168 Results Found
PowerShell is the perfect tool for capturing the best practices that your IT staff already implements manually, and transforms that with scripting. It provides the ability to cross-reference information from a variety of different sources, and apply custom solutions that marshal your unique resources to solve the problems you face. The tool is easy to learn, included for free with all your Windows OSs, and provides enormously rich possibilities to grow skills over time.
Change is the order of the day, and if anything, the pace of business and technology change is accelerating. The business and customers are looking to IT service providers to be more responsive, delivering more frequent service changes with higher quality-resulting in services that deliver more value to the business. In order to continue to be relevant and of high value, ITIL must continue to benefit from other complementary best-practices for IT. DevOps, an approach that encourages improved communication, collaboration, and teamwork across development and operations, can have a positive influence in improving ITIL processes across the service life-cycle.
Cloud computing is a big force in IT today, and it isn't going away. In fact, cloud adoption is going up geometrically, both for end users (think apps on your phone or tablet) as well as for organizations of all sizes. In fact, many smaller organizations may not have any on-premises infrastructure at all, other than networking infrastructure to get connected to the cloud. With this transformation in IT, it behooves all of us in the industry to understand it and adapt or risk being out of a job, like punch card operators.
We build requirements at a quantum level to connect the vital elements, which are needed to realize a requirement. As we consider the relationships between the behaviors, actions, and responses, we begin to identify and associate the characteristics and conditions, which will drive and constrain the behaviors. Realizing a requirement means joining these elements together and noting them as elements of the requirement.
PowerVC is a cloud tool based on OpenStack technology used to manage your virtualized environment running on your Power System. It automates rapid provisioning/deprovisioning and provides simple ongoing management of LPARs on Power Systems. Join us for this free, interactive webinar to hear senior power cloud consultants Vess Natchev and Kyle Wurgler from IBM System Lab Services.
Microsoft Office 365 has a vast array of features to explore. A rich administration interface, streamlined security, and versatile migration options make this one of the most interesting products when it comes to an SaaS public cloud solution.
Global Knowledge instructor Mark Baugher shares three quick tips on how to use Microsoft PowerShell 4.0 more effectively: Discoverability using the Get cmdlet, dot notation and pipeline.
In this paper, we explore the basic usage of PowerShell in the pursuit of automating the management of Hyper-V deployments. This paper is targeted to IT professionals who have been "GUI-bound" to their management interfaces and have been working with or are embarking on the journey of Hyper-V administration. We'll explore the usage of Hyper-V specific cmdlets with the intent of ultimately being able to include multiple cmdlets in a "script" to allow for pushing one button and accomplishing the combined actions of many multiple mouse clicks in the GUI. No more repetitive tasks!
Interested in SharePoint 2013 developer training? Learn from SharePoint instructor Tracy Wallace, if you're ready and which SharePoint 2013 developer class you should take.
When we learn a concept for the first time, the newness of it tends to become embedded with the learning process. We remember the new idea's significance and forever after remember it as new. The initial impact of a discovery can prevent the concept from aging. At the same time, we realize how quickly technology advances. Is it time to evolve your expertise?
Nowadays, you can read weekly articles about security attacks and stolen data. Even leading companies and organizations are victims of cybercrime. Attacks can include breaches at three levels: the physical level, which includes social engineering, system and network and applications (e.g., web and mobile). In this complimentary webinar, you will discover the benefits of using automated solutions to detect application vulnerabilities, provide steps to remediate them and avoid costly compliance violation.
A range of factors can influence the data center you choose. You should consider all of the factors listed in this white paper before deciding where to place your servers.
Unless you know the meanings of the five symbols regularly used in PowerShell, they can obscure the purpose and actions of a PowerShell script. There will always be new cmdlets to decipher. Each new operating system release and application version will include new and useful cmdlets along with new parameters for existing cmdlets. You can't memorize them all, but with the basic knowledge of these particular symbols, you should be well equipped to follow the logic of many scripts.
Dynamic Access Control (DAC) in Windows Server 2012 lets you manage access to documents in ways that go beyond classic NTFS (New Technology File System) permissions. For example, if you want to allow a set of users in an office across the country or across the globe read-only access to files relating to the Wind Turbine Project, DAC can do the job.
Through the use of automation, compliance, self-service portal, and standardization, Microsoft's System Center Service Manager can support the best practices found in the Information Technology Infrastructure Library (ITIL®) and the Microsoft Operations Framework (MOF). Service Manager also has built-in processes for Incident and Problem management, Change and Configuration management as well as Asset Lifecycle Management.
One of the most significant new features in Microsoft Windows Server 2012 is the Hyper-V Replica (HVR) capability. Whether you are considering this for your own organization or just prepping for your Windows Server 2012 MCSA, this white paper presents the essentials of deploying this disaster recovery feature.
Kirsten Lora, our senior product director, discusses how Global Knowledge's Business Transformation Services prepare your employees to support your organizational change.
In this video, instructor Glenn Weadock explains the Windows 7 library concept and how it replaces the traditional "My Documents" user profile folder by adding the Public profile to the user profile.
Times are changing. Attacks are becoming much more sophisticated and hackers are exploiting human vulnerabilities to gain access to enterprise networks and private information. Employees and end users want to help protect your company's sensitive data, we just need to motivate them as to why they should care. By educating your employees on security best practices and current human vulnerabilities, you can take a step forward to ensuring you're not a part of the many organizations that are breached.
The Microsoft Assessment and Planning (MAP) Toolkit is an free inventory, assessment, and reporting tool from that helps you assess your current IT infrastructure and determine the right Microsoft technologies for your IT needs.
Public Key Infrastructure (PKI) can become a fairly complex environment and deployment, as it involves multiple components that all need to work together smoothly. Understanding the theory of how it all works will help in building a solid foundation for this complex technology in your organization. Although there is always something new to learn in PKI, this white paper gives you a great overview of the core configuration of your Microsoft CAs.
The bad guys just keep getting better! No matter how much patching and tweaking we do, the bad guys' constantly changing tactics and techniques continue harming our networks, stealing and damaging data, and just generally screw things up. What motivates someone to do such terrible things in the first place? How have these hackers changed and improved? What kinds of attacks are popular now and why? In this hour-long webinar, security expert, former hacker and Global Knowledge instructor Phillip D. Shade will provide insight into understanding the latest hacking techniques, what the current threat landscape looks like, and suggested countermeasures to mitigate threats. He will include specific examples of the current threat landscape, including data mining, social engineering cyber threat terminology, man-in-the- middle attacks and Denial of Service (DoS) attacks.
Having options in life is usually a good thing. Do you want a cheeseburger or pizza for lunch? Water or sweet tea? And, if you’re going to take a Microsoft certification exam, do you prefer to take it at a Pearson VUE Authorized Test Center or in the comfort of your own home or office?
PowerVM is the virtualization environment for AIX, Linux, and IBM i running on the IBM POWER hardware platform. This white paper provides an overview of PowerVM concepts, architecture, terminology, and capabilities.
More challenging Microsoft certification exams require the demanding Microsoft boot camps at Global Knowledge. Rebuilt from the ground up to provide students all the study tools needed to master the Microsoft skills needed to certify and succeed.
Interested in SharePoint 2013 administrator training? Learn from SharePoint instructor Tracy Wallace, if you're a good candidate and which SharePoint 2013 administrator class you should take.
In this video, instructor Charles Strother does a quick overview of what is needed to install a Read-Only Domain Controller (RODC) in a Windows Server 2008 environment.
If you're running SharePoint 2010, learn how SharePoint 2013 is different and what you'll need to learn to deploy it effectively.
The Logical Volume Manager (LVM) is a powerful tool for managing storage on Linux servers. This video provides an overview of how LVM works and explores several ways that LVM makes storage management easier and more flexible. Examples include how to expand storage capacity on the fly using LVM and resize2fs, and how to migrate data from local storage to a storage area network (SAN) without downtime using pvmove.
In this video, you will learn about the latest version of ReportBuilder available in SQL Server 2008 R2.
Part of IBM's new training approach includes a carefully selected group of four Global Training Providers. Tom Rosamilia explains the detailed process and criteria IBM used to select the four Global Training Providers, including worldwide reach and innovation in delivery methods. These IBM Global Training Providers are experts in skills education and will help IBM meet our goal of providing clients the right skill set to quickly and efficiently leverage the full power of IBM solutions.
The National Institute of Standards and Technology (NIST) created a cloud definition that has been well-accepted across the IT industry. NIST was mandated to assist government agencies to adopt cloud computing for their IT operations. As part of their mandate, NIST created multiple working groups to define cloud computing, its architecture, and requirements. In this paper we explore the center core of NIST's cloud definition.
This white paper addresses four different components of the Tivoli monitoring infrastructure for creating a high availability environment while providing redundancy and failover capacity. Although the principles are the same for each of these systems, the methods for adhering to these principles are different for each of them.
In this video, instructor Glenn Weadock examines new Taskbar capabilities, such as pinning non-loaded programs, customizing the jump list, and selectively hiding all but one active program.
In this video, Practice Leader Craig Brown discusses our exclusive Server 2008 course - Configuring, Managing, and Maintaining Server 2008 R2 (M6419). Specifically, the enhancements we've made to this course through Server 2008 R2 supplemental learning materials and custom hands-on labs that enable the student to utilize critical Server 2008 R2 functions after completing the course.
Cloud computing enables development teams to get applications into production faster. IT Service Management (ITSM) leaders must adopt new strategies and change existing processes or risk becoming a barrier to success. Cloud computing requires DevOps-the blending of development and operations with the goal of accelerating time-to-market and reducing time-to-value. The good news is that ITIL® is uniquely positioned to accelerate DevOps, but it requires changes to existing ITSM processes.
If you are coming to AIX from another UNIX system, the Object Data Manager (ODM) will be new to you. Fortunately, it is not so very complicated. This white paper explains how ODM is structured and how to use these databases in order to meet the goals the architects had for the ODM.
In this video, you'll learn how to utilize a great new feature of SQL Server 2008 called Policy Based Management for Multi-Server Management capabilities.
In this video, you will learn how to a use a new feature of SQL Server 2008 R2 and Office 2010 called PowerPivot for Self-Service Business Intelligence.
Learn the fundamentals of technology with Microsoft Technology Associate (MTA) training. Designed for business professionals who work with technology and IT professionals looking for cross-training, MTA courses provide a foundational technology education in topics such as networking, security, software development, Windows OS and more. Three days of intensive training will get you on the right track to working effectively in the ever-changing IT industry.