Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Topics

Show Filters
Result Filters:

1042 Results Found

Results per page: 10 40 80

Understanding Inner and Outer Joins

Article | June 12, 2013

One of the most difficult concepts for me as I was learning database syntax was joins. Of course, I tried reading and understanding articles and books that dealt with this topic. In almost every case, I was faced with the Venn diagram examples.

What’s in a CSI Register?

Article | June 14, 2013

ITIL is generally not prescriptive. In reality, the CSI Register at any given organization might look significantly different than the example given in the CSI book. The fields given in this example are important. 

SIP and the Art of Converged Communications

White Paper | June 18, 2013

Session Initiation Protocol (SIP) is an internet signaling protocol, developed by the IETF (starting in 1996), for establishing, maintaining, and tearing down sessions between a variety of real-time media, including voice, video, and chat. SIP allows endpoints to locate other endpoints, whether stationary or mobile. SIP doesn't have to worry about transporting voice or video as Real Time Transport Protocol (RTP) takes care of that. It also relies on Session Description Protocol (SDP) to negotiate capabilities and codecs. SIP does not provide a Directory Service or Authentication, but it does work with services such as LDAP or RADIUS. SIP is only concerned with signaling. This white paper is going to look at the way SIP is used in the converged Unified Communications environment.

Uncover e-Learning Best Practices from a CSTD Award-Winning Project

Webinar – Recorded | June 26, 2013

Learn how to leverage e-Learning to its full potential from someone who has succeeded in e-Learning. E-Learning is considered the way of the future for good reason: attractive cost-savings, flexibility, and convenience. To realize these benefits, you need to craft the training to meet a number of rigorous objectives. Join Kevin Kernohan, senior production manager at Global Knowledge, and Ann Schuler, learning and development consultant at the Government of Alberta Human Services Ministry, as they lead you from beginning to end of the e-Learning development cycle. In partnership with the Government of Alberta, Global Knowledge developed the Critical Thinking in Action training program for employees throughout the province. Discover why this e-Learning program earned a CSTD Award for Training Excellence and how you can assimilate these best practices into your organization.

How to Succeed at Service-Oriented Architecture

White Paper | June 27, 2013

SOA is all about architecture-after all, it's right there in the acronym-yet most organizations think it is about turning existing software components into web services. When you adopt SOA, remember that it is all about design and governing that design. It's about how you design your service interfaces, your services, your data model, and your business processes. It's about how you keep track of your services, how you control the design, definition, deployment, and distribution of your services and their artifacts, how you define a service contract and service level agreement for your service consumers, how to secure your services, and how to react when things go wrong with them.

Using Countermeasures to Ensure Risk Management

Article | July 03, 2013

While the last few years have brought about many great advances in IT and network technology security and risk management have a critical point. There is a host of new concerns the IT security manager must be concerned with, including social networking, mobile, cloud, and information sharing. This has unleashed a new wave of change and potential risk. Risk management is required to deal with these emerging technologies and should provide the rationale for all information security activities within the organization. You can think of risk management as the process of ensuring that the impact of threats and exploited vulnerabilities is within acceptable limits at an acceptable cost. Risk management requires the use of countermeasures. Countermeasures can include any process that serves to reduce threats or vulnerabilities.

Cisco Training for Unified Communications

Video | July 11, 2013

Meet Global Knowledge course director and lab topology architect Joey DeWiele, a specialist in Unified Communications. Joey will walk you through the benefits of our exclusive Cisco UC lab architecture - a more scalable and stable approach to the all-important labs featured in unified communications courses. Our labs feature upgraded hardware and software including Custom Lenovo T61 PCs, 7965 IP Phones, 3560 Switches and Call Manager 7. With our flexible UC architecture, students are able to view and experience the full lab architecture regardless of which Cisco UC course they are taking or the skill set they are seeking. The lab architecture features a realistic network with redundant environments that are made rich with multiple machines, pre-deployed tools with shortcuts, online documentation that is particular to individual pods, and multiple OS support for all virtual machines (Windows, Linux, VMware).

FIREWALL 2.0 - Deploying Cisco ASA Firewall Solutions

Video | July 11, 2013

Global Knowledge instructor Doug Notini discusses the benefits of our FIREWALL 2.0 - Deploying Cisco ASA Firewall Solutions course.

High Availability Options in SQL Server 2008

Video | July 11, 2013

In this video, you will learn about the High Availability options in SQL Server 2008: Server Clustering, Database Mirroring, Log Shipping and Peer-to-Peer Replication.

Ten Performance Monitor Counters to Analyze SQL Server Memory Pressure

Article | July 12, 2013

Many experts agree that memory is the most important resource with regard to SQL Server performance. There are hundreds of performance counters, and therefore, it can be complex to figure out just what to monitor. Here are some suggestions in understanding whether memory pressure might be the performance problem with your SQL Server.

How To Use Transparent Data Encryption in SQL Server 2008

Video | July 18, 2013

In this video, you will learn how to a use a new feature of SQL Server 2008 called Transparent Data Encryption for enhanced security.

Top Five Reasons Your Company Needs VMware Horizon View 5.2

White Paper | July 23, 2013

With the growth of bring your own device (BYOD) and mobility, users are increasingly asking for computing anywhere from any device at any time. Users now expect productivity on the go with a desktop that can be freely accessed and secure. We're no longer a society that sits at a desk to be productive. The VMware Horizon Suite allows the datacenter administrators to satisfy the accelerated mobility needs of the workforce while still maintaining an IT solution that is easily managed and secure.

ITIL Mission Statement: Key to Better Services

Article | July 29, 2013

Many I&O leaders and customers see little value from investments in ITIL. Not getting the Return on Investment (ROI) you expect normally comes from using ITIL incorrectly. You, your staff, and your customers must share the same goals and understand exactly what to expect from your ITIL investments. The goal of ITIL is not “business and IT alignment” or “competitive advantage from IT investments.” Instead, its first goal is to stabilize service operation. This builds a base for the second goal: increasing value through service optimization. You must have clear-cut, documented, and managed expectations for each activity, and order is vital. Success requires that you stabilize service delivery before trying to optimize. Focusing on the correct goal and linking each ITIL task to that goal is the correct use of ITIL.

Military Orders Process vs. Project Management Methodology, Part 1

Article | Aug. 13, 2013

For a project manager (PM) who has served as a military officer on a battalion or higher staff, the parallels between the military decision-making process (MDMP), the orders production process, and project management doctrine prescribed by the Project Management Institute (PMI) are difficult to ignore. Both the MDMP and the processes outlined in A Guide to the Project Management Body of Knowledge—Fifth Edition (PMBOK® Guide) are iterative in nature, allow for the introduction of changes to the original plan, assign tasks and responsibilities, and involve the concept of managing the scope of the operation or project.

UCS Troubleshooting Boot Camp

Video | Aug. 15, 2013

John Barnes, Global Knowledge's Cisco Course Developer, discusses enhancements to our UCS Troubleshooting Boot Camp and suggestions for students in preparation for this course.

Top 12 SonicWALL CSSA Exam Prep Tips

Article | Aug. 21, 2013

Dell SonicWALL's CSSA (Certified SonicWALL Security Administrator) exam is an open book, online certification exam that certifies a student’s understanding of the SonicOS Unified Threat Management (UTM) operating system. The exam tests a student’s network security knowledge, and their ability to use the GUI menu structure for configuration of standard network security scenarios.

Understanding Networking Fundamentals

Video | Aug. 22, 2013

Global Knowledge Product Manager Tori Easterly discusses the benefits of our Understanding Networking Fundamentals course.

What Is Multiplexing?

Article | Aug. 22, 2013

Multiplexing is the technology that is able to combine multiple communication signals together in order for them to traverse an otherwise single signal communication medium simultaneously. Multiplexing can be applied to both analog and digital signals. A benefit of using multiplexing, or muxing, is reducing the physical hardware cost for expensive dedicated network communication segments, such as copper or fiber cables.

Why Network Administrator is the Hot IT Job of the Future

Article | Aug. 23, 2013

Are you at a crossroads professionally or looking to start training for a new job? If so, you might want to consider pursuing network administration as a career. Network administrators are responsible for maintaining computer hardware and software systems that make up a computer network, including maintaining and monitoring active data networks, converged infrastructure networks, and related network equipment.

Applying the Four Standards of Security-Based CIA

Article | Aug. 29, 2013

Constant change in the technology landscape has been mirrored by the steady evolution of information security. The current information system environment is increasingly complex, comprising storage, servers, LANs/WANs, workstations, Unified Communications, Intranet, and Internet connections.

Enhancing the Value of ITIL® and TOGAF®

Webinar – Recorded | Aug. 29, 2013

Traditionally, ITIL and TOGAF professionals have been part of different teams within an organization. Due to the ongoing alignment of business and IT, these professionals now often find themselves on the same team. Because of this crossover, there is a growing trend towards organization of work based on multiple best practice models. 

Military Orders Process vs. Project Management Methodology, Part 2

Article | Sep. 10, 2013

Now that we have looked at the similarities and differences between the first two steps of the military decision-making process (MDMP) and the project management processes from the planning process group that align with them, it’s time to take a look at the third ste...

How MIMO Cuts Data Transmission in Half

Video | Sep. 12, 2013

The driver behind 802.11n is MIMO, or multiple input multiple output. This video explains how MIMO works to double your channel speed by sending two or more data streams over the same channel.

Shortcuts to Speed Your vCloud Deployment

White Paper | Sep. 17, 2013

VMware vCloud Director fashions the provisioning of the software-defined datacenter layer to allow for a full virtual datacenter deployment within a short period of time. A vCloud consists of many layers and can quickly become a complex architecture. Before any deployment, requirements should be defined so that the vCloud can be designed to offer those services needed. It is imperative to understand the many components of vCloud, how each vCloud construct fits, which allocation models are available, and what network options can be chosen.

Designing IP Addresses for Large Networks

White Paper | Sep. 25, 2013

In numerous Cisco classes, students learn about IPv4 and IPv6 address subnetting, complex subnetting, variable length subnet masking (VLSM), summarization, prefix routing, and address aggregation. These are valuable skills. In order to apply these skills efficiently, a network designer should possess one additional skill. Planning the IP address space for a Class A or B IPv4 address is necessary to apply the complex skills listed above properly. Complex subnetting, VLSM, and IP address summarization can be implemented simply and efficiently with proper planning.

Getting There Faster - Accelerating Leadership Development

Webinar – Recorded | Oct. 01, 2013

How can leaders and Human Resources professionals use effective, simple and research-based talent management practices to contribute to their organization's success? Too many leadership development theories provide complex and confusing answers. Join Jocelyn Bérard as he shares the core practices introduced in his new book, Accelerating Leadership Development, which reflects his extensive research and years of experience in making leadership development uncomplicated and practical.

Cybersecurity Necessities: A Firewall, Antivirus, and a Well-Trained Workforce

Webinar – Recorded | Oct. 03, 2013

You have spent money on software and hardware, implemented best practices, and believe you are secure, right? You may have overlooked the weakest link: your employee. Many breaches occur as a result of an employee mistakenly clicking on a link or visiting a site that allows a virus to be unknowingly downloaded, giving hackers access to your network. Today, a well-trained workforce is a necessity and may even be your most important cybersecurity tool. In this webinar, security expert David Willson will discuss how many breaches have occurred and are occurring, the tools and techniques hackers use to trick employees into clicking on links or opening attachments, and how to prevent such behavior.

When is a TCP SYN not a SYN?

Article | Oct. 07, 2013

Answer? When it is flagged as a retransmission in Wireshark!

Subnetting Made Easy - Part 2

Video | Oct. 10, 2013

Instructor John Harmon continues his explanation of subnetting by showing how subnet masks can be used to sub-divide networks.

Wireless LAN Channels

Video | Oct. 10, 2013

There are several Wireless LAN Standards, including b, g, and n, which exist in the 2.4 GHz band. These standards need around 20 MHz of radio frequency in order to transmit their signals. In this video, Ben Miller discusses how to pick access points and channels for optimal performance.

Developing Effective IT Learning Processes

Webinar – Recorded | Oct. 16, 2013

Business is changing rapidly and Information Technology is at the centre of the trends: mobile, social, cloud and big data,. Forward thinking IT functions must develop and manage the skills of their most critical asset-- their employees. Effective professional development can guard against the pace of change, leading IT units to re-define job roles to include both technical and non-technical competencies and to establish business processes to help their staff develop and maintain these skills. This session will present the components of a holistic process to support learning and development in any IT organization.

What's New in vSphere 5.5

White Paper | Oct. 16, 2013

vSphere 5.5 is now available with myriad small improvements such as a faster Web Client, LACP, Autoscale and higher configuration maximums. In addition, there are changes coming such as VSAN, which may be ground-breaking in regard to VM storage of the future. Since the release of vSphere 5.5, they have not yet announced a change to the blueprint for the test. That being the case, I will say, for now, that the VCP-510 test should remain unchanged as well. My goal here is not to reeducate you on everything that you need to know for the test; instead, it is to point out the few changes that might apply in your company or organization.

Can Use Cases Really be Used in an Agile Environment?

Webinar – Recorded | Oct. 17, 2013

Agile is a set of principles requiring a significant cultural shift, new paradigms in thinking and team organization. Over the years, Agile has become "productized" or in many cases "institutionalized", creating different flavours and levels of commitment among teams and organizations. Along the way, managers and team members have lost sight of Agile's principles and tried to enforce the use of certain tools and structure where they may not belong. In this one hour webinar, Perry McLeod will explain how tools such as use cases can be successful in an agile environment, provided the principles of agile are always active in the minds of the managers and the team members that are using them. Join Perry to determine whether or not making the cultural shift towards the use case method in an agile environment is the right move for you and your organization.

The Art of Enterprise Thinking

Article | Oct. 22, 2013

Enterprise thinking, simply put, is the practice of considering the entire enterprise in decision-making, not just a given group or department. This style of thinking makes the organization both leaner and more agile—lean by reducing the waste and inefficiencies that come from blinkered and siloed thinking and agile by increasing everyone’s understanding of enterprise goals, vision, and functions.

La réalisation des bénéfices - l'objectif partagé du GP et de l'organisation commanditaire

Webinar – Recorded | Oct. 24, 2013

Ce séminaire en ligne portera sur l'importance de la réalisation de la valeur attendu du projet et proposera des outils et des approches pratiques pour aider dans votre quête du rôle de précieux allié. La profession de gestionnaire de projet est en plein essor et le rôle du GP est en transition. En plus d'être un expert en techniques de planification et de contrôle, le GP d'aujourd'hui doit bien coordonner le travail d'équipe et, ultimement, protéger l'organisation contre l'incertitude. Avec cette responsabilité accrue vient également un sens d'imputabilité pour la réalisation des bénéfices envisagés par le projet. Au-delà de bien gérer la triple contrainte, un GP qui maintien l'attention de l'équipe sur la réalisation des bénéfices sera un partenaire clé de l'organisation. Ce séminaire en ligne porte sur l'importance de la réalisation de la aleur attendu du projet et proposera des outils et des approches pratiques pour aider dans votre quête du rôle de précieux allié.

Microsoft SharePoint Training for Site Collection Administrators

Video | Oct. 24, 2013

As a power user, find out if you're ready for the SharePoint Site Collection and Site Administration class and how it can benefit your organization.

Key Differences in Global Knowledge's ITIL Training

Video | Oct. 31, 2013

Co-authors Michael Scarborough and Ryan Ballmer discuss some key differences in the new Global Knowledge ITIL courseware.

Why is ITIL Important?

Video | Oct. 31, 2013

Michael Scarborough and Ryan Ballmer, co-authors of Global Knowledge ITIL courseware, discuss why ITIL is important to businesses.

Démystifier les cas d'utilisation pour les analystes d'affaires

Webinar – Recorded | Nov. 07, 2013

La plupart des analystes d'affaires ont déjà entendu parler des cas d'utilisation, mais sont souvent intimidés par des exemples complexes qui ne semblent pas pertinents pour eux. Ce webinaire a pour but de clarifier ce que sont précisément les cas d'utilisation et leur usage, en plus de démontrer comment ils peuvent faciliter les tâches de l'analyste d'affaires.

Subnetting Made Easy - Part 1

Video | Nov. 14, 2013

Instructor John Harmon explains subnetting using binary numbers and decimal conversions.

Five Phases of a Gap Analysis

Article | Dec. 05, 2013

A gap analysis is a tool that ITIL recommends organizations use to compare their current state to some future desired state.

New Group Policies

Video | Dec. 05, 2013

In this video, instructor Glenn Weadock demonstrates how Group Policy settings can control new user interface features such as the Taskbar, and resuscitate obsolete features such as classic menus in Windows Explorer.

Four Common Questions Students Ask in My Cisco Contact Center Express Classes

Article | Dec. 10, 2013

Frequently, questions come up in the Cisco Contact Center Express classes I teach concerning the ability of the system to perform this or that task. In this blog post, I will cover some of the more popular questions I get during class.

Cisco IOS Digit Manipulation

White Paper | Dec. 20, 2013

Need to control the digits contained in the telephone number that enter or leave a gateway? Digit manipulation involves adding, subtracting, and changing telephone numbers. You can manipulate calling numbers, called numbers, and redirecting numbers, as well as the numbering plan and ISDN number type. Learn about the techniques that are applied to incoming or outgoing calls, or globally to all calls. You can also manipulate telephone numbers before or after a dial peer is matched.

Extending Role Security in Analysis Services for SQL Server

White Paper | Dec. 30, 2013

By using and implementing a many-to-many relationship in a cube, existing tables with user account information can be used directly to secure cube contents, rather than converting to role based security in the cube. You can also secure your analysis services more easily and access sensitive information contained within it.

15 Most Popular IT and Business Certifications for 2014

Special Report | Jan. 01, 2014

In this report, I've reviewed the 15 most popular certifications according to our more than 12,000 North American respondents to our annual IT Skills and Salary Survey. For each certification, you'll find a brief description, the average salary, and some insight into why it is popular.

A Guide for Maximizing your Training Dollars

Special Report | Jan. 01, 2014

You know you need to invest in training, but how do you get the best return on investment (ROI) from your training dollars? To help you make smart training decisions, we've put together this guide, which illustrates some alternative and little-known payment options, the types of discounts and promotions available with training and a suggested list of courses that give you excellent value.

List of IT Skills

Special Report | Jan. 01, 2014

Organizations are moving strongly toward Bring Your Own Device (BYOD) access, bringing outsourced activities back in-house, and finding ways to make use of the growing amounts of data flowing in from many new sources such as social media. These factors create an increasing shift in required and desired skills showing up in IT departments. Hiring and salary surveys, such as the 2014 IT Skills and Salary Survey from Global Knowledge and Windows IP Pro, TEKsystems' 2014 Annual IT Forecast, Foote Research Group's 2014 IT Skills and Certifications Pay Index, Computerworld's annual Forecast survey, Robert Half Technology Survey, and information from the US Bureau of Labor Statistics, Futurestep, Mondo, GovLoop, and Dice have presented a developing picture of the IT skills that will be in demand in 2014. Here, in survey order, are the top 10 major skills and why they made the list.

Preparing for the PMP® Exam Part 1

Video | Jan. 01, 2014

Global Knowledge Senior Business Skills instructor Samuel Brown covers tips for preparing and practicing for the PMP exam.

ITIL Capability versus ITIL Lifecycle?

Video | Jan. 02, 2014

Michael Scarborough and Ryan Ballmer, co-authors of Global Knowledge ITIL courseware, discuss the difference between ITIL Capability courses and ITIL Lifecycle courses.

Putting the SharePoint Management Shell on ISE

Article | Jan. 07, 2014

The default shortcut for the SharePoint 2013 Management Shell uses PowerShell.exe; however, a few small changes can easily yield a SharePoint Management Shell based on the more awesomely powerful PowerShell ISE.

Introduction to Amazon Relational Database Service (Amazon RDS)

White Paper | Jan. 16, 2014

Database Management Systems (DBMS) have been monolithic structures with their own dedicated hardware, storage arrays, and consoles. Amazon Web Services (AWS) realized that while each company can use unique methods of collecting and using data, the actual processes of building the management infrastructure are almost always the same. AWS remedies DBMS problems with its Amazon Relational Database Service (Amazon RDS).

Configuration Cheat Sheet for the New vSphere Web Client

White Paper | Jan. 21, 2014

If you have been working with vSphere 5.1 or 5.5 lately, you have undoubtedly noticed that the latest features such as XvMotion and vSphere Replication are only available on the Web Client. This cheat sheet for the new Web Client includes instructions for configuring VMs, networking, storage, resource settings, cluster settings, permissions, and many other settings.

Preparing for the PMP® Exam Part 2

Video | Feb. 03, 2014

Global Knowledge Senior Business Skills instructor Samuel Brown covers tips for preparing and practicing for the PMP exam.

Secure Your SQL Server Today!

Webinar – Recorded | Feb. 05, 2014

Your Microsoft SQL Server database often contains the most valuable information in your organization. Get tips for securing it properly and effectively in this free, information-packed webinar with Microsoft SQL Server expert Gidget Pryor. In just an hour, Gidget will demonstrate the layered security approach used by SQL Server. She will step you through the process and best practices of setting up logins, users, roles, schemas, and permissions, and she will review the security model changes that have taken place from SQL Server 2005 through SQL Server 2012. She will also review SQL Server 2012 training and certifications.

Tips and Tricks to Speed AWS Deployment

White Paper | Feb. 06, 2014

Amazon Web Services (AWS) offers increased agility, developer productivity, pay-as-you-go pricing and overall cost savings. But you might wonder where to start, what pitfalls exist and how can you avoid them? How can you best save time and money? Learn what you need to know and where to start before launching an AWS-hosted service.

The Business Analyst in an Agile Environment

Webinar – Recorded | Feb. 19, 2014

Agile is increasingly becoming the foundation for today's business world, and Business Analysts are essential for organizations and projects to achieve maximum success. Following a brief overview, Benjamin will tackle and dispel many of the common myths about Agile and then dig deeper into the true value Business Analysts hold for their organization. Join us for a look at the modern Business Analyst and their role in an Agile environment.

Top 10 Mistakes Deploying and Upgrading Lync Server 2013

White Paper | Feb. 25, 2014

Microsoft Lync Server 2013 requires a proactive approach during deployment. This white paper provides valuable recommendations as well as the technical links that help you avoid common mistakes during a Microsoft Lync Server 2013 deployment.

The Power of Influence in the Workplace

Webinar – Recorded | Feb. 26, 2014

A shift is occurring in the way we view leadership today. If you want to get things done, you need influence, not authority. This means that IT Professionals, Project Managers, Business Analysts, business-line Managers and individual contributors must focus on demonstrating personal leadership. Getting results through others by building relationships and using influence skills rather than relying on positional power is key.

Cisco DCUFI Training and Data Center Challenges

Video | Feb. 27, 2014

Instructor Carol Kavalla talks about the advantages of taking a Cisco Data Center Unified Fabric Implementation class from Global Knowledge.

Business Requirements Scoping Techniques

Webinar – Recorded | March 01, 2014

Organizations launch projects with the assumption that the new or improved solution will provide worthwhile benefits for stakeholders and a suitable return on investment. By understanding your business requirements you ensure that your teams actually deliver those benefits. Keeping user and functional requirements aligned with the business requirements is a key to successful solution delivery.

Introduction to Amazon Auto Scaling

White Paper | March 06, 2014

AWS has introduced Auto Scaling so that you can take advantage of cloud computing without having to incur the costs of adding more personnel or building your own software. You can use Auto Scaling to scale for high availability, to meet increasing system demand, or to control costs by eliminating unneeded capacity. You can also use Auto Scaling to quickly deploy software for massive systems, using testable, scriptable processes to minimize risk and cost of deployment.

Overview of Microsoft Cloud Computing Architectures

Video | March 13, 2014

In this video, Practice Leader Craig Brown discusses the new Microsoft Cloud Computing platforms and how to keep your organization's data secure and functioning properly while operating either partially or entirely on the cloud.

Which Is Easier to Configure: Cisco IOS or Juniper Junos?

Article | March 17, 2014

The short answer (and a common one in our industry): it depends. When comparing Cisco IOS with Juniper Junos, the decision to choose one over the other is difficult and often boils down to cost. Of course, there are other factors to consider.

What’s the Difference between Video Conferencing and Telepresence?

Article | March 18, 2014

With the advent of video use in our everyday communications, a number of questions commonly surface. One of them is the question of terminology. What's the difference between video conferencing and telepresence? What is meant by immersive technologies? Frankly, there is no one single right answer.

Where to Go Once Your Servers Are Virtualized

White Paper | March 20, 2014

The technologies examined reduce operational expenses (OpEx), not capital expenses (CapEx) that has traditionally been the focus of virtualization. Many companies implemented virtualization with the goal of saving money in the form of fewer servers to buy with a side benefit of reducing the footprint of the servers and lowering the required power and cooling. Most of the savings were in capital, but do not expect the same with many of the technologies listed here, because some may even require some additional capital expenditures, at least for software, in order to save on the day-to-day operations of IT. The bigger cost in running an IT department is in the OpEx category anyway, so savings there are recurring.

Learn OpenStack from the Experts at Red Hat

Webinar – Recorded | March 26, 2014

In this seminar, discover how OpenStack can simplify your cloud infrastructure management. Experts from Red Hat, the leading contributor to the OpenStack project, will fill you in on how organizations have solved problems and increased business value with open-source cloud technology. They will also give you a peek into the future of Red Hat OpenStack and reveal how Red Hat training and certification can ensure the success of your cloud deployment.

VSAN: Reimagining Storage in vSphere

White Paper | March 26, 2014

In 2013, VMware announced VMware Virtual SAN (VSAN), which is VMware's native version of Software Defined Storage (SDS). It is simple, easy to setup and managed by user-defined policies. This paper explains VSAN, its basic requirements and how it works.

Amazon Web Services: An Overview

Webinar – Recorded | March 28, 2014

Amazon Web Services: An OverviewThere's a really good chance that Amazon Web Services (AWS) has more than a few products to help you work faster, smarter, and more cost effectively. After all, the depth and breadth of AWS is significant, comprising more than 30 services in dozens of data centers located in nine regions across the globe. They offer computing, storage, networking, deployment, management, and a host of supporting services, such as queues and email services. Getting a clear understanding of what AWS is and how it can help your business can be challenging. Never fear. In this hour-long webinar, Global Knowledge instructor and cloud and big data analyst Rich Morrow will help. He'll give an overview of AWS and its many benefits.

Prioritization: Start Working Strategically

Webinar – Recorded | April 02, 2014

Today, every project comes with limited resources and an impossible timeline. You have to prioritize, but how do you determine what's most important? The answer is to do more than just prioritize. You have to fully understand your company's strategic direction and make every action align with that strategy. In this hour-long webinar, project management expert Yvan Bastien will show you how to reach that full understanding and make the kinds of informed decisions that lead to success.

What DMVPN Is and Why We Should Care

Article | April 03, 2014

According to Cisco marketing, Dynamic Multipoint VPN (DMVPN) “will lower capital and operation expenses, simplifies branch communications, reduces deployment complexity, and improves business resiliency.” Okay. But what is it, really, and why should we care?

The Role of Cisco Unified Communications Manager in Video Conferencing

Article | April 10, 2014

If you’re in IT, you’ve likely heard the saying, “In technology, the only thing constant is change itself,” and boy is that right! For technical companies, if you are not moving forward, then you’re falling behind. There is no such thing as standing still! A perfect example of this mindset is in Cisco’s evolution of video conferencing and telepresence.

UFFA Is Every Support Professional’s Responsibility

Article | April 14, 2014

UFFA, which stands for “Use it, Flag it or Fix it, Add it,” is the responsibility of every support professional in the knowledge management process. It comes from the Knowledge-Centered Support (KCS) methodology where knowledge management is based on collaboration and a shared ownership of the knowledge base. Let’s break it down.

Intersecting Project Management and Business Analysis

White Paper | April 15, 2014

Effective requirements collection at the outset of the project is the key step that will ensure that the project manager can deliver what is actually expected. In this respect, the business analyst must become a key ally and advisor to the project manager. Most project managers are not trained business analysts, so taking advantage of the skill set that a business analyst can offer can greatly enhance the possibility of project success.

PM and BA Roles in Requirements and Project Communication

Article | April 18, 2014

Communication is vital within projects and contributes significantly to project success. PMs and BAs have important—and different—roles. Let's take a look.

A Guide to Password use in WebSphere Application Server

White Paper | April 21, 2014

Nearly every WebSphere administrator has desired a deeper understanding of how passwords are created, used, stored, and encrypted. Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.

Why Your Company Should Have a Risk Management Program

Webinar – Recorded | April 22, 2014

Does your company have a risk management program? In this hour-long webinar, cybersecurity expert and Global Knowledge instructor David Willson will explain why you should. In light of recent breaches at Target, Nieman Marcus, Michaels, Yahoo, and a growing list of others, we're learning that FBI Director Mueller was right when he said getting breached is not a matter of if, but when. While having a risk management program may not prevent a breach, it can certainly lower the risk of one, ensure compliance, and reduce or even eliminate your liability if a breach does occur, enabling you to recover quickly and to protect your reputation. Beyond explaining the importance of a risk management program, David will tell you how to implement one, including conducting a basic risk assessment, policies you'll need, and training your workforce.

Unlock the Power of Microsoft SQL Server 2014

Webinar – Recorded | April 24, 2014

Join Microsoft SQL Server expert Brian Egler for an hour-long webinar covering the key features and updates in the upcoming release of Microsoft SQL Server 2014! You will get a thorough review, along with demonstrations, of how SQL Server 2014 provides substantial improvements in performance, manageability, and availability that will make your job easier.

Problem Management and Knowledge Management

Article | April 28, 2014

Most organizations quickly realize that knowledge management must be integrated with incident management in order to improve the quality of service and the efficiency of providing assisted service. What is not as quickly recognized is the value of integrating knowledge management with problem management.

PMs Are From Mars, BAs Are From Venus

Webinar – Recorded | May 01, 2014

Whether you're a Project Manager or a Business Analyst, you can certainly relate to a situation where you've felt like your cohort on a project was from a completely different planet! This panel discussion webinar between our PM expert, Ori Schibi, and our BA expert, Cheryl Lee, will explore some of the misconceptions that each role has and learn how to play nicely with each other in the project world.