Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Brands

Show Filters
Result Filters:

93 Results Found

Results per page: 10 40 80

A Beginner's Guide to Encryption

Article | Aug. 29, 2017

It should come as no surprise that in this modern era of digital data we need encryption. But what exactly is it? How do you know what kind of encryption you need? If you were to ask someone what kind of encryption they use, they may respond with a specific encryption-based product, like full-disk encryption. Or they may mention an encryption-based protocol, like HTTPS (HyperText Transport Protocol over SSL). But encryption is much more complicated than that.

Why You Should Consider a Career as a Computer Support Specialist

Article | Aug. 06, 2017

If you are considering career options or have been in the workforce a few years and are seeking a career change, you might want to consider training to become a computer support specialist.

Top 5 Growth Opportunities for IT Pros

Article | July 13, 2017

IT professionals benefit from gaining skills in data analysis, cybersecurity, cloud computing, virtualization and hyperconvergence, and mobile app development.

Password Complexity: You're Doing It Wrong!

Article | July 12, 2017

Just like the physical keys to your car or house, passwords add a bit of inconvenience in exchange for security. However, if you've ever been frustrated by password rules (complexity, special characters and numbers, etc.), you might be happy about the latest news.

Defining and Simulating ITIL® Processes Using IBM WebSphere Business Modeler Advanced

White Paper | Feb. 26, 2016

IBM WebSphere Business Modeler (WBM) can be used in conjunction with an adoption of ITIL best practices. It is a full-featured process modeling and simulation tool that fits well with other IBM products that are used to define various service management processes and activities. In this white paper learn more about how WBM provides both the ability to visually define process activities and the ability to define detailed information about processes, including inputs, outputs, cost, revenue, roles and resources.

Software Problems and How Docker Addresses Them

White Paper | Jan. 12, 2016

Learn how Docker makes it easy to update, test and debug software with this white paper and gain foundational knowledge about Dockerfile, Docker images and containers.

New RHEL 7.1 Features Ease Business and IT Adoption

White Paper | Jan. 06, 2016

The recent Red Hat Enterprise Linux (RHEL) 7.1 release offers a range of system-wide improvements. Whether you're new to RHEL or a veteran user, this white paper covers essential new tools and upgrades. Dynamic patching, in-place upgrades, easily configuring new deployments or monitoring entire systems represent some of the more significant changes. This white paper not only explores the significance of these modifications, it also provides useful examples, including diagrams and command lines for executing key tasks. RHEL 7.1 represents the first minor release of RHEL 7, which launched in June 2014 and will be supported for a 10-year life cycle.

Business Process Modeling: From Macro to Micro

Webinar – Recorded | Nov. 12, 2015

Business processes are complicated, and mapping them is not a trivial task. Modelling standards give us the tools to model complex processes, but they do not tell us the best way to approach a model or effectively use the tool. In this hour-long webinar, Global Knowledge instructor Rod Fage will guide you through the best way to develop a model, from determining the goal and scope of the process and measuring its effectiveness, to modelling the process in a hierarchical top-down approach, enabling business analyst to continuously validate the model.

IBM Cloud TechTalks (Part 4 of 4): Maximizing Business Agility with Cloud on a z System

Webinar – Recorded | Nov. 12, 2015

Cloud can be described as the ability for users to provision new environments and/or services in a self-service fashion backed by automation. z Systems use technologies that best allow us to apply the strengths of our platform to cloud methodologies while complying with industry standards and preserving the security and manageability of our platform. This enables us to use the strengths of z Systems scalable multitenant architecture for on-premise cloud deployments. z Systems can also expose valuable enterprise services in a secure manner that feels native to mobile and Web application developers, enabling organizations to use enterprise services on z Systems with a frictionless experience for distributed developers.

A Survey of IBM Power Systems Initiatives in Large-Scale Computing

White Paper | Oct. 23, 2015

The amount of data being produced does not seem to show any sign of slowing; if anything, it may in fact be exceeding projected growth rates. As these absolute limitations on raw hardware capacity begin to be felt, the importance of looking at all of the aspects of a computing infrastructure in order to tackle the future's truly large-scale computing demands, is imperative. This white paper examines how IBM's initiatives like Linux, Cloud Manager with OpenStack and the OpenPower Foundation IBM are meeting this challenge.