Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Topics

Show Filters
Result Filters:

1010 Results Found

Results per page: 10 40 80

Enhancing the Value of ITIL® and TOGAF®

Webinar – Recorded | Aug. 29, 2013

Traditionally, ITIL and TOGAF professionals have been part of different teams within an organization. Due to the ongoing alignment of business and IT, these professionals now often find themselves on the same team. Because of this crossover, there is a growing trend towards organization of work based on multiple best practice models. 

Why Network Administrator is the Hot IT Job of the Future

Article | Aug. 23, 2013

Are you at a crossroads professionally or looking to start training for a new job? If so, you might want to consider pursuing network administration as a career. Network administrators are responsible for maintaining computer hardware and software systems that make up a computer network, including maintaining and monitoring active data networks, converged infrastructure networks, and related network equipment.

Understanding Networking Fundamentals

Video | Aug. 22, 2013

Global Knowledge Product Manager Tori Easterly discusses the benefits of our Understanding Networking Fundamentals course.

What Is Multiplexing?

Article | Aug. 22, 2013

Multiplexing is the technology that is able to combine multiple communication signals together in order for them to traverse an otherwise single signal communication medium simultaneously. Multiplexing can be applied to both analog and digital signals. A benefit of using multiplexing, or muxing, is reducing the physical hardware cost for expensive dedicated network communication segments, such as copper or fiber cables.

Top 12 SonicWALL CSSA Exam Prep Tips

Article | Aug. 21, 2013

Dell SonicWALL's CSSA (Certified SonicWALL Security Administrator) exam is an open book, online certification exam that certifies a student’s understanding of the SonicOS Unified Threat Management (UTM) operating system. The exam tests a student’s network security knowledge, and their ability to use the GUI menu structure for configuration of standard network security scenarios.

UCS Troubleshooting Boot Camp

Video | Aug. 15, 2013

John Barnes, Global Knowledge's Cisco Course Developer, discusses enhancements to our UCS Troubleshooting Boot Camp and suggestions for students in preparation for this course.

Military Orders Process vs. Project Management Methodology, Part 1

Article | Aug. 13, 2013

For a project manager (PM) who has served as a military officer on a battalion or higher staff, the parallels between the military decision-making process (MDMP), the orders production process, and project management doctrine prescribed by the Project Management Institute (PMI) are difficult to ignore. Both the MDMP and the processes outlined in A Guide to the Project Management Body of Knowledge—Fifth Edition (PMBOK® Guide) are iterative in nature, allow for the introduction of changes to the original plan, assign tasks and responsibilities, and involve the concept of managing the scope of the operation or project.

ITIL Mission Statement: Key to Better Services

Article | July 29, 2013

Many I&O leaders and customers see little value from investments in ITIL. Not getting the Return on Investment (ROI) you expect normally comes from using ITIL incorrectly. You, your staff, and your customers must share the same goals and understand exactly what to expect from your ITIL investments. The goal of ITIL is not “business and IT alignment” or “competitive advantage from IT investments.” Instead, its first goal is to stabilize service operation. This builds a base for the second goal: increasing value through service optimization. You must have clear-cut, documented, and managed expectations for each activity, and order is vital. Success requires that you stabilize service delivery before trying to optimize. Focusing on the correct goal and linking each ITIL task to that goal is the correct use of ITIL.

Top Five Reasons Your Company Needs VMware Horizon View 5.2

White Paper | July 23, 2013

With the growth of bring your own device (BYOD) and mobility, users are increasingly asking for computing anywhere from any device at any time. Users now expect productivity on the go with a desktop that can be freely accessed and secure. We're no longer a society that sits at a desk to be productive. The VMware Horizon Suite allows the datacenter administrators to satisfy the accelerated mobility needs of the workforce while still maintaining an IT solution that is easily managed and secure.

How To Use Transparent Data Encryption in SQL Server 2008

Video | July 18, 2013

In this video, you will learn how to a use a new feature of SQL Server 2008 called Transparent Data Encryption for enhanced security.