Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Topics

Show Filters
Result Filters:

85 Results Found

Results per page: 10 40 80

The Importance of Policies for Event Management

Article | June 15, 2015

Event management, although theoretically different, is fundamentally what most IT organizations refer to as “monitoring.” Monitoring an organization’s environment to determine whether important assets are in the state they should be, and knowing when that state changes, is a very important activity that many organizations spend significant portions of their budget doing.

Top Four Considerations When Choosing Your SoftLayer Data Center Location

White Paper | May 07, 2015

A range of factors can influence the data center you choose. You should consider all of the factors listed in this white paper before deciding where to place your servers.

UFFA Is Every Support Professional’s Responsibility

Article | April 14, 2014

UFFA, which stands for “Use it, Flag it or Fix it, Add it,” is the responsibility of every support professional in the knowledge management process. It comes from the Knowledge-Centered Support (KCS) methodology where knowledge management is based on collaboration and a shared ownership of the knowledge base. Let’s break it down.

Understanding the Difference Between Incident Management and Problem Management

Webinar – Recorded | April 02, 2015

In this hour-long webinar, Global Knowledge instructor and ITIL Expert Michael Scarborough will share his knowledge and expertise on various aspects of incident management and problem management processes. He will help you understand the difference between incidents and problems and between incident and problem management, providing examples from his own experience to drive the concepts home. Michael will also provide an overview of who performs various incident and problem management activities in an organization.

Understanding the Objectives of the Event Management Process

Article | July 03, 2015

A strong event management process that is able to detect changes of state throughout an organization’s IT environment is a key aspect of a complete suite of service management processes. Event management ultimately helps an organization maintain control through an understanding of the state of things, and how the state of those things changes in an IT environment.

What is a Business Analyst?

Video | June 19, 2014

Kirsten Lora, Global Knowledge Senior Product Director, explains why business analysts are essential to organizations and how our Business Analysis Essentials and Business Process Analysis courses can help them in these roles

What is the Difference Between Ethernet II and IEEE 802.3?

Article | Jan. 12, 2022

To understand the difference between Ethernet II and 802.3, you first must know how Ethernet works. While Ethernet cables transmit data, their role is relatively simple compared to that of the Ethernet card — also referred to as an adapter. It’s within the function of this card that you find the differences between Ethernet II and 802.3.

What Happens If I Have More Than One Switch With Redundant Links?

Article | Oct. 11, 2012

That depends on their configurations. For example: While it makes very good sense to include redundant physical links in a network, connecting switches in loops, without taking the appropriate measures, will cause havoc on a network. Without the correct measures, a switch floods broadcast frames out all of its ports, causing serious problems for the network devices. The main problem is a broadcast storm where broadcast frames are flooded through every switch until all available bandwidth is used and all network devices have more inbound frames than they can process.

What is the Cisco UCS Manager?

Article | Feb. 01, 2012

The Cisco UCS is truly a “unified” architecture that integrates three major datacenter technologies into a single, coherent system: Computing Network Storage Instead of being simply the next generation of blade servers, the Cisco UCS is an innova­tive architecture designed from scratch to be highly scalable, efficient, and powerful with one-third less infrastructure than traditional blade servers.

What is Twisted Pair and Does It Work?

Article | June 12, 2012

“Twisted Pair” is another way to identify a network cabling solution that’s also called Unshielded Twisted Pair (UTP) and was invented by Alexander Graham Bell in 1881. Indoor business telephone applications use them in 25-pair bundles. In homes, they were down to four wires, but in networking we use them in 8-wire cables. By twisting the pairs at different rates (twists per foot), cable manufacturers can reduce the electromagnetic pulses coming from the cable while improving the cable’s ability to reject common electronic noise from the environment.