31 Results Found
With ever increasing demands for storage, system administrators often find themselves needing to add new storage to servers. This video provides step-by-step examples of how to partition, format, and mount new storage space using Linux.
Recruit great talent. Red Hat Certifications
The Bash shell is a powerful tool for managing Linux servers. This video offers a number of tips and tricks for using Bash to help make working on the Linux command-line easier and faster. It explores time saving tools like tab completion, command history, and brace expasion as well as how to combine commands together to create powerful new tools using piping.
In this video, instructor Glenn Weadock explains the Windows 7 library concept and how it replaces the traditional "My Documents" user profile folder by adding the Public profile to the user profile.
The Logical Volume Manager (LVM) is a powerful tool for managing storage on Linux servers. This video provides an overview of how LVM works and explores several ways that LVM makes storage management easier and more flexible. Examples include how to expand storage capacity on the fly using LVM and resize2fs, and how to migrate data from local storage to a storage area network (SAN) without downtime using pvmove.
In this seminar, discover how OpenStack can simplify your cloud infrastructure management. Experts from Red Hat, the leading contributor to the OpenStack project, will fill you in on how organizations have solved problems and increased business value with open-source cloud technology. They will also give you a peek into the future of Red Hat OpenStack and reveal how Red Hat training and certification can ensure the success of your cloud deployment.
Get a look at how your numbers compare to your peers and neighbors with our comprehensive lists below. A Note About Our Certification List For the condensed list of certifications in our 2013 IT Skills & Salary Report, we included only certifications that received enough responses to be statistically relevant. The list below is more inclusive. Certification data is for informational purposes only, as the values of some of the more exclusive certifications are based on few responses and, therefore, are less reliable.
Chief Technical Architect Craig Brown discusses the Windows 7 certification and skills tracks available to Global Knowledge students.
Network security is everyone's concern, and this applies to computer security as well. Many security breaches occur due to user ignorance of basic security principles, not malicious intent. Network and computer security are like an onion - there are multiple layers. Good security begins with understanding what you can do to keep your systems safe and implementing a layered approach. If you depend on one program or feature to secure your computer, then when (not if, but when) that dependency is breached, you may have personal information stolen or even have your computer taken over.
For the fourth year in a row, Global Knowledge and TechRepublic have partnered to create a comprehensive IT salary survey. With over 12,000 responses, the 2011 report has turned out to be one of this year's most relevant and revealing salary surveys in the industry. Below is our complete list of Salaries by Popular Certifications and Salaries by State.