Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By
Show Filters
Result Filters:

169 Results Found

Results per page: 10 40 80

4 Tips and Tricks for Microsoft Windows Group Policy

Article | Feb. 07, 2013

There exists a need to properly read, deploy, and examine the results of Group Policy. By its architecture, Group Policy Deployment to the Clients or Servers can be erratic and latent, or even non-existent throughout your Enterprise Organization, frustrating Administrators who are rolling out the Group Policy to Client or Server computers. To help mitigate this behavior, I compiled these insights into a two part series from real-world examples, experiences, and fixes that have worked for me. I know that these Tips and Tricks will work for you, too.

Learning How To Learn Hadoop

White Paper | Jan. 11, 2013

Learning how to program and develop for the Hadoop platform can lead to lucrative new career opportunities in Big Data. But like the problems it solves, the Hadoop framework can be quite complex and challenging. Join Global Knowledge instructor and Technology Consultant Rich Morrow as he leads you through some of the hurdles and pitfalls students encounter on the Hadoop learning path. Building a strong foundation, leveraging online resources, and focusing on the basics with professional training can help neophytes across the Hadoop finish line.

10 SQL Terms You Should Know

Article | Sep. 24, 2012

Some of you might just be starting out as a database administrator and need to know what a basic Transact-SQL query is for Microsoft SQL Server 2012, others might already be creating database objects. Either way, we put together a list of a few terms regarding Microsoft SQL Server that any database administrator should know.

Seven Security Myths of Windows 7

White Paper | May 10, 2012

Network security is everyone's concern, and this applies to computer security as well. Many security breaches occur due to user ignorance of basic security principles, not malicious intent. Network and computer security are like an onion - there are multiple layers. Good security begins with understanding what you can do to keep your systems safe and implementing a layered approach. If you depend on one program or feature to secure your computer, then when (not if, but when) that dependency is breached, you may have personal information stolen or even have your computer taken over.

12 Steps to Bring Your Own Device (BYOD) Success

White Paper | April 16, 2012

IT departments have multiple opportunities and challenges as a result of the Bring Your Own Device (BYOD) invasion. The most common opportunity is to reinforce enterprise network security from both the inside and the outside. Supporting BYOD also offers more monitoring and tracking of activities that provide a more detailed view of network traffic flow. Alternatively, it will be a challenge for some IT departments to give up control over which devices may access their enterprise network. Another challenge will be to have the users doing configurations for network access, which adds human error to a crucial part of the process. The opportunities and challenges BYOD represents are real. Enterprises must make their network infrastructure BYOD ready to meet the onslaught.

Go Further with Microsoft Certification

Video | March 15, 2012

The 'Go Further' video is an testimonial to the value of Microsoft Certification as a validation of technical skills. Whether you're just starting your IT career, or looking to advance it, certification can make a huge impact. Take a look at the video, and hear the stories of real MCPs.

T-SQL Basics: Anatomy of the Select Statement

Article | Sep. 19, 2011

Relational databases are important not only because of the information they store but, more importantly, for the data we retrieve from them. The select statement allows us to ask the database a question. It’s the way we retrieve information from the database system.

Troubleshoot Domain Controllers with Dcdiag.exe

Article | Feb. 15, 2011

Dcdiag is an often overlooked tool that can discover problems in a domain controller’s configuration. If client computers can't locate a domain controller or if domain controllers can't replicate Active Directory, you can run tests with Dcdiag to look for a solution.

Djoin.exe Simplifies and Automates Joining Computers to a Domain

Article | Sep. 14, 2010

Adding a new computer to an Active Directory domain can be a disruptive process, particularly if that computer is part of a large, high-speed deployment. Djoin.exe is a command line tool that permits the joining of a Windows 7 or Server 2008 R2 computer to Active Dir...

BranchCache Reduces Traffic between HQ and Branch Offices

Article | Aug. 20, 2010

Windows Software Update Services (WSUS) is commonly used to distribute security patches and updates for Windows operating systems and Microsoft applications. WSUS is a web application that runs within Internet Information Services (IIS) on Windows Server. When client...