984 Results Found
Scrum serves as a framework for the development of software and other products. It helps teams collaborate and provides a way to address challenges and changes in order to deliver a high value product. The Scrum Master promotes and supports the framework (Scrum). A Certified Scrum Master (CSM) helps everyone understand Scrum theory, practices, rules, and values.
Kirsten Lora, Global Knowledge Senior Product Director, explains why business analysts are essential to organizations and how our Business Analysis Essentials and Business Process Analysis courses can help them in these roles
This paper provides an overview of how to judge the rigor of one's decision making. It describes how anyone can make better (higher quality) decisions, in any situation.
One of the most used ways for hackers to attack an organization is through email phishing. From an attacker’s point of view, email attacks can be automated at scale with thousands of emails sent virtually for free.
Power BI is a business analytics solution that lets you visualize your data and share insights across your organization or embed them in your app or website. Connect to hundreds of data sources and bring your data to life with live dashboards and reports. Join us during this recorded webinar to see what Power BI can do for you and your organization.
Microsoft’s Excel program is a staple in many business environments, but very few people take full advantage of this tool. This webinar is a great opportunity to introduce yourself to formulas, data validation, pivot tables, and power query.
Getting the best possible performance from a SQL server can become more complicated as you add more operations to your database.
Thinking about getting ITIL certified? In this post, we cover the value of each ITIL certification and dive into survey results to determine whether ITIL certifications are worth it. The results are in!
Cloud and virtualization technologies have spawned a whole ecosystem of applications. But like any powerful technology, they can be used for bad as well as good. This session reviews the top 10 most common mistakes made in cloud and virtualization security.
Cyber resilience is becoming a bigger issue for all organizations. But what does “good cyber resilience” look like? And how do you get there?
In this white paper, you'll discover what SAP BusinessObjects and Web Intelligence can deliver. When it comes to accessing large amounts of data and then creating customized and sophisticated analytical reports, you'll see why Web Intelligence is a wise choice.
In the previous post, we discussed the need for VXLAN in the cloud along with the issues it solves. In this post, we will focus more on how VXLAN works.
One of the most important steps in mastering a new technology is learning the associated terminology or vocabulary. In the IT field, this can be a very challenging step, as much of the terminology is often used inconsistently. This white paper defines the terminology associated with IT virtualization. It is mainly vendor-agnostic, but it does provide some vendor-specific terms, product names, and feature names used by VMware, Citrix, and Microsoft.
In 2013, VMware announced VMware Virtual SAN (VSAN), which is VMware's native version of Software Defined Storage (SDS). It is simple, easy to setup and managed by user-defined policies. This paper explains VSAN, its basic requirements and how it works.
There are some common misconceptions on the part of some of my students as to how VPN sessions are established from either a remote location or remote user to the ASA firewall. In particular, a “gray area” seems to be when the attributes from the tunnel group are app...
There are many interesting new issues that seem to have come with the addition of voice and video to the data network. Most of the engineers that are now working on VoIP networks come from either a pure data network background or a traditional phone system background...
Resource Pools are often misunderstood, disliked, and untrusted by vSphere Administrators. However, resource pools can be very useful tools for administrators who want to configure resource management without having to individually configure each VM. This leads to the administrator’s desire to explore the proper usage of resource pools.
This vSphere Essentials white paper will give you a basic understanding of some of the concerns or planning points to consider as you get ready to deploy vSphere in your organization. This is a glimpse into some of the essential things to consider for implementing vSphere. This will focus on some of the basics that vSphere administrators run into when installing the latest features and not realizing they still have some older versions implemented.
There are two types of virtual switches available using vSphere, the vSphere Standard Switch and the vSphere Distributed Switch. The vSphere Standard Switch (vSwitch or vSS) resides in and is manually configured and administered on each ESXi host. The vSphere Distributed Switch (dvSwitch or vDS) provides similar functionality but is centralized to vCenter Server and is more featured. This white paper will cover the vDS architecture as well as an overview of many of the different features that are exclusive to the vSphere Distributed Switch.
VMware Horizon 6 was announced in April and began shipping in June 2014, bringing a more unified suite delivering more integration with infrastructure and cloud products and more simplicity for all devices. Along with the numerous updates across the Horizon suite, VMware has transitioned to a more traditional product licensing hierarchy. This paper explores the new licensing model and provides an overview of the new features associated with VMware Horizon 6.
In the rapidly evolving world of IT infrastructure and cloud computing, organisations are constantly looking for ways to transform and modernise their data centres. One of the leading solutions increasingly emerging in this regard is VMware Cloud Foundation. This powerful platform provides an integrated and automated infrastructure that enables companies to operate more efficiently, save costs and be more agile. In this article, we dive deeper into VMware Cloud Foundation and discuss training options to build the expertise needed.
When properly utilized, VLANs and trunks provide flexibility, stability and ease of troubleshooting. This paper provides technical details about VLANs and trunks, along with design options at a basic to intermediate level. Recommendations and commands are included throughout.
While the recent trend towards cloud computing might make it seem like virtualization is new, it has existed in some form for many decades.
There are many challenges that come to the forefront as you begin the process of virtualizing the data center and moving away from the current physical network setup.
Examine fifteen common myths surrounding virtualization, including many that prevent IT administrators (or their bosses) from getting the maximum value from virtualization. This paper is designed to be vendor-neutral; in other words, the basic concepts and advantages are the same whether you choose to use Citrix XenServer, VMware vSphere, Microsoft Hyper-V, or one of the many Linux-based solutions. We'll break the reasons into three broad categories (Cost/ROI, Performance, and Other), allowing you to focus in on a specific area if desired, or you can review the entire white paper for a broader view.
This article defines many of the most commonly used terms in the virtualization vocabulary.
Virtualization is an umbrella term that continues to evolve to include many different types that are used in many different ways in production environments. Originally virtualization was done by writing software and firmware code for physical equipment so that the physical equipment could run multiple jobs at once. With the success of VMware and its virtualization of x86 hardware, the term virtualization has grown to include not just virtualizing servers, but whole new areas of IT. This article is going to look at the origins of virtualization and how some of the historical development has spurred on today's virtualization. In addition, we will discuss different types of virtualization that are being utilized in the marketplace today and a listing of some of the leading vendors.
Many people believe that cloud computing requires server (or desktop) virtualization. But does it? We will look at using virtualization without cloud computing, cloud computing without virtualization, and then look at using both together. In each case, we'll look at where each deployment might be most useful, some use cases for it and some limitations.
One of the advantages of vSphere is that you can move a virtual machine from one location to another, across servers, storage locations-even data centers. Physical servers don't have that ability and that can have many implications for disaster recovery, availability, and so forth. This white paper explains why migrations are useful, the methods that vSphere makes available for you to manually move a virtual machine (VM), and how vSphere can automate the process for you in various scenarios.
The IT Skills and Salary Report covers a lot in the published report, and that’s only the surface. Here are four snippets of AWS data that weren't included in the published report.
One of the many useful features of tunneling is to carry non-IP traffic across an IP network, and this is still the case when dealing with IPv6 traffic. This transition mechanism makes use of a configured tunnel to transport IPv6 over a native IPv4 network, which may consist of two sites or more. Unlike the previous transition mechanisms, tunneling is not monolithic; while the basic principles may be similar, the operations are different. The following chart gives a breakdown of the current, major tunneling types in use, particularly in a Cisco environment:
RTMT provides a set of canned views of both system resources and application counters that provide you with a snapshot of your environment right out of the box. Read on to learn how you can make RTMT even more helpful by customizing it to show you different views of your resources and CUCM environment.
While the last few years have brought about many great advances in IT and network technology security and risk management have a critical point. There is a host of new concerns the IT security manager must be concerned with, including social networking, mobile, cloud, and information sharing. This has unleashed a new wave of change and potential risk. Risk management is required to deal with these emerging technologies and should provide the rationale for all information security activities within the organization. You can think of risk management as the process of ensuring that the impact of threats and exploited vulnerabilities is within acceptable limits at an acceptable cost. Risk management requires the use of countermeasures. Countermeasures can include any process that serves to reduce threats or vulnerabilities.
Occasionally as I'm teaching a Cisco training class, I get an idea for a blog post and it happened again this week. The Securing Networks with ASA Fundamentals curriculum is mostly based on the Adaptive Security Device Manager (ASDM). While the class describes the us...
The methods we have used in the past to secure our networks won’t work for tomorrow’s networks. Cloud-based applications and multi-tenant environments require greater scalability, agility and control. Software-defined networking (SDN), such as that provided by VMware NSX, can deliver a new platform that transforms networking and provides for much more specific control of the security of your data and networked applications. In this white paper, author Bill Ferguson describes the microsegmentation of security and illustrates how you can use NSX to provide security that works on today’s and tomorrow’s networks.
This white paper describes a technique for defining processes called SIPOC (Suppliers, Inputs, Process, Outputs, and Customers). SIPOC provides a structured way to define the key elements of any process. SIPOC can be used as a means of defining any of the service management processes presented in ITIL® best practices. Furthermore, SIPOC can be used as the preliminary input into the more formal documentation of a process in one of many process design tools.
Global Knowledge instructor Mark Baugher discusses how to use System Center 2012 Configuration Manager to report on installed software on computers.
The purpose of this Webinar is to introduce Apache Spark and its relevant integration with IBM SPSS Modeler. Why integrate? What type of benefits? We will review the integration process high level and advise which enhanced features to pay attention to, and common pitfalls to avoid.
Adding a new computer to an Active Directory domain can be a disruptive process, particularly if that computer is part of a large, high-speed deployment. Djoin.exe is a command line tool that permits the joining of a Windows 7 or Server 2008 R2 computer to Active Dir...
If you are upgrading to ESXi 5.1, there are some important facts that you should consider first. Upgrading involves many stages and processes that must be performed in a specific order. Many of these processes are one-way and do not provide a "back button." If you do not use care and consideration in your upgrade plan, you could possibly lose important data and configuration; and potentially even lose contact with your servers.
If you're running SharePoint 2010, learn how SharePoint 2013 is different and what you'll need to learn to deploy it effectively.
If you're running SharePoint 2007, learn what had changed in SharePoint 2013 for administrators and developers.
The PMP certification exam is changing but the PMBOK is not. Everyone planning to pursue their PMP certification in 2020 needs to know what is changing and how it will affect the way they prepare for the exam. In this session we will identify and explore the changes that PMI has announced to the PMP Certification Exam Blueprint, when and how the exam will be affected, and will look at a few examples of potential new questions. View the slide deck>
Whether you are a seasoned computer user or new to the MS Office environment, we are sure you have some questions regarding Office 365. This webinar will help demystify the differences between Office 365 in the Cloud and on your PC. Find out when to use one over the other. Have you wondered when should you use OneDrive over SharePoint. Can you just use PowerBi Desktop or should you subscribe to the PowerBI Service? What is Delve? Is Flow a useful tool and how could you use it?
Join Microsoft SQL Server expert Brian Egler for an hour-long webinar covering the key features and updates in the upcoming release of Microsoft SQL Server 2014! You will get a thorough review, along with demonstrations, of how SQL Server 2014 provides substantial improvements in performance, manageability, and availability that will make your job easier.
A strong event management process that is able to detect changes of state throughout an organization’s IT environment is a key aspect of a complete suite of service management processes. Event management ultimately helps an organization maintain control through an understanding of the state of things, and how the state of those things changes in an IT environment.
So far, in our discussion of Router Information Protocol (RIP), we’ve discussed the basics and also verified and reviewed RIP version1. We stated that RIP version 1 is a classful routing protocol that used FLSM and sent it routing updates without the subnet mask. In...
One of the most difficult concepts for me as I was learning database syntax was joins. Of course, I tried reading and understanding articles and books that dealt with this topic. In almost every case, I was faced with the Venn diagram examples.
There is a wide-range of services available in GCP ranging from Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) to completely managed Software-as-a-Service (SaaS). In the first part of this series, we will discuss the available infrastructure components and how they provide a powerful and flexible foundation on which to build your applications.
In this hour-long webinar, Global Knowledge instructor and ITIL Expert Michael Scarborough will share his knowledge and expertise on various aspects of incident management and problem management processes. He will help you understand the difference between incidents and problems and between incident and problem management, providing examples from his own experience to drive the concepts home. Michael will also provide an overview of who performs various incident and problem management activities in an organization.
If you are coming to AIX from another UNIX system, the Object Data Manager (ODM) will be new to you. Fortunately, it is not so very complicated. This white paper explains how ODM is structured and how to use these databases in order to meet the goals the architects had for the ODM.
A brief introduction to the basics of penetration testing.
Next Hop Resolution Protocol enables businesses to have a way for next-hop servers and next-hop clients to communicate with each other directly, bypassing a central hub and preventing potential bottlenecks.
Global Knowledge Product Manager Tori Easterly discusses the benefits of our Understanding Networking Fundamentals course.
Kubernetes automates container management. The process of container orchestration is so complex that trying to manage containers by hand has become impossible. There are many, components to container orchestration, but one of the most misunderstood is networking. In this 1-hour webinar we’ll explore how k8s actually performs IP networking and service discovery, two of the most critical components for successfully delivering microservices. We’ll examine how kubernetes carries the burden of cloud networking and lastly what it takes to pass the CKAD/CKA Certifications.
Google Cloud Platform (GCP) is Google’s public cloud offering comparable to Amazon Web Services and Microsoft Azure. The difference is that GCP is built upon Google's massive, cutting-edge infrastructure that handles the traffic and workload of all Google users. There is a wide range of services available in GCP ranging from Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) to completely managed Software-as-a-Service (SaaS). We will discuss the available infrastructure components and how they provide a powerful and flexible foundation on which to build your applications.
The responsibility for securing organizational data has spread beyond the traditional IT professional. While there are more diverse security solutions, there are more diverse and sophisticated security threats. Security awareness and training is essential for everyone within an organization. Learn how Cisco has continued to evolve its security solutions and training.
Where should you apply the CSS, and why are there two places to apply it? One approach is to pick one of the parameters and apply the permissions there. Quite often, an administrator will pick the phone-level CSS and configure it there so that it applies to all calls made from all lines. The goal is to specify what partitions are allowed to be called.
Like many UNIX operating systems, AIX uses the concepts of Logical Volume Management (LVM) in its data management architecture. This white paper explains the specifics of the AIX LVM and provides some tips and best practice recommendations to get the most from your AIX disk storage.
Learn how to leverage e-Learning to its full potential from someone who has succeeded in e-Learning. E-Learning is considered the way of the future for good reason: attractive cost-savings, flexibility, and convenience. To realize these benefits, you need to craft the training to meet a number of rigorous objectives. Join Kevin Kernohan, senior production manager at Global Knowledge, and Ann Schuler, learning and development consultant at the Government of Alberta Human Services Ministry, as they lead you from beginning to end of the e-Learning development cycle. In partnership with the Government of Alberta, Global Knowledge developed the Critical Thinking in Action training program for employees throughout the province. Discover why this e-Learning program earned a CSTD Award for Training Excellence and how you can assimilate these best practices into your organization.
UFFA, which stands for “Use it, Flag it or Fix it, Add it,” is the responsibility of every support professional in the knowledge management process. It comes from the Knowledge-Centered Support (KCS) methodology where knowledge management is based on collaboration and a shared ownership of the knowledge base. Let’s break it down.
John Barnes, Global Knowledge's Cisco Course Developer, discusses enhancements to our UCS Troubleshooting Boot Camp and suggestions for students in preparation for this course.
Cloud computing is a big force in IT today, and it isn't going away. In fact, cloud adoption is going up geometrically, both for end users (think apps on your phone or tablet) as well as for organizations of all sizes. In fact, many smaller organizations may not have any on-premises infrastructure at all, other than networking infrastructure to get connected to the cloud. With this transformation in IT, it behooves all of us in the industry to understand it and adapt or risk being out of a job, like punch card operators.
The VMware NSX platform combines networking and security functionality directly in the hypervisor and it interoperable with a vast majority of VMware’s products. The platform provides a set of logical networking elements and services, using logical switching, routing, load balancing, VPN, firewall, etc. This product decouples network functionality from the physical devices.
Relational databases are important not only because of the information they store but, more importantly, for the data we retrieve from them. The select statement allows us to ask the database a question. It’s the way we retrieve information from the database system.
Last blog we looked at how we can use Trunk groups to ease the configuration of dial-peers and digit manipulation using analog FXO ports for an E911 solution. Now let’s take a look on how it can be used for T-1 CAS configurations and ISDN channel selection. The firs...
One aspect of Unified Communications is this concept of trunk groups. I will discuss what they are, what benefit they can provide and how to configure them for Cisco gateways. First of all the official definition of a trunk group is “A group of trunks serving the s...
Dcdiag is an often overlooked tool that can discover problems in a domain controller’s configuration. If client computers can't locate a domain controller or if domain controllers can't replicate Active Directory, you can run tests with Dcdiag to look for a solution.
The triple constraints model has been one of the main staples for teaching project management for as long as I can remember. The model is generally represented by a triangle with Scope on the horizontal leg, Time on the left leg, Cost or Resources on the right leg an...
Organizations and individuals are threatened with ever-growing cyber threats and must be prepared to address them. The more we are connected to networks, the more suspectable we are to attacks, therefore enterprises must stay current applying various cybersecurity measures and maintaining awareness of cybersecurity trends. View the slide deck>
Since PeopleCert’s acquisition of the ITIL Body of Knowledge in 2021, they have worked to modernize, refine, and improve the guidance it provides so that businesses that adopt it facilitate better collaboration between IT and its stakeholders, experience greater user satisfaction when utilizing IT services, and deliver improved business outcomes. During that time, the certification program has continued to evolve to better align to the people doing the work, the roles they hold, and the types of practices they perform in the co-creation of value for the organization. We plan to discuss the value & benefits that ITIL certification brings to organizations, to describe the re-certification pathways of the recently announced recertification program, and to illustrate how you can leverage the modern components of the ITIL framework to grow your ITSM practice. We hope you’ll join us, along with our partners from Peoplesoft, for this robust discussion on the modern practices of the ITIL®4 framework, and how Skillsoft can help you implement them. Watch Now
Explore the key features and benefits of Azure Active Directory Identity Protection. You'll learn how this powerful tool can help you detect and mitigate identity risks, automate threat response, and provide real-time protection against suspicious activities.
The main reason for Python’s explosive growth is that it’s very easy to learn, use, and deploy, and in this 45-minute webinar, we’ll take a high level look at Python’s syntax, and explore some of the other reasons for Python’s ubiquity, including its very active and evangelical user community, and the availability of a huge collection of add-ons and libraries, including hundreds for data science and machine learning. Join Skillsoft as we focus on the role that Python can play in almost every area of your business, including as a productivity tool for employees and domains that you might not necessarily associate with a programming function. Watch Now
To stay competitive in the industry, your employers and clients rely on you to stay ahead of the tech curve. Maybe they look to you when they evaluate a move to the cloud, or maybe they bring you a problem and point to an existing tech stack for solutions you may or may not be able to create. Whatever the scenario, you can be sure that the skills you bring to the table are critical on many levels. We will take a look at the cybersecurity Architect Expert certification track. This is the first expert-level certification in Microsoft’s Security, Compliance, and Identity portfolio. This certification will focus on designing elements of a cybersecurity architecture and evaluating the tradeoffs between different solutions. Watch Now
Whether you’re a business user, administrator, or embarking on your technical career, this certification provides an opportunity to prove yourself as a cloud evangelist. In addition to validating your knowledge of Microsoft 365 capabilities, earning this certification makes it clear to your organization that you understand the benefits of adopting cloud services, the basics of a Software as a Service (SaaS) cloud model, and the value of implementing Microsoft 365 cloud services. Join Skillsoft in the third of our Transformative Tech Microsoft Certification series, where we demonstrate foundational-level knowledge of cloud services, such as standard practices, considerations, and benefits. Watch Now
Join Skillsoft, as part of our Transformative Tech series, as we demonstrate how we can educate your organization to foster a culture of cybersecurity and unify all employees to manage risk and encourage agility and vigilance. Watch Now
If you enjoy analyzing data and using Power BI to discover and unlock data insights, this could be the ideal certification for you – especially if you use those insights to provide easy-to-understand data visualizations that can help drive the success of your team and organization. Join Skillsoft in the second of our Transformative Tech Microsoft Certification series, where we leverage our expert knowledge in Microsoft Power BI to inform you on the potential benefits for your business when utilizing Power BI. In this webinar you will learn: Watch Now
Chaos and disorganization are commonplace as organizations struggle to manage IT-enabled services, which can have a serious impact on the Helpdesk. Skillsoft has the solution with ITIL. The Foundation, Advanced, and Extension Modules will provide knowledge and training so that you can proactively build and manage a blueprint for IT. This will enable you to effectively address real-world issues that impact your service organizations and their individual contributors alike. Watch Now
Explore how IT decision-makers’ training views have changed since we first released our annual IT Skills and Salary Report 12 years ago. Once viewed as an expense, IT leadership now sees professional development as an investment. Even with shrinking budgets and a recent rise in skills gaps, the value of training is currently at an all-time high.