Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By
Show Filters
Result Filters:

100 Results Found

Results per page: 10 40 80

Ensuring the Availability of Your IBM Tivoli Monitoring Infrastructure

White Paper | July 08, 2014

This white paper addresses four different components of the Tivoli monitoring infrastructure for creating a high availability environment while providing redundancy and failover capacity. Although the principles are the same for each of these systems, the methods for adhering to these principles are different for each of them.

A Practical View of NIST's Cloud Definition

White Paper | July 14, 2014

The National Institute of Standards and Technology (NIST) created a cloud definition that has been well-accepted across the IT industry. NIST was mandated to assist government agencies to adopt cloud computing for their IT operations. As part of their mandate, NIST created multiple working groups to define cloud computing, its architecture, and requirements. In this paper we explore the center core of NIST's cloud definition.

Managing Stakeholder Expectations for Project Success

Webinar – Recorded | July 24, 2014

This power session is an introduction to Managing Stakeholder relations. It offers new ways of managing and dealing with projects, which focus more on communications, understanding stakeholders' needs and managing their expectations, as well as learning about organizational politics and culture, and performing value-add activities. It provides a practical approach to managing issues that matter most for project success - communication, stakeholder expectations, risk, change and quality; so that the scope, schedule and cost end up on target, achieving the desired outcomes for the organization.

Tom Rosamilia on IBM Training: Our Trusted Global Training Providers

Video | July 24, 2014

Part of IBM's new training approach includes a carefully selected group of four Global Training Providers. Tom Rosamilia explains the detailed process and criteria IBM used to select the four Global Training Providers, including worldwide reach and innovation in delivery methods. These IBM Global Training Providers are experts in skills education and will help IBM meet our goal of providing clients the right skill set to quickly and efficiently leverage the full power of IBM solutions.

Managing Storage with the Linux Logical Volume Manager (LVM)

Video | July 31, 2014

The Logical Volume Manager (LVM) is a powerful tool for managing storage on Linux servers. This video provides an overview of how LVM works and explores several ways that LVM makes storage management easier and more flexible. Examples include how to expand storage capacity on the fly using LVM and resize2fs, and how to migrate data from local storage to a storage area network (SAN) without downtime using pvmove.

How Project Managers Can Influence Their Stakeholders' Perceptions

Webinar – Recorded | Sep. 25, 2014

In this hour-long webinar, Global Knowledge instructor and PMP-certified project management expert Daniel Stober will look beyond the triple constraint model and focus on the true essence of project success: stakeholder satisfaction. Many project managers (PMs) fall into the familiar habit of managing based on the constraints of time, cost and scope. While all of these are important, managing them effectively doesn't guarantee project success if the PM fails to conduct proper stakeholder management. To manage stakeholders effectively, the PM has to set expectations. Once expectations are set, the PM must influence the perception of project performance with the stakeholder. Tune in as Dan explores methods you can use to accomplish that goal.

PowerVm Virtualization Essentials

White Paper | Oct. 09, 2014

PowerVM is the virtualization environment for AIX, Linux, and IBM i running on the IBM POWER hardware platform. This white paper provides an overview of PowerVM concepts, architecture, terminology, and capabilities.

Stakeholder Perceptions Become Your Project Reality

White Paper | Oct. 13, 2014

For project managers, meeting stakeholder expectations means that you have to know what the expectations are to begin with if you are ever expected to meet them. After expectations have been set, follow up with your stakeholders to ensure that the expectations haven't changed. People change their minds often, so communicate in order to influence their perceptions and expectations. You may be surprised how simple communication and understanding expectations can positively affect your next project.

What You Don't Know About Cybersecurity CAN Hurt You

Webinar – Recorded | Oct. 21, 2014

The bad guys just keep getting better! No matter how much patching and tweaking we do, the bad guys' constantly changing tactics and techniques continue harming our networks, stealing and damaging data, and just generally screw things up. What motivates someone to do such terrible things in the first place? How have these hackers changed and improved? What kinds of attacks are popular now and why? In this hour-long webinar, security expert, former hacker and Global Knowledge instructor Phillip D. Shade will provide insight into understanding the latest hacking techniques, what the current threat landscape looks like, and suggested countermeasures to mitigate threats. He will include specific examples of the current threat landscape, including data mining, social engineering cyber threat terminology, man-in-the- middle attacks and Denial of Service (DoS) attacks.

Human Vulnerabilities in Our Current Threat Landscape

White Paper | Jan. 23, 2015

Times are changing. Attacks are becoming much more sophisticated and hackers are exploiting human vulnerabilities to gain access to enterprise networks and private information. Employees and end users want to help protect your company's sensitive data, we just need to motivate them as to why they should care. By educating your employees on security best practices and current human vulnerabilities, you can take a step forward to ensuring you're not a part of the many organizations that are breached.