Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By
Show Filters
Result Filters:

466 Results Found

Results per page: 10 40 80

Four Common Questions Students Ask in My Cisco Contact Center Express Classes

Article | Dec. 10, 2013

Frequently, questions come up in the Cisco Contact Center Express classes I teach concerning the ability of the system to perform this or that task. In this blog post, I will cover some of the more popular questions I get during class.

Putting the SharePoint Management Shell on ISE

Article | Jan. 07, 2014

The default shortcut for the SharePoint 2013 Management Shell uses PowerShell.exe; however, a few small changes can easily yield a SharePoint Management Shell based on the more awesomely powerful PowerShell ISE.

Which Is Easier to Configure: Cisco IOS or Juniper Junos?

Article | March 17, 2014

The short answer (and a common one in our industry): it depends. When comparing Cisco IOS with Juniper Junos, the decision to choose one over the other is difficult and often boils down to cost. Of course, there are other factors to consider.

What’s the Difference between Video Conferencing and Telepresence?

Article | March 18, 2014

With the advent of video use in our everyday communications, a number of questions commonly surface. One of them is the question of terminology. What's the difference between video conferencing and telepresence? What is meant by immersive technologies? Frankly, there is no one single right answer.

What DMVPN Is and Why We Should Care

Article | April 03, 2014

According to Cisco marketing, Dynamic Multipoint VPN (DMVPN) “will lower capital and operation expenses, simplifies branch communications, reduces deployment complexity, and improves business resiliency.” Okay. But what is it, really, and why should we care?

The Role of Cisco Unified Communications Manager in Video Conferencing

Article | April 10, 2014

If you’re in IT, you’ve likely heard the saying, “In technology, the only thing constant is change itself,” and boy is that right! For technical companies, if you are not moving forward, then you’re falling behind. There is no such thing as standing still! A perfect example of this mindset is in Cisco’s evolution of video conferencing and telepresence.

UFFA Is Every Support Professional’s Responsibility

Article | April 14, 2014

UFFA, which stands for “Use it, Flag it or Fix it, Add it,” is the responsibility of every support professional in the knowledge management process. It comes from the Knowledge-Centered Support (KCS) methodology where knowledge management is based on collaboration and a shared ownership of the knowledge base. Let’s break it down.

PM and BA Roles in Requirements and Project Communication

Article | April 18, 2014

Communication is vital within projects and contributes significantly to project success. PMs and BAs have important—and different—roles. Let's take a look.

Problem Management and Knowledge Management

Article | April 28, 2014

Most organizations quickly realize that knowledge management must be integrated with incident management in order to improve the quality of service and the efficiency of providing assisted service. What is not as quickly recognized is the value of integrating knowledge management with problem management.

How Can We Use AutoQoS to Protect Voice and Video Traffic?

Article | May 13, 2014

Many companies are already using VoIP while incorporating video capabilities into their portfolio of services. One question that I am often asked is, “How can we ensure that the voice and video quality is good and consistent when using VoIP?”

Using the Cisco Real-Time Monitoring Tool for CUCM Performance Monitoring

Article | July 10, 2014

RTMT provides a set of canned views of both system resources and application counters that provide you with a snapshot of your environment right out of the box. Read on to learn how you can make RTMT even more helpful by customizing it to show you different views of your resources and CUCM environment.

Why Spanning Tree Should Be Dead But Isn’t

Article | July 16, 2014

Spanning Tree Protocol (STP) is dead, or at least it should be. It’s too slow to converge when there’s a change, and it causes issues with performance because there is only one forwarding path. It was developed in 1985 by Radia Perlman at Digital Equipment Corporation to allow for redundant paths within a Layer 2 topology, which was great in 1985. In fact, it was huge! So much so, that it was later standardized by the IEEE as 802.1D, and we’ve been living with it ever since.

Selecting a BA Certification: PMI-PBA vs. CBAP vs. CCBA

Article | Aug. 07, 2014

The demand for skilled business analysis (BA) professionals is on the rise, and a great way to declare your expertise is with a BA certification. But which BA certification is right for you: PMI-PBA, CBAP or CCBA? Here is a look at the eligibility requirements and steps for obtaining each.

Comparing SDN, NFV and Cloud Computing

Article | Aug. 14, 2014

While most organizations have not yet fully (or in many cases even partially) adopted cloud computing, the trend is growing in all but the smallest businesses.

How Your Digital Footprint Could Become A Security Risk

Article | Aug. 21, 2014

Have you ever Googled yourself to see how much of your personal information is online? In many cases it can be pretty scary and include things like your home address, phone number, likes, dislikes, etc. One young man searched for himself and found all of his banking information online. In that case it turned out to be a mistake by a bank employee, exposing the banking information of 86,000 customers.

Enabling Call Screening Based on Caller ID in CUCM

Article | Sep. 23, 2014

Occasionally I am asked to configure the ability to block calls based on Caller ID. Prior to Cisco Unified Communications Manager (CUCM) v8, the only way to block these calls was to configure voice translation rules and profiles on the gateway receiving the calls. This has changed in CUCM v8 with the introduction of an additional parameter in translation patterns: Route Next Hop By Calling Party Number.

How To Use Enterprise License Manager with Cisco Unified Communications Manager

Article | Sep. 29, 2014

License provisioning has always been a bit of a challenge in the CUCM environment. Prior to CUCM v9.0, licensing was managed on a per-cluster basis with each cluster requiring its own license files that were tied to the media access control (MAC) address of the cluster’s publisher. This approach to license management was limiting in the fact that one cluster might have unused licenses while another cluster may be at its limit and sharing between clusters was not possible.

How To Use BGP Prefix-Independent Convergence

Article | Sep. 30, 2014

Border Gateway Protocol (BGP) is a fascinating protocol because there are a lot of things that can be done with BGP. However, there has always been an issue with BGP, which is convergence (the time the network or protocol takes to accept change). BGP was designed for scale, not speed, so it’s something that we’ve had to tolerate from its inception.

Benefits of Using “+” Dialing in the CUCM Dial Plan

Article | Oct. 03, 2014

For smaller companies, configuring a dial plan to account for variations in dialed numbers is often not a problem. However, companies that are larger and more global in nature encounter a number of issues when designing their dial plan approach.

6 Things Project Managers Shouldn’t Do: #6 Ignore the Input of Their Team

Article | Oct. 07, 2014

In this series, we are looking at six things that can trip up project managers. We’ve covered the hazards of overcommitting, how to provide feedback, the importance of taking responsibility, staying focused, and what leading from the front can actually look like. Finally, we’ll take a look at handling team input.

Understanding Calling Search Space Usage at the Phone and Line Level

Article | Oct. 14, 2014

Where should you apply the CSS, and why are there two places to apply it? One approach is to pick one of the parameters and apply the permissions there. Quite often, an administrator will pick the phone-level CSS and configure it there so that it applies to all calls made from all lines. The goal is to specify what partitions are allowed to be called. 

Microsoft Certification Exams, No Testing Center Required

Article | Oct. 17, 2014

Having options in life is usually a good thing. Do you want a cheeseburger or pizza for lunch? Water or sweet tea? And, if you’re going to take a Microsoft certification exam, do you prefer to take it at a Pearson VUE Authorized Test Center or in the comfort of your own home or office?

BGP Cross-Address Family Support: What Are the Gotchas and How Do I Fix Them?

Article | Oct. 30, 2014

As I’ve stated before, I like Border Gateway Protocol (BGP). I think it’s an interesting protocol, and yes — it’s complicated, but I guess that part of why I like it. There are a lot of knobs to tweak in BGP, maybe too many, but that’s another post. Anyway, we are now running BGP version 4 and it has had extensions written that support more than just IPv4 unicast routing. We now have IPv4 multicast, IPv6 unicast and multicast, VPNv4, VPNv6, and a few others.

Pen Test Legal Issues

Article | Nov. 13, 2014

Pen testers beware. Whether you believe you know and understand all the potential legal issues, read on. First of all, a penetration test or “pen test” is a method that’s used to evaluate the security and/or vulnerabilities in a network. This test is normally conducted externally wherein the tester is attempting to hack a network or computer. Breaking into computers and networks is illegal under the Computer Fraud and Abuse Act (CFAA), and depending on your activities and other factors, other federal laws and state laws may be broken.

When a Friend "Sends" You Junk Email

Article | Dec. 09, 2014

One of the main weapons of organized crime on the Internet is the use of junk email, also called spam. Hackers use spam for a number of purposes such as selling counterfeit products (medicines, particularly) to steal your personal or financial information, or to infect your computer with spyware and malware. This malicious software can then hijack your computer and your Internet connection to help propagate itself.

Business Continuity and Disaster Recovery: Protecting Your Assets and Dealing with “The Emergency”

Article | Dec. 18, 2014

Business Continuity and Disaster Recovery (BC/DR) planning is the process of developing the plans, processes and procedures to respond to the range of incidents. We start with understanding the essential functions of an organization, called Business Impact Analysis (BIA). In life, we set the same priorities: protection of family and friends, shelter, food and water and other life-giving essentials.

What’s the Difference Between High Availability and Fault Tolerance in VMware vSphere?

Article | Dec. 30, 2014

What’s the difference between high availability and fault tolerance in VMware vSphere? This article elaborates on first configuring high availability and then layer on the fault tolerance capability. Learn more.

Policy-Based Routing: What Is It and How Is It Used?

Article | Jan. 08, 2015

What is PBR? Policy-Based Routin (PBR) is the process of using a route map to match on something more than the destination and then defining the path out of the router based on those conditions. PBR could match on destination only, but typically we would match on more. PBR is considered to be an exception to the RIB and is looked at before examining the RIB.

OSPFv3 Address Families: How They’re Used and Why

Article | Jan. 15, 2015

Now that we are moving towards IPv6, the logical move would be to also run OSPF for that protocol suite, which makes sense and reduces the learning curve for implementation and support. But, that would mean that you have to run two OSPF processes — one for IPv4 unicast and one for IPv6 unicast. That means two sets of policies have to be applied, including security for OSPF itself. Running OSPFv3 for both IPv4 and IPv6 reduces the number routing protocols and the configuration that goes with that. It makes it easier to implement policy in a consistent way for both protocol suites.

Top 10 Reasons for Choosing SAP BusinessObjects

Article | March 18, 2015

In many of today’s enterprise data warehouses and decision support teams, data scientists and data visualization specialists have reached near rock star status. This is in large part due to their ability to produce unique, clever and insightful perspectives with company information. These analytical gems often bypass obstacles to explain complex business data. This line of work is both an art and a science, and is generally most effective when the right blend of business intelligence tools are in place.

Top 5 Ways Dynamic Access Control Provides Flexibility in Windows Server 2012

Article | March 23, 2015

Dynamic Access Control (DAC) in Windows Server 2012 lets you manage access to documents in ways that go beyond classic NTFS (New Technology File System) permissions. For example, if you want to allow a set of users in an office across the country or across the globe read-only access to files relating to the Wind Turbine Project, DAC can do the job.

Strategies to Close Skills Gaps: You and Your Organization

Article | April 09, 2015

Young adults unable to find work, employers unable to fill jobs, a recent GAO study that reported substantial declines in telecommunication expertise — there has been a lot of news about the pervasiveness of skills gaps, their causes, the actual impacts and what to do about them. It’s rather confusing, because the term “skills gaps” has been hijacked to politicize an extremely wide range of issues.

How to Monitor VMware vSphere Distributed Switches

Article | April 21, 2015

It’s not uncommon for different teams to be managing the virtual switch and physical switch configurations. This can make it very difficult to troubleshoot unless each configuration parameter has been gone through manually. There have been enhancements to the vSphere Distributed Switch over the past few years to address these operational challenges.

Quick Look at the PMBOK® Guide: Work Breakdown Structure (WBS)

Article | April 24, 2015

In this blog series, we'll get you up to speed on using the key tools listed in the PMBOK® Guide. First up, Work Breakdown Structure (WBS).

How To Protect Data in Flight

Article | April 28, 2015

Accessing cloud-based resources, whether they be IaaS/PaaS/SaaS-based, is very convenient. With a browser and Internet connection, you are up and running. No driving to your work office, no need to log into the corporate network. Just open up your web browser and go. This convenience, however, comes with a security risk. All of your business work is conducted over an insecure communication network. Unlike your office network, where the network link between you and the data center is under corporate control and is physically secure, the cloud access link is over the Internet.

Quick Look at the PMBOK® Guide: Decision Tree Diagrams

Article | May 22, 2015

In this blog series, we'll get you up to speed on using the key tools listed in the PMBOK® Guide, including Decision Tree Diagrams.

Tech Skills Heading the Way of the Dinosaur

Article | June 11, 2015

If any of the following reminiscences ring true to you, have you moved beyond them? If not, it might be time to make some new discoveries.

The Importance of Policies for Event Management

Article | June 15, 2015

Event management, although theoretically different, is fundamentally what most IT organizations refer to as “monitoring.” Monitoring an organization’s environment to determine whether important assets are in the state they should be, and knowing when that state changes, is a very important activity that many organizations spend significant portions of their budget doing.

Understanding the Objectives of the Event Management Process

Article | July 03, 2015

A strong event management process that is able to detect changes of state throughout an organization’s IT environment is a key aspect of a complete suite of service management processes. Event management ultimately helps an organization maintain control through an understanding of the state of things, and how the state of those things changes in an IT environment.

Is Cisco IOS XE the Future of Cisco?

Article | Aug. 04, 2015

Cisco Internetwork Operating System (IOS) has been around since a little after the inception of Cisco Systems as a company. In 1984, Len and Sandy Bosack from Stanford University founded Cisco Systems with a small commercial gateway server. The first Cisco router that I touched was an Advanced Gateway Server (AGS), which was the first marketed product of the company. After this came the Mid-Range Gateway Server (MGS), the Compact Gateway Server (CGS) and later the Integrated Gateway Server (IGS) and AGS+. The first version of IOS that I touched was 8.2(7). The operating system was based on a Unix-based system and was designed as a monolithic operating system, meaning that processes are stacked and interrelated.