Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Show Filters
Result Filters:

70 Results Found

Results per page: 10 40 80

When a Friend "Sends" You Junk Email

Article | Dec. 09, 2014

One of the main weapons of organized crime on the Internet is the use of junk email, also called spam. Hackers use spam for a number of purposes such as selling counterfeit products (medicines, particularly) to steal your personal or financial information, or to infect your computer with spyware and malware. This malicious software can then hijack your computer and your Internet connection to help propagate itself.

Business Continuity and Disaster Recovery: Protecting Your Assets and Dealing with “The Emergency”

Article | Dec. 18, 2014

Business Continuity and Disaster Recovery (BC/DR) planning is the process of developing the plans, processes and procedures to respond to the range of incidents. We start with understanding the essential functions of an organization, called Business Impact Analysis (BIA). In life, we set the same priorities: protection of family and friends, shelter, food and water and other life-giving essentials.

Strategies to Close Skills Gaps: You and Your Organization

Article | April 09, 2015

Young adults unable to find work, employers unable to fill jobs, a recent GAO study that reported substantial declines in telecommunication expertise — there has been a lot of news about the pervasiveness of skills gaps, their causes, the actual impacts and what to do about them. It’s rather confusing, because the term “skills gaps” has been hijacked to politicize an extremely wide range of issues.

15 Top-Paying Certifications for 2016

Article | June 02, 2016

What were the top paying IT and project management certifications for 2016? his article will help you answer both questions by providing a review of the 15 top-paying certifications.

Two Great Security Features of VMware’s NSX Network Virtualization Platform

Article | Aug. 30, 2016

The VMware NSX platform combines networking and security functionality directly in the hypervisor and it interoperable with a vast majority of VMware’s products. The platform provides a set of logical networking elements and services, using logical switching, routing, load balancing, VPN, firewall, etc. This product decouples network functionality from the physical devices.

Six Scary IT Certification Exams

Article | July 13, 2017

Certifications are the most common way in IT to prove you have the skills to solve various technical and business challenges. In this article, I'll address a range of skill sets. For each certification listed, I've included what the certification measures, the requirements to obtain it.

Top 5 Growth Opportunities for IT Pros

Article | July 13, 2017

IT professionals benefit from gaining skills in data analysis, cybersecurity, cloud computing, virtualization and hyperconvergence, and mobile app development.

10 Mistakes that Could Doom Your Career as an IT Pro

Article | July 16, 2017

There are many career pitfalls in the IT field, especially if they are clearly outlined in an employee handbook.

Can You Afford Not to be Certified?

Article | July 29, 2017

I am a VMware Certified Instructor and every single time I teach, I get questions regarding certification. IT certifications always seem to be a controversial topic, and the question is always, "Why should I become certified?"

5 Secrets to Being a Success in IT

Article | Oct. 11, 2017

This article addresses non-technical skills you need to do to be a success in IT.