Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Search

Show Filters
Result Filters:

60 Results Found for "azure"

Results per page: 10 40 80

Overcoming Barriers to Creating a Knowledge Management Culture

White Paper | March 29, 2016

In this white paper on IT service management, discover the most common barriers you will face when implementing knowledge management and how to overcome them.

Cisco Completes the Security Picture with Sourcefire

White Paper | June 19, 2015

Rich Hummel discusses about Cisco's security solutions and how Cisco's acquisition of Sourcefire has changed the security landscape. Learn more here.

Five Security Concerns with Mobile Payment Systems

White Paper | March 10, 2015

Learn about the five major security concerns with mobile payment systems before you link your finances to a mobile device for payments. Download your copy!

Benefits of Using “+” Dialing in the CUCM Dial Plan

Article | Oct. 03, 2014

For smaller companies, configuring a dial plan to account for variations in dialed numbers is often not a problem. However, companies that are larger and more global in nature encounter a number of issues when designing their dial plan approach.

Benefits of an “Agile” Mindset

Article | Nov. 24, 2015

Projects are a social endeavor. Traditional project management approaches have shied away from the social advantages a more agile project environment brings. By nature, we are storytelling, pattern seeking and social people. We need colocation to shine truly in a project environment.

Pen Test Legal Issues

Article | Nov. 13, 2014

Pen testers beware. Whether you believe you know and understand all the potential legal issues, read on. First of all, a penetration test or “pen test” is a method that’s used to evaluate the security and/or vulnerabilities in a network. This test is normally conducted externally wherein the tester is attempting to hack a network or computer. Breaking into computers and networks is illegal under the Computer Fraud and Abuse Act (CFAA), and depending on your activities and other factors, other federal laws and state laws may be broken.

Data Center Basics: the Differences Between IOS and NX-OS

Article | Sep. 04, 2012

As we discussed previously, Cisco created the Nexus Operating System (NX-OS) to power its next-generation data-center switching platform. While this new OS shares many similarities to the original IOS, there are some definite differences that you need to be aware of as you begin using it.

Zero Day Exploits

White Paper | Oct. 23, 2012

A zero day exploit is an attack that was previously unknown to the target or security experts in general.

How to Execute the Perfect Business Analysis Interview

White Paper | Feb. 13, 2017

When designing a structured business analyst interview, it’s crucial to have a goal in mind, a clear set of questions planned, and an understanding of how those questions may deviate from the intended goal.

Global Knowledge Releases Resources and Big-Name Webinars For Cybersecurity Awareness Month, October 2020

News | Oct. 06, 2020

Read the article about Global Knowledge realeasing Resources and Big-Name Webinars For Cybersecurity Awareness Month, October 2020. | Learn more here.