Examine the OSI model, the features assigned to each layer, and examples of common protocols or technologies associated with the OSI layers.
Discover the prospects of Network Functions Virtualization (NFV) as it evolves from a hardware-centric approach to a software-driven model. This paper also examines the future market implications and how NFV can help organizations to achieve their goals.
Learn how the latest feature updates including database management via MariaDB, container-based app isolation, the XFS file system and OpenLMI represent key open source advances.
Explore how Microsoft Office 365 works, and then discover what steps your organization should choose to implement an infrastructure that is completely driven by it.
Kerry Doyle discusses Security and the Rise of Machine-to-Machine (M2M) Communications to help avoid any security risk in the future. Learn more here.
Learn the basics of cloud computing and the types (models) available.
A zero day exploit is an attack that was previously unknown to the target or security experts in general.
Learn about the uplink strategies for traffic coming in and out of a Cisco Unified Computing Solution (UCS) chassis.
This white paper will bring you up to speed on what DevOps is, how it can help IT deliver value to the business, and position the IT organization to keep up with business demand for change.
Course Code: 2482
Enhance your Agile Business Analyst skills in this Global Knowledge course, which is compliant with IIBA and A Guide to the Business Analysis Body of Knowledge, including the recently-published Agile Extension. Enroll now!