101 Results Found
No matter which IT field you're working in, there are several skills that are useful for every IT professional to know. Here, seven experienced IT professionals working in the networking, programming, project management, and security fields, share what they believe a...
Managing the change of DataStage components can often become a test of wills. Picture fitting a square peg in a round hole, and you might start to get the idea. The complexity of what is required to promote components from one environment to another during the development, testing, and eventual implementation in the production environments, should be and is often a controlled activity.
The process of subnetting is both a mathematical process and a network design process. Mathematics drives how subnets are calculated, identified, and assigned. The network design and requirements of the organization drive how many subnets are needed and how many hosts an individual subnet needs to support. Binary basics and IPv4 address structure were covered in part one of this two-part paper.
The CCNAX - CCNA Routing and Switching Boot Camp is a great option to obtain Cisco Routing and Switching skills while pursuing the CCNA Routing and Switching certification.
With Forrester Research declaring "Waterfall processes have become obstacles to speed, quality and predictability," and more than 85% of CIO's surveyed by CIO Magazine using or planning to pursue Agile practices in 2014, this one-hour webinar will explore the basics of Agile and why so many organizations are adopting Agile methods.
Amazon Redshift opens up enterprise data warehouse (EDW) capabilities to even the smallest of businesses, yet its costs, security, and flexibility also make it appealing to the largest of enterprises. It allows companies to easily and conveniently scale their EDW needs both up and down, and as a managed service, it allows your team to offload all of the "undifferentiated heavy lifting" of building and maintaining an EDW. Its raw storage costs are about one-fifth to one-tenth of traditional in-house EDW, and AWS has taken great care to ensure its performance is still competitive with those in-house solutions. Before deciding to use Amazon Redshift, however, it's important to understand what it is and is not.
With Microsoft SQL Server 2016, you can distribute your data to the cloud using the Stretch Database feature to improve local access while allowing cloud access to large amounts of historical data. You can also provide transparent end-to-end security using Always Encrypted technology and track changes automatically through temporal data. Download this white paper to learn why these features and more make SQL Server 2016 Microsoft's most important release to date.
I attended a meeting this week with a customer of mine and a potential new vendor. The new vendor was there to pitch his configuration and setup service offerings for a specific ITSM toolset. My customer has already had one bad experience with an ITSM tool configuration vendor who promised one thing and delivered much less. He ended up with a tool that’s minimally used and not configured to match his business needs. He’s looking for a vendor that can understand his business needs and priorities and quickly help him get his tool configured and working in a short time frame. Then the topic of standard changes came up. My customer asked for examples of standard changes. The vendor responded, “Server reboots are an example of standard changes.”
The OSI model is a conceptual tool used to discuss and describe network functions. The use of a standard reference model is essential to communicating ideas as well as creating new technologies. It is a good idea to be familiar with the OSI model, the features assigned to each layer, and examples of common protocols or technologies associated with the OSI layers.
Diane Teare, Global Knowledge's Cisco Course Director, discusses the advantages to taking our CCNA Boot Camp.
Projects are a social endeavor. Traditional project management approaches have shied away from the social advantages a more agile project environment brings. By nature, we are storytelling, pattern seeking and social people. We need colocation to shine truly in a project environment.
The process of learning how to subnet IP addresses begins with understanding binary numbers and decimal conversions along with the basic structure of IPv4 addresses. This paper focuses on the mathematics of binary numbering and IP address structure.
CompTIA has become one of the most recognized and respected names in IT certifications, from the first A+ back in the 1990s to today with over a dozen vendor-neutral certifications covering a variety of topics. At first glance, it may seem daunting trying to figure out which certifications you should pursue and what it takes to pass the exams. But do not fear! CompTIA has streamlined their certification process. Let this white paper be your guide along your CompTIA journey. We will explain the certifications, the order to take them, how to prepare for the exams and the details of the testing experience.
Despite advances in security, hackers continue to break through network defenses. In this hour-long webinar, network security specialist Catherine Paquet will examine the favorite methods and targets of hackers and will introduce you to the different categories of security technologies. In this foundational presentation, you will learn about the benefits of security solutions such as firewalls, VPNs, IPS, identity services and BYOD.
The benefits of a RADIUS server are many. In addition to speed, you receive heightened security with user access monitoring, reporting and tracking functions and personalized restrictions. Setting it up costs less than $60 and this white paper walks you through each of the steps, settings, configurations and the equipment you will need.
Agile is a set of principles requiring a significant cultural shift, new paradigms in thinking and team organization. Over the years, Agile has become "productized" or in many cases "institutionalized", creating different flavours and levels of commitment among teams and organizations. Along the way, managers and team members have lost sight of Agile's principles and tried to enforce the use of certain tools and structure where they may not belong. In this one hour webinar, Perry McLeod will explain how tools such as use cases can be successful in an agile environment, provided the principles of agile are always active in the minds of the managers and the team members that are using them. Join Perry to determine whether or not making the cultural shift towards the use case method in an agile environment is the right move for you and your organization.
This recorded webinar will help you understand the basics of switch functionality in Cisco networks. In this setting, a SWITCH is functioning at OSI Layer 2. Before SWITCHES we used BRIDGES to segment within the same network.
In support of software-defined networking, Cisco has introduced several products to strengthen networks and meet the increased demand for flexible and cost-efficient solutions. The Cisco SDN solution in the data center is ACI. Outside the data center the primary Cisco solution is DNA.
The traditional network engineering model of configuring one device at a time simply doesn’t scale to the growing needs of today’s network. Cisco's intent-based networks and software-defined networking solutions will enable your organization to meet the demands of network programmability and automation. The result will be greater network agility to support new applications while complying with increasing security needs.
Often, we don't have time to learn the reasons behind the standards we use. But learning what instigated a standard goes a long way toward not only understanding its importance, but also more easily and effectively applying it in your workplace. In this hour-long webinar, Global Knowledge instructor Keith Sorn will discuss common networking standards and explain how they were determined and why they are relevant. He will fill you in on things like why it's important to use proper color-coding standards when making cable and why the length limitations on wired cable are essential. He will also explain new standards, such as power over fiber.
This paper covers the configuration of IP Multicast with Multiprotocol Label Switching (MPLS) including the basics of Multicast with the Group Encrypted Transport VPN (GETVPN).
Depending on the switch vendor, the exact steps will vary on how to set up and configure VLANs on a switch. For the network design shown, the general process for setting up VLANs on the switch is:
Cloud computing enables development teams to get applications into production faster. IT Service Management (ITSM) leaders must adopt new strategies and change existing processes or risk becoming a barrier to success. Cloud computing requires DevOps-the blending of development and operations with the goal of accelerating time-to-market and reducing time-to-value. The good news is that ITIL® is uniquely positioned to accelerate DevOps, but it requires changes to existing ITSM processes.
For us wireless folks that aren’t stellar routing and switching guys, one of the most daunting network tasks is integrating our WLAN infrastructure with the existing wired infrastructure and its services. Understanding wired design topics is pretty fundamental to installing or managing any network, so it really should be on our priority list to spruce up those skills. To give you a nudge on your journey, let’s talk about DHCP for wireless clients.
While Apple has created many fine things, they were yet to be created themselves when Xerox PARC scientists created Media Access Control addresses. These MAC addresses are 48 bits or 6 bytes long, so they are also known as MAC-48 or EUI-48. EUI stands for Extended Unique Identifier. It is written in hexadecimal characters as shown below:
Wi-Fi networks have been misunderstood by much of the IT community since their inception. Even the reasons for this misunderstanding are kind of hard to understand. The result has been that myths about 802.11 (better known as Wi-Fi) networks have grown almost as fast as the technology itself. In this web seminar, we'll examine 11 common Wi-Fi myths and explore ways to use correct information to make your networks scalable, secure and satisfying for your users.
A local area network (LAN) provides a path of communication, allowing the delivery of packets of data, voice, or video originating from the sender (logical source address) to the receiver (logical destination address). Ethernet is the most common LAN used. As you start to learn about networking, remember that communication and the movement of large numbers, whether it is people, cars, mail, or network traffic, have a commonality. Everything you know and use in your daily life can be compared to the way traffic moves.
The OSI model is a conceptual tool used to discuss and describe network functions. The use of a standard reference model is essential to communicate ideas as well as create new technologies. It is a good idea to be familiar with the OSI model, the features assigned to each layer, and examples of common protocols or technologies associated with the OSI layers.
With the onset of the Digital Age, IT professionals today are hit with a tsunami of changes! "By 2018, adoption of mobile, social, cloud, analytics will redefine 90% of IT roles" according to IDC 2014 Predictions: CIO Agenda. Large organizations are eliminating silos. Small and medium organizations are outsourcing technology services. Digital natives have entered the workforce. New roles will emerge as new ways of doing business are introduced and as old technology fades away. Today's IT professionals must adapt, and a new set of skills is in order. Join Pranav Shah, Manager of Information Technology and Security at Sony Canada, and Pam Maguire, Business Development Manager, Global Knowledge, for a 60 minute webinar on how to future-proof your IT career in the Digital Age. You will learn about how IT roles are changing, what organizations are looking for, and what you can do now to be ready.
Whether you’re a beginner or intermediate Python developer, you’ll want to keep this guide close to your keyboard and Python editors. In it, you’ll find sample use cases for many of the most common language constructs and tasks that you’ll likely need to perform, such as reading a file or working with a database.
The driver behind 802.11n is MIMO, or multiple input multiple output. This video explains how MIMO works to double your channel speed by sending two or more data streams over the same channel.
Managing users' access to an organization's resources via portals is convenient with IBM's WebSphere Portal Scripting Interface. Compare tools available to the portal administrator and identify some use cases where IBM's Portal Scripting Interface may be the ideal choice. Review basic commands and find out how to create custom scripts.
If you’re interested in pursuing a career in Cisco technologies or acquiring a Cisco career certification, all paths begin with ICND1 v3.0 - Interconnecting Cisco Networking Devices, Part 1.
In this hour-long webinar, Global Knowledge course director Brian Egler will examine key new features of Microsoft SQL Server 2016 that demonstrate how it provides automatic end-to-end security, seamless generation of business analytics and elastic integration of data in the cloud.
Discover how the enhanced performance and reliability of Amazon Aurora will help AWS customers reduce performance bottlenecks in their applications. The relatively low cost of Aurora will tempt many customers to migrate workloads to this implementation of RDS.
Database Management Systems (DBMS) have been monolithic structures with their own dedicated hardware, storage arrays, and consoles. Amazon Web Services (AWS) realized that while each company can use unique methods of collecting and using data, the actual processes of building the management infrastructure are almost always the same. AWS remedies DBMS problems with its Amazon Relational Database Service (Amazon RDS).
In 1998, the Internet Engineering Task Force (IETF) released RFC 2460, outlining the technical specifications of IPv6, which addressed the shortcomings of the aging IPv4 protocol. As with any evolution of technology, new elements exist in the protocol that may seem strange and unfamiliar. This certainly includes address representation, space, and so forth, but also includes a number of different types of addresses as well. A subset of these new addressing types has corresponding types in IPv4, but many will seem significantly different. The purpose of this white paper is to examine addressing classifications in detail and outline their functions within the context of the protocol.
As with the adoption of any new technology, the move from IP version 4 to IP version 6 will take a number of years to complete. During that transition phase, various mechanisms will be necessary to continue support of the older protocol as the newer gains widespread momentum. In addition, there has been some evolution even within the availability of these mechanisms, some of which have already passed from general use into deprecated status. Network engineering professionals already proficient in the use of IPv6, as well as the available coexistence mechanisms, will undoubtedly stay in high demand throughout this process.
The first big push toward implementation of IPv6 was mobile devices. Now, one of the driving forces is the Internet of Things. As the name implies, this means everything, including machine to machine communication (M2M).
Network Functions Virtualization (NFV) is gaining momentum along with Software-Defined Networking (SDN). This paper examines the history of NFV and explores the prospects for networking to gradually evolve from a hardware-centric approach to a software-driven model. It concludes with an examination of future market implications and how NFV can help organizations to achieve their goals.
Learning how to program and develop for the Hadoop platform can lead to lucrative new career opportunities in Big Data. But like the problems it solves, the Hadoop framework can be quite complex and challenging. Join Global Knowledge instructor and Technology Consultant Rich Morrow as he leads you through some of the hurdles and pitfalls students encounter on the Hadoop learning path. Building a strong foundation, leveraging online resources, and focusing on the basics with professional training can help neophytes across the Hadoop finish line.
In this paper, we explore the basic usage of PowerShell in the pursuit of automating the management of Hyper-V deployments. This paper is targeted to IT professionals who have been "GUI-bound" to their management interfaces and have been working with or are embarking on the journey of Hyper-V administration. We'll explore the usage of Hyper-V specific cmdlets with the intent of ultimately being able to include multiple cmdlets in a "script" to allow for pushing one button and accomplishing the combined actions of many multiple mouse clicks in the GUI. No more repetitive tasks!
There's a new Microsoft training solution available to fit your demanding schedule. Flexible, on-demand training designed to help you acquire the skills you need when you want them. Available via individual courses for three months or as a complete collection for 12 months.
Interested in SharePoint 2013 developer training? Learn from SharePoint instructor Tracy Wallace, if you're ready and which SharePoint 2013 developer class you should take.
While IT professionals are most likely to hold certifications in CompTIA and Microsoft, a greater percentage are pursuing credentials in AWS and Cisco in 2019. Here is a list of the five most sought-after IT certifications this year.
Authentication is one of the essential components of security. It is one part of the concept known as authentication, authorization, and accounting (AAA). Authentication is the process of claiming an identity the proving that you are that claimed identity. Authorization is the mechanism to control what you can access or do. Accounting is the recording of events into a log to review the activities against the rules and policies in order to detect violations or confirm compliance. All three of these should be addressed when constructing a system in order to have a reasonable foundation for reliable security.
In this hour-long webinar, security expert and Global Knowledge instructor Phillip D. Shade will provide insight into the emerging network security science of network forensics analysis, a.k.a. security event analysis and reconstruction. Using case studies, you will examine the role of data retention in network forensics analysis, and you will learn about applying forensics analysis techniques to handle application-based attacks, VoIP call interception, and worms, bots, and viruses.
Looking ahead at new and emerging certifications provides insight into the areas deemed valuable in the IT industry. If you are an early adopter or in a position where you need to show that you have the bleeding-edge expertise of a technology, this list of recent and upcoming certifications is for you.
The recent Red Hat Enterprise Linux (RHEL) 7.1 release offers a range of system-wide improvements. Whether you're new to RHEL or a veteran user, this white paper covers essential new tools and upgrades. Dynamic patching, in-place upgrades, easily configuring new deployments or monitoring entire systems represent some of the more significant changes. This white paper not only explores the significance of these modifications, it also provides useful examples, including diagrams and command lines for executing key tasks. RHEL 7.1 represents the first minor release of RHEL 7, which launched in June 2014 and will be supported for a 10-year life cycle.
Most Internet users don't realize that often a website or other service that seems slow to respond is actually working fine. Instead, it’s the resolution of DNS that is putting a glitch in your giddy up. Fortunately, there are several steps you can take to optimize your DNS to get better performance.
Using Palo Alto Networks, PAN-OS, enterprises can build an IT Security Platform capable of delivering protection against all stages of the Cyber-Attack Lifecycle. From Reconnaissance to Act on Objective, the PAN-OS Single-Pass Parallel Processing (SP3) engine combines efficient throughput with maximum data protection. This recorded webinar will describe how the SP3 Architecture can increase network traffic visibility and enable you to control your environment.
In this hour-long webinar, Global Knowledge instructor John Barnes will guide you through implementing Cisco private VLANs. He will review VLANs and 802.1q, and he will discuss private VLAN fundamentals and operation, covering primary VLANs and secondary VLANs. He will cover VLAN mapping and discuss using private VLANs between multiple switches. He will also provide a use case example.
Nowadays, you can read weekly articles about security attacks and stolen data. Even leading companies and organizations are victims of cybercrime. Attacks can include breaches at three levels: the physical level, which includes social engineering, system and network and applications (e.g., web and mobile). In this complimentary webinar, you will discover the benefits of using automated solutions to detect application vulnerabilities, provide steps to remediate them and avoid costly compliance violation.
The STP (Spanning Tree Protocol) standard (IEEE 802.1d) was designed when the recovery after an outage could wait a minute or so and be acceptable performance. With Layer 3 switching in LANs, switching began to compete with routers running protocols because they are able to offer faster alternate paths. Rapid Spanning Tree Protocol (RSTP or IEEE 802.1w) brought the ability to take the twenty seconds of waiting for the Max Age counter plus fifteen seconds of Listening plus fifteen seconds of Learning or fifty seconds down to less than one second for point-to-point connected and edge switches and six seconds for root switches.
Red Hat Taste of Training - JB248
Red Hat Taste of Training - JB348
Web Intelligence is much more than just querying a database and displaying data in rows and columns. Take advantage of an extensive set of formatting options to convert data into drillable and actionable information. Highly formatted reports spawn immeasurable user confidence and make a huge difference with the ultimate goal of business intelligence - solving business problems. Get ready to extend your Web Intelligence report design journey with the formatting tips outlined in this white paper.
In this video, you will learn about the latest version of ReportBuilder available in SQL Server 2008 R2.
After a review of Software-Defined Networking (SDN) and its close cousin Network Functions Virtualization (NFV), this white paper addresses three main deployment scenarios: SDN without deploying cloud computing, cloud computing without deploying SDN, and deploying cloud computing in conjunction with SDN. We'll look at use cases, when the approach makes sense, and any applicable limitations.
Your Microsoft SQL Server database often contains the most valuable information in your organization. Get tips for securing it properly and effectively in this free, information-packed webinar with Microsoft SQL Server expert Gidget Pryor. In just an hour, Gidget will demonstrate the layered security approach used by SQL Server. She will step you through the process and best practices of setting up logins, users, roles, schemas, and permissions, and she will review the security model changes that have taken place from SQL Server 2005 through SQL Server 2012. She will also review SQL Server 2012 training and certifications.
In a recent post, I gave an overall description of a service portfolio and the key components of a portfolio. Here, I will describe how a cloud services provider might implement an ITIL service portfolio. A cloud services provider will regularly have a set of services under development, a set of service in live operation, and a set of services that are retired.
Session Initiation Protocol (SIP) is an internet signaling protocol, developed by the IETF (starting in 1996), for establishing, maintaining, and tearing down sessions between a variety of real-time media, including voice, video, and chat. SIP allows endpoints to locate other endpoints, whether stationary or mobile. SIP doesn't have to worry about transporting voice or video as Real Time Transport Protocol (RTP) takes care of that. It also relies on Session Description Protocol (SDP) to negotiate capabilities and codecs. SIP does not provide a Directory Service or Authentication, but it does work with services such as LDAP or RADIUS. SIP is only concerned with signaling. This white paper is going to look at the way SIP is used in the converged Unified Communications environment.
Learn how Docker makes it easy to update, test and debug software with this white paper and gain foundational knowledge about Dockerfile, Docker images and containers.
Subnetting is a complicated topic that has confused students for a very long time. However, subnetting is an important topic for many different certifications with various vendors, including Cisco. In the real world environment, people are used to just punching in the numbers in many of the free subnet calculators that are readily available on the internet. For exam purposes, you still have to do this in a very fast manner since many exams are time-based and you don't have the luxury of spending those precious minutes on any single question. This Cisco training whitepaper will solve some of those age-old and complicated subnetting puzzles.
Global Knowledge instructor Kevin Schweers reviews the fundamentals of spanning tree, including the three primary steps.
You may have noticed that it’s the dynamic routing protocols that get all the glory. Since I like rooting (routing?) for the underdog, let’s talk about static routes! As you may recall, a router has three methods for learning a route. A route can appear in the routi...
Instructor John Harmon explains subnetting using binary numbers and decimal conversions.
Instructor John Harmon continues his explanation of subnetting by showing how subnet masks can be used to sub-divide networks.
In the digital age, people and intellectual property have supplanted physical assets as the most important criteria for determining the value of an organization. It is the employees who develop the next big product or improve the practices, processes, services and internal culture that add significant value to an organization.
This short example illustrates basic VLAN operation. Examining VLANs in a large-scale installation can show the full benefits of VLANs. Consider that this is a small portion of a large corporate headquarters with 5,000 devices connected in a 20 building campus.
Switches play a vital role in moving data from one device to another. Specifically, switches greatly improve network performance, compared to hubs, by providing dedicated bandwidth to each end device, supporting full-duplex connectivity, utilizing the MAC address table to make forwarding decisions, and utilizing ASICs and CAM tables to increase the rate at which frames can be processed.
With skills gaps plaguing the industry, these 10 skills are must-haves for all IT departments. It’s no coincidence that these skills make up a large percentage of the IT skills gap across the industry. Decision-makers are struggling to fill these job roles. The positions also pay well because of a lack of qualified professionals. If you’re looking to make an IT skills investment or start a new career path this year, these are the areas to consider.
Networks are as different as the people and organizations that use them. Despite those differences, there are some foundational components that all networks share. This session will explore different types of networks and the common components that must exist in these networks.
Like it or not, Internet of Things (IoT) is upon us. There are a number of factors that will impact its adoption rate, and the inevitable privacy (or lack of) discussions will likely happen sooner than later. This is going to change the world as we know it, in many cases for the better. But we will need to keep an eye on the extent to which it invades our personal lives if it is going to be the positive force it has the potential to be.
Change is the order of the day, and if anything, the pace of business and technology change is accelerating. The business and customers are looking to IT service providers to be more responsive, delivering more frequent service changes with higher quality-resulting in services that deliver more value to the business. In order to continue to be relevant and of high value, ITIL must continue to benefit from other complementary best-practices for IT. DevOps, an approach that encourages improved communication, collaboration, and teamwork across development and operations, can have a positive influence in improving ITIL processes across the service life-cycle.
Use cases are an effective and widely used technique for eliciting software requirements. In this hour-long webinar, software development and process improvement expert Karl E. Wiegers will introduce you to a practical and straightforward use cases approach to requirements elicitation. You will learn how to focus on the goals that users have with a system, rather than emphasize system functionality.
A major challenge of problem determination is dealing with unanticipated problems. It is much like detective work: finding clues, making educated guesses, verifying suspicions, and other considerations. An ideal strategy for problem prevention is to monitor the system regularly. Use the strategies outlined in this paper to minimize downtime and detective work so you can maximize performance.
Amazon Web Services (AWS) offers increased agility, developer productivity, pay-as-you-go pricing and overall cost savings. But you might wonder where to start, what pitfalls exist and how can you avoid them? How can you best save time and money? Learn what you need to know and where to start before launching an AWS-hosted service.
Based on survey responses from the Global Knowledge 2019 IT Skills and Salary Report, this year’s highest-paying certifications reveal a strong emphasis on particular topics, such as cloud computing, cybersecurity, networking and project management. In fact, cloud and project management dominate the top five spots.
Global Knowledge subject matter experts predict the top trends for 2019 in cloud, cybersecurity, networking and IT training.