Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By
Show Filters
Result Filters:

463 Results Found

Results per page: 10 40 80

Bridge Your Knowledge from ITIL v3 to ITIL 4

Article | Feb. 01, 2019

ITIL® 4 Foundation Bridge is a new Global Knowledge course that addresses the specific needs of professionals who have already achieved the ITIL v3 Foundation certification and wish to upgrade to ITIL 4. 

Big Data and Apache Hadoop Adoption

Article | Oct. 16, 2018

Every data center has unique hardware and software requirements that can pose significant management challenges to IT. Cloud utilization, virtualization, mobile device management, app development, security, and storage networking represent just a few of the management challenges facing IT today. Add to that the responsibility of providing the infrastructure for processing an exponential increase in data and making it available to an increasingly mobile workforce on a daily basis.

BGP Cross-Address Family Support: What Are the Gotchas and How Do I Fix Them?

Article | Oct. 30, 2014

As I’ve stated before, I like Border Gateway Protocol (BGP). I think it’s an interesting protocol, and yes — it’s complicated, but I guess that part of why I like it. There are a lot of knobs to tweak in BGP, maybe too many, but that’s another post. Anyway, we are now running BGP version 4 and it has had extensions written that support more than just IPv4 unicast routing. We now have IPv4 multicast, IPv6 unicast and multicast, VPNv4, VPNv6, and a few others.

Between Connectivity and Isolation: Achieve Optimal Data Center Security with Cisco ACI

Article | June 28, 2021

In this article, we discuss how to achieve that optimal security approach in the data center with Cisco Application Centric Architecture, or ACI.

Best Paying Jobs in IT

Article | Oct. 16, 2016

In reviewing the list of best-paying jobs in IT, you’ll see some areas you might expect like cloud computing and other areas you probably didn’t, like business technology or enterprise infrastructure management. The top 10 functional areas are based on the 2016 IT Skills and Salary Survey conducted by Global Knowledge in October 2015. Note that all references to “average” represent the mean, not the median or other statistical measures.

Benefits of Using “+” Dialing in the CUCM Dial Plan

Article | Oct. 03, 2014

For smaller companies, configuring a dial plan to account for variations in dialed numbers is often not a problem. However, companies that are larger and more global in nature encounter a number of issues when designing their dial plan approach.

Benefits of an “Agile” Mindset

Article | Nov. 24, 2015

Projects are a social endeavor. Traditional project management approaches have shied away from the social advantages a more agile project environment brings. By nature, we are storytelling, pattern seeking and social people. We need colocation to shine truly in a project environment.

Benefits of a Cloud Based Architecture

Article | May 26, 2011

In the fourth of his five-part series, Eric Strause explores the hardware and application benefits inherent in a cloud-based architecture.

Benefit from Using Failover MAC Address

Article | Nov. 04, 2011

In this post I’ll focus on a topic that’s mentioned in the Cisco FIREWALL training class but isn’t emphasized there or in the online Cisco ASA documentation. When configuring failover on a pair of ASA security appliances, a situation can arise in which network disruption occurs due to the secondary ASA in a failover pair becoming active first and then the primary comes online second. Both the documentation and the courseware point out that this causes the secondary (and active ASA) to swap its interface MAC addresses with those of the primary. Being naturally skeptical about this behavior, I decided to investigate. The rest of this post illustrates my confirmation of this phenomenon.

Beginner’s Guide: Seven Layers of the OSI Model

Article | April 30, 2013

The OSI model is a conceptual tool used to discuss and describe network functions. The use of a standard reference model is essential to communicating ideas as well as creating new technologies. It is a good idea to be familiar with the OSI model, the features assigned to each layer, and examples of common protocols or technologies associated with the OSI layers.