191 Results Found
General character attributes every IT pro should have and on the things that every IT pro should know or do.
When designing a structured business analyst interview, it’s crucial to have a goal in mind, a clear set of questions planned, and an understanding of how those questions may deviate from the intended goal. An interview has an intended line of questioning; it may also have alternate lines of questioning and unanticipated paths where the interviewee has raised issues or answered questions in a way the business analyst had not considered or planned. In short, an interview is a social process.
A structured business analysis interview is much more than a conversation; it is a controlled event requiring attention to detail, cautious design, and a strong social foundation from which to build a trusting and lasting relationship.
Linking business analysis skills with the methods of The Open Group’s Architecture Framework, TOGAF®, facilitates stronger IT results that drive business value.
Structuring techniques are the foundation of decision making. They are to decision making what blueprints are to construction. There are a number of techniques that will quickly and easily improve the analysis of virtually any problem. This paper introduces some of the simplest and most effective structuring techniques including sorting, sequencing, placement, decision trees, and ranking.
Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a breach. But what is "reasonable security," and is there a definition?
A brief introduction to the basics of penetration testing.
When a decision matters, there are certain steps you will want to follow. In this white paper, we provide guidelines for approaching decisions. The steps in this white paper are a series of interconnected techniques used in problem analysis and decision making.
The VMware NSX platform combines networking and security functionality directly in the hypervisor and it interoperable with a vast majority of VMware’s products. The platform provides a set of logical networking elements and services, using logical switching, routing, load balancing, VPN, firewall, etc. This product decouples network functionality from the physical devices.
Whether you’re a beginner or intermediate Python developer, you’ll want to keep this guide close to your keyboard and Python editors. In it, you’ll find sample use cases for many of the most common language constructs and tasks that you’ll likely need to perform, such as reading a file or working with a database.
Cyber resilience is becoming a bigger issue for all organizations. But what does “good cyber resilience” look like? And how do you get there?
Leadership is evolving beyond traditional leadership skills, and it has never been so important. In an era of constant change, digital disruption, increased employee expectations and rising business complexity, today’s leaders require more than the fundamentals. In years past, leadership development focused on helping leaders set performance expectations, communicate effectively, provide feedback, coach and motivate their employees. While these skills remain important, they are no longer sufficient to meet the business requirements of the 21st century. Leaders now require skills and competencies to ensure that they also build highly productive teams, accelerate organizational results and transform customer experiences in a fast-paced, highly competitive and global working environment. In this hour-long webinar, leadership consultant Kim Caughlin will reveal and discuss the new high-demand skills and competencies required to lead effectively in the 21st century.
Learn how Docker makes it easy to update, test and debug software with this white paper and gain foundational knowledge about Dockerfile, Docker images and containers.
The recent Red Hat Enterprise Linux (RHEL) 7.1 release offers a range of system-wide improvements. Whether you're new to RHEL or a veteran user, this white paper covers essential new tools and upgrades. Dynamic patching, in-place upgrades, easily configuring new deployments or monitoring entire systems represent some of the more significant changes. This white paper not only explores the significance of these modifications, it also provides useful examples, including diagrams and command lines for executing key tasks. RHEL 7.1 represents the first minor release of RHEL 7, which launched in June 2014 and will be supported for a 10-year life cycle.
Which mainstay certifications should be in your list of credentials? What's the next up-and-coming certification? This article will help you answer both questions by providing a review of the 15 top-paying certifications.
The Toronto Chapter of the Association of Change Management Professionals (ACMP), in partnership with Global Knowledge, welcomes Kelly Norgate to share information about her success in leading change with powerful change communication strategies. In this hour-long webinar, Norgate will examine the link between creative change communication solutions and great corporate culture. You will learn practical change communications strategies and tactics that generate the energy and commitment required to get employees on board with transformational change. Take your next change communication plan from good – to great.
Projects are a social endeavor. Traditional project management approaches have shied away from the social advantages a more agile project environment brings. By nature, we are storytelling, pattern seeking and social people. We need colocation to shine truly in a project environment.
IT organizations are increasingly being held accountable to bring digital value to the business and participate as a strategic partner. To this end, IT organizations must ensure they have the right skills at the right time to support the strategic direction of the business and contribute overall ROI. Deploying an IT skills framework provides an opportunity for IT organizations to determine their level of readiness by identifying where skill gaps exist.
If you're responsible for creating marketing content and the demand for fresh content is stressing you out, help has arrived. In this hour-long webinar, award-winning content creator Gail Mercer-MacKay will show you how to easily create new content that will attract prospects even if you're short on time and budget. You will learn how basic building blocks, such as blogs, social media and newsletters, support each other and can be reused multiple times. By producing fresh content, leveraging the content of others and broadcasting through various mechanisms to drive awareness, followers, likes and leads, you can obtain your desired results by investing only seven to 10 hours a month.
Often we let personal biases and other intuitive mental forces push us towards quick decisions. In contrast, good decision makers make the effort to really analyze issues. Instead learn how to become a critical thinker by separating facts from assumptions to make consistent, high-quality decisions.
From the largest to the smallest company, the inescapable truth is that with the click of a few keys or even a simple phone call, intruders can bypass all of your carefully constructed security. According to the Ponemon Institute's 2015 Cost of Data Breach Study, the average total cost of a data breach increased from $3.52 million to $3.79 million in 2014. While a number of major data breaches have made the news, often overlooked are the events and decisions that set the stage for the breach to occur. In this hour-long webinar, Global Knowledge instructor Phill Shade will walk through a number of key areas in which today's decisions set the stage for tomorrow's breach.
Managing users' access to an organization's resources via portals is convenient with IBM's WebSphere Portal Scripting Interface. Compare tools available to the portal administrator and identify some use cases where IBM's Portal Scripting Interface may be the ideal choice. Review basic commands and find out how to create custom scripts.
A major challenge of problem determination is dealing with unanticipated problems. It is much like detective work: finding clues, making educated guesses, verifying suspicions, and other considerations. An ideal strategy for problem prevention is to monitor the system regularly. Use the strategies outlined in this paper to minimize downtime and detective work so you can maximize performance.
The responsibility for securing organizational data has spread beyond the traditional IT professional. While there are more diverse security solutions, there are more diverse and sophisticated security threats. Security awareness and training is essential for everyone within an organization. Learn how Cisco has continued to evolve its security solutions and training.
Technology is a wonderful thing, but it comes with a price: cybersecurity. Free Web browsers, social media sites and other digital services collect personal information like email addresses, phone numbers, place of employment, buying habits, mortgage data that is shared with advertisers. The availability of this information leaves us vulnerable to hackers. This white paper can help you learn more about what kind of personal data is typically collected, and how to secure your information online.
Red Hat Taste of Training - JB248
Red Hat Taste of Training - JB348
Experts agree that as long as there is data, there will be people trying to steal it. For every defense mechanism put in place, there is someone who will find a way to get around it. Constant vigilance, education of the workforce, and management support are all necessary to implement effective security policies. While a well-trained IT staff is key to protecting data, all employees must understand the importance of protecting company assets, including data.
In this hour-long webinar, Global Knowledge course director Brian Egler will examine key new features of Microsoft SQL Server 2016 that demonstrate how it provides automatic end-to-end security, seamless generation of business analytics and elastic integration of data in the cloud.
With Microsoft SQL Server 2016, you can distribute your data to the cloud using the Stretch Database feature to improve local access while allowing cloud access to large amounts of historical data. You can also provide transparent end-to-end security using Always Encrypted technology and track changes automatically through temporal data. Download this white paper to learn why these features and more make SQL Server 2016 Microsoft's most important release to date.
Discover why healthcare organizations must take an immediate active role in securing their data. It is much more costly, monetarily as well as with regard to reputation, for an organization to react to a breach rather than plan for it.
Every business needs to have a consultative approach that increases organizational buy-in, enhances client relationships and improves customer service. Applying consulting skills can mean greater success for individuals and organizations alike. In this one-hour webinar, Michelle Moore will provide an overview of the Consulting Skills Lifecycle and present practical ideas from our McMaster Certified Consulting Skills Program. You'll learn how to engage your clients, gather and analyze information, present findings and recommendations, plan and implement recommendations and conclude the engagement and evaluate results.
Despite advances in security, hackers continue to break through network defenses. In this hour-long webinar, network security specialist Catherine Paquet will examine the favorite methods and targets of hackers and will introduce you to the different categories of security technologies. In this foundational presentation, you will learn about the benefits of security solutions such as firewalls, VPNs, IPS, identity services and BYOD.
Change is the order of the day, and if anything, the pace of business and technology change is accelerating. The business and customers are looking to IT service providers to be more responsive, delivering more frequent service changes with higher quality-resulting in services that deliver more value to the business. In order to continue to be relevant and of high value, ITIL must continue to benefit from other complementary best-practices for IT. DevOps, an approach that encourages improved communication, collaboration, and teamwork across development and operations, can have a positive influence in improving ITIL processes across the service life-cycle.
Use cases are an effective and widely used technique for eliciting software requirements. In this hour-long webinar, software development and process improvement expert Karl E. Wiegers will introduce you to a practical and straightforward use cases approach to requirements elicitation. You will learn how to focus on the goals that users have with a system, rather than emphasize system functionality.
In this world of volatility and complexity, it seems that the only certainty is the unstoppable advancement of technology. As people and organizations look to improve productivity, innovate their business models and processes, and differentiate their client and employee experiences, they need to be prepared to work in new and different ways. The challenge is that recent data reveals that Canada is falling behind the rest of the world in innovation, especially regarding new and disruptive technologies that promise to significantly impact every industry and organizations of all types and sizes. In this 60-minute webinar, we will explore the concept of digital disruption and provide information about how to future-proof yourself and your organization to succeed in this new world.
The network forensics market is set to dramatically expand as increasing numbers of organizations become the victims of malware attacks. Limiting the damage from these incursions, and avoiding potentially crippling losses, are key motivators for businesses of any size. And network forensics offers a powerful set of tools to help companies achieve those goals.
If any of the following reminiscences ring true to you, have you moved beyond them? If not, it might be time to make some new discoveries.
In this paper, we explore the basic usage of PowerShell in the pursuit of automating the management of Hyper-V deployments. This paper is targeted to IT professionals who have been "GUI-bound" to their management interfaces and have been working with or are embarking on the journey of Hyper-V administration. We'll explore the usage of Hyper-V specific cmdlets with the intent of ultimately being able to include multiple cmdlets in a "script" to allow for pushing one button and accomplishing the combined actions of many multiple mouse clicks in the GUI. No more repetitive tasks!
This paper provides an overview of how to judge the rigor of one's decision making. It describes how anyone can make better (higher quality) decisions, in any situation.