Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By
Show Filters
Result Filters:

107 Results Found

Results per page: 10 40 80

Get Your Best Practices in Order: ITSM and Your Organization

Webinar – Recorded | June 24, 2014

Nasser El-Batal will walk you through the most useful, recognized, and mandated ITSM best practices in the industry: TOGAF, COBIT and ITIL®. He will highlight the benefits of integrating them into a single implementation program to avoid project disaster. Discussions are focused on "Getting Your House in Order" and how to establish your own organization-specific business transformation program, while increasing your organization maturity.

DevOps: The Future of ITSM and ITIL

Webinar – Recorded | June 19, 2014

Cloud computing enables development teams to get applications into production faster. IT Service Management (ITSM) leaders must adopt new strategies and change existing processes or risk becoming a barrier to success. Cloud computing requires DevOps-the blending of development and operations with the goal of accelerating time-to-market and reducing time-to-value. The good news is that ITIL® is uniquely positioned to accelerate DevOps, but it requires changes to existing ITSM processes.

Understanding the AIX Object Data Manager

White Paper | June 18, 2014

If you are coming to AIX from another UNIX system, the Object Data Manager (ODM) will be new to you. Fortunately, it is not so very complicated. This white paper explains how ODM is structured and how to use these databases in order to meet the goals the architects had for the ODM.

Monitoring and Troubleshooting the Performance of a Windows Server Environment Workshop

Video | May 29, 2014

Global Knowledge Practice Leader, Craig Brown, explains what students will learn in our "Monitoring and Troubleshooting the Performance of a Windows Server Environment" workshop.

Getting the Most Out of Your Tivoli Endpoint Manager Deployment

White Paper | May 21, 2014

IBM Tivoli Endpoint Manager (ITEM) is a product designed to let enterprises automatically manage computers, allowing thousands of them to be managed by just a few support staff. With ITEM, tasks such as patch application, software distribution, and security policy enforcement can be performed on all of an organization's computers with minimal supervision.

License Management Using SmartCloud Control Desk

White Paper | May 20, 2014

Unified asset and service management software provides a common control center for managing business processes for both digital and physical assets. SmartCloud Control Desk is an Information Technology Infrastructure Library (ITIL®)-compliant software that is accessible through mobile devices and integrates with social media and development tools. Discover how to choose the delivery model you need such as on-premise, software as a service (SaaS), or VM image and seamlessly change it to suit your business needs.

Understanding AIX Logical Volume Management

White Paper | May 14, 2014

Like many UNIX operating systems, AIX uses the concepts of Logical Volume Management (LVM) in its data management architecture. This white paper explains the specifics of the AIX LVM and provides some tips and best practice recommendations to get the most from your AIX disk storage.

A Guide to Password use in WebSphere Application Server

White Paper | April 21, 2014

Nearly every WebSphere administrator has desired a deeper understanding of how passwords are created, used, stored, and encrypted. Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.

ITIL Capability versus ITIL Lifecycle?

Video | Jan. 02, 2014

Michael Scarborough and Ryan Ballmer, co-authors of Global Knowledge ITIL courseware, discuss the difference between ITIL Capability courses and ITIL Lifecycle courses.

15 Most Popular IT and Business Certifications for 2014

Special Report | Jan. 01, 2014

In this report, I've reviewed the 15 most popular certifications according to our more than 12,000 North American respondents to our annual IT Skills and Salary Survey. For each certification, you'll find a brief description, the average salary, and some insight into why it is popular.

A Guide for Maximizing your Training Dollars

Special Report | Jan. 01, 2014

You know you need to invest in training, but how do you get the best return on investment (ROI) from your training dollars? To help you make smart training decisions, we've put together this guide, which illustrates some alternative and little-known payment options, the types of discounts and promotions available with training and a suggested list of courses that give you excellent value.

Five Phases of a Gap Analysis

Article | Dec. 05, 2013

A gap analysis is a tool that ITIL recommends organizations use to compare their current state to some future desired state.

Key Differences in Global Knowledge's ITIL Training

Video | Oct. 31, 2013

Co-authors Michael Scarborough and Ryan Ballmer discuss some key differences in the new Global Knowledge ITIL courseware.

Why is ITIL Important?

Video | Oct. 31, 2013

Michael Scarborough and Ryan Ballmer, co-authors of Global Knowledge ITIL courseware, discuss why ITIL is important to businesses.

Developing Effective IT Learning Processes

Webinar – Recorded | Oct. 16, 2013

Business is changing rapidly and Information Technology is at the centre of the trends: mobile, social, cloud and big data,. Forward thinking IT functions must develop and manage the skills of their most critical asset-- their employees. Effective professional development can guard against the pace of change, leading IT units to re-define job roles to include both technical and non-technical competencies and to establish business processes to help their staff develop and maintain these skills. This session will present the components of a holistic process to support learning and development in any IT organization.

Enhancing the Value of ITIL® and TOGAF®

Webinar – Recorded | Aug. 29, 2013

Traditionally, ITIL and TOGAF professionals have been part of different teams within an organization. Due to the ongoing alignment of business and IT, these professionals now often find themselves on the same team. Because of this crossover, there is a growing trend towards organization of work based on multiple best practice models. 

ITIL Mission Statement: Key to Better Services

Article | July 29, 2013

Many I&O leaders and customers see little value from investments in ITIL. Not getting the Return on Investment (ROI) you expect normally comes from using ITIL incorrectly. You, your staff, and your customers must share the same goals and understand exactly what to expect from your ITIL investments. The goal of ITIL is not “business and IT alignment” or “competitive advantage from IT investments.” Instead, its first goal is to stabilize service operation. This builds a base for the second goal: increasing value through service optimization. You must have clear-cut, documented, and managed expectations for each activity, and order is vital. Success requires that you stabilize service delivery before trying to optimize. Focusing on the correct goal and linking each ITIL task to that goal is the correct use of ITIL.

How to Succeed at Service-Oriented Architecture

White Paper | June 27, 2013

SOA is all about architecture-after all, it's right there in the acronym-yet most organizations think it is about turning existing software components into web services. When you adopt SOA, remember that it is all about design and governing that design. It's about how you design your service interfaces, your services, your data model, and your business processes. It's about how you keep track of your services, how you control the design, definition, deployment, and distribution of your services and their artifacts, how you define a service contract and service level agreement for your service consumers, how to secure your services, and how to react when things go wrong with them.

What’s in a CSI Register?

Article | June 14, 2013

ITIL is generally not prescriptive. In reality, the CSI Register at any given organization might look significantly different than the example given in the CSI book. The fields given in this example are important. 

What is Supplier Management?

Article | Jan. 30, 2013

Organizations that plan for and conduct supplier management according to defined processes and boundaries are more likely to receive predictable, high-quality goods and services from their suppliers in a timely manner.

Learning How To Learn Hadoop

White Paper | Jan. 11, 2013

Learning how to program and develop for the Hadoop platform can lead to lucrative new career opportunities in Big Data. But like the problems it solves, the Hadoop framework can be quite complex and challenging. Join Global Knowledge instructor and Technology Consultant Rich Morrow as he leads you through some of the hurdles and pitfalls students encounter on the Hadoop learning path. Building a strong foundation, leveraging online resources, and focusing on the basics with professional training can help neophytes across the Hadoop finish line.

Outcomes and Outputs

Article | July 25, 2012

Previously I discussed service providers and their risks in the example of my involvement with a landscaping company. ITIL clearly states that services, “…deliver value to customers by facilitating outcomes customers want to achieve…” However, sometimes organizations and people focus on outputs as opposed to outcomes, which sacrifices some of the value of the service. This leads to a question, what is the difference between an outcome and an output?

Incident Management Process Flow – Which Comes First, Categorization or Initial Diagnosis?

Article | April 18, 2012

What's the correct sequence of activities for handling an incident? Find out why categorization occurs before initial diagnosis in the ITIL incident management process flow so you can answer this common ITIL Foundation exam question.

12 Steps to Bring Your Own Device (BYOD) Success

White Paper | April 16, 2012

IT departments have multiple opportunities and challenges as a result of the Bring Your Own Device (BYOD) invasion. The most common opportunity is to reinforce enterprise network security from both the inside and the outside. Supporting BYOD also offers more monitoring and tracking of activities that provide a more detailed view of network traffic flow. Alternatively, it will be a challenge for some IT departments to give up control over which devices may access their enterprise network. Another challenge will be to have the users doing configurations for network access, which adds human error to a crucial part of the process. The opportunities and challenges BYOD represents are real. Enterprises must make their network infrastructure BYOD ready to meet the onslaught.

ITIL 2011: How Many Processes?

Article | Jan. 11, 2012

As long as I've been involved in service management, one of the perennial debates that's really never been resolved focuses around how many discrete processes ITIL describes. No such single list exists in the ITIL core books. However, section 4.1 of each of the ITIL 2011 core books shows the processes described within that specific book. When we deliver accredited ITIL training, if it is describe in section 4.1 of any of the ITIL core books, then it is considered a "process".

10 Security Concerns for Cloud Computing

Webinar – Recorded | May 17, 2010

The flexibility, reduced cost, and mobility of cloud computing have made the concept a hot topic. Before implementing this method of computing, however, it is important to consider the security of the "cloud." During this webinar, we will help you understand some of the risks and benefits of cloud computing so you can decide if it is the right solution for you.

Cloud Computing: What It Is and What It Can Do for You

White Paper | March 10, 2010

The definition of cloud computing depends largely on whether you are a consumer or producer. The public cloud is geared more for the individual consumer or small company, while the private cloud is geared more for a medium-to-large company. In addition, the private cloud is branching out to incorporate the ability to have some data and applications serviced from the public cloud. This white paper examines the different types of cloud computing and shows what cloud computing can offer you.