Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By
Show Filters
Result Filters:

29 Results Found

Results per page: 10 40 80

Is Agile the Best Way Forward for Your Organization?

Webinar – Recorded | April 07, 2017

This webinar focuses on assisting leaders who are determining whether Agile is right for their organization. In one hour, we will take you from the basic concepts of Agile methodology to understanding the process and what your role is as a leader. You will learn the challenges and benefits and how an Agile culture can fuel your teams and provide value for your customers faster.

Project Managers in Agile - Where do They Fit In?

Webinar – Recorded | March 31, 2017

Agile project management literally turns the world of managing projects upside down. The triple constraint is balanced in an unconventional way, the role of the matrix team coordinator is downplayed, and risk management can be built into the prioritization approach. So, what is left for the PM to do?

IBM Cloud TechTalks (Part 4 of 4): Maximizing Business Agility with Cloud on a z System

Webinar – Recorded | Nov. 12, 2015

Cloud can be described as the ability for users to provision new environments and/or services in a self-service fashion backed by automation. z Systems use technologies that best allow us to apply the strengths of our platform to cloud methodologies while complying with industry standards and preserving the security and manageability of our platform. This enables us to use the strengths of z Systems scalable multitenant architecture for on-premise cloud deployments. z Systems can also expose valuable enterprise services in a secure manner that feels native to mobile and Web application developers, enabling organizations to use enterprise services on z Systems with a frictionless experience for distributed developers.

A Survey of IBM Power Systems Initiatives in Large-Scale Computing

White Paper | Oct. 23, 2015

The amount of data being produced does not seem to show any sign of slowing; if anything, it may in fact be exceeding projected growth rates. As these absolute limitations on raw hardware capacity begin to be felt, the importance of looking at all of the aspects of a computing infrastructure in order to tackle the future's truly large-scale computing demands, is imperative. This white paper examines how IBM's initiatives like Linux, Cloud Manager with OpenStack and the OpenPower Foundation IBM are meeting this challenge.

What's New in Windows 10

Webinar – Recorded | Oct. 15, 2015

Whether you've already upgraded to Windows 10 or you're interested to learn more, this webinar will help familiarize you with the major updates and features. Join Microsoft instructor, John Panagakos, for an hour-long webinar that will dive into the exciting new features Windows 10 has to offer.

Managing Windows Libraries

Video | Jan. 26, 2015

In this video, instructor Glenn Weadock explains the Windows 7 library concept and how it replaces the traditional "My Documents" user profile folder by adding the Public profile to the user profile.

PowerVm Virtualization Essentials

White Paper | Oct. 09, 2014

PowerVM is the virtualization environment for AIX, Linux, and IBM i running on the IBM POWER hardware platform. This white paper provides an overview of PowerVM concepts, architecture, terminology, and capabilities.

Windows 7 Certification and Skills Learning Tracks

Video | Feb. 28, 2013

Chief Technical Architect Craig Brown discusses the Windows 7 certification and skills tracks available to Global Knowledge students.

Seven Security Myths of Windows 7

White Paper | May 10, 2012

Network security is everyone's concern, and this applies to computer security as well. Many security breaches occur due to user ignorance of basic security principles, not malicious intent. Network and computer security are like an onion - there are multiple layers. Good security begins with understanding what you can do to keep your systems safe and implementing a layered approach. If you depend on one program or feature to secure your computer, then when (not if, but when) that dependency is breached, you may have personal information stolen or even have your computer taken over.