Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By
Show Filters
Result Filters:

210 Results Found

Results per page: 10 40 80

The Role of Critical Thinking in Problem Analysis

White Paper | Oct. 13, 2020

Critical thinking allows us to take control of our thinking rather than letting it become hijacked by convenience, mindset, assumptions and bias. This white paper will walk you through understanding the implications of inputs (data) and influences (bias) to the reasoning process. You will learn how to develop a questioning outlook and quality standards that will lead you to make more effective decisions.

The Power of Linking Business Analysis and TOGAF® to Achieve IT Results

White Paper | Jan. 03, 2017

Linking business analysis skills with the methods of The Open Group’s Architecture Framework, TOGAF®, facilitates stronger IT results that drive business value.

The Packet Delivery Process: Remotely Connected Hosts

White Paper | Sep. 09, 2014

Moving data from one networked device to another requires several different functions. Each function has its own protocol or protocols that define how it is accomplished. Also, the process of delivering data from one device to another can vary. The main factor in data delivery is determining whether the two devices are directly connected or remotely connected.

The Packet Delivery Process: Locally Connected Hosts

White Paper | Sep. 09, 2014

Moving data from one networked device to another requires several different functions. Each function has its own protocol or protocols that define how it is accomplished. Also, the process of delivering data from one device to another can vary. The main factor in data delivery is determining whether the two devices are directly connected or remotely connected.

The Intersection of DevOps and ITIL®

White Paper | July 07, 2015

Change is the order of the day, and if anything, the pace of business and technology change is accelerating. The business and customers are looking to IT service providers to be more responsive, delivering more frequent service changes with higher quality-resulting in services that deliver more value to the business. In order to continue to be relevant and of high value, ITIL must continue to benefit from other complementary best-practices for IT. DevOps, an approach that encourages improved communication, collaboration, and teamwork across development and operations, can have a positive influence in improving ITIL processes across the service life-cycle.

The Internet of Things: A Primer for the Curious

White Paper | April 08, 2015

Like it or not, Internet of Things (IoT) is upon us. There are a number of factors that will impact its adoption rate, and the inevitable privacy (or lack of) discussions will likely happen sooner than later. This is going to change the world as we know it, in many cases for the better. But we will need to keep an eye on the extent to which it invades our personal lives if it is going to be the positive force it has the potential to be.

The Evolution of the IT Decision-Maker

White Paper | Nov. 16, 2017

For 10 years, Global Knowledge has surveyed IT professionals and published the findings in our annual IT Skills and Salary Report. With topics ranging from top-paying certifications to most in-demand skills, our reports have consistently provided a deep examination of the attitudes and opinions held by IT professionals around the globe. With a decade of reporting at our fingertips, we decided it was an appropriate time to dissect the views of those making the decisions in the tech industry. What are their biggest challenges? How have their training opinions changed over time? How do their actions affect staff?

The Current IT Landscape

White Paper | May 13, 2015

IT architecture is undergoing a period of rapid change and evolution. With this change comes enormous opportunity for professionals who are not just deep in a single technology but deeply conversant in several and who can join these technologies together to meet the needs of today's enterprise. The Red Hat Certified Architect program provides a credential that represents these skills and knowledge. Through a combination of flexible requirements and recommended concentrations, Red Hat is providing a path for professionals to advance their careers and for its subscription customers to find the right architect.

The Basics of Configuring and Using Cisco Access Control Lists

White Paper | July 15, 2014

Cisco Access Control Lists (ACLs) are used in nearly all product lines for several purposes, including filtering packets (data traffic) as it crosses from an inbound port to an outbound port on a router or switch, defining classes of traffic, and restricting access to devices or services. Knowing how to design, configure, and troubleshoot ACLs is required for all network engineers working within a Cisco network.

The Basics of Configuring and Using Cisco Network Address Translation

White Paper | July 31, 2014

While the Internet uses IP addresses assigned by an Internet authority such as the American Registry for Internet Numbers (ARIN), there are too few of these numbers to uniquely identify the millions of computers and computing devices in the world. Therefore, most enterprises use private addresses which allow them to identify the aforementioned computers. Of course, these IP numbers cannot be allowed on the Internet because all private networks use the same ones so there would be vast overlapping of addresses, and the addresses are not compliant anyway. Therefore, it is necessary to change the identity of a private host to a legal public host. This process is called Network Address Translation (NAT) and may be implemented on Cisco firewall products and Cisco routers. The firewall device(s) at the Internet demarcation point is by far the more popular way to implement NAT, but routers are used in small offices or small-to-medium-sized networks in which a separate firewalling solution is not possible or affordable. The focus of this paper is on the router-based NAT solution.

The Agile Business Analyst: How Much Is Enough?

White Paper | June 19, 2014

The principles in this white paper help you introduce greater predictability into your own Agile requirements activities, both individually and across your organization. As you start to apply these ideas and pose these questions, you'll likely see certain patterns emerge that will help you establish your own set of practices that make Agile work for you.

Ten Risky Security Behaviors to Avoid: Protect Your Organization

White Paper | Sep. 24, 2014

You are a problem. You are a risk to your employer. The actions you take and the activities you perform at work, online, and even in your personal life put your employer at risk. You need to know how you are a security risk to the organization and what you can do to reduce or eliminate those risks. In this paper, I discuss ten common risky behaviors that typical workers engage in and what you can do to avoid being the weakest link in your company.

Technology Offers Convenience, Privacy Pays the Price

White Paper | Sep. 25, 2015

Technology is a wonderful thing, but it comes with a price: cybersecurity. Free Web browsers, social media sites and other digital services collect personal information like email addresses, phone numbers, place of employment, buying habits, mortgage data that is shared with advertisers. The availability of this information leaves us vulnerable to hackers. This white paper can help you learn more about what kind of personal data is typically collected, and how to secure your information online.

Switching Operations

White Paper | June 05, 2015

Switches play a vital role in moving data from one device to another. Specifically, switches greatly improve network performance, compared to hubs, by providing dedicated bandwidth to each end device, supporting full-duplex connectivity, utilizing the MAC address table to make forwarding decisions, and utilizing ASICs and CAM tables to increase the rate at which frames can be processed.

Successful Business Analysis Interviews Hinge on Prep Work

White Paper | Feb. 06, 2017

A structured business analysis interview is much more than a conversation; it is a controlled event requiring attention to detail, cautious design, and a strong social foundation from which to build a trusting and lasting relationship.

Stop Gathering Requirements and Start Building Them

White Paper | June 19, 2015

We build requirements at a quantum level to connect the vital elements, which are needed to realize a requirement. As we consider the relationships between the behaviors, actions, and responses, we begin to identify and associate the characteristics and conditions, which will drive and constrain the behaviors. Realizing a requirement means joining these elements together and noting them as elements of the requirement.

Stakeholder Perceptions Become Your Project Reality

White Paper | Oct. 13, 2014

For project managers, meeting stakeholder expectations means that you have to know what the expectations are to begin with if you are ever expected to meet them. After expectations have been set, follow up with your stakeholders to ensure that the expectations haven't changed. People change their minds often, so communicate in order to influence their perceptions and expectations. You may be surprised how simple communication and understanding expectations can positively affect your next project.

Solving the Mysteries of Subnetting

White Paper | Feb. 11, 2010

Subnetting is a complicated topic that has confused students for a very long time. However, subnetting is an important topic for many different certifications with various vendors, including Cisco. In the real world environment, people are used to just punching in the numbers in many of the free subnet calculators that are readily available on the internet. For exam purposes, you still have to do this in a very fast manner since many exams are time-based and you don't have the luxury of spending those precious minutes on any single question. This Cisco training whitepaper will solve some of those age-old and complicated subnetting puzzles.

Software Problems and How Docker Addresses Them

White Paper | Jan. 12, 2016

Learn how Docker makes it easy to update, test and debug software with this white paper and gain foundational knowledge about Dockerfile, Docker images and containers.

SIP and the Art of Converged Communications

White Paper | June 18, 2013

Session Initiation Protocol (SIP) is an internet signaling protocol, developed by the IETF (starting in 1996), for establishing, maintaining, and tearing down sessions between a variety of real-time media, including voice, video, and chat. SIP allows endpoints to locate other endpoints, whether stationary or mobile. SIP doesn't have to worry about transporting voice or video as Real Time Transport Protocol (RTP) takes care of that. It also relies on Session Description Protocol (SDP) to negotiate capabilities and codecs. SIP does not provide a Directory Service or Authentication, but it does work with services such as LDAP or RADIUS. SIP is only concerned with signaling. This white paper is going to look at the way SIP is used in the converged Unified Communications environment.

Simplifying VMware vCloud

White Paper | Feb. 25, 2013

This white paper has three main goals. The first is to generate a better understanding of the cloud in both the business and IT communities. The second is to describe the major components of vCloud and the virtual datacenters they provide. The third is help businesses visualize and understand how vClouds could be beneficial in addressing their specific IT needs.

Shortcuts to Speed Your vCloud Deployment

White Paper | Sep. 17, 2013

VMware vCloud Director fashions the provisioning of the software-defined datacenter layer to allow for a full virtual datacenter deployment within a short period of time. A vCloud consists of many layers and can quickly become a complex architecture. Before any deployment, requirements should be defined so that the vCloud can be designed to offer those services needed. It is imperative to understand the many components of vCloud, how each vCloud construct fits, which allocation models are available, and what network options can be chosen.

Seven Tips for Troubleshooting VMware vSphere5

White Paper | May 31, 2012

Here are seven tips for working with vSphere, including: Logging in via Command Line, dealing with connection problems using ssh to an ESXi host; network performance issues; possible storage problems; Log Files to View in vSphere ESXi 5; network performance troubleshooting; migrating to a virtual machine using VMotion.

Seven Security Myths of Windows 7

White Paper | May 10, 2012

Network security is everyone's concern, and this applies to computer security as well. Many security breaches occur due to user ignorance of basic security principles, not malicious intent. Network and computer security are like an onion - there are multiple layers. Good security begins with understanding what you can do to keep your systems safe and implementing a layered approach. If you depend on one program or feature to secure your computer, then when (not if, but when) that dependency is breached, you may have personal information stolen or even have your computer taken over.

Security+ SY0-601 Study Guide

White Paper | Feb. 19, 2021

The Security+ certification is a common component of a cybersecurity professional’s resume, which would leave a gap if it is not present. Learn about the new material that will be present on the SY0-601 Security+ exam.

Security and the Rise of Machine-to-Machine (M2M) Communications

White Paper | Aug. 26, 2014

Increased interconnectivity via machine-to-machine (M2M) communications, the IoE, and smart systems holds profound implications for how business trends continue to evolve. In terms of M2M growth, key developments in security will be essential, from the design and manufacture of devices to more robust cloud security and ensuring the integrity of wireless data transmissions. Without these safeguards in place, organizations and industries that rely on M2M will continue to place themselves at risk.

SDN and Cloud Computing

White Paper | June 18, 2014

After a review of Software-Defined Networking (SDN) and its close cousin Network Functions Virtualization (NFV), this white paper addresses three main deployment scenarios: SDN without deploying cloud computing, cloud computing without deploying SDN, and deploying cloud computing in conjunction with SDN. We'll look at use cases, when the approach makes sense, and any applicable limitations.

Report Formatting for Success with SAP BusinessObjects

White Paper | Dec. 18, 2015

Web Intelligence is much more than just querying a database and displaying data in rows and columns. Take advantage of an extensive set of formatting options to convert data into drillable and actionable information. Highly formatted reports spawn immeasurable user confidence and make a huge difference with the ultimate goal of business intelligence - solving business problems. Get ready to extend your Web Intelligence report design journey with the formatting tips outlined in this white paper.

“Reasonable Security” Best Practices: Learning From Notable Data Breaches

White Paper | Nov. 28, 2016

Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a breach. But what is "reasonable security," and is there a definition?

Project Team Member Performance

White Paper | May 21, 2015

Most project team members report to a functional manager who controls their assignments, performance appraisals, raises, bonuses, etc. Until recently, project managers (PMs) had little input into any of these processes. In this paper, learn how a PM working in a functional or matrix organizational structure can get team members to perform.

PowerVm Virtualization Essentials

White Paper | Oct. 09, 2014

PowerVM is the virtualization environment for AIX, Linux, and IBM i running on the IBM POWER hardware platform. This white paper provides an overview of PowerVM concepts, architecture, terminology, and capabilities.

Playing the Joint Project Manager-Business Analyst Role

White Paper | May 15, 2018

Being able to play both roles of a project manager (PM) and a business analyst (BA) is a great skillset to have. Learn how to ensure your team gets what it needs in these two key roles so that you all can deliver successfully.

Performance and Troubleshooting with esxtop

White Paper | April 19, 2013

The utility that many senior VMware administrators rely on to address performance and troubleshooting issues is the built-in utility called ESXTOP. The tool has been built in to the hypervisor, and can be used in both ESXi and the old ESX host. The first tool many VMware Administrators rely upon is esxtop, to check real-time performance on an ESXi host using a command-line tool such as ssh to start the esxtop CLI utility. This paper will introduce and demonstrate how to start and use esxtop, specifically looking at the CPU fields. In addition, we will cover information that can be used to help with performance issues of the CPU. The esxtop utility is an excellent tool to use when you want to observe an individual ESXi host's performance.

Overcoming Barriers to Creating a Knowledge Management Culture

White Paper | March 29, 2016

Discover the most common barriers you will face when implementing knowledge management and how to overcome them, so that your organization changes, over time, into a culture where knowledge sharing and reuse becomes second nature and part of the normal course of activity.

Office 365: An Introductory Guide

White Paper | June 12, 2015

Microsoft Office 365 has a vast array of features to explore. A rich administration interface, streamlined security, and versatile migration options make this one of the most interesting products when it comes to an SaaS public cloud solution.

New VMware vSphere 6 Features

White Paper | Sep. 11, 2015

With the release of vSphere 6, there are big changes that allow for zero downtime with data access and recovery. The new features enable live migrations across long distances with enhanced vMotion features, datastore backup capabilities around Fault Tolerance upgrades and a new Content Library. These advances help you keep up to date with the latest in server virtualization.

New Topics on the New Security+ SY0-501 Exam

White Paper | Jan. 25, 2018

It has been over three years since the last revision of the CompTIA Security+ exam back on May 1, 2014. In fall of 2017, the latest version, SY0-501, was released. This revamped exam retains the same six domains as established in SY0-401, which emphasizes security in three main areas: application, data, and host.

New RHEL 7.1 Features Ease Business and IT Adoption

White Paper | Jan. 06, 2016

The recent Red Hat Enterprise Linux (RHEL) 7.1 release offers a range of system-wide improvements. Whether you're new to RHEL or a veteran user, this white paper covers essential new tools and upgrades. Dynamic patching, in-place upgrades, easily configuring new deployments or monitoring entire systems represent some of the more significant changes. This white paper not only explores the significance of these modifications, it also provides useful examples, including diagrams and command lines for executing key tasks. RHEL 7.1 represents the first minor release of RHEL 7, which launched in June 2014 and will be supported for a 10-year life cycle.

Network Forensics for Attack Mitigation

White Paper | June 11, 2015

The network forensics market is set to dramatically expand as increasing numbers of organizations become the victims of malware attacks. Limiting the damage from these incursions, and avoiding potentially crippling losses, are key motivators for businesses of any size. And network forensics offers a powerful set of tools to help companies achieve those goals.

Multicast Implementation with Virtual Port Channels and FabricPath

White Paper | April 07, 2015

Multicast Sparse Mode and its derivatives are supported in the Nexus OS. This white paper explains how it has been implemented in the Nexus platform to provide optimum performance in both virtual PortChannel and FabricPath environments.