128 Results Found
Look back at the some of the highest paying IT certifications of 2020.
Most Internet users don't realize that often a website or other service that seems slow to respond is actually working fine. Instead, it’s the resolution of DNS that is putting a glitch in your giddy up. Fortunately, there are several steps you can take to optimize your DNS to get better performance.
Learn about the five types of area networks.
An quick fundamental overview of layer two devices. To learn more about this and similar topics, enroll in our exclusive Understanding Networking Fundamentals course.
Aside from plenty of laughs, “Groundhog Day” delivers powerful messages about change, love and being a good person. Phil is unable to break the time loop until he totally changes who he is. Unless you’re as selfish and heartless as Phil, by making incremental changes over time you’ll bring success to your life and career.
The key difference between hubs, switches and bridges is that hubs operate at Layer 1 of the OSI model, while bridges and switches work with MAC addresses at Layer 2 of the OSI model.
While Apple has created many fine things, they were yet to be created themselves when Xerox PARC scientists created Media Access Control addresses. These MAC addresses are 48 bits or 6 bytes long, so they are also known as MAC-48 or EUI-48. EUI stands for Extended Unique Identifier. It is written in hexadecimal characters as shown below:
As IT departments struggle with skills gaps and businesses attempt to recovery economically from the COVID-19 pandemic, these 10 IT skills are essential to drive success. Job roles in these areas pay well, but decision-makers are struggling to find qualified candidates. If you’re looking to make an IT skills investment or start a new career path this year, these are the areas to consider.
These technology job roles are proven to be essential during a crisis as enterprises scramble to change strategies and meet goals. The skills demonstrated by IT professionals in these 10 positions can make the difference between business success and failure, especially during a recession.
While cybersecurity remains the most popular certification category in our IT Skills and Salary Report, foundational-level certifications highlight our list of the most popular IT certifications of 2020.
If you’ve been wondering what are some good IT pranks for April Fools’ Day—or any other time of the year—this is the post for you. Whether you’re an IT pro with decades of experience or a noob who is about to learn that holding CTRL+SHIFT+ESC is a faster way to access the task manager (you’re welcome), we have an IT prank for you.
For women in IT, advancing your career can be a challenge in itself. In the Global Knowledge 2019 IT Skills and Salary Report, only eight percent of senior- and executive-level IT professionals are women. We have pulled data from our research that sheds light on the job roles, skills, challenges, certifications and experience of women in tech who have progressed to the highest levels of an organization.
According to the Global Knowledge IT Skills and Salary Report, women make up 16% of the tech workforce, and an even smaller percentage (8%) are at the senior or executive level. Here’s an overview of the most popular and most pursued certifications by women in tech.
In 2020 we will see the complete ITIL4 education portfolio released and in all likelihood the start of the retirement of the ITIL v3 qualifications. Our ITIL guru, Barry Corless lead author for ITIL4 incident and problem management practices, will talk about the course content, the practical skills you’ll learn, and who will benefit from attending each courses. If you plan to continue your ITIL education then you cannot afford to miss this webinar.
This webinar will discuss our Python offerings and how it is proving to be the language of Data Science, Artificial Intelligence and Deep Learning. View the slide deck>
Global Knowledge subject matter experts predict the top trends for 2020 in IT training, Microsoft, Cisco, AWS, cybersecurity and more.
Looking ahead at new and emerging certifications provides insight into the areas deemed valuable in the IT industry. If you are an early adopter or in a position where you need to show that you have the bleeding-edge expertise of a technology, this list of recent and upcoming certifications is for you.
Using Palo Alto Networks, PAN-OS, enterprises can build an IT Security Platform capable of delivering protection against all stages of the Cyber-Attack Lifecycle. From Reconnaissance to Act on Objective, the PAN-OS Single-Pass Parallel Processing (SP3) engine combines efficient throughput with maximum data protection. This recorded webinar will describe how the SP3 Architecture can increase network traffic visibility and enable you to control your environment.
For organizations with the willingness to get in shape and regain their corporate vitality, combining and aligning best practice frameworks is a sure way to achieve that goal. Admittedly, it takes work. Combining ITIL® 4 and project management should be high on your list.
Answer the questions posed in our ITIL Decision Tree to see if you should pursue ITIL 4. It’s easy-to-follow and no matter how you answer, it will provide a distinct next step for your ITIL journey.
ITIL® is still recognised as the de facto standard in delivering end-to-end, holistic IT services. The 4th iteration retains ITIL’s place as one of the key tools at the disposal of organization’s seeking to manage digital transformations.
The ITIL 4 update is the first since 2011, and will address the new processes, vocabulary, and methods used in modern IT, including DevOps, Agile, and Lean IT development.
ITIL® 4 Foundation Bridge is a new Global Knowledge course that addresses the specific needs of professionals who have already achieved the ITIL v3 Foundation certification and wish to upgrade to ITIL 4.
In support of software-defined networking, Cisco has introduced several products to strengthen networks and meet the increased demand for flexible and cost-efficient solutions. The Cisco SDN solution in the data center is ACI. Outside the data center the primary Cisco solution is DNA.
The CCNAX - CCNA Routing and Switching Boot Camp is a great option to obtain Cisco Routing and Switching skills while pursuing the CCNA Routing and Switching certification.
Software-defined networking (SDN) is a solution that will enable your organization to meet the demands of network programmability and automation. The result will be greater network agility to support new applications while complying with increasing security needs.
The traditional network engineering model of configuring one device at a time simply doesn’t scale to the growing needs of today’s network. Cisco's intent-based networks and software-defined networking solutions will enable your organization to meet the demands of network programmability and automation. The result will be greater network agility to support new applications while complying with increasing security needs.
We asked for your top IT horror stories, and you delivered. Read the most unexpected and cringe-worthy IT nightmares from fellow IT professionals.
In the digital age, people and intellectual property have supplanted physical assets as the most important criteria for determining the value of an organization. It is the employees who develop the next big product or improve the practices, processes, services and internal culture that add significant value to an organization.
This certification and exam guide discusses the various ITIL® certifications and what they might mean to you, your organization, and your career, as well as provide important test-taking tips for the ITIL certification exams. ITIL certifications help individuals validate their ability to demonstrate skills from a foundational to a mastery level of IT service management. ITIL certification can often be a key differentiator in the marketplace as well.
The process of subnetting is both a mathematical process and a network design process. Mathematics drives how subnets are calculated, identified, and assigned. The network design and requirements of the organization drive how many subnets are needed and how many hosts an individual subnet needs to support. Binary basics and IPv4 address structure were covered in part one of this two-part paper.
Google Cloud Platform (GCP) is Google’s public cloud offering comparable to Amazon Web Services and Microsoft Azure. The difference is that GCP is built upon Google's massive, cutting-edge infrastructure that handles the traffic and workload of all Google users. There is a wide range of services available in GCP ranging from Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) to completely managed Software-as-a-Service (SaaS). We will discuss the available infrastructure components and how they provide a powerful and flexible foundation on which to build your applications.
Shortly after being awarded an ITIL® Foundation certification, a recipient’s natural inclination is to ask: “Now what? How do I take the best practices I’ve learned and apply them to my organization?”
Whether you’re a beginner or intermediate Python developer, you’ll want to keep this guide close to your keyboard and Python editors. In it, you’ll find sample use cases for many of the most common language constructs and tasks that you’ll likely need to perform, such as reading a file or working with a database.
Discover the most common barriers you will face when implementing knowledge management and how to overcome them, so that your organization changes, over time, into a culture where knowledge sharing and reuse becomes second nature and part of the normal course of activity.
The benefits of a RADIUS server are many. In addition to speed, you receive heightened security with user access monitoring, reporting and tracking functions and personalized restrictions. Setting it up costs less than $60 and this white paper walks you through each of the steps, settings, configurations and the equipment you will need.
Learn how Docker makes it easy to update, test and debug software with this white paper and gain foundational knowledge about Dockerfile, Docker images and containers.
The recent Red Hat Enterprise Linux (RHEL) 7.1 release offers a range of system-wide improvements. Whether you're new to RHEL or a veteran user, this white paper covers essential new tools and upgrades. Dynamic patching, in-place upgrades, easily configuring new deployments or monitoring entire systems represent some of the more significant changes. This white paper not only explores the significance of these modifications, it also provides useful examples, including diagrams and command lines for executing key tasks. RHEL 7.1 represents the first minor release of RHEL 7, which launched in June 2014 and will be supported for a 10-year life cycle.
Projects are a social endeavor. Traditional project management approaches have shied away from the social advantages a more agile project environment brings. By nature, we are storytelling, pattern seeking and social people. We need colocation to shine truly in a project environment.
Measurements and metrics provide a view into every aspect of an organization. From resource availability to necessary improvements, measurements are the key to successfully understanding how your organization is performing. This paper will give you guidance on why measuring is important, how to get started, what types of metrics are available, what should be measured, and how to go about initiating improvements.
Managing users' access to an organization's resources via portals is convenient with IBM's WebSphere Portal Scripting Interface. Compare tools available to the portal administrator and identify some use cases where IBM's Portal Scripting Interface may be the ideal choice. Review basic commands and find out how to create custom scripts.
A major challenge of problem determination is dealing with unanticipated problems. It is much like detective work: finding clues, making educated guesses, verifying suspicions, and other considerations. An ideal strategy for problem prevention is to monitor the system regularly. Use the strategies outlined in this paper to minimize downtime and detective work so you can maximize performance.
CompTIA has raised the bar for Network+ candidates. The new certification exam has significant changes to the five "domains" or knowledge areas with new content related to security, cloud, data-center and operational concerns and troubleshooting. There is also a greater emphasis on wireless networking and VoIP. Use this white paper to help you gain an overview of what's new and what's different.
Red Hat Taste of Training - JB248
Red Hat Taste of Training - JB348
Businesses today are more dependent on technology than ever. And, more than ever, they're looking to IT for ways to improve employee productivity, customer service and innovation. The challenge is that in order to achieve results with technology, IT and the business have to work collaboratively. IT needs to be able to develop the right relationships and communicate with different stakeholders from a business perspective - not a technical one. As a result, the transformation of the IT department has become a top-level priority for many leading organizations. At the same time, business leaders need to strengthen their business technology IQ and play a more significant role in the governance of IT.
In this hour-long webinar, Global Knowledge course director Brian Egler will examine key new features of Microsoft SQL Server 2016 that demonstrate how it provides automatic end-to-end security, seamless generation of business analytics and elastic integration of data in the cloud.
With Microsoft SQL Server 2016, you can distribute your data to the cloud using the Stretch Database feature to improve local access while allowing cloud access to large amounts of historical data. You can also provide transparent end-to-end security using Always Encrypted technology and track changes automatically through temporal data. Download this white paper to learn why these features and more make SQL Server 2016 Microsoft's most important release to date.
Despite advances in security, hackers continue to break through network defenses. In this hour-long webinar, network security specialist Catherine Paquet will examine the favorite methods and targets of hackers and will introduce you to the different categories of security technologies. In this foundational presentation, you will learn about the benefits of security solutions such as firewalls, VPNs, IPS, identity services and BYOD.
Change is the order of the day, and if anything, the pace of business and technology change is accelerating. The business and customers are looking to IT service providers to be more responsive, delivering more frequent service changes with higher quality-resulting in services that deliver more value to the business. In order to continue to be relevant and of high value, ITIL must continue to benefit from other complementary best-practices for IT. DevOps, an approach that encourages improved communication, collaboration, and teamwork across development and operations, can have a positive influence in improving ITIL processes across the service life-cycle.
A strong event management process that is able to detect changes of state throughout an organization’s IT environment is a key aspect of a complete suite of service management processes. Event management ultimately helps an organization maintain control through an understanding of the state of things, and how the state of those things changes in an IT environment.
Use cases are an effective and widely used technique for eliciting software requirements. In this hour-long webinar, software development and process improvement expert Karl E. Wiegers will introduce you to a practical and straightforward use cases approach to requirements elicitation. You will learn how to focus on the goals that users have with a system, rather than emphasize system functionality.
Event management, although theoretically different, is fundamentally what most IT organizations refer to as “monitoring.” Monitoring an organization’s environment to determine whether important assets are in the state they should be, and knowing when that state changes, is a very important activity that many organizations spend significant portions of their budget doing.
When properly utilized, VLANs and trunks provide flexibility, stability and ease of troubleshooting. This paper provides technical details about VLANs and trunks, along with design options at a basic to intermediate level. Recommendations and commands are included throughout.
In this paper, we explore the basic usage of PowerShell in the pursuit of automating the management of Hyper-V deployments. This paper is targeted to IT professionals who have been "GUI-bound" to their management interfaces and have been working with or are embarking on the journey of Hyper-V administration. We'll explore the usage of Hyper-V specific cmdlets with the intent of ultimately being able to include multiple cmdlets in a "script" to allow for pushing one button and accomplishing the combined actions of many multiple mouse clicks in the GUI. No more repetitive tasks!
Switches play a vital role in moving data from one device to another. Specifically, switches greatly improve network performance, compared to hubs, by providing dedicated bandwidth to each end device, supporting full-duplex connectivity, utilizing the MAC address table to make forwarding decisions, and utilizing ASICs and CAM tables to increase the rate at which frames can be processed.
Interested in SharePoint 2013 developer training? Learn from SharePoint instructor Tracy Wallace, if you're ready and which SharePoint 2013 developer class you should take.
Nowadays, you can read weekly articles about security attacks and stolen data. Even leading companies and organizations are victims of cybercrime. Attacks can include breaches at three levels: the physical level, which includes social engineering, system and network and applications (e.g., web and mobile). In this complimentary webinar, you will discover the benefits of using automated solutions to detect application vulnerabilities, provide steps to remediate them and avoid costly compliance violation.
This paper covers the configuration of IP Multicast with Multiprotocol Label Switching (MPLS) including the basics of Multicast with the Group Encrypted Transport VPN (GETVPN).
The first big push toward implementation of IPv6 was mobile devices. Now, one of the driving forces is the Internet of Things. As the name implies, this means everything, including machine to machine communication (M2M).
Young adults unable to find work, employers unable to fill jobs, a recent GAO study that reported substantial declines in telecommunication expertise — there has been a lot of news about the pervasiveness of skills gaps, their causes, the actual impacts and what to do about them. It’s rather confusing, because the term “skills gaps” has been hijacked to politicize an extremely wide range of issues.
Like it or not, Internet of Things (IoT) is upon us. There are a number of factors that will impact its adoption rate, and the inevitable privacy (or lack of) discussions will likely happen sooner than later. This is going to change the world as we know it, in many cases for the better. But we will need to keep an eye on the extent to which it invades our personal lives if it is going to be the positive force it has the potential to be.
In this hour-long webinar, Global Knowledge instructor and ITIL Expert Michael Scarborough will share his knowledge and expertise on various aspects of incident management and problem management processes. He will help you understand the difference between incidents and problems and between incident and problem management, providing examples from his own experience to drive the concepts home. Michael will also provide an overview of who performs various incident and problem management activities in an organization.
Learn the ITIL® concepts of accountability, boundaries, and consistency (the ABCs) and discover how ITIL helps establish, manage, and maintain the ABCs.
Discover how the enhanced performance and reliability of Amazon Aurora will help AWS customers reduce performance bottlenecks in their applications. The relatively low cost of Aurora will tempt many customers to migrate workloads to this implementation of RDS.
Amazon Redshift opens up enterprise data warehouse (EDW) capabilities to even the smallest of businesses, yet its costs, security, and flexibility also make it appealing to the largest of enterprises. It allows companies to easily and conveniently scale their EDW needs both up and down, and as a managed service, it allows your team to offload all of the "undifferentiated heavy lifting" of building and maintaining an EDW. Its raw storage costs are about one-fifth to one-tenth of traditional in-house EDW, and AWS has taken great care to ensure its performance is still competitive with those in-house solutions. Before deciding to use Amazon Redshift, however, it's important to understand what it is and is not.
You will learn how many organizations approach change management as compared to how best practices dictate that change management should work. Global Knowledge instructor and ITIL Expert Michael Scarborough will fill you in on the purpose of change management and the difference between change management and change tickets. He will provide a high-level guide for establishing a change management process that uses real-world examples as its basis.
The process of learning how to subnet IP addresses begins with understanding binary numbers and decimal conversions along with the basic structure of IPv4 addresses. This paper focuses on the mathematics of binary numbering and IP address structure.
If you're running SharePoint 2010, learn how SharePoint 2013 is different and what you'll need to learn to deploy it effectively.
Often, we don't have time to learn the reasons behind the standards we use. But learning what instigated a standard goes a long way toward not only understanding its importance, but also more easily and effectively applying it in your workplace. In this hour-long webinar, Global Knowledge instructor Keith Sorn will discuss common networking standards and explain how they were determined and why they are relevant. He will fill you in on things like why it's important to use proper color-coding standards when making cable and why the length limitations on wired cable are essential. He will also explain new standards, such as power over fiber.
In this hour-long webinar by Global Knowledge instructor and ITIL Expert Michael Scarborough, you will learn how to study for and succeed in passing ITIL Intermediate Exams. You will learn how to approach an ITIL Intermediate exam, the true/false approach and why it works and how to study for the ITIL Intermediate exams.
Problem Solving - Root Cause Analysis using Kepner Tregoe
In this video, you will learn about the latest version of ReportBuilder available in SQL Server 2008 R2.
Network Functions Virtualization (NFV) is gaining momentum along with Software-Defined Networking (SDN). This paper examines the history of NFV and explores the prospects for networking to gradually evolve from a hardware-centric approach to a software-driven model. It concludes with an examination of future market implications and how NFV can help organizations to achieve their goals.
With Forrester Research declaring "Waterfall processes have become obstacles to speed, quality and predictability," and more than 85% of CIO's surveyed by CIO Magazine using or planning to pursue Agile practices in 2014, this one-hour webinar will explore the basics of Agile and why so many organizations are adopting Agile methods.
With the onset of the Digital Age, IT professionals today are hit with a tsunami of changes! "By 2018, adoption of mobile, social, cloud, analytics will redefine 90% of IT roles" according to IDC 2014 Predictions: CIO Agenda. Large organizations are eliminating silos. Small and medium organizations are outsourcing technology services. Digital natives have entered the workforce. New roles will emerge as new ways of doing business are introduced and as old technology fades away. Today's IT professionals must adapt, and a new set of skills is in order. Join Pranav Shah, Manager of Information Technology and Security at Sony Canada, and Pam Maguire, Business Development Manager, Global Knowledge, for a 60 minute webinar on how to future-proof your IT career in the Digital Age. You will learn about how IT roles are changing, what organizations are looking for, and what you can do now to be ready.
Nasser El-Batal will walk you through the most useful, recognized, and mandated ITSM best practices in the industry: TOGAF, COBIT and ITIL®. He will highlight the benefits of integrating them into a single implementation program to avoid project disaster. Discussions are focused on "Getting Your House in Order" and how to establish your own organization-specific business transformation program, while increasing your organization maturity.
Cloud computing enables development teams to get applications into production faster. IT Service Management (ITSM) leaders must adopt new strategies and change existing processes or risk becoming a barrier to success. Cloud computing requires DevOps-the blending of development and operations with the goal of accelerating time-to-market and reducing time-to-value. The good news is that ITIL® is uniquely positioned to accelerate DevOps, but it requires changes to existing ITSM processes.
After a review of Software-Defined Networking (SDN) and its close cousin Network Functions Virtualization (NFV), this white paper addresses three main deployment scenarios: SDN without deploying cloud computing, cloud computing without deploying SDN, and deploying cloud computing in conjunction with SDN. We'll look at use cases, when the approach makes sense, and any applicable limitations.
In this video, you'll learn how to utilize a great new feature of SQL Server 2008 called Policy Based Management for Multi-Server Management capabilities.