cloud on their own or accessing a public cloud through a service provider. Virtualization, a key component for building secure cloud environments, offers many advantages, including higher machine efficiency due to increased utilization, energy savings, and the flexibility to build or destroy virtual machines (VMs) on demand to meet changing organizational needs. Choosing open source virtualization over proprietary alternatives can significantly increase savings. However, an open source Linux Kernel-based virtual machine (KVM) offers several benefits to organizations beyond just cost savings. These benefits include security, reliability, availability, performance, and scalability. In this white paper, we’ll look at the relationship between open source virtualization and the cloud, and explore the security aspects of KVM hypervisor technology, especially in relation to how it leverages SELinux and related capabilities for secure public, private, and hybrid cloud performance.
One of the most difficult concepts for me as I was learning database syntax was joins. Of course, I tried reading and understanding articles and books that dealt with this topic. In almost every case, I was faced with the Venn diagram examples.
In this video, you will learn about the High Availability options in SQL Server 2008: Server Clustering, Database Mirroring, Log Shipping and Peer-to-Peer Replication.
Many experts agree that memory is the most important resource with regard to SQL Server performance. There are hundreds of performance counters, and therefore, it can be complex to figure out just what to monitor. Here are some suggestions in understanding whether memory pressure might be the performance problem with your SQL Server.
In this video, you will learn how to a use a new feature of SQL Server 2008 called Transparent Data Encryption for enhanced security.
As a power user, find out if you're ready for the SharePoint Site Collection and Site Administration class and how it can benefit your organization.
In this video, instructor Glenn Weadock demonstrates how Group Policy settings can control new user interface features such as the Taskbar, and resuscitate obsolete features such as classic menus in Windows Explorer.
By using and implementing a many-to-many relationship in a cube, existing tables with user account information can be used directly to secure cube contents, rather than converting to role based security in the cube. You can also secure your analysis services more easily and access sensitive information contained within it.
In this report, I've reviewed the 15 most popular certifications according to our more than 12,000 North American respondents to our annual IT Skills and Salary Survey. For each certification, you'll find a brief description, the average salary, and some insight into why it is popular.
You know you need to invest in training, but how do you get the best return on investment (ROI) from your training dollars? To help you make smart training decisions, we've put together this guide, which illustrates some alternative and little-known payment options, the types of discounts and promotions available with training and a suggested list of courses that give you excellent value.
The default shortcut for the SharePoint 2013 Management Shell uses PowerShell.exe; however, a few small changes can easily yield a SharePoint Management Shell based on the more awesomely powerful PowerShell ISE.
Your Microsoft SQL Server database often contains the most valuable information in your organization. Get tips for securing it properly and effectively in this free, information-packed webinar with Microsoft SQL Server expert Gidget Pryor. In just an hour, Gidget will demonstrate the layered security approach used by SQL Server. She will step you through the process and best practices of setting up logins, users, roles, schemas, and permissions, and she will review the security model changes that have taken place from SQL Server 2005 through SQL Server 2012. She will also review SQL Server 2012 training and certifications.
Microsoft Lync Server 2013 requires a proactive approach during deployment. This white paper provides valuable recommendations as well as the technical links that help you avoid common mistakes during a Microsoft Lync Server 2013 deployment.
In this video, Practice Leader Craig Brown discusses the new Microsoft Cloud Computing platforms and how to keep your organization's data secure and functioning properly while operating either partially or entirely on the cloud.
The results are in, and analysis is complete from our seventh annual IT Skills and Salary Survey. This was our second in partnership with Windows IT Pro and one of the industry's largest with more than 12,000 North American respondents. Download your copy to learn how your salary, bonus, job function, and other factors compare to your peers.
Join Microsoft SQL Server expert Brian Egler for an hour-long webinar covering the key features and updates in the upcoming release of Microsoft SQL Server 2014! You will get a thorough review, along with demonstrations, of how SQL Server 2014 provides substantial improvements in performance, manageability, and availability that will make your job easier.
In this video, Practice Leader Craig Brown discusses how Microsoft Lync can function in enterprise environments to streamline communication and increase productivity.