1082 Results Found
One aspect of Unified Communications is this concept of trunk groups. I will discuss what they are, what benefit they can provide and how to configure them for Cisco gateways. First of all the official definition of a trunk group is “A group of trunks serving the s...
Last blog we looked at how we can use Trunk groups to ease the configuration of dial-peers and digit manipulation using analog FXO ports for an E911 solution. Now let’s take a look on how it can be used for T-1 CAS configurations and ISDN channel selection. The firs...
Relational databases are important not only because of the information they store but, more importantly, for the data we retrieve from them. The select statement allows us to ask the database a question. It’s the way we retrieve information from the database system.
The VMware NSX platform combines networking and security functionality directly in the hypervisor and it interoperable with a vast majority of VMware’s products. The platform provides a set of logical networking elements and services, using logical switching, routing, load balancing, VPN, firewall, etc. This product decouples network functionality from the physical devices.
Cloud computing is a big force in IT today, and it isn't going away. In fact, cloud adoption is going up geometrically, both for end users (think apps on your phone or tablet) as well as for organizations of all sizes. In fact, many smaller organizations may not have any on-premises infrastructure at all, other than networking infrastructure to get connected to the cloud. With this transformation in IT, it behooves all of us in the industry to understand it and adapt or risk being out of a job, like punch card operators.
John Barnes, Global Knowledge's Cisco Course Developer, discusses enhancements to our UCS Troubleshooting Boot Camp and suggestions for students in preparation for this course.
UFFA, which stands for “Use it, Flag it or Fix it, Add it,” is the responsibility of every support professional in the knowledge management process. It comes from the Knowledge-Centered Support (KCS) methodology where knowledge management is based on collaboration and a shared ownership of the knowledge base. Let’s break it down.
Learn how to leverage e-Learning to its full potential from someone who has succeeded in e-Learning. E-Learning is considered the way of the future for good reason: attractive cost-savings, flexibility, and convenience. To realize these benefits, you need to craft the training to meet a number of rigorous objectives. Join Kevin Kernohan, senior production manager at Global Knowledge, and Ann Schuler, learning and development consultant at the Government of Alberta Human Services Ministry, as they lead you from beginning to end of the e-Learning development cycle. In partnership with the Government of Alberta, Global Knowledge developed the Critical Thinking in Action training program for employees throughout the province. Discover why this e-Learning program earned a CSTD Award for Training Excellence and how you can assimilate these best practices into your organization.
Like many UNIX operating systems, AIX uses the concepts of Logical Volume Management (LVM) in its data management architecture. This white paper explains the specifics of the AIX LVM and provides some tips and best practice recommendations to get the most from your AIX disk storage.
Where should you apply the CSS, and why are there two places to apply it? One approach is to pick one of the parameters and apply the permissions there. Quite often, an administrator will pick the phone-level CSS and configure it there so that it applies to all calls made from all lines. The goal is to specify what partitions are allowed to be called.
The responsibility for securing organizational data has spread beyond the traditional IT professional. While there are more diverse security solutions, there are more diverse and sophisticated security threats. Security awareness and training is essential for everyone within an organization. Learn how Cisco has continued to evolve its security solutions and training.
Google Cloud Platform (GCP) is Google’s public cloud offering comparable to Amazon Web Services and Microsoft Azure. The difference is that GCP is built upon Google's massive, cutting-edge infrastructure that handles the traffic and workload of all Google users. There is a wide range of services available in GCP ranging from Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) to completely managed Software-as-a-Service (SaaS). We will discuss the available infrastructure components and how they provide a powerful and flexible foundation on which to build your applications.
Kubernetes automates container management. The process of container orchestration is so complex that trying to manage containers by hand has become impossible. There are many, components to container orchestration, but one of the most misunderstood is networking. In this 1-hour webinar we’ll explore how k8s actually performs IP networking and service discovery, two of the most critical components for successfully delivering microservices. We’ll examine how kubernetes carries the burden of cloud networking and lastly what it takes to pass the CKAD/CKA Certifications.
Global Knowledge Product Manager Tori Easterly discusses the benefits of our Understanding Networking Fundamentals course.
Next Hop Resolution Protocol enables businesses to have a way for next-hop servers and next-hop clients to communicate with each other directly, bypassing a central hub and preventing potential bottlenecks.
A brief introduction to the basics of penetration testing.
If you are coming to AIX from another UNIX system, the Object Data Manager (ODM) will be new to you. Fortunately, it is not so very complicated. This white paper explains how ODM is structured and how to use these databases in order to meet the goals the architects had for the ODM.
In this hour-long webinar, Global Knowledge instructor and ITIL Expert Michael Scarborough will share his knowledge and expertise on various aspects of incident management and problem management processes. He will help you understand the difference between incidents and problems and between incident and problem management, providing examples from his own experience to drive the concepts home. Michael will also provide an overview of who performs various incident and problem management activities in an organization.
There is a wide-range of services available in GCP ranging from Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) to completely managed Software-as-a-Service (SaaS). In the first part of this series, we will discuss the available infrastructure components and how they provide a powerful and flexible foundation on which to build your applications.
One of the most difficult concepts for me as I was learning database syntax was joins. Of course, I tried reading and understanding articles and books that dealt with this topic. In almost every case, I was faced with the Venn diagram examples.
So far, in our discussion of Router Information Protocol (RIP), we’ve discussed the basics and also verified and reviewed RIP version1. We stated that RIP version 1 is a classful routing protocol that used FLSM and sent it routing updates without the subnet mask. In...
A strong event management process that is able to detect changes of state throughout an organization’s IT environment is a key aspect of a complete suite of service management processes. Event management ultimately helps an organization maintain control through an understanding of the state of things, and how the state of those things changes in an IT environment.
Join Microsoft SQL Server expert Brian Egler for an hour-long webinar covering the key features and updates in the upcoming release of Microsoft SQL Server 2014! You will get a thorough review, along with demonstrations, of how SQL Server 2014 provides substantial improvements in performance, manageability, and availability that will make your job easier.
Palo Alto Networks offers instructor-led training (ILT) through Skillsoft Global Knowledge, an authorized training provider, that connects learners directly with certified industry experts in a structured and engaging environment.
Skillsoft Global Knowledge is offering a series of free Copilot bootcamps on Percipio. Designed to empower individuals and organizations with the latest in Copilot technology, these bootcamps cover a range of essential topics, ensuring you gain comprehensive knowledge and practical skills.
In today's rapidly evolving digital landscape, maintaining a competitive edge is essential for individuals and organizations. Obtaining the ITIL® 4 Practice Certification is one effective strategy to ensure your success. This certification offers numerous advantages that can considerably improve career prospects and organizational efficiency. Let us explore why this certification is pivotal.
Whether you are a seasoned computer user or new to the MS Office environment, we are sure you have some questions regarding Office 365. This webinar will help demystify the differences between Office 365 in the Cloud and on your PC. Find out when to use one over the other. Have you wondered when should you use OneDrive over SharePoint. Can you just use PowerBi Desktop or should you subscribe to the PowerBI Service? What is Delve? Is Flow a useful tool and how could you use it?
Explore how Skillsoft Global Knowledge, an award-winning training provider, upskills and reskills through high-quality training courses and certifications.
The PMP certification exam is changing but the PMBOK is not. Everyone planning to pursue their PMP certification in 2020 needs to know what is changing and how it will affect the way they prepare for the exam. In this session we will identify and explore the changes that PMI has announced to the PMP Certification Exam Blueprint, when and how the exam will be affected, and will look at a few examples of potential new questions. View the slide deck>
If you're running SharePoint 2007, learn what had changed in SharePoint 2013 for administrators and developers.
If you're running SharePoint 2010, learn how SharePoint 2013 is different and what you'll need to learn to deploy it effectively.
If you are upgrading to ESXi 5.1, there are some important facts that you should consider first. Upgrading involves many stages and processes that must be performed in a specific order. Many of these processes are one-way and do not provide a "back button." If you do not use care and consideration in your upgrade plan, you could possibly lose important data and configuration; and potentially even lose contact with your servers.