25 Results Found
Mark Morgan is a Global Knowledge Senior Instructor. He has worked in the IT industry for over 20 years and has taught Microsoft courses for Global Knowledge since 2000. In this video clip, Mark discusses the top differentiators in Global Knowledge's Windows 7 and Server 2008 Boot Camps.
The four-part Cloud TechTalks series shares practical insights and best practices for using the cloud. With exponential growth and unparalleled demand, there are few areas with greater opportunity than storage in the cloud. Join us for this complimentary, hour-long webinar to hear Susan Schreitmueller, IBM distinguished engineer and senior cloud advisor, share IBM's cloud storage solutions. Along with exploring trends and directions around IBM's roadmap for storage in the cloud, Schreitmueller will review Cloud Managed Services and SoftLayer options, as well as software-defined storage and IBM's suite of products.
When properly utilized, VLANs and trunks provide flexibility, stability and ease of troubleshooting. This paper provides technical details about VLANs and trunks, along with design options at a basic to intermediate level. Recommendations and commands are included throughout.
Switches play a vital role in moving data from one device to another. Specifically, switches greatly improve network performance, compared to hubs, by providing dedicated bandwidth to each end device, supporting full-duplex connectivity, utilizing the MAC address table to make forwarding decisions, and utilizing ASICs and CAM tables to increase the rate at which frames can be processed.
A range of factors can influence the data center you choose. You should consider all of the factors listed in this white paper before deciding where to place your servers.
The first big push toward implementation of IPv6 was mobile devices. Now, one of the driving forces is the Internet of Things. As the name implies, this means everything, including machine to machine communication (M2M).
What is policy-based routing? PBR is the process of using a route map to match on something more than the destination and then defining the path out of the router based on those conditions. Learn more here!
More challenging Microsoft certification exams require the demanding Microsoft boot camps at Global Knowledge. Rebuilt from the ground up to provide students all the study tools needed to master the Microsoft skills needed to certify and succeed.
The process of learning how to subnet IP addresses begins with understanding binary numbers and decimal conversions along with the basic structure of IPv4 addresses. This paper focuses on the mathematics of binary numbering and IP address structure.
While the Internet uses IP addresses assigned by an Internet authority such as the American Registry for Internet Numbers (ARIN), there are too few of these numbers to uniquely identify the millions of computers and computing devices in the world. Therefore, most enterprises use private addresses which allow them to identify the aforementioned computers. Of course, these IP numbers cannot be allowed on the Internet because all private networks use the same ones so there would be vast overlapping of addresses, and the addresses are not compliant anyway. Therefore, it is necessary to change the identity of a private host to a legal public host. This process is called Network Address Translation (NAT) and may be implemented on Cisco firewall products and Cisco routers. The firewall device(s) at the Internet demarcation point is by far the more popular way to implement NAT, but routers are used in small offices or small-to-medium-sized networks in which a separate firewalling solution is not possible or affordable. The focus of this paper is on the router-based NAT solution.