73 Results Found
The process of subnetting is both a mathematical process and a network design process. Mathematics drives how subnets are calculated, identified, and assigned. The network design and requirements of the organization drive how many subnets are needed and how many hosts an individual subnet needs to support. Binary basics and IPv4 address structure were covered in part one of this two-part paper.
This article addresses non-technical skills you need to do to be a success in IT.
General character attributes every IT pro should have and on the things that every IT pro should know or do.
To help you stay ahead of the game, here are ten IT skills that are on the brink of extinction.
If you want to stay relevant as an IT professional, you have two choices: evolve your current skills or make a big change.
The benefits of a RADIUS server are many. In addition to speed, you receive heightened security with user access monitoring, reporting and tracking functions and personalized restrictions. Setting it up costs less than $60 and this white paper walks you through each of the steps, settings, configurations and the equipment you will need.
The Toronto Chapter of the Association of Change Management Professionals (ACMP), in partnership with Global Knowledge, welcomes Kelly Norgate to share information about her success in leading change with powerful change communication strategies. In this hour-long webinar, Norgate will examine the link between creative change communication solutions and great corporate culture. You will learn practical change communications strategies and tactics that generate the energy and commitment required to get employees on board with transformational change. Take your next change communication plan from good – to great.
CompTIA has raised the bar for Network+ candidates. The new certification exam has significant changes to the five "domains" or knowledge areas with new content related to security, cloud, data-center and operational concerns and troubleshooting. There is also a greater emphasis on wireless networking and VoIP. Use this white paper to help you gain an overview of what's new and what's different.
Despite advances in security, hackers continue to break through network defenses. In this hour-long webinar, network security specialist Catherine Paquet will examine the favorite methods and targets of hackers and will introduce you to the different categories of security technologies. In this foundational presentation, you will learn about the benefits of security solutions such as firewalls, VPNs, IPS, identity services and BYOD.
When properly utilized, VLANs and trunks provide flexibility, stability and ease of troubleshooting. This paper provides technical details about VLANs and trunks, along with design options at a basic to intermediate level. Recommendations and commands are included throughout.