Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Topics

Show Filters
Result Filters:

1019 Results Found

Results per page: 10 40 80

4 Mistakes Cloud Architects Can’t Afford to Make in Their Jobs

Article | Dec. 15, 2020

These mistakes can be resume-updating events if you are not careful. Take the time to learn the skills of a cloud architect and both your career and your employer will benefit.

Can One VLAN Reach Another Without a Router or OSI Layer 3 Device?

Article | Dec. 15, 2020

Early one morning, an engineer end user discovered that the Engineer servers were unreachable, and he didn’t know if he could reach the Internet. The administrator investigated the user’s PC with the IPCONFIG /ALL command and verified that the PC was a DHCP client, but it had received an address from the Accounting DHCP server, not the Engineering DHCP server.

Does a MAC Address Mean Apple Invented It?

Article | Dec. 15, 2020

While Apple has created many fine things, they were yet to be created themselves when Xerox PARC scientists created Media Access Control addresses. These MAC addresses are 48 bits or 6 bytes long, so they are also known as MAC-48 or EUI-48. EUI stands for Extended Unique Identifier. It is written in hexadecimal characters as shown below:

FLOGI, PLOGI, and PRLI

Article | Dec. 15, 2020

When you connect your server or storage, it will send a Fabric login (FLOGI) request. This FLOGI request serves two purposes: Fibre Channel ID is the WWPN connection to this port from the FLOGI server Exchange buffer credits with the switch To better understand the first function, it is exactly the same if I rewrite it as, “request an IP address for a MAC address from the DHCP server”.

From Foundation to Finish Line: Get Your Head in the Microsoft Azure Cloud

Webinar – Recorded | Dec. 08, 2020

Join this exciting journey through the Microsoft cloud. We will discuss how companies have implemented Azure and other Microsoft cloud services and solutions. We will also address hesitations companies may have as they consider cloud technologies. In addition, we will explore practical tips about how to begin or continue your journey as you implement cloud solutions.

10 Ways to Test Your Network’s Defenses

Article | Dec. 04, 2020

Hackers are looking for your company’s network. Unless you are offline and have no internet connectivity, the company network is discoverable.

10 Steps to Improve Your Job Position as a Cybersecurity or IT Professional

Article | Nov. 30, 2020

Finding the right job may not always be that easy. For IT and cybersecurity professionals who are searching for a new job, or would just like to hang onto their current one, there are steps you can take to improve your job position. Whether you’re looking to get better at your job or advance up the ranks of your organization, these tips are aimed at you!

Do These Seven Things to Safeguard Your Computer and Network Going into 2021

Article | Nov. 30, 2020

With 2021 quickly approaching, you need to be ready for existing and new threats. If you want to secure your system from hackers, then you need to think like them. In 2020, we saw attacks on many companies such as Twitter, Experian South Africa, British Airlines, DigitalOcean, etc. These companies have trained security teams, but hackers continue to find ways exploit vulnerabilities.

Advantages of Using SonicWALL Route-Based VPN Instead of Site-to-Site VPN

Article | Nov. 19, 2020

There are several advantages to implementing a route-based VPN (a.k.a. tunnel interface VPN) instead of a site-to-site one. Learn more.

DevOps: the leading choice for high velocity business

Webinar – Recorded | Nov. 10, 2020

In this 1-hour webinar, you will learn more about the current DevOps market landscape and how to lead a conversation with the C-suite about how to sustain high-velocity businesses with DevOps training and certifications across three key success factors: Culture, Practices & Automation. View slide deck>