Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Topics

Show Filters
Result Filters:

161 Results Found

Results per page: 10 40 80

Preparing for Digital Disruption: Future-Proofing Yourself and Your Organization

Webinar – Recorded | June 16, 2015

In this world of volatility and complexity, it seems that the only certainty is the unstoppable advancement of technology. As people and organizations look to improve productivity, innovate their business models and processes, and differentiate their client and employee experiences, they need to be prepared to work in new and different ways. The challenge is that recent data reveals that Canada is falling behind the rest of the world in innovation, especially regarding new and disruptive technologies that promise to significantly impact every industry and organizations of all types and sizes. In this 60-minute webinar, we will explore the concept of digital disruption and provide information about how to future-proof yourself and your organization to succeed in this new world.

IBM Cloud TechTalks (Part 1 of 4): Building a Power Cloud for Your Administrators

Webinar – Recorded | June 15, 2015

PowerVC is a cloud tool based on OpenStack technology used to manage your virtualized environment running on your Power System. It automates rapid provisioning/deprovisioning and provides simple ongoing management of LPARs on Power Systems. Join us for this free, interactive webinar to hear senior power cloud consultants Vess Natchev and Kyle Wurgler from IBM System Lab Services.

Office 365: An Introductory Guide

White Paper | June 12, 2015

Microsoft Office 365 has a vast array of features to explore. A rich administration interface, streamlined security, and versatile migration options make this one of the most interesting products when it comes to an SaaS public cloud solution.

Managing Hyper-V with PowerShell for the GUI-Bound Administrator

White Paper | June 05, 2015

In this paper, we explore the basic usage of PowerShell in the pursuit of automating the management of Hyper-V deployments. This paper is targeted to IT professionals who have been "GUI-bound" to their management interfaces and have been working with or are embarking on the journey of Hyper-V administration. We'll explore the usage of Hyper-V specific cmdlets with the intent of ultimately being able to include multiple cmdlets in a "script" to allow for pushing one button and accomplishing the combined actions of many multiple mouse clicks in the GUI. No more repetitive tasks!

What Is a "Good" Decision? How Is Quality Judged?

White Paper | June 05, 2015

This paper provides an overview of how to judge the rigor of one's decision making. It describes how anyone can make better (higher quality) decisions, in any situation.

Microsoft SharePoint 2013 Training for Developers

Video | June 04, 2015

Interested in SharePoint 2013 developer training?  Learn from SharePoint instructor Tracy Wallace, if you're ready and which SharePoint 2013 developer class you should take.

Project Managers are Makers; Change Managers are Shakers!

Webinar – Recorded | May 28, 2015

Change managers and project managers come at the same goal of maximizing ROI for their organizations, but from different perspectives and approaches and with different skill sets. While project managers are responsible for achieving specific objectives on time and on budget, the change manager's role is broader. Change managers apply a structured approach to helping individuals, teams and organizations negotiate relentless change. A project manager turns ideas into reality. Increasingly, project managers are required to take on the role of change manager as well. Business today can't afford to carry out tasks without considering the larger picture. Today, integration is unavoidable - and expected. In this hour-long interactive session, we'll discuss the similarities and differences between project management and change management. We'll also identify the occasions when both a project manager and a change manager might be needed.

Protect Software Applications with IBM Security AppScan

Webinar – Recorded | May 28, 2015

Nowadays, you can read weekly articles about security attacks and stolen data. Even leading companies and organizations are victims of cybercrime. Attacks can include breaches at three levels: the physical level, which includes social engineering, system and network and applications (e.g., web and mobile). In this complimentary webinar, you will discover the benefits of using automated solutions to detect application vulnerabilities, provide steps to remediate them and avoid costly compliance violation.

An Introduction to AWS Security

White Paper | May 05, 2015

AWS is an incredibly rich ecosystem of services and tools, some of which have security aspects baked in (like S3 SSE), and others that provide overarching security capabilities (like IAM and VPC) that apply to many services. With regard to data storage, operating system, and applications, security functions largely the same in the cloud or on-premises software. Customers can and should continue to follow best practices that have served them well in their own data centers.

How To Protect Data in Flight

Article | April 28, 2015

Accessing cloud-based resources, whether they be IaaS/PaaS/SaaS-based, is very convenient. With a browser and Internet connection, you are up and running. No driving to your work office, no need to log into the corporate network. Just open up your web browser and go. This convenience, however, comes with a security risk. All of your business work is conducted over an insecure communication network. Unlike your office network, where the network link between you and the data center is under corporate control and is physically secure, the cloud access link is over the Internet.