At some point, you’ll find yourself working with “Difficult People.” The effects they can have on an organization vary greatly but usually involve many problems for the team. Learn about some common types of difficult people and how to handle them.
Learn 10 common ways that malicious code can penetrate your network.
Prepare to install and administer IP Office Manager 9.1.
Gain the understanding you need to implement ITIL with instructions and tips for important steps and methods for evaluating your existing processes.
Examine 15 common myths surrounding virtualization from a vendor-neutral viewpoint.
Learn how to configure IP Multicast with Multiprotocol Label Switching (MPLS) and how to add encryption for Multicast with the Group Encrypted Transport VPN (GETVPN).
ITIL implementation initiatives fail when all three enablers aren’t factored in: people, process, and technology. The most important enabler is people.
Structuring techniques are the foundation of decision making. This white paper introduces some of the simplest and most effective structuring techniques including sorting, sequencing, placement, decision trees, and ranking.
Discover how the Red Hat Certified Architect program provides a credential that represents skills and knowledge needed for a world in which IT architecture is undergoing a period of rapid change and evolution.