93 Results Found
Nowadays, you can read weekly articles about security attacks and stolen data. Even leading companies and organizations are victims of cybercrime. Attacks can include breaches at three levels: the physical level, which includes social engineering, system and network and applications (e.g., web and mobile). In this complimentary webinar, you will discover the benefits of using automated solutions to detect application vulnerabilities, provide steps to remediate them and avoid costly compliance violation.
This paper covers the configuration of IP Multicast with Multiprotocol Label Switching (MPLS) including the basics of Multicast with the Group Encrypted Transport VPN (GETVPN).
The first big push toward implementation of IPv6 was mobile devices. Now, one of the driving forces is the Internet of Things. As the name implies, this means everything, including machine to machine communication (M2M).
Like it or not, Internet of Things (IoT) is upon us. There are a number of factors that will impact its adoption rate, and the inevitable privacy (or lack of) discussions will likely happen sooner than later. This is going to change the world as we know it, in many cases for the better. But we will need to keep an eye on the extent to which it invades our personal lives if it is going to be the positive force it has the potential to be.
The process of learning how to subnet IP addresses begins with understanding binary numbers and decimal conversions along with the basic structure of IPv4 addresses. This paper focuses on the mathematics of binary numbering and IP address structure.
If you're running SharePoint 2010, learn how SharePoint 2013 is different and what you'll need to learn to deploy it effectively.
Often, we don't have time to learn the reasons behind the standards we use. But learning what instigated a standard goes a long way toward not only understanding its importance, but also more easily and effectively applying it in your workplace. In this hour-long webinar, Global Knowledge instructor Keith Sorn will discuss common networking standards and explain how they were determined and why they are relevant. He will fill you in on things like why it's important to use proper color-coding standards when making cable and why the length limitations on wired cable are essential. He will also explain new standards, such as power over fiber.
Network Functions Virtualization (NFV) is gaining momentum along with Software-Defined Networking (SDN). This paper examines the history of NFV and explores the prospects for networking to gradually evolve from a hardware-centric approach to a software-driven model. It concludes with an examination of future market implications and how NFV can help organizations to achieve their goals.
With Forrester Research declaring "Waterfall processes have become obstacles to speed, quality and predictability," and more than 85% of CIO's surveyed by CIO Magazine using or planning to pursue Agile practices in 2014, this one-hour webinar will explore the basics of Agile and why so many organizations are adopting Agile methods.
Cloud computing enables development teams to get applications into production faster. IT Service Management (ITSM) leaders must adopt new strategies and change existing processes or risk becoming a barrier to success. Cloud computing requires DevOps-the blending of development and operations with the goal of accelerating time-to-market and reducing time-to-value. The good news is that ITIL® is uniquely positioned to accelerate DevOps, but it requires changes to existing ITSM processes.