Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Search

Show Filters
Result Filters:

34 Results Found for "power bi"

Results per page: 10 40 80

Data Protection for Mobile Phones

Video | Oct. 11, 2018

Learn basic mobile phone security practices to lock down this potential entry point to your corporate systems.

The Story Behind Cloudera and Big Data

Article | July 15, 2017

We spoke with Doug Cutting about his role with Cloudera and learned more about Big Data, training options for IT professionals interested in Big Data, and how Cloudera compares to Red Hat.

Virtualization for Newbies

Article | Oct. 16, 2017

The reasons to virtualize might have begun with saving money, but there are other good reasons to virtualize, such as better resource utilization and the ability to quickly add new virtual machines.

Big Data and Apache Hadoop Adoption

Article | Oct. 16, 2018

Explore the demands of big data, provide an overview of recent vendor offerings, and explain how they streamline the process for using Apache Hadoop in handling today's data loads.

What’s the Difference Between High Availability and Fault Tolerance in VMware vSphere?

Article | Dec. 30, 2014

What’s the difference between high availability and fault tolerance in VMware vSphere? This article elaborates on first configuring high availability and then layer on the fault tolerance capability. Learn more.

Why Now Is the Right Time to Combine ITIL® 4 and Project Management

Article | May 09, 2019

The Information Technology Infrastructure Library is a set of best practices designed to describe common approaches for IT service management (ITSM).

UFFA Is Every Support Professional’s Responsibility

Article | April 14, 2014

UFFA, which stands for “Use it, Flag it or Fix it, Add it,” is the responsibility of every support professional in the knowledge management process. It comes from the Knowledge-Centered Support (KCS) methodology where knowledge management is based on collaboration and a shared ownership of the knowledge base. Let’s break it down.

Top 5 Ways Dynamic Access Control Provides Flexibility in Windows Server 2012

Article | March 23, 2015

Dynamic Access Control (DAC) in Windows Server 2012 lets you manage access to documents in ways that go beyond classic NTFS (New Technology File System) permissions. For example, if you want to allow a set of users in an office across the country or across the globe read-only access to files relating to the Wind Turbine Project, DAC can do the job.

How to Manage PowerShell Remote Access with SharePoint Server 2013

Article | Dec. 02, 2015

Have you ever been tasked to do a certain job, but were restricted or prevented from doing it because of the lack of tools or authorization? Many IT administrators who consult or attend training have stories to share about the impediments to using the full power of Windows PowerShell for automating system tasks. There are some ways around this. Although there are many options, we’ll focus on one technique for opening up the use of PowerShell for certain kinds of SharePoint administration.

Improve Your Data Analytics with Google Cloud Platform Big Data Tools

Article | June 27, 2018

A longtime leader in data analytics, Google continues to earn their position by continually improving their data analytics offerings. Now, with Google Cloud Platform (GCP), you can capture, process, store, and analyze your data in one place, allowing you to change your focus from infrastructure to analytics that informs business decisions. However, you can also use GCP Big Data tools in combination with other cloud-native and open-source solutions to meet your needs. Below is an overview of GCP Big Data Tools and how you might utilize them to improve analytics.