Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By
Show Filters
Result Filters:

220 Results Found

Results per page: 10 40 80

Cisco Collaboration Endpoints

White Paper | Sep. 17, 2015

Your clients, vendors and workforce don't always operate in the same building, state or country. Cisco Collaboration Endpoint products make communicating with your counterparts across town or on the other side of the world easy. This white paper provides you with product specifications and capabilities for Cisco's phone, desktop, and large screen immersive videoconferencing options.

ITIL® Adaptation and Adoption: Where to Begin

White Paper | Sep. 03, 2015

Using ITIL can improve your IT service levels, customer service ratings, business productivity and reduce operating costs, but getting started can be overwhelming. Gain the understanding you need to adopt and adapt ITIL with instructions and tips for important steps such as internal employee communications, determining potential pain points and methods for evaluating your existing processes.

Aligning IT and Business for Better Results

Webinar – Recorded | Aug. 25, 2015

Businesses today are more dependent on technology than ever. And, more than ever, they're looking to IT for ways to improve employee productivity, customer service and innovation. The challenge is that in order to achieve results with technology, IT and the business have to work collaboratively. IT needs to be able to develop the right relationships and communicate with different stakeholders from a business perspective - not a technical one. As a result, the transformation of the IT department has become a top-level priority for many leading organizations. At the same time, business leaders need to strengthen their business technology IQ and play a more significant role in the governance of IT.

Benefits of Virtual Classroom Live Cisco Training

Video | Aug. 20, 2015

Learn more about the many benefits of Global Knowledge's Virtual Classroom Live training.

Building Up Network Security: Intrusion Prevention and Sourcefire

Webinar – Recorded | Aug. 20, 2015

In this second webinar in a series dedicated to building up network security, network security specialist Catherine Paquet will fill you in on advanced threat protection that integrates real-time contextual awareness, intelligent security automation and superior performance with industry-leading network intrusion prevention, Sourcefire.

Examples of Event Types

Article | Aug. 07, 2015

The ITIL® event management process defines three event types: informational, warning and exception. In this post, I will discuss the different event types and give real-world examples of each.

Is Cisco IOS XE the Future of Cisco?

Article | Aug. 04, 2015

Cisco Internetwork Operating System (IOS) has been around since a little after the inception of Cisco Systems as a company. In 1984, Len and Sandy Bosack from Stanford University founded Cisco Systems with a small commercial gateway server. The first Cisco router that I touched was an Advanced Gateway Server (AGS), which was the first marketed product of the company. After this came the Mid-Range Gateway Server (MGS), the Compact Gateway Server (CGS) and later the Integrated Gateway Server (IGS) and AGS+. The first version of IOS that I touched was 8.2(7). The operating system was based on a Unix-based system and was designed as a monolithic operating system, meaning that processes are stacked and interrelated.

Building Up Network Security: An Introduction

Webinar – Recorded | July 16, 2015

Despite advances in security, hackers continue to break through network defenses. In this hour-long webinar, network security specialist Catherine Paquet will examine the favorite methods and targets of hackers and will introduce you to the different categories of security technologies. In this foundational presentation, you will learn about the benefits of security solutions such as firewalls, VPNs, IPS, identity services and BYOD.

The Intersection of DevOps and ITIL®

White Paper | July 07, 2015

Change is the order of the day, and if anything, the pace of business and technology change is accelerating. The business and customers are looking to IT service providers to be more responsive, delivering more frequent service changes with higher quality-resulting in services that deliver more value to the business. In order to continue to be relevant and of high value, ITIL must continue to benefit from other complementary best-practices for IT. DevOps, an approach that encourages improved communication, collaboration, and teamwork across development and operations, can have a positive influence in improving ITIL processes across the service life-cycle.

Cisco Completes the Security Picture with Sourcefire

White Paper | June 19, 2015

Security attacks have become more advanced; therefore, security solutions have needed to evolve to deal with those threats. Cisco's acquisition of Sourcefire brings a new paradigm to the security landscape. No longer is security a one-time, instantaneous event. Security now is threat based, network cognizant, and continuous. All organizations, public and private, need to be aware not only of the constantly changing threat environment, but must be prepared to respond in kind.

Collaboration Systems Release 10.6 Features Overview

White Paper | June 19, 2015

Cisco Collaboration Systems Release (CSR) 10.6, along with CUCM 10.5(2), enhances the user and administrator experiences and interactions. In many cases, a change to one product may necessitate changes to other products. For example, where the deployment options for video conference control changed to place all control behind the Telepresence Conductor, Cisco Prime Collaboration management tools had to be updated to reflect this new deployment approach. As new endpoints are added, CUCM and Prime Collaboration both needed to be updated to reflect the new endpoints.

Using SIPOC to Define ITIL® Processes

White Paper | June 19, 2015

This white paper describes a technique for defining processes called SIPOC (Suppliers, Inputs, Process, Outputs, and Customers). SIPOC provides a structured way to define the key elements of any process. SIPOC can be used as a means of defining any of the service management processes presented in ITIL® best practices. Furthermore, SIPOC can be used as the preliminary input into the more formal documentation of a process in one of many process design tools.

VLANs and Trunks

White Paper | June 11, 2015

When properly utilized, VLANs and trunks provide flexibility, stability and ease of troubleshooting. This paper provides technical details about VLANs and trunks, along with design options at a basic to intermediate level. Recommendations and commands are included throughout.

Cisco Collaboration Certifications Overview

White Paper | June 09, 2015

On February 17, 2015, Cisco announced changes to the existing voice and video certifications and detailed the new collaboration certification portfolio. This white paper provides an overview of the changes to Cisco certifications with respect to voice and video, outlining dates, and deadlines that may affect your certification process.

Switching Operations

White Paper | June 05, 2015

Switches play a vital role in moving data from one device to another. Specifically, switches greatly improve network performance, compared to hubs, by providing dedicated bandwidth to each end device, supporting full-duplex connectivity, utilizing the MAC address table to make forwarding decisions, and utilizing ASICs and CAM tables to increase the rate at which frames can be processed.

Cisco UCS B Series Uplink Strategies

White Paper | April 10, 2015

This paper explains uplink strategies for traffic coming in and out of a Cisco Unified Computing Solution (UCS) chassis. An uplink can be Ethernet, Fibre Channel, or FCoE and is a physical connection on the FI that leaves the UCS domain directed away from the B Chassis.

Configuring Multicast with MPLS and GETVPN

White Paper | April 09, 2015

This paper covers the configuration of IP Multicast with Multiprotocol Label Switching (MPLS) including the basics of Multicast with the Group Encrypted Transport VPN (GETVPN).

Dynamic Multipoint Virtual Private Network (DMVPN)

White Paper | April 09, 2015

A Dynamic Multipoint Virtual Private Network (DMVPN) can be used with other networks like Multiprotocol Label Switching (MPLS), but streaming multicast is accomplished quite well using "Default" and "Data" Multicast Distribution Trees (MDTs) with MPLS.

Hardware and Technology Updates in the Cisco UCS Server Products

White Paper | April 09, 2015

Cisco Unified Computing Solution (UCS) is a very popular and powerful solution. Cisco continues to provide updated UCS management options for the full range of data center installations.

IPv6: Are We There Yet?

White Paper | April 09, 2015

The first big push toward implementation of IPv6 was mobile devices. Now, one of the driving forces is the Internet of Things. As the name implies, this means everything, including machine to machine communication (M2M).

The Internet of Things: A Primer for the Curious

White Paper | April 08, 2015

Like it or not, Internet of Things (IoT) is upon us. There are a number of factors that will impact its adoption rate, and the inevitable privacy (or lack of) discussions will likely happen sooner than later. This is going to change the world as we know it, in many cases for the better. But we will need to keep an eye on the extent to which it invades our personal lives if it is going to be the positive force it has the potential to be.

Multicast Configuration Comparison of Cisco IOS and Nexus OS

White Paper | April 07, 2015

While there are differences between the IP Multicast configuration in the IOS and the Nexus OS, the Protocol Independent Multicast (PIM) protocol remains fundamentally the same. If you feel comfortable configuring Multicast in the IOS, you should be able to acclimate fairly easily to the changes in the Nexus OS.

Multicast Implementation with Virtual Port Channels and FabricPath

White Paper | April 07, 2015

Multicast Sparse Mode and its derivatives are supported in the Nexus OS. This white paper explains how it has been implemented in the Nexus platform to provide optimum performance in both virtual PortChannel and FabricPath environments.

Understanding the Difference Between Incident Management and Problem Management

Webinar – Recorded | April 02, 2015

In this hour-long webinar, Global Knowledge instructor and ITIL Expert Michael Scarborough will share his knowledge and expertise on various aspects of incident management and problem management processes. He will help you understand the difference between incidents and problems and between incident and problem management, providing examples from his own experience to drive the concepts home. Michael will also provide an overview of who performs various incident and problem management activities in an organization.

ABCs of ITIL®

White Paper | Feb. 27, 2015

Learn the ITIL® concepts of accountability, boundaries, and consistency (the ABCs) and discover how ITIL helps establish, manage, and maintain the ABCs.

Hyper-V Replicas in Windows Server 2012

White Paper | Feb. 27, 2015

One of the most significant new features in Microsoft Windows Server 2012 is the Hyper-V Replica (HVR) capability. Whether you are considering this for your own organization or just prepping for your Windows Server 2012 MCSA, this white paper presents the essentials of deploying this disaster recovery feature.

OSPFv3 Address Families: How They’re Used and Why

Article | Jan. 15, 2015

Now that we are moving towards IPv6, the logical move would be to also run OSPF for that protocol suite, which makes sense and reduces the learning curve for implementation and support. But, that would mean that you have to run two OSPF processes — one for IPv4 unicast and one for IPv6 unicast. That means two sets of policies have to be applied, including security for OSPF itself. Running OSPFv3 for both IPv4 and IPv6 reduces the number routing protocols and the configuration that goes with that. It makes it easier to implement policy in a consistent way for both protocol suites.

Policy-Based Routing: What Is It and How Is It Used?

Article | Jan. 08, 2015

What is PBR? Policy-Based Routin (PBR) is the process of using a route map to match on something more than the destination and then defining the path out of the router based on those conditions. PBR could match on destination only, but typically we would match on more. PBR is considered to be an exception to the RIB and is looked at before examining the RIB.

Getting Started with Change Management

Webinar – Recorded | Dec. 04, 2014

You will learn how many organizations approach change management as compared to how best practices dictate that change management should work. Global Knowledge instructor and ITIL Expert Michael Scarborough will fill you in on the purpose of change management and the difference between change management and change tickets. He will provide a high-level guide for establishing a change management process that uses real-world examples as its basis.

Implementing Virtual Routing and Forwarding (VRF) on Cisco Nexus Data Center Switches

White Paper | Nov. 18, 2014

Cisco provides a wide array of connectivity and isolation tools within the datacenter. This white paper addresses Virtual Routing and Forwarding (VRF), which is a Layer 3 isolation mechanism for routing protocols.

BGP Cross-Address Family Support: What Are the Gotchas and How Do I Fix Them?

Article | Oct. 30, 2014

As I’ve stated before, I like Border Gateway Protocol (BGP). I think it’s an interesting protocol, and yes — it’s complicated, but I guess that part of why I like it. There are a lot of knobs to tweak in BGP, maybe too many, but that’s another post. Anyway, we are now running BGP version 4 and it has had extensions written that support more than just IPv4 unicast routing. We now have IPv4 multicast, IPv6 unicast and multicast, VPNv4, VPNv6, and a few others.

Understanding Calling Search Space Usage at the Phone and Line Level

Article | Oct. 14, 2014

Where should you apply the CSS, and why are there two places to apply it? One approach is to pick one of the parameters and apply the permissions there. Quite often, an administrator will pick the phone-level CSS and configure it there so that it applies to all calls made from all lines. The goal is to specify what partitions are allowed to be called. 

Benefits of Using “+” Dialing in the CUCM Dial Plan

Article | Oct. 03, 2014

For smaller companies, configuring a dial plan to account for variations in dialed numbers is often not a problem. However, companies that are larger and more global in nature encounter a number of issues when designing their dial plan approach.

How to Become an ITIL Expert

Video | Oct. 02, 2014

Michael Scarborough and Ryan Ballmer, co-authors of Global Knowledge ITIL courseware, discuss how to become an ITIL expert.

How To Use BGP Prefix-Independent Convergence

Article | Sep. 30, 2014

Border Gateway Protocol (BGP) is a fascinating protocol because there are a lot of things that can be done with BGP. However, there has always been an issue with BGP, which is convergence (the time the network or protocol takes to accept change). BGP was designed for scale, not speed, so it’s something that we’ve had to tolerate from its inception.

How To Use Enterprise License Manager with Cisco Unified Communications Manager

Article | Sep. 29, 2014

License provisioning has always been a bit of a challenge in the CUCM environment. Prior to CUCM v9.0, licensing was managed on a per-cluster basis with each cluster requiring its own license files that were tied to the media access control (MAC) address of the cluster’s publisher. This approach to license management was limiting in the fact that one cluster might have unused licenses while another cluster may be at its limit and sharing between clusters was not possible.

Enabling Call Screening Based on Caller ID in CUCM

Article | Sep. 23, 2014

Occasionally I am asked to configure the ability to block calls based on Caller ID. Prior to Cisco Unified Communications Manager (CUCM) v8, the only way to block these calls was to configure voice translation rules and profiles on the gateway receiving the calls. This has changed in CUCM v8 with the introduction of an additional parameter in translation patterns: Route Next Hop By Calling Party Number.

The Packet Delivery Process: Locally Connected Hosts

White Paper | Sep. 09, 2014

Moving data from one networked device to another requires several different functions. Each function has its own protocol or protocols that define how it is accomplished. Also, the process of delivering data from one device to another can vary. The main factor in data delivery is determining whether the two devices are directly connected or remotely connected.

The Packet Delivery Process: Remotely Connected Hosts

White Paper | Sep. 09, 2014

Moving data from one networked device to another requires several different functions. Each function has its own protocol or protocols that define how it is accomplished. Also, the process of delivering data from one device to another can vary. The main factor in data delivery is determining whether the two devices are directly connected or remotely connected.

Read-Only Domain Controllers (RODC)

Video | Sep. 02, 2014

In this video, instructor Charles Strother does a quick overview of what is needed to install a Read-Only Domain Controller (RODC) in a Windows Server 2008 environment.