Is your salary on par with others in your field? Learn more in Skillsoft's 2024 IT Skills and Salary Report. Click Here.

Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Resource Library

Filter By

Topics

Show Filters
Result Filters:

1055 Results Found

Results per page: 10 40 80

What is Cisco Unity, Unity Connection & Unity Express?

Video | March 14, 2013

Global Knowledge Course Director and Lab Topology Architect Joey DeWiele, a specialist in Unified Communications, discusses Cisco Unity, Unity Connection & Unity Express.

What is Blockchain and How it Will Impact Your Business

Webinar – Recorded | July 13, 2018

With blockchain constantly in the news, business leaders are not only asking themselves what it is but most importantly, what’s in it for me and my business. If you’ve asked those questions, this webinar is for you! In it you will not only learn what blockchain is, but understand its impact and potential for your business. We will demonstrate some of its immediate use cases in technology, business, and enterprise products and institutions.  

What is Amazon Web Services?

Video | Sep. 01, 2015

Learn about the Amazon Web Services platform, products, and services. Gain on-demand access to compute, storage, and database services without upfront costs.

What is a Scrum Master?

Article | Dec. 09, 2019

Scrum serves as a framework for the development of software and other products. It helps teams collaborate and provides a way to address challenges and changes in order to deliver a high value product. The Scrum Master promotes and supports the framework (Scrum). A Certified Scrum Master (CSM) helps everyone understand Scrum theory, practices, rules, and values.

What is a Business Analyst?

Video | June 19, 2014

Kirsten Lora, Global Knowledge Senior Product Director, explains why business analysts are essential to organizations and how our Business Analysis Essentials and Business Process Analysis courses can help them in these roles

What Is a "Good" Decision? How Is Quality Judged?

White Paper | June 05, 2015

This paper provides an overview of how to judge the rigor of one's decision making. It describes how anyone can make better (higher quality) decisions, in any situation.

What Hackers Don't Want You to Know About Phishing Emails

Article | April 14, 2021

One of the most used ways for hackers to attack an organization is through email phishing. From an attacker’s point of view, email attacks can be automated at scale with thousands of emails sent virtually for free.

What Can You Do with Microsoft Power BI?

Webinar – Recorded | April 25, 2019

Power BI is a business analytics solution that lets you visualize your data and share insights across your organization or embed them in your app or website. Connect to hundreds of data sources and bring your data to life with live dashboards and reports. Join us during this recorded webinar to see what Power BI can do for you and your organization.

What Can Excel Do for You?

Webinar – Recorded | Jan. 23, 2019

Microsoft’s Excel program is a staple in many business environments, but very few people take full advantage of this tool. This webinar is a great opportunity to introduce yourself to formulas, data validation, pivot tables, and power query.  

What Are The Major Disadvantages of Indexing in SQL Server

Article | Sep. 09, 2021

Getting the best possible performance from a SQL server can become more complicated as you add more operations to your database.

What Are ITIL Certifications & Are They Worth It?

Article | July 14, 2017

Thinking about getting ITIL certified? In this post, we cover the value of each ITIL certification and dive into survey results to determine whether ITIL certifications are worth it. The results are in!

What Are Common Mistakes in Cloud Security?

Webinar – Recorded | Jan. 15, 2021

Cloud and virtualization technologies have spawned a whole ecosystem of applications. But like any powerful technology, they can be used for bad as well as good. This session reviews the top 10 most common mistakes made in cloud and virtualization security.

What “Good Cyber Resilience” Is and How to Get There

Webinar – Recorded | May 26, 2016

Cyber resilience is becoming a bigger issue for all organizations. But what does “good cyber resilience” look like? And how do you get there?

Web Intelligence to the Rescue

White Paper | June 12, 2015

In this white paper, you'll discover what SAP BusinessObjects and Web Intelligence can deliver. When it comes to accessing large amounts of data and then creating customized and sophisticated analytical reports, you'll see why Web Intelligence is a wise choice.

VXLAN: What is It, and Why Do We Need It - the Conclusion

Article | March 26, 2012

In the previous post, we discussed the need for VXLAN in the cloud along with the issues it solves. In this post, we will focus more on how VXLAN works.

vTerminology: A Guide to Key Virtualization Terminology

White Paper | April 24, 2013

One of the most important steps in mastering a new technology is learning the associated terminology or vocabulary. In the IT field, this can be a very challenging step, as much of the terminology is often used inconsistently. This white paper defines the terminology associated with IT virtualization. It is mainly vendor-agnostic, but it does provide some vendor-specific terms, product names, and feature names used by VMware, Citrix, and Microsoft.

VSAN: Reimagining Storage in vSphere

White Paper | March 26, 2014

In 2013, VMware announced VMware Virtual SAN (VSAN), which is VMware's native version of Software Defined Storage (SDS). It is simple, easy to setup and managed by user-defined policies. This paper explains VSAN, its basic requirements and how it works.

VPN Connection Process

Article | Jan. 05, 2010

There are some common misconceptions on the part of some of my students as to how VPN sessions are established from either a remote location or remote user to the ASA firewall. In particular, a “gray area” seems to be when the attributes from the tunnel group are app...

VoIP Networks and One Way Audio

Article | March 30, 2010

There are many interesting new issues that seem to have come with the addition of voice and video to the data network. Most of the engineers that are now working on VoIP networks come from either a pure data network background or a traditional phone system background...

VMware Resource Pools: Prioritizing VMs

Article | March 11, 2013

Resource Pools are often misunderstood, disliked, and untrusted by vSphere Administrators. However, resource pools can be very useful tools for administrators who want to configure resource management without having to individually configure each VM. This leads to the administrator’s desire to explore the proper usage of resource pools.

VMware vSphere Essentials

White Paper | Jan. 23, 2013

This vSphere Essentials white paper will give you a basic understanding of some of the concerns or planning points to consider as you get ready to deploy vSphere in your organization. This is a glimpse into some of the essential things to consider for implementing vSphere. This will focus on some of the basics that vSphere administrators run into when installing the latest features and not realizing they still have some older versions implemented.

VMware vSphere Distributed Switches

White Paper | March 23, 2015

There are two types of virtual switches available using vSphere, the vSphere Standard Switch and the vSphere Distributed Switch. The vSphere Standard Switch (vSwitch or vSS) resides in and is manually configured and administered on each ESXi host. The vSphere Distributed Switch (dvSwitch or vDS) provides similar functionality but is centralized to vCenter Server and is more featured. This white paper will cover the vDS architecture as well as an overview of many of the different features that are exclusive to the vSphere Distributed Switch.

VMware Simplifies Their Training Portfolio

Article | Jan. 11, 2024

In November of last year, Broadcom completed the acquisition of virtualization and cloud computing specialist VMware. Following the acquisition, VMware is now divided into four distinct divisions: VMware Cloud Foundation, Software-Defined Edge Application, Networking and Security, and a dedicated entity for the Tanzu offering, specifically for Kubernetes environments.

VMware Horizon 6 Overview

White Paper | Aug. 11, 2014

VMware Horizon 6 was announced in April and began shipping in June 2014, bringing a more unified suite delivering more integration with infrastructure and cloud products and more simplicity for all devices. Along with the numerous updates across the Horizon suite, VMware has transitioned to a more traditional product licensing hierarchy. This paper explores the new licensing model and provides an overview of the new features associated with VMware Horizon 6.

VMware Cloud Foundation: The building block for a modern IT infrastructure

Article | Sep. 15, 2023

In the rapidly evolving world of IT infrastructure and cloud computing, organisations are constantly looking for ways to transform and modernise their data centres. One of the leading solutions increasingly emerging in this regard is VMware Cloud Foundation. This powerful platform provides an integrated and automated infrastructure that enables companies to operate more efficiently, save costs and be more agile. In this article, we dive deeper into VMware Cloud Foundation and discuss training options to build the expertise needed.

VLANs and Trunks

White Paper | June 11, 2015

When properly utilized, VLANs and trunks provide flexibility, stability and ease of troubleshooting. This paper provides technical details about VLANs and trunks, along with design options at a basic to intermediate level. Recommendations and commands are included throughout.

Virtualization for Newbies: Five Types of Virtualization

Article | Nov. 29, 2021

While the recent trend towards cloud computing might make it seem like virtualization is new, it has existed in some form for many decades.

Virtualization: What Challenges Appear When Moving a Data Center to the Cloud?

Article | Nov. 19, 2021

There are many challenges that come to the forefront as you begin the process of virtualizing the data center and moving away from the current physical network setup.

Virtualization: Myths vs. Facts

White Paper | March 05, 2012

Examine fifteen common myths surrounding virtualization, including many that prevent IT administrators (or their bosses) from getting the maximum value from virtualization. This paper is designed to be vendor-neutral; in other words, the basic concepts and advantages are the same whether you choose to use Citrix XenServer, VMware vSphere, Microsoft Hyper-V, or one of the many Linux-based solutions. We'll break the reasons into three broad categories (Cost/ROI, Performance, and Other), allowing you to focus in on a specific area if desired, or you can review the entire white paper for a broader view.

Virtualization Terms You Should Know

Article | June 23, 2017

This article defines many of the most commonly used terms in the virtualization vocabulary.

Virtualization for Newbies

Article | Oct. 16, 2017

Virtualization is an umbrella term that continues to evolve to include many different types that are used in many different ways in production environments. Originally virtualization was done by writing software and firmware code for physical equipment so that the physical equipment could run multiple jobs at once. With the success of VMware and its virtualization of x86 hardware, the term virtualization has grown to include not just virtualizing servers, but whole new areas of IT. This article is going to look at the origins of virtualization and how some of the historical development has spurred on today's virtualization. In addition, we will discuss different types of virtualization that are being utilized in the marketplace today and a listing of some of the leading vendors.

Virtualization and Cloud Computing: Does One Require the Other?

White Paper | July 07, 2014

Many people believe that cloud computing requires server (or desktop) virtualization. But does it? We will look at using virtualization without cloud computing, cloud computing without virtualization, and then look at using both together. In each case, we'll look at where each deployment might be most useful, some use cases for it and some limitations.

Virtual Machine Migration Methods in vSphere

White Paper | Nov. 11, 2014

One of the advantages of vSphere is that you can move a virtual machine from one location to another, across servers, storage locations-even data centers. Physical servers don't have that ability and that can have many implications for disaster recovery, availability, and so forth. This white paper explains why migrations are useful, the methods that vSphere makes available for you to manually move a virtual machine (VM), and how vSphere can automate the process for you in various scenarios.

Value of AWS Certified Staff, Popular Cross-certifications and AWS Certs Pursued by Age Group

Article | Jan. 25, 2021

The IT Skills and Salary Report covers a lot in the published report, and that’s only the surface. Here are four snippets of AWS data that weren't included in the published report.

Using Tunneling to Transition to IPv6

Article | Jan. 15, 2013

One of the many useful features of tunneling is to carry non-IP traffic across an IP network, and this is still the case when dealing with IPv6 traffic. This transition mechanism makes use of a configured tunnel to transport IPv6 over a native IPv4 network, which may consist of two sites or more. Unlike the previous transition mechanisms, tunneling is not monolithic; while the basic principles may be similar, the operations are different. The following chart gives a breakdown of the current, major tunneling types in use, particularly in a Cisco environment:

Using the Cisco Real-Time Monitoring Tool for CUCM Performance Monitoring

Article | July 10, 2014

RTMT provides a set of canned views of both system resources and application counters that provide you with a snapshot of your environment right out of the box. Read on to learn how you can make RTMT even more helpful by customizing it to show you different views of your resources and CUCM environment.

Using Countermeasures to Ensure Risk Management

Article | July 03, 2013

While the last few years have brought about many great advances in IT and network technology security and risk management have a critical point. There is a host of new concerns the IT security manager must be concerned with, including social networking, mobile, cloud, and information sharing. This has unleashed a new wave of change and potential risk. Risk management is required to deal with these emerging technologies and should provide the rationale for all information security activities within the organization. You can think of risk management as the process of ensuring that the impact of threats and exploited vulnerabilities is within acceptable limits at an acceptable cost. Risk management requires the use of countermeasures. Countermeasures can include any process that serves to reduce threats or vulnerabilities.

Using ASDM with Minimum User Privileges

Article | July 30, 2010

Occasionally as I'm teaching a Cisco training class, I get an idea for a blog post and it happened again this week. The Securing Networks with ASA Fundamentals curriculum is mostly based on the Adaptive Security Device Manager (ASDM). While the class describes the us...

VMware Training White Paper: Using VMware NSX for the Microsegmentation of Security

White Paper | Oct. 07, 2016

The methods we have used in the past to secure our networks won’t work for tomorrow’s networks. Cloud-based applications and multi-tenant environments require greater scalability, agility and control. Software-defined networking (SDN), such as that provided by VMware NSX, can deliver a new platform that transforms networking and provides for much more specific control of the security of your data and networked applications.  In this white paper, author Bill Ferguson describes the microsegmentation of security and illustrates how you can use NSX to provide security that works on today’s and tomorrow’s networks.

Using SIPOC to Define ITIL® Processes

White Paper | June 19, 2015

This white paper describes a technique for defining processes called SIPOC (Suppliers, Inputs, Process, Outputs, and Customers). SIPOC provides a structured way to define the key elements of any process. SIPOC can be used as a means of defining any of the service management processes presented in ITIL® best practices. Furthermore, SIPOC can be used as the preliminary input into the more formal documentation of a process in one of many process design tools.