108 Results Found
General character attributes every IT pro should have and on the things that every IT pro should know or do.
There is a wide-range of services available in GCP ranging from Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) to completely managed Software-as-a-Service (SaaS). In the first part of this series, we will discuss the available infrastructure components and how they provide a powerful and flexible foundation on which to build your applications.
As with all technologies transforming the way organizations operate, it’s expected that roles will also evolve. Cloud computing already has and will continue to change traditional IT roles and functions for years to come. We'll begin our overview of the transformation of cloud job roles with a look at some of the top cloud computing roles and responsibilities for architects, engineers and developers.
We spoke with Doug Cutting about his role with Cloudera and learned more about Big Data, training options for IT professionals interested in Big Data, and how Cloudera compares to Red Hat.
Having a breadth and depth of skills -- especially on new and emerging technologies -- can only weigh in your favor.
It’s inevitable. At some point in your career, you’ll find yourself working alongside individuals who fall into the general category of “Difficult People.” The effects these people can have on an organization vary greatly but usually involve many problems for the team. This white paper describes some of the more common types of difficult people and provides you with tips on how to handle them.
Get an insider’s take on 2017 cloud computing, DevOps, and Internet of Things (IoT) trends from an industry expert.
You’ll be hearing a lot about AWS in Canada in 2017 as Canadian organizations are evaluating their options for moving to the cloud. Now is the time to get up to speed and find out what you and your organization need to know.
Everything from wearables and smart homes to drones and ad blockers could be increasingly susceptible to hackers in 2016, according to cybersecurity expert James Michael Stewart. In this white paper, Stewart predicts that a wide range of disastrous data breaches will occur this year as hackers have adapted to the latest technologies to automate attacks on today's devices and software.
Learn how Docker makes it easy to update, test and debug software with this white paper and gain foundational knowledge about Dockerfile, Docker images and containers.