1055 Results Found
Global Knowledge Course Director and Lab Topology Architect Joey DeWiele, a specialist in Unified Communications, discusses Cisco Unity, Unity Connection & Unity Express.
With blockchain constantly in the news, business leaders are not only asking themselves what it is but most importantly, what’s in it for me and my business. If you’ve asked those questions, this webinar is for you! In it you will not only learn what blockchain is, but understand its impact and potential for your business. We will demonstrate some of its immediate use cases in technology, business, and enterprise products and institutions.
Learn about the Amazon Web Services platform, products, and services. Gain on-demand access to compute, storage, and database services without upfront costs.
Scrum serves as a framework for the development of software and other products. It helps teams collaborate and provides a way to address challenges and changes in order to deliver a high value product. The Scrum Master promotes and supports the framework (Scrum). A Certified Scrum Master (CSM) helps everyone understand Scrum theory, practices, rules, and values.
Kirsten Lora, Global Knowledge Senior Product Director, explains why business analysts are essential to organizations and how our Business Analysis Essentials and Business Process Analysis courses can help them in these roles
This paper provides an overview of how to judge the rigor of one's decision making. It describes how anyone can make better (higher quality) decisions, in any situation.
One of the most used ways for hackers to attack an organization is through email phishing. From an attacker’s point of view, email attacks can be automated at scale with thousands of emails sent virtually for free.
Power BI is a business analytics solution that lets you visualize your data and share insights across your organization or embed them in your app or website. Connect to hundreds of data sources and bring your data to life with live dashboards and reports. Join us during this recorded webinar to see what Power BI can do for you and your organization.
Microsoft’s Excel program is a staple in many business environments, but very few people take full advantage of this tool. This webinar is a great opportunity to introduce yourself to formulas, data validation, pivot tables, and power query.
Getting the best possible performance from a SQL server can become more complicated as you add more operations to your database.
Thinking about getting ITIL certified? In this post, we cover the value of each ITIL certification and dive into survey results to determine whether ITIL certifications are worth it. The results are in!
Cloud and virtualization technologies have spawned a whole ecosystem of applications. But like any powerful technology, they can be used for bad as well as good. This session reviews the top 10 most common mistakes made in cloud and virtualization security.
Cyber resilience is becoming a bigger issue for all organizations. But what does “good cyber resilience” look like? And how do you get there?
In this white paper, you'll discover what SAP BusinessObjects and Web Intelligence can deliver. When it comes to accessing large amounts of data and then creating customized and sophisticated analytical reports, you'll see why Web Intelligence is a wise choice.
In the previous post, we discussed the need for VXLAN in the cloud along with the issues it solves. In this post, we will focus more on how VXLAN works.
One of the most important steps in mastering a new technology is learning the associated terminology or vocabulary. In the IT field, this can be a very challenging step, as much of the terminology is often used inconsistently. This white paper defines the terminology associated with IT virtualization. It is mainly vendor-agnostic, but it does provide some vendor-specific terms, product names, and feature names used by VMware, Citrix, and Microsoft.
In 2013, VMware announced VMware Virtual SAN (VSAN), which is VMware's native version of Software Defined Storage (SDS). It is simple, easy to setup and managed by user-defined policies. This paper explains VSAN, its basic requirements and how it works.
There are some common misconceptions on the part of some of my students as to how VPN sessions are established from either a remote location or remote user to the ASA firewall. In particular, a “gray area” seems to be when the attributes from the tunnel group are app...
There are many interesting new issues that seem to have come with the addition of voice and video to the data network. Most of the engineers that are now working on VoIP networks come from either a pure data network background or a traditional phone system background...
Resource Pools are often misunderstood, disliked, and untrusted by vSphere Administrators. However, resource pools can be very useful tools for administrators who want to configure resource management without having to individually configure each VM. This leads to the administrator’s desire to explore the proper usage of resource pools.
This vSphere Essentials white paper will give you a basic understanding of some of the concerns or planning points to consider as you get ready to deploy vSphere in your organization. This is a glimpse into some of the essential things to consider for implementing vSphere. This will focus on some of the basics that vSphere administrators run into when installing the latest features and not realizing they still have some older versions implemented.
There are two types of virtual switches available using vSphere, the vSphere Standard Switch and the vSphere Distributed Switch. The vSphere Standard Switch (vSwitch or vSS) resides in and is manually configured and administered on each ESXi host. The vSphere Distributed Switch (dvSwitch or vDS) provides similar functionality but is centralized to vCenter Server and is more featured. This white paper will cover the vDS architecture as well as an overview of many of the different features that are exclusive to the vSphere Distributed Switch.
In November of last year, Broadcom completed the acquisition of virtualization and cloud computing specialist VMware. Following the acquisition, VMware is now divided into four distinct divisions: VMware Cloud Foundation, Software-Defined Edge Application, Networking and Security, and a dedicated entity for the Tanzu offering, specifically for Kubernetes environments.
VMware Horizon 6 was announced in April and began shipping in June 2014, bringing a more unified suite delivering more integration with infrastructure and cloud products and more simplicity for all devices. Along with the numerous updates across the Horizon suite, VMware has transitioned to a more traditional product licensing hierarchy. This paper explores the new licensing model and provides an overview of the new features associated with VMware Horizon 6.
In the rapidly evolving world of IT infrastructure and cloud computing, organisations are constantly looking for ways to transform and modernise their data centres. One of the leading solutions increasingly emerging in this regard is VMware Cloud Foundation. This powerful platform provides an integrated and automated infrastructure that enables companies to operate more efficiently, save costs and be more agile. In this article, we dive deeper into VMware Cloud Foundation and discuss training options to build the expertise needed.
When properly utilized, VLANs and trunks provide flexibility, stability and ease of troubleshooting. This paper provides technical details about VLANs and trunks, along with design options at a basic to intermediate level. Recommendations and commands are included throughout.
While the recent trend towards cloud computing might make it seem like virtualization is new, it has existed in some form for many decades.
There are many challenges that come to the forefront as you begin the process of virtualizing the data center and moving away from the current physical network setup.
Examine fifteen common myths surrounding virtualization, including many that prevent IT administrators (or their bosses) from getting the maximum value from virtualization. This paper is designed to be vendor-neutral; in other words, the basic concepts and advantages are the same whether you choose to use Citrix XenServer, VMware vSphere, Microsoft Hyper-V, or one of the many Linux-based solutions. We'll break the reasons into three broad categories (Cost/ROI, Performance, and Other), allowing you to focus in on a specific area if desired, or you can review the entire white paper for a broader view.
This article defines many of the most commonly used terms in the virtualization vocabulary.
Virtualization is an umbrella term that continues to evolve to include many different types that are used in many different ways in production environments. Originally virtualization was done by writing software and firmware code for physical equipment so that the physical equipment could run multiple jobs at once. With the success of VMware and its virtualization of x86 hardware, the term virtualization has grown to include not just virtualizing servers, but whole new areas of IT. This article is going to look at the origins of virtualization and how some of the historical development has spurred on today's virtualization. In addition, we will discuss different types of virtualization that are being utilized in the marketplace today and a listing of some of the leading vendors.
Many people believe that cloud computing requires server (or desktop) virtualization. But does it? We will look at using virtualization without cloud computing, cloud computing without virtualization, and then look at using both together. In each case, we'll look at where each deployment might be most useful, some use cases for it and some limitations.
One of the advantages of vSphere is that you can move a virtual machine from one location to another, across servers, storage locations-even data centers. Physical servers don't have that ability and that can have many implications for disaster recovery, availability, and so forth. This white paper explains why migrations are useful, the methods that vSphere makes available for you to manually move a virtual machine (VM), and how vSphere can automate the process for you in various scenarios.
The IT Skills and Salary Report covers a lot in the published report, and that’s only the surface. Here are four snippets of AWS data that weren't included in the published report.
One of the many useful features of tunneling is to carry non-IP traffic across an IP network, and this is still the case when dealing with IPv6 traffic. This transition mechanism makes use of a configured tunnel to transport IPv6 over a native IPv4 network, which may consist of two sites or more. Unlike the previous transition mechanisms, tunneling is not monolithic; while the basic principles may be similar, the operations are different. The following chart gives a breakdown of the current, major tunneling types in use, particularly in a Cisco environment:
RTMT provides a set of canned views of both system resources and application counters that provide you with a snapshot of your environment right out of the box. Read on to learn how you can make RTMT even more helpful by customizing it to show you different views of your resources and CUCM environment.
While the last few years have brought about many great advances in IT and network technology security and risk management have a critical point. There is a host of new concerns the IT security manager must be concerned with, including social networking, mobile, cloud, and information sharing. This has unleashed a new wave of change and potential risk. Risk management is required to deal with these emerging technologies and should provide the rationale for all information security activities within the organization. You can think of risk management as the process of ensuring that the impact of threats and exploited vulnerabilities is within acceptable limits at an acceptable cost. Risk management requires the use of countermeasures. Countermeasures can include any process that serves to reduce threats or vulnerabilities.
Occasionally as I'm teaching a Cisco training class, I get an idea for a blog post and it happened again this week. The Securing Networks with ASA Fundamentals curriculum is mostly based on the Adaptive Security Device Manager (ASDM). While the class describes the us...
The methods we have used in the past to secure our networks won’t work for tomorrow’s networks. Cloud-based applications and multi-tenant environments require greater scalability, agility and control. Software-defined networking (SDN), such as that provided by VMware NSX, can deliver a new platform that transforms networking and provides for much more specific control of the security of your data and networked applications. In this white paper, author Bill Ferguson describes the microsegmentation of security and illustrates how you can use NSX to provide security that works on today’s and tomorrow’s networks.
This white paper describes a technique for defining processes called SIPOC (Suppliers, Inputs, Process, Outputs, and Customers). SIPOC provides a structured way to define the key elements of any process. SIPOC can be used as a means of defining any of the service management processes presented in ITIL® best practices. Furthermore, SIPOC can be used as the preliminary input into the more formal documentation of a process in one of many process design tools.