466 Results Found
What's the correct sequence of activities for handling an incident? Find out why categorization occurs before initial diagnosis in the ITIL incident management process flow so you can answer this common ITIL Foundation exam question.
This article will serve as an important reference in optimizing and stabilizing your Group Policy Deployment.
COVID-19 has had a significant impact on businesses. Cost-cutting efforts have resulted in organizations having to do more with less. Safety protocols and social distancing guidelines have meant that more employees are working from home. The reality of remote workers and the access, reliability, and security issues that they create are at the forefront of the challenges facing IT departments.
A longtime leader in data analytics, Google continues to earn their position by continually improving their data analytics offerings. Now, with Google Cloud Platform (GCP), you can capture, process, store, and analyze your data in one place, allowing you to change your focus from infrastructure to analytics that informs business decisions. However, you can also use GCP Big Data tools in combination with other cloud-native and open-source solutions to meet your needs. Below is an overview of GCP Big Data Tools and how you might utilize them to improve analytics.
Lessons learned is a theory, or conclusion, based on evidence at a given time and describes what went wrong (as well as what went right) throughout the lifecycle of a project. Although it’s completed during the project closeout process, it should occur during the entire project lifecycle to ensure all information is captured and documented. Consequences of not having a project review of lessons learned are the increased likelihood of repeating actions that might have caused:
Keep your project on time and within budget by controlling the baselines, budget, and schedule. View our comprehensive guide to project management, from project scheduling to cost control, from the experts at Global Knowledge.
Cloud technologies continue to help organizations transform their businesses at a rapid pace. To ensure continued value from their cloud investments, organizations must empower their teams with current, role-relevant cloud skills.
When the hostname.domainname associated with my Small Office Home Office (SOHO) failed to update after a power outage, and a new DHCP-assigned external address was assigned to my router, I was reminded of the need for Dynamic DNS. This article will explore the implem...
The official Cisco CCNP Security FIREWALL training course (as well as other documentation) recommends enabling the inspection of the Internet Control Message Protocol (ICMP), even though it’s disabled by default. The image below displays the recommended practice as configured in ASDM, but the curious student might wonder what the unchecked “ICMP Error” box is. That’s what I’ll focus on in this post.
Certifications matter. A lot. That’s one of the major takeaways from the Global Knowledge 2018 IT Skills and Salary Report. The benefits, both personally and organizationally, are undeniable—certified professionals are more effective, complete tasks faster and are more sought after.
Have you ever Googled yourself to see how much of your personal information is online? In many cases it can be pretty scary and include things like your home address, phone number, likes, dislikes, etc. One young man searched for himself and found all of his banking information online. In that case it turned out to be a mistake by a bank employee, exposing the banking information of 86,000 customers.
Cloud adoption continues to soar. In fact, worldwide Infrastructure-as-a-Service (IaaS) public cloud services grew by 29.5 percent in 2017, according to Gartner. If it’s not in a company’s current plans to utilize cloud technology, it most certainly will be (or should be) in the next couple of years.
With Multiprotocol Label Switching (MPLS) as popular as it is in the provider space and private MPLS clouds for larger enterprise, we needed some tools to help troubleshoot and maintain these networks. With the providers in mind, the normal ping or traceroute may not be enough.
License provisioning has always been a bit of a challenge in the CUCM environment. Prior to CUCM v9.0, licensing was managed on a per-cluster basis with each cluster requiring its own license files that were tied to the media access control (MAC) address of the cluster’s publisher. This approach to license management was limiting in the fact that one cluster might have unused licenses while another cluster may be at its limit and sharing between clusters was not possible.
Border Gateway Protocol (BGP) is a fascinating protocol because there are a lot of things that can be done with BGP. However, there has always been an issue with BGP, which is convergence (the time the network or protocol takes to accept change). BGP was designed for scale, not speed, so it’s something that we’ve had to tolerate from its inception.
Recently, I was asked the following question: “We plan to implement Windows 7 in our network very soon. We want to use Windows 2003 Domain Controllers for the next couple of years. Can we make the hundreds of new Group Policy setting available to Windows 7 Windows Server 2003 DCs?” This is not an unusual situation. Some organizations find they need to replace their desktop computers immediately because of age or obsolescence and others wish to upgrade to Windows 7 because of its superior security and performance. But there may be no budget or desire to upgrade to Windows 2008 or 2008 R2. Luckily, it is not difficult to adapt Server 2003 to work with Windows 7.
One size does not always fit all. At times there’s a need to run more than one routing protocol and have more than one routing domain: multivendor shops, migration from one protocol to another, scalability issues of a single protocol, political or personal preference, production versus test networks, mergers, and acquisitions.
Accessing cloud-based resources, whether they be IaaS/PaaS/SaaS-based, is very convenient. With a browser and Internet connection, you are up and running. No driving to your work office, no need to log into the corporate network. Just open up your web browser and go. This convenience, however, comes with a security risk. All of your business work is conducted over an insecure communication network. Unlike your office network, where the network link between you and the data center is under corporate control and is physically secure, the cloud access link is over the Internet.
It’s not uncommon for different teams to be managing the virtual switch and physical switch configurations. This can make it very difficult to troubleshoot unless each configuration parameter has been gone through manually. There have been enhancements to the vSphere Distributed Switch over the past few years to address these operational challenges.
Have you ever been tasked to do a certain job, but were restricted or prevented from doing it because of the lack of tools or authorization? Many IT administrators who consult or attend training have stories to share about the impediments to using the full power of Windows PowerShell for automating system tasks. There are some ways around this. Although there are many options, we’ll focus on one technique for opening up the use of PowerShell for certain kinds of SharePoint administration.
As mentioned earlier, one of the most useful pieces of guidance that ITIL provides relates to the categorization of suppliers. ITIL describes four categories of suppliers:
Previously, I talked about the logical and physical steps to building a basic certification lab, concentrating mostly on the CCENT/CCNA Routing and Switching level. Once you have that set of certifications under your belt, there are several options for specialization. Each of these advanced technology tracks serve as methods of enhancing your professional skill set as follows:
The purpose of Interior Routing Protocols (IGP), and routing protocols more generally, is to advertise the existence of destination networks. All protocols then have some method of picking what they would consider to be the best path and maintain the information. By...
Configuring a wireless lab for study and testing capabilities is a bit more involved than you might think at first glance. Most of the requirements take place on the management devices, but the underlying switch infrastructure requires some preparations as well. The tasks involved are as follows:
Knowledge Management examines how we acquire, organize, manage, share, and utilize knowledge and information. The Internet gives us an overwhelming amount of information on a daily basis — and the volume of information available is growing rapidly! One of the biggest challenges for individuals and organizations involved in project management is to make the best use of this knowledge and information so they can operate more efficiently, improve decision making, and sustain a competitive advantage.
Have you been afraid to implement PowerShell in your environment because of security fears? The reality of PowerShell security doesn’t always match the perception. When compared to other scripting languages, PowerShell is actually more secure by default.
Precision Time Protocol (PTP) is a protocol designed to go beyond what Network Time Protocol (NTP) can offer relative to accuracy. PTP is IEEE standard 1588 that can give local computing systems accuracy within the sub-microsecond range (such as microsecond, nanosecond or picoseconds) whereas NTP is within milliseconds or longer. PTP standard was first released in 2002 and known as 1588-2002. In 2008, the IEEE released a revised standard for PTP, known as 1588-2008, that improved the accuracy and precision of the protocol. It is also known as PTPv2 and is not backward compatible with the older version. PTP was developed for packet based network for control and measurement systems.
Every second of every day, data is being sent and received. Billions of data packets are processed by your company’s network every day. In fact, you received dozens of packets just to read this article, but the vast majority of us have no idea how this works. People have no clue as to what goes on behind the scenes to ensure data actually gets to the right device.
Many companies are already using VoIP while incorporating video capabilities into their portfolio of services. One question that I am often asked is, “How can we ensure that the voice and video quality is good and consistent when using VoIP?”
Dynamic Multipoint Virtual Private Network (DMVPN) is a Cisco network solution for those with many sites that need access to either a hub site or to each other.
Learn how to boost your visibility on LinkedIn by listing your skills and certifications and leveraging the courses you’ve taken for professional development. This is especially important to catch the eyes of recruiters and when applying for jobs.
According to our IT Skills and Salary Report, 85% of professionals possess at least one certification. That’s a ton of competition in the industry. And the general consensus is the more certifications, the better. So why are so many IT pros and decision-makers putting such an emphasis on certifications? Why is so much investment devoted to training?
Routers and switches make up the bulk of network infrastructure and are vulnerable to attack. We hear about mass Denial of Service (DOS) attacks or Distributed Denial of Service (DDOS), but the network itself is as big a risk because if it is taken out, there is no path for the data to flow.
In any operational data network, the two high-level outcome possibilities are connectivity and isolation. If every device can connect to every other device by enabling full connectivity, networking is relatively easy to create, but inherently unsecure. If a network fully isolates all forms of traffic, it is unusable.
The demand for professionals who can successfully manage a project to completion is rising. Heavy demand means you will be able to command a higher salary and have the flexibility to choose projects you are passionate about.
Cybersecurity is the arena of technology, methodology, and practice that focuses on protecting electronic information and the systems supporting it against compromise and attack.
Five tips for staying above the office drama that could cost you your job.
Answer the questions posed in our ITIL Decision Tree to see if you should pursue ITIL 4. It’s easy-to-follow and no matter how you answer, it will provide a distinct next step for your ITIL journey.
This article – the first in a series explaining VMware offerings – is designed to simplify things. We hope to explain what specific VMware products do, why each one is important, and what skills you need to leverage them in your own organization. In this article, we’ll look at VMware NSX-T™ Data Center.
IT and general technology trade shows offer ample opportunities for learning about the latest trends and product releases in an environment outside of the office. They also provide opportunities for training and achieving sought-after certifications.
In any operational data network, the two high-level outcome possibilities are connectivity and isolation. If every device can connect to every other device by enabling full connectivity, networking is relatively easy to create, but inherently unsecure. If a network fully isolates all forms of traffic, it is unusable.
One of the best ways to increase your satisfaction with your compensation is to increase the amount of control that you have over it. That inevitably means getting comfortable talking with your boss about a raise.
After reading this article, whether you’re requesting training for yourself or your team, you will be better prepared to build and state your case for the business-delivering value of training.
CompTIA has become one of the most recognized and respected names in IT certifications, from the first A+ back in the 1990s to today with over a dozen vendor-neutral certifications covering a variety of topics.
For every organization, effective cybersecurity depends on a careful deployment of technology, processes, and people. And if you get the people right, they’ll take care of the other two factors. Just like sports teams, cybersecurity teams need to be carefully bult and managed to reach optimum performance. They don’t just take shape naturally.
A lot of IT pros would like to get their work to fund their training and certifications, but if the issue isn't approached with care and forethought, it can be dangerous territory. So how do you justify the costs of training? Luckily, a help desk tech in the healthcare field named R. Lee Young offered up some great suggestions.
The Ethernet switch has become an integral part of the world’s LAN infrastructure. At its core, the Ethernet is a shared network, each node contending for access to precious bandwidth and dealing with the repercussions of collisions.
Artificial Intelligence (AI) is grabbing headlines and inspiring imaginations around the world with its potential to transform the world as we know it. With Microsoft Cloud, organizations have a unique opportunity to amplify human ingenuity and realize exponential value with the leading AI platform.
ITIL is one of the most sought-after certifications among IT professionals—nearly one in five is ITIL-certified. Find out how ITIL students apply what they learned to their job.
What’s the difference between incidents and problems? This article explains the differences between these ITIL® concepts, how they are related, and why it matters.
In the world of corporate technology training, blended or hybrid learning is a recent introduction. While a few learning providers have launched offerings, only Global Knowledge has implemented a solution—Blended Live—that utilizes the true potential of a blended learning delivery model.
So what makes a new certification "Hot"? Is it the perceived qualitative value? Or is it the possible increase in salary? Is it just the fact that so many are seeking that one particular certification? How about the governing body of the certification? Or maybe it is a combination of one or more of these? Whatever the case, there are new certifications (and some that have been completely re-written as to be a new certification) that are perceived to be the "ones" to possess and will be highly desirable in 2013.
This is the second of a two-part series on First Hop Redundancy Protocols (FHRP). In Part 1 of this topic, we reviewed the fundamentals of networking, the importance of the Default Gateway to an endpoint, and how to solve redundancy of Default Gateway by using an FHRP such as Hot Standby Router Protocol (HSRP)
HR and IT managers, if you're losing top talent and having trouble attracting quality candidates, the no. 1 reason is that they don't see a future with you. If you're not leveraging professional development, here are a couple tips to start.
While anyone with a strong general background in information technology shouldn't have too much trouble finding work in today's economy, there are some areas of specialization that are in higher demand than others. Some are in such high demand, in fact, that many IT hiring managers report they're having difficulty finding qualified candidates.
Cybersecurity is a top technology investment area around the globe, with over half of our survey respondents saying it’s a priority. It’s no longer a niche skill—every IT professional needs some cybersecurity knowledge.
Although the GSS can be configured to be authoritative for an entire domain, e.g. cisco.com (option 1), the GSS is designed to be integrated into an existing traditional BIND-based or any DNS system. The GSS operates as an A-record DNS server for Hosted Domains (HD) for which it has been delegated authority from a higher-level name server, which generally would be a name server (NS) controlled by an Enterprise or ISP. In addition to A-record support, the GSS is able to proxy for other query types using NS Forwarding and a back-end name server such as BIND.
Google takes security to a whole new level thanks to their years of experience as one of the most popular targets on the internet for would-be hackers and denial of service bots. This led Google to build a sophisticated security infrastructure the likes of which few companies or organizations can claim. Google approaches security holistically and involves everything from the physical data centers, to the data pipelines between them, down to the training of each employee that is responsible for managing the infrastructure.
Google Cloud certifications had a breakout year according to the Global Knowledge 2019 IT Skills and Salary Report. GCP Cloud Architect is the top-paying IT certification in North America and Europe, the Middle East and Africa (EMEA), while Google Cloud salaries are 34% higher than the average for North America. As more IT departments adopt multi-cloud strategies, Google Cloud skills are increasing in popularity.
Global Knowledge, a Skillsoft company and global leader in corporate learning solutions, has announced that it has successfully completed the six badges needed to earn the highest designation in Microsoft’s new Solutions Partner program. This partnership will showcase Global Knowledge’s proven capabilities in its learning offerings and ability to deliver high-quality, scalable solutions to customers across the globe.
Recently we've been comparing using Telnet with Secure Shell protocol to allow remote access to a device such as a router or switch. Now, we're going to compare File Transfer Protocol (FTP) and Trivial File Transfer protocol (TFTP) for a Cisco router or switch. These...
Unlike ITIL, DevOps is more of a philosophy than a formal framework. DevOps, which is short for Collaboration between Development and Operations, arose as a movement within IT best practices when IT managers began to realize that something needed to be done to close the communications and collaboration gap between development groups and support operations staff. After some time and examination, it became clear that there was no inherent conflict between the DevOps movement and ITIL—the two, in fact, are quite complementary.
Frequently, questions come up in the Cisco Contact Center Express classes I teach concerning the ability of the system to perform this or that task. In this blog post, I will cover some of the more popular questions I get during class.
When you connect your server or storage, it will send a Fabric login (FLOGI) request. This FLOGI request serves two purposes: Fibre Channel ID is the WWPN connection to this port from the FLOGI server Exchange buffer credits with the switch To better understand the first function, it is exactly the same if I rewrite it as, “request an IP address for a MAC address from the DHCP server”.
Moving capabilities to a cloud provider such as Microsoft Azure is pretty straightforward. However, given the depth and breadth of service offerings provided by Azure, it’s easy to miss the product’s less obvious capabilities. If you're implementing a Microsoft Azure cloud platform, you'll want to consider these five services to save time, money, and your sanity.
Though there are several sources for agile certifications, the Project Management Institute (PMI)® Agile Certified Practitioner (PMI-ACP)® has established itself as the world’s fastest growing agile credential. The PMI-ACP certification formally recognizes your knowledge of agile principles and your skill with agile techniques.
A gap analysis is a tool that ITIL recommends organizations use to compare their current state to some future desired state.
ITIL® 4 reflects new ways of working that have accompanied the digital revolution. Service Management, and ITIL in particular, is still an important toolset but you are now integrating its adoption and use with a vast array of new ways of working (DevOps, Agile, SIAM, Site Reliability Engineering). Since ITIL v3 was released in 2006, a large number of new and updated technologies (Cloud, Serverless Computing, Software-Defined Networking, AI, etc.) have emerged that now need managing. ITIL 4 reflects these changes. Here are some frequently asked questions about ITIL 4, as well as answers that explain what it entails, why we need it and how it differs from ITIL v3.
Exchange 2010 builds upon the significant changes to the transport that were made in Exchange 2007. In this article, I'll review the transport pipeline and routing components and list some of the new architectural and administrative enhancements to the Exchange 2010...
The ITIL® event management process defines three event types: informational, warning and exception. In this post, I will discuss the different event types and give real-world examples of each.
A feature common to IPSec Virtual Private Network implementations throughout the Cisco product line is Perfect Forward Secrecy (PFS). This optional additional component is now a default supplied configuration setting with the Adaptive Security Device Manager (ASDM) I...
The 2021 revised and updated version CISSP (Certified Information System Security Practitioner) certification exam will be released on May 1, 2021. This new version of the popular CISSP exam will include a modest revision and re-organization of previously included topics, but will integrate a significant number of new topics.
In the last two posts I discussed aspects of services in the context of some landscaping work that I’m having done. This is clearly what many people would call a “non-IT example.” I often use similar examples in my classes. However, I might initially describe an example that seems unrelated to IT, but will conclude with a challenge to students. That challenge is, “identify the IT in this example.” The truth of the matter is that most businesses these days are underpinned by some form of information technology. In fact, technology has become so ingrained into everyday services that often even the service providers themselves don’t realize how technology supports their business.
There are two types of networks: those that have been hacked and those that will be. To defend against hacks, cyber professionals can benefit greatly from ethical hacking programs.
Both technologies, Ethernet and FC, satisfied the two conditions at that time, but there was a catch. Read more.
Once an organization has categorized suppliers, one of the benefits that is quickly realized is an understanding of how supplier changes affect the buying organization and vice-versa. Changes are the modification, addition, or removal of something from the environment. The scope and scale of each change can be different. Change management covers everything from regular, low-risk, operational modifications all the way to significant organizational strategic shifts.
Occasionally I am asked to configure the ability to block calls based on Caller ID. Prior to Cisco Unified Communications Manager (CUCM) v8, the only way to block these calls was to configure voice translation rules and profiles on the gateway receiving the calls. This has changed in CUCM v8 with the introduction of an additional parameter in translation patterns: Route Next Hop By Calling Party Number.
Even in professionally managed network environments it is still possible for mistakes to happen. If an Active Directory object such as a user or computer account is accidentally deleted network access will be lost. Worker productivity will decline until the account...