Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By
Show Filters
Result Filters:

312 Results Found

Results per page: 10 40 80

VMware Horizon 6 Overview

White Paper | Aug. 11, 2014

VMware Horizon 6 was announced in April and began shipping in June 2014, bringing a more unified suite delivering more integration with infrastructure and cloud products and more simplicity for all devices. Along with the numerous updates across the Horizon suite, VMware has transitioned to a more traditional product licensing hierarchy. This paper explores the new licensing model and provides an overview of the new features associated with VMware Horizon 6.

Binary and IP Address Basics of Subnetting

White Paper | Aug. 07, 2014

The process of learning how to subnet IP addresses begins with understanding binary numbers and decimal conversions along with the basic structure of IPv4 addresses. This paper focuses on the mathematics of binary numbering and IP address structure.

ITIL Foundation PoleStar Simulation

Video | Aug. 07, 2014

Simulate the ITIL v3 Service Management Lifecycle with an interactive gaming experience.

Upgrading from SharePoint 2010 to SharePoint 2013

Video | Aug. 07, 2014

If you're running SharePoint 2010, learn how SharePoint 2013 is different and what you'll need to learn to deploy it effectively.

Managing Storage with the Linux Logical Volume Manager (LVM)

Video | July 31, 2014

The Logical Volume Manager (LVM) is a powerful tool for managing storage on Linux servers. This video provides an overview of how LVM works and explores several ways that LVM makes storage management easier and more flexible. Examples include how to expand storage capacity on the fly using LVM and resize2fs, and how to migrate data from local storage to a storage area network (SAN) without downtime using pvmove.

The Basics of Configuring and Using Cisco Network Address Translation

White Paper | July 31, 2014

While the Internet uses IP addresses assigned by an Internet authority such as the American Registry for Internet Numbers (ARIN), there are too few of these numbers to uniquely identify the millions of computers and computing devices in the world. Therefore, most enterprises use private addresses which allow them to identify the aforementioned computers. Of course, these IP numbers cannot be allowed on the Internet because all private networks use the same ones so there would be vast overlapping of addresses, and the addresses are not compliant anyway. Therefore, it is necessary to change the identity of a private host to a legal public host. This process is called Network Address Translation (NAT) and may be implemented on Cisco firewall products and Cisco routers. The firewall device(s) at the Internet demarcation point is by far the more popular way to implement NAT, but routers are used in small offices or small-to-medium-sized networks in which a separate firewalling solution is not possible or affordable. The focus of this paper is on the router-based NAT solution.

Problem Solving - Root Cause Analysis using Kepner Tregoe

Video | July 24, 2014

Problem Solving - Root Cause Analysis using Kepner Tregoe

ReportBuilder 3.0

Video | July 24, 2014

In this video, you will learn about the latest version of ReportBuilder available in SQL Server 2008 R2.

Tom Rosamilia on IBM Training: Our Trusted Global Training Providers

Video | July 24, 2014

Part of IBM's new training approach includes a carefully selected group of four Global Training Providers. Tom Rosamilia explains the detailed process and criteria IBM used to select the four Global Training Providers, including worldwide reach and innovation in delivery methods. These IBM Global Training Providers are experts in skills education and will help IBM meet our goal of providing clients the right skill set to quickly and efficiently leverage the full power of IBM solutions.

Is Network Functions Virtualization (NFV) Moving Closer to Reality?

White Paper | July 23, 2014

Network Functions Virtualization (NFV) is gaining momentum along with Software-Defined Networking (SDN). This paper examines the history of NFV and explores the prospects for networking to gradually evolve from a hardware-centric approach to a software-driven model. It concludes with an examination of future market implications and how NFV can help organizations to achieve their goals.

The Basics of Configuring and Using Cisco Access Control Lists

White Paper | July 15, 2014

Cisco Access Control Lists (ACLs) are used in nearly all product lines for several purposes, including filtering packets (data traffic) as it crosses from an inbound port to an outbound port on a router or switch, defining classes of traffic, and restricting access to devices or services. Knowing how to design, configure, and troubleshoot ACLs is required for all network engineers working within a Cisco network.

A Practical View of NIST's Cloud Definition

White Paper | July 14, 2014

The National Institute of Standards and Technology (NIST) created a cloud definition that has been well-accepted across the IT industry. NIST was mandated to assist government agencies to adopt cloud computing for their IT operations. As part of their mandate, NIST created multiple working groups to define cloud computing, its architecture, and requirements. In this paper we explore the center core of NIST's cloud definition.

Ensuring the Availability of Your IBM Tivoli Monitoring Infrastructure

White Paper | July 08, 2014

This white paper addresses four different components of the Tivoli monitoring infrastructure for creating a high availability environment while providing redundancy and failover capacity. Although the principles are the same for each of these systems, the methods for adhering to these principles are different for each of them.

Virtualization and Cloud Computing: Does One Require the Other?

White Paper | July 07, 2014

Many people believe that cloud computing requires server (or desktop) virtualization. But does it? We will look at using virtualization without cloud computing, cloud computing without virtualization, and then look at using both together. In each case, we'll look at where each deployment might be most useful, some use cases for it and some limitations.

Changes to the Taskbar

Video | July 02, 2014

In this video, instructor Glenn Weadock examines new Taskbar capabilities, such as pinning non-loaded programs, customizing the jump list, and selectively hiding all but one active program.

Windows Server 2008 R2 Training

Video | July 01, 2014

In this video, Practice Leader Craig Brown discusses our exclusive Server 2008 course - Configuring, Managing, and Maintaining Server 2008 R2 (M6419). Specifically, the enhancements we've made to this course through Server 2008 R2 supplemental learning materials and custom hands-on labs that enable the student to utilize critical Server 2008 R2 functions after completing the course.

Our Approach to Teaching PMP

Video | June 19, 2014

Samuel Brown, project management instructor and consultant, has taught Global Knowledge courses for more than fifteen years. In this video clip, Samuel discusses Global Knowledge's unique and effective approach to helping students prepare for PMP certification.

The Agile Business Analyst: How Much Is Enough?

White Paper | June 19, 2014

The principles in this white paper help you introduce greater predictability into your own Agile requirements activities, both individually and across your organization. As you start to apply these ideas and pose these questions, you'll likely see certain patterns emerge that will help you establish your own set of practices that make Agile work for you.

Topics Covered in IT Project Management

Video | June 19, 2014

Kirsten Lora, Global Knowledge Senior Product Director, discusses the benefits of our IT Project Management course.

What is a Business Analyst?

Video | June 19, 2014

Kirsten Lora, Global Knowledge Senior Product Director, explains why business analysts are essential to organizations and how our Business Analysis Essentials and Business Process Analysis courses can help them in these roles

Which Business Analysis Class is Right for You?

Video | June 19, 2014

Kirsten Lora, Global Knowledge Senior Product Director, explains the difference between our Business Analysis Essentials course and Business Process Analysis course.

SDN and Cloud Computing

White Paper | June 18, 2014

After a review of Software-Defined Networking (SDN) and its close cousin Network Functions Virtualization (NFV), this white paper addresses three main deployment scenarios: SDN without deploying cloud computing, cloud computing without deploying SDN, and deploying cloud computing in conjunction with SDN. We'll look at use cases, when the approach makes sense, and any applicable limitations.

Understanding the AIX Object Data Manager

White Paper | June 18, 2014

If you are coming to AIX from another UNIX system, the Object Data Manager (ODM) will be new to you. Fortunately, it is not so very complicated. This white paper explains how ODM is structured and how to use these databases in order to meet the goals the architects had for the ODM.

How to Use Policy Based Management in SQL Server 2008

Video | June 12, 2014

In this video, you'll learn how to utilize a great new feature of SQL Server 2008 called Policy Based Management for Multi-Server Management capabilities.

How To Use PowerPivot in SQL Server 2008 R2 and Office 2010

Video | June 12, 2014

In this video, you will learn how to a use a new feature of SQL Server 2008 R2 and Office 2010 called PowerPivot for Self-Service Business Intelligence.

The Work Breakdown Structure for Project Management

Video | June 12, 2014

Global Knowledge Course Director Samuel Brown introduces the Work Breakdown Structure and why it matters to project management.

Fundamentals of the PKI Infrastructure

White Paper | June 02, 2014

Securing corporate information can be a challenge, considering the numerous technologies and platforms that need to be protected. One technology that definitely helps achieve secure data is public key infrastructure (PKI), which enhances the security of data by using advanced access methods and making sure the authenticity of the data flow is preserved.

An Intro to Microsoft Technology Associate (MTA) Training

Video | May 29, 2014

Learn the fundamentals of technology with Microsoft Technology Associate (MTA) training. Designed for business professionals who work with technology and IT professionals looking for cross-training, MTA courses provide a foundational technology education in topics such as networking, security, software development, Windows OS and more. Three days of intensive training will get you on the right track to working effectively in the ever-changing IT industry.

Critical Concepts of the 200-120 CCNA Routing and Switching Exam

White Paper | May 29, 2014

In the spring of 2013, Cisco announced major updates to their Cisco Certified Network Associate (CCNA) curricula, including a new version of the CCNA Routing and Switching exam (200-120 CCNA). This paper provides a review of the CCNA Routing and Switching exam's critical concepts, as an aid to students preparing to pass the latest version of the CCNA Routing and Switching exam.

Monitoring and Troubleshooting the Performance of a Windows Server Environment Workshop

Video | May 29, 2014

Global Knowledge Practice Leader, Craig Brown, explains what students will learn in our "Monitoring and Troubleshooting the Performance of a Windows Server Environment" workshop.

Prep Tips for Microsoft Windows 7 and Server 2008 Exams

Video | May 29, 2014

Mark Morgan is a Global Knowledge Senior Instructor. He has worked in the IT industry for over 20 years and has taught Microsoft courses for Global Knowledge since 2000. In this video clip, Mark shares some tips for students preparing for the Microsoft Windows 7 and Server 2008 certification exams.

Tips on Preparing for and Passing the VCP5-DCV Exam

White Paper | May 22, 2014

This paper is aimed at IT professionals who are interested in earning a VMware Certified Professional on Data Center Virtualization (VCP5-DCV) certification. It provides the benefits of having the certification, details for earning the certification and tips for passing the exam.

Getting the Most Out of Your Tivoli Endpoint Manager Deployment

White Paper | May 21, 2014

IBM Tivoli Endpoint Manager (ITEM) is a product designed to let enterprises automatically manage computers, allowing thousands of them to be managed by just a few support staff. With ITEM, tasks such as patch application, software distribution, and security policy enforcement can be performed on all of an organization's computers with minimal supervision.

License Management Using SmartCloud Control Desk

White Paper | May 20, 2014

Unified asset and service management software provides a common control center for managing business processes for both digital and physical assets. SmartCloud Control Desk is an Information Technology Infrastructure Library (ITIL®)-compliant software that is accessible through mobile devices and integrates with social media and development tools. Discover how to choose the delivery model you need such as on-premise, software as a service (SaaS), or VM image and seamlessly change it to suit your business needs.

Understanding AIX Logical Volume Management

White Paper | May 14, 2014

Like many UNIX operating systems, AIX uses the concepts of Logical Volume Management (LVM) in its data management architecture. This white paper explains the specifics of the AIX LVM and provides some tips and best practice recommendations to get the most from your AIX disk storage.

Upgrading from SharePoint 2007 to SharePoint 2013

Video | May 08, 2014

If you're running SharePoint 2007, learn what had changed in SharePoint 2013 for administrators and developers.

Overview of Microsoft Lync

Video | May 06, 2014

In this video, Practice Leader Craig Brown discusses how Microsoft Lync can function in enterprise environments to streamline communication and increase productivity.

A Guide to Password use in WebSphere Application Server

White Paper | April 21, 2014

Nearly every WebSphere administrator has desired a deeper understanding of how passwords are created, used, stored, and encrypted. Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.

Intersecting Project Management and Business Analysis

White Paper | April 15, 2014

Effective requirements collection at the outset of the project is the key step that will ensure that the project manager can deliver what is actually expected. In this respect, the business analyst must become a key ally and advisor to the project manager. Most project managers are not trained business analysts, so taking advantage of the skill set that a business analyst can offer can greatly enhance the possibility of project success.

VSAN: Reimagining Storage in vSphere

White Paper | March 26, 2014

In 2013, VMware announced VMware Virtual SAN (VSAN), which is VMware's native version of Software Defined Storage (SDS). It is simple, easy to setup and managed by user-defined policies. This paper explains VSAN, its basic requirements and how it works.