Article
Learn everything you need to know about IT and technology trade shows and how they provide additional opportunities to hear about new technologies, talk with vendors, develop new skills, take certification exams, connect with peers in the industry and have a good time. Read now >
This webinar recording will help you understand the essence of DevOps, including what it is, the business value, common myths, and be provided steps on how to gauge your organization’s readiness for adoption.
Problem Solving - Root Cause Analysis using Kepner Tregoe
Learn hot to get a secure and scalable instance of Docker Enterprise up and running.
Co-authors Michael Scarborough and Ryan Ballmer discuss some key differences in the new Global Knowledge ITIL courseware.
Michael Scarborough and Ryan Ballmer, co-authors of Global Knowledge ITIL courseware, discuss how to become an ITIL expert.
Michael Scarborough and Ryan Ballmer, co-authors of Global Knowledge ITIL courseware, discuss why ITIL is important to businesses.
In this post I’ll focus on a topic that’s mentioned in the Cisco FIREWALL training class but isn’t emphasized there or in the online Cisco ASA documentation. When configuring failover on a pair of ASA security appliances, a situation can arise in which network disruption occurs due to the secondary ASA in a failover pair becoming active first and then the primary comes online second. Both the documentation and the courseware point out that this causes the secondary (and active ASA) to swap its interface MAC addresses with those of the primary. Being naturally skeptical about this behavior, I decided to investigate. The rest of this post illustrates my confirmation of this phenomenon.
Learn how to get your best practices in order with ITSM in our webinar.