Global Knowledge

Displaying 1-40 of 216 results

  • White Papers // Feb 2011

    Getting Started with Master Data Services

    Master Data Services in SQL Server 2008 R2 allows an organization to define a "single source of truth" about its enterprise data using a purpose-built centralized database and a predefined Web application - Master Data Manager. Multiple application databases can be referenced through models forming a "hub-and-spoke" type architecture enabling...

    Sponsored By Global Knowledge

  • White Papers // Oct 2013

    What's New in vSphere 5.5

    vSphere 5.5 is now available with myriad small improvements such as a faster Web Client, LACP, Autoscale, and higher configuration maximums. In addition, there are changes coming such as VSAN, which may be ground-breaking in regard to VM storage of the future. Since the release of vSphere 5.5, they have...

    Provided By Global Knowledge

  • White Papers // Oct 2013

    Planning a Career Path in Cybersecurity

    As a society, we have all become heavily dependent on computers, network, and data stores. This in turn has exposed us to the risk of loss or compromise of those data systems. The need for personnel knowledgeable and experienced in security implementation and management has never been greater, and the...

    Provided By Global Knowledge

  • White Papers // Sep 2013

    Where to Go Once Your Servers Are Virtualized

    So, what do you do - what technology or technologies should you look at - once you've virtualized all or most of your environment? What can you look at to further drive down costs and increase efficiency? This white paper discusses several possible "next moves" and how they can make...

    Provided By Global Knowledge

  • White Papers // Sep 2013

    Designing IP Addresses for Large Networks

    In numerous Cisco classes, students learn about IPv4 and IPv6 address subnetting, complex subnetting, variable length subnet masking (VLSM), summarization, prefix routing, and address aggregation. These are valuable skills. In order to apply these skills efficiently, a network designer should possess one additional skill. Planning the IP address space for...

    Provided By Global Knowledge

  • White Papers // Sep 2013

    Shortcuts to Speed Your vCloud Deployment

    VMware vCloud Director fashions the provisioning of the software-defined datacenter layer to allow for a full virtual datacenter deployment within a short period of time. A vCloud consists of many layers and can quickly become a complex architecture. Before any deployment, requirements should be defined so that the vCloud can...

    Provided By Global Knowledge

  • White Papers // Sep 2013

    Tips and Techniques to Pass the PMP® Exam

    Passing the Project Management Professional® (PMP) certification exam can seem like a daunting task when project managers first decide to take the leap. Just like a project management plan, if you carefully map out your study plan, you will be successful. You must understand several key concepts, be intimately familiar...

    Provided By Global Knowledge

  • White Papers // Sep 2013

    Differences between Avaya Aura Contact Center (AML or SIP) and Avaya Aura Call Center Elite

    Brett Hanson, a Global Knowledge instructor who teaches telecommunication classes that encompass the Avaya Call Server 1000 and the Avaya Communication Manager portfolio, has found as he talks to people about Avaya's Call Center solutions, there seems to be some confusion about the various Contact Center solutions that are available...

    Provided By Global Knowledge

  • White Papers // Sep 2013

    Getting the Most out of Your Business Analysts and Business Architects

    The business analyst and business architect roles are growing in enterprises around the globe. Each provides bountiful opportunities to build strong, active, analytical doers who can shape the present and future course of an organization. However, the roles often struggle for traction. Business analysts all too often are cast as...

    Provided By Global Knowledge

  • White Papers // Aug 2013

    Applying the Four Standards of Security-Based CIA

    As organizations evaluate the available approaches to information security, they need to address a number of considerations in terms of operational, procedural, environmental, and system-related areas. It's no longer about just protecting data. Businesses need to formulate coherent, systematic approaches to security by incorporating regulatory compliance, periodic assessments and the...

    Provided By Global Knowledge

  • White Papers // Aug 2013

    Communicate, Communicate, Communicate

    Accelerating Leadership Development provides a proven model to develop high-potential employees to 1) assume critical roles, and 2) develop competencies, intellectual and knowledge capital. The book offers practical and rigorous tools and practices that enable organizations to identify and develop high-potential individuals, follow-up procedures to ensure activities are executed and...

    Provided By Global Knowledge

  • White Papers // Aug 2013

    Increase Your Earning Potential with Cisco Network Design Certifications and Skills

    If you are an experienced network engineer, and you are thinking about making more money, one way to do that is by obtaining additional Cisco certifications and the associated skills in network design in order to receive higher compensation without changing jobs or careers. Statistical information shows the salaries associated...

    Provided By Global Knowledge

  • White Papers // Aug 2013

    Why Software Architecture Matters (more than you think)

    The object of this white paper is to convince you that having a competent solutions or software architect on the team is absolutely critical to IT project success. A full-time, dedicated SA will form the glue that will hold your development team together and lead to project success.

    Provided By Global Knowledge

  • White Papers // Aug 2013

    Virtualization for Newbies

    One of the most popular topics in Information Technology (IT) the last several years has been virtualization. This paper introduces virtualization, beginning with reasons why a company would want to virtualize in the first place. One of the main reasons that most businesses like virtualization is to save money. Of...

    Provided By Global Knowledge

  • White Papers // Aug 2013

    Productivity Squared: The Benefits of Exchange and Lync Server 2013 Integration

    The recent release of Exchange Server 2013 and Lync Server 2013 has brought some powerful new capabilities to enterprise messaging and telecommunications. But combining and integrating the two brings together advantages befitting a true Unified Communications (UC) platform. Improved archiving, compliance and a unified contact store are just some of...

    Provided By Global Knowledge

  • White Papers // Aug 2013

    Multi-Step Authentication and Why You Should Use It

    Authentication is one of the essential components of security. It is one part of the concept known as authentication, authorization, and accounting (AAA). Authentication is the process of claiming an identity the proving that you are that claimed identity. Authorization is the mechanism to control what you can access or...

    Provided By Global Knowledge

  • White Papers // Jul 2013

    Cyber Heists: What Happened, Mistakes Made, Courts' Reaction, and What You Should Do!

    Whether you are the owner or manager of a bank or financial institution, or a business owner concerned about the security of your money in that bank or financial institution, this article contains critical information for you. Cyber heists have increased in intensity over the past three years. Here are...

    Provided By Global Knowledge

  • White Papers // Jul 2013

    How To Secure Online Activities

    The Internet is not automatically a secure or safe place to be. It is important to be clear and distinct when discussing security. Security is not a singular concept, solution, or state. It is a combination of numerous aspects, implementations, and perspectives. In fact, security is usually a relative term...

    Provided By Global Knowledge

  • White Papers // Jul 2013

    Making the Case for Windows 8.1

    With the evolution of the user interface in Windows 8, there were many concerns about the huge changes Microsoft made with the GUI. But lost in the discussion were all the substantial improvements made to the core operating system in terms of usability and manageability for users and organizations. Follow...

    Provided By Global Knowledge

  • White Papers // Jul 2013

    Top Five Reasons Your Company Needs VMware Horizon View 5.2

    With the growth of bring-your-own device (BYOD) and mobility, users are increasingly asking for computing anywhere from any device at any time. Users now expect productivity on the go with a desktop that can be freely accessed and secure. We're no longer a society that sits at a desk to...

    Provided By Global Knowledge

  • White Papers // Jul 2013

    Top Leveraging the Power of the Peloton to Lead Change

    In my experience I have found that a good way to address my work in organizations as a change agent helping to evolve their Service Management processes is to employ an important technique from cycling - the power of the peloton. The peloton is the tight formation that you see...

    Provided By Global Knowledge

  • White Papers // Jul 2013

    Unlock the Power of Microsoft SQL Server 2012

    Microsoft SQL Server 2012 has many great new features that will allow you to develop higher performing, more scalable next-generation applications using more than just relational data. The fact that the features are largely incremental in nature should reassure users that Microsoft is building on the established foundation of SQL...

    Provided By Global Knowledge

  • White Papers // Jul 2013

    802.1x - Implementing and Deploying Methods

    As time goes on, we'll be seeing more and more of 802.1X in the environments we support. We have to for due diligence. Allowing trusted and non-trusted hosts to connect to our networks without proper controls is really just turning a blind eye to security. You may have heard concerns...

    Provided By Global Knowledge

  • White Papers // Jun 2013

    Basics of Switching

    A switch (or packet switch) is a Layer 2 network device that forwards Ethernet frames based on the destination media access control (MAC) address. A switch has RJ-45 ports for connection and the intelligence to read MAC addresses to make forwarding decisions. The purpose of the switch is to quickly...

    Provided By Global Knowledge

  • White Papers // Jun 2013

    How to Succeed at Service-Oriented Architecture

    SOA is all about architecture-after all, it's right there in the acronym-yet most organizations think it is about turning existing software components into web services. When you adopt SOA, remember that it is all about design and governing that design. It's about how you design your service interfaces, your services,...

    Provided By Global Knowledge

  • White Papers // Jun 2013

    Visions of my Datacenter Virtualized

    Although many small- and mid-size businesses have not yet invested in server virtualization, they are actually limiting themselves from dramatic total cost of ownership (TCO) savings and improved business continuity. VMware vSphere is a reliable technology that is utilized by almost all Fortune 500 companies and is proven to reduce...

    Provided By Global Knowledge

  • White Papers // Jun 2013

    Avaya Aura Communication Manager Survivability Simplified

    The Avaya Aura product line offers many opportunities for communications to survive failures of the IP network or the Avaya equipment. Here, we will focus on the Communication Manager Survivability explanation, implementation, verification, "good to know facts," and troubleshooting commands.

    Provided By Global Knowledge

  • White Papers // Jun 2013

    Avaya Aura Contact Center Database Integration Wizard: Part Two, Data Exchange

    In Part 2, Data Exchange, of this series on the Avaya Aura Contact Center Database Integration Wizard you will see how to use the SEND REQUEST and GET RESPONSE operations so that customer information collected during the call to the contact center system can be exchanged with a backend database....

    Provided By Global Knowledge

  • White Papers // Jun 2013

    Avaya Aura Contact Center Database Integration Wizard: Part One, Sending Data

    In Part One: Sending Data, of this two-part series on the Avaya Aura Contact Center Database Integration Wizard (DIW), you will see how to integrate the Avaya Aura Contact Center with a backend database management system and how to use the DIW to employ the SEND INFO operation. This allows...

    Provided By Global Knowledge

  • White Papers // Jun 2013

    SIP and the Art of Converged Communications

    Session Initiation Protocol (SIP) is an internet signaling protocol, developed by the IETF (starting in 1996), for establishing, maintaining, and tearing down sessions between a variety of real-time media, including voice, video, and chat. SIP allows endpoints to locate other endpoints, whether stationary or mobile. SIP doesn't have to worry...

    Provided By Global Knowledge

  • White Papers // Jun 2013

    A Unified Model for Describing a Project Plan

    This paper proposes a unifying model for project plans. A distinction will be made between the outputs of project planning and the project plan itself. The significance of this distinction is to allow projects of all types to be described at a high level, in a common language, regardless of...

    Provided By Global Knowledge

  • White Papers // Jun 2013

    LAN Fundamentals: Logical Addresses vs. Physical Addresses

    There are two basic types of addresses used in Local Area Networking (LAN): logical addresses and physical addresses. Ethernet is the most common LAN and is the example used in this document. Understanding the differences of how the two addresses are used is the focus of this discussion. A list...

    Provided By Global Knowledge

  • White Papers // Jun 2013

    Emerging Trends in Project Management

    The technical aspects of managing projects notwithstanding, project managers are increasingly asked to lead the organization in transformative ways. Since project managers often interact across the entire spectrum of departments within corporations, they are often exposed to emerging trends within the industry that other or departmental managers are not. Among...

    Provided By Global Knowledge

  • White Papers // Jun 2013

    Foundational Focus: Basics of Ethernet

    A local area network (LAN) provides a path of communication, allowing the delivery of packets of data, voice, or video originating from the sender (logical source address) to the receiver (logical destination address). Ethernet is the most common LAN used. As you start to learn about networking, remember that communication...

    Provided By Global Knowledge

  • White Papers // Jun 2013

    Building a Home Lab for VMware sphere 5.1

    I often get asked by my students how to setup a home lab for study after class, and the result is this white paper. This paper is broken down into three major sections: the hardware required, the VMware Workstation configuration, and installing vSphere and Virtual Center (VC). This white paper...

    Provided By Global Knowledge

  • White Papers // May 2013

    Avaya CS 1000: Defining Calling Line Identification Numbers

    The Calling Line Identification (CLID) feature allows a CS1000 or Meridian 1 telephone to send a caller's telephone number to the called party. The presentation of CLID information is of particular importance when the caller dials an emergency number. This white paper describes a two-part process used to define CLID...

    Provided By Global Knowledge

  • White Papers // May 2013

    Understanding Avaya IP Office Short Codes

    This white paper provides a road map to understanding the programming and use of short codes in an Avaya IP Office system. It is based primarily on the codes used with the IPO 8.1 U-Law system with the Essential, Preferred, or Advanced Edition system licenses.

    Provided By Global Knowledge

  • White Papers // May 2013

    Cisco Unified Communications Manager Express

    Unified Communications, once a cutting-edge approach to voice communications, has gained status as a widely adopted way of communicating. Leveraging a more integrated approach between data networks and voice communications, this technology brings an incredible feature set to even smaller business entities. For small-to-medium sized companies, the Cisco Communications Manager...

    Provided By Global Knowledge

  • White Papers // May 2013

    Fundamentals of SCSI and iSCSI.

    SCSI (Small Computer Systems Interface), which is present in all personal, defines an initiator/target client/server relationship that includes addresses, commands, and specified operations. The SCSI model has numerous interfaces, including TCP/IP, fibre channel, directly attached parallel bus, and firewire. Fibre Channel and iSCSI are the two major choices for building...

    Provided By Global Knowledge

  • White Papers // May 2013

    Cisco Unified Communication Manager - Digit Manipulation

    Review why we would need to modify either the calling-party or called-party number, or both, to accommodate the various dial-plans that a phone call might encounter. We will also reviewed the tools available to us, as well as the various locations the modifications can be performed, from within UCM. Cisco...

    Provided By Global Knowledge

  • White Papers // Feb 2011

    Getting Started with Master Data Services

    Master Data Services in SQL Server 2008 R2 allows an organization to define a "single source of truth" about its enterprise data using a purpose-built centralized database and a predefined Web application - Master Data Manager. Multiple application databases can be referenced through models forming a "hub-and-spoke" type architecture enabling...

    Sponsored By Global Knowledge

  • White Papers // Apr 2013

    10 Tech Skills Heading the Way of the Dinosaur - 2013 Edition

    IT is a very fast changing industry - what is hot today may be a tiny niche market in only a few years, while things few have heard of may be huge trends in the same timeframe. There are many new technologies on the way, and that means opportunities for...

    Provided By Global Knowledge

  • White Papers // Oct 2010

    To Know MED-V In Windows 7

    This white paper introduces MED-V (Microsoft Enterprise Desktop Virtualization), Microsoft's enterprise-oriented tool for delivering legacy applications in virtual machines running on clients across your business network. The author discusses topics such as whether you need MED-V and how to get it, requirements, core features, and implementing and managing MED-V.

    Provided By Global Knowledge

  • White Papers // Mar 2013

    2013 IT Skills & Salary Report

    The results are in and analysis is complete from our sixth annual IT Skills and Salary Survey. This was our first in partnership with Windows IT Pro and our largest survey ever. In fact, this year's survey ranks as one of the largest in the industry. Download your copy...

    Provided By Global Knowledge

  • White Papers // Jun 2013

    Building a Home Lab for VMware sphere 5.1

    I often get asked by my students how to setup a home lab for study after class, and the result is this white paper. This paper is broken down into three major sections: the hardware required, the VMware Workstation configuration, and installing vSphere and Virtual Center (VC). This white paper...

    Provided By Global Knowledge

  • White Papers // Sep 2012

    Ten Steps to Better, Stronger Passwords

    Hackers are everywhere, and they have a sophisticated array of tools for cracking your passwords. The primary purpose of this white paper is to help you understand that easy-to-remember passwords are no longer considered a secure form of authentication. You should consider any static password that you can remember as...

    Provided By Global Knowledge

  • White Papers // Mar 2012

    Why ITIL® Is Important

    This paper discuss several concepts and techniques that ITIL promotes, including ensuring accountability, defining and enforcing boundaries, and conducting consistent and predictable activities in order to produce consistent and predictable results. Furthermore, additional benefits that ITIL provides as discussed in this paper include the agility that comes from being able...

    Provided By Global Knowledge

  • White Papers // Jan 2013

    Simplify Your Route to the Internet: Three Advantages of Using LISP

    The Location ID separation protocol (LISP) simplifies the process of connecting multi-homed sites, and also presents distinct advantages for networks. These advantages include simplicity over BGP, load balancing, and mobility.

    Provided By Global Knowledge

  • White Papers // Jan 2013

    15 Top Paying Certifications for 2013

    Having earned an IT certification, many individuals think they are automatically entitled to a huge raise. The truth is that several factors, including geography, industry, experience, and yes, certifications, combine to play a major role in determining an individual's salary. However, certain certifications do have greater impact on the earning...

    Provided By Global Knowledge

  • White Papers // Jun 2013

    Emerging Trends in Project Management

    The technical aspects of managing projects notwithstanding, project managers are increasingly asked to lead the organization in transformative ways. Since project managers often interact across the entire spectrum of departments within corporations, they are often exposed to emerging trends within the industry that other or departmental managers are not. Among...

    Provided By Global Knowledge

  • White Papers // Apr 2010

    77 Features for Windows 7 that Every IT Professional Should Know About

    Windows 7 builds on Windows Vista's positives and eliminates many of the negatives. It adds new functionality, is less resource-hungry, and starts and shuts down noticeably faster. Whether you're upgrading from Vista or moving up from Windows XP, these 77 tips and tricks, along with other new and enhanced features,...

    Provided By Global Knowledge

  • White Papers // Feb 2012

    Basics of IP Address Subnetting

    IP Address Subnetting is a complicated topic that can be confusing for many IT professionals. While you may be using one of the free subnet calculators available on the internet, knowing the reasons behind it and why it works the way it does is critical for true success. This white...

    Provided By Global Knowledge

  • White Papers // Oct 2010

    Windows 7 Troubleshooting Tips

    Your company has finally migrated to Windows 7. Congratulations! And now you have your first support call. This Microsoft white paper will tell you all you need to know about the new troubleshooting tools that are bundled with Windows 7 and provide you with the knowledge to quickly figure out...

    Provided By Global Knowledge

  • White Papers // May 2012

    Building a Home Lab for VMware vSphere5

    I often get asked by my students how to setup a home lab for study after class, and the result is this white paper. This paper is broken down into three major sections: the hardware required, the VMware Workstation configuration, and installing vSphere and Virtual Center (VC). This white paper...

    Provided By Global Knowledge

  • White Papers // Oct 2010

    Address Translation (NAT) and Port Address Translation (PAT)

    It's common today to use private addressing within an Autonomous System (AS), a collection of routers and subnets under a common administrative domain. The problem is that per RFC 1918 (Address Allocation for Private Internets), advertising these address spaces to the public Internet is not allowed. This means that if...

    Provided By Global Knowledge

  • White Papers // Apr 2012

    Five Secrets for Successfully Virtualizing a Data Center

    Here are some secrets, tips, and tricks for virtualizing your datacenter. We want to introduce some best practices for virtualization, while not being too biased towards one virtualization vendor or another. We'll use some common examples of products and tools that work with VMware's vSphere and Microsoft's Hyper-V, but with...

    Provided By Global Knowledge

  • White Papers // Jan 2013

    The Value of ITIL® Certification

    The professional certification industry has grown significantly in conjunction with increased growth of various aspects of the information technology field. The Information Technology Infrastructure Library (ITIL®) is a set of best practices designed to describe common approaches that organizations can apply to regular activities conducted by information technology (IT) organizations....

    Provided By Global Knowledge

  • White Papers // Mar 2013

    Legal Issues of Cloud Forensics

    Cloud forensics involves exploring issues a company and its forensic examiner may face when suffering a breach of company information in the cloud. If they need to collect information from the cloud to determine what happened, to determine what was lost or compromised, for remediation, for civil litigation, or for...

    Provided By Global Knowledge

  • White Papers // Jan 2010

    DirectAccess: The New VPN

    Windows 7 and Windows Server 2008 R2 have a new built-in architecture designed to create a Virtual Private Network (VPN) connection. This new technology is known as DirectAccess (DA) and is forecasted to replace traditional VPN connections for most of your remote access needs. DA can be installed as a...

    Provided By Global Knowledge

  • White Papers // Mar 2011

    Minimizing Windows 7 "Interface Shock"

    Every desktop administrator worries about the potential disruption from a new user interface. Such a distraction has come to be known as "interface shock." Fortunately, it is possible to minimize interface shock for users by leveraging Group Policy to make Windows 7 look more like Windows XP. This white paper...

    Provided By Global Knowledge

  • White Papers // Aug 2010

    Using Microsoft's Free Tools to Image and Deploy Windows 7

    Microsoft provides freely available and quite powerful tools that can help you image and deploy Windows 7. This white paper explores those components and their processes used during these deployments. It considers and explains every step of a Lite Touch installation, while also detailing the benefits of ImageX, the WIM...

    Provided By Global Knowledge

  • White Papers // Jan 2013

    The Evolution of Cisco Switching

    A thorough understanding of the fundamentals of routing and switching dynamics is not only necessary but expected by network professionals today. While the various processes may run almost invisibly on a properly configured device in a healthy network, inevitable issues will nearly always require the ability to examine problems at...

    Provided By Global Knowledge

  • White Papers // Apr 2013

    Foundational Focus: OSI Model - Breaking Down the 7 Layers

    The OSI model is a conceptual tool used to discuss and describe network functions. The use of a standard reference model is essential to communicate ideas as well as create new technologies. It is a good idea to be familiar with the OSI model, the features assigned to each layer,...

    Provided By Global Knowledge

  • White Papers // Oct 2012

    Big Data and Apache Hadoop Adoption: Key Challenges and Rewards

    The demands for management and analysis of big data are driving changes in the data center, along with the need for Apache Hadoop expertise. While open-source Apache Hadoop can be a powerful platform for handling big data, deploying and managing this key technology is not without its challenges. Learn more...

    Provided By Global Knowledge

  • White Papers // Jan 2011

    Speeding Up File Transfers in Windows 7

    File transfers in Windows involve many factors, any one of which can present problems. In a typical Windows network with a mix of clients and servers, file transfer performance can vary wildly. Because it's such a common operation, this white paper examines some of the reasons for the variations and...

    Provided By Global Knowledge

  • White Papers // Nov 2011

    General Guidelines for Building Effective Service Catalogs

    This white paper briefly describes what a service catalog is, the types of service catalogs, and a real-world analog to an IT service catalog. Furthermore, this paper listed 6 general guidelines a business can use to ensure that service catalog projects accomplish their intended goals. By including these guidelines in...

    Provided By Global Knowledge

  • White Papers // Aug 2010

    Enterprise Analysis: An Introduction To Evaluating Your Organization

    As a business or enterprise develops, it evolves to meet the needs and objectives of its founders. As time goes by, it can grow so large that it becomes overburdened by too many products, too many divisions, too many management levels, or a multitude of other problems. Enterprise analysis is...

    Provided By Global Knowledge

  • White Papers // May 2012

    The Top 10 Reasons all IT Professionals Should Learn Project Management

    Do your IT projects seem to be working out as you had planned? Do you have a plan? Could it be that there might just be a better way? A better approach, a different method, something that's been proven to be useful, proven to be successful, and proven to be...

    Provided By Global Knowledge

  • White Papers // Jul 2012

    IT Roles Facing Extinction

    Today, there's a huge amount of focus on getting more efficiency using virtualization, the cloud, Web 2.0, networking, and mobility. Better efficiency and innovation will reduce the number of technicians needed for certain tasks within the datacenter. The following are some of the key areas where traditional IT administration skill...

    Provided By Global Knowledge

  • White Papers // Jun 2013

    LAN Fundamentals: Logical Addresses vs. Physical Addresses

    There are two basic types of addresses used in Local Area Networking (LAN): logical addresses and physical addresses. Ethernet is the most common LAN and is the example used in this document. Understanding the differences of how the two addresses are used is the focus of this discussion. A list...

    Provided By Global Knowledge

  • White Papers // Jan 2013

    Change Is Constant: PMBOK Guide® 5th Edition

    On December 31, 2012 the fifth edition of the PMBOK Guide® was released and once again the profession of project management moved forward. As we wrap up the current four-year review cycle and anticipate the new, refreshed outcome, we have an opportunity to identify what has changed and how it...

    Provided By Global Knowledge

  • White Papers // Nov 2010

    Ten Things You Should Know About SharePoint 2010

    Whenever the new version of a popular application is released, it receives a lot of attention. SharePoint Server 2010 (SPS 2010) is no exception. Because its deployment affects so many areas of an organization, its new features and requirements should get careful consideration. SPS is definitely not just a new...

    Provided By Global Knowledge

  • White Papers // Oct 2011

    10 Current Security Threats for Individuals

    We now live in a world where new threats are poised to cause us harm in ways most of us never dreamed possible. The convenience and benefits of Internet access, always-on connectivity, and mobile devices have made us vulnerable to these attacks. It is time for us to adopt a...

    Provided By Global Knowledge

  • White Papers // May 2011

    10 Essential Security Policies

    Every organization needs a corporate security policy to firmly establish guidelines that will keep the company's resources and knowledge safe. This white paper discusses ten such guidelines that should be included in every security policy. While certainly not a conclusive study of essential practices, these ten suggestions are a good...

    Provided By Global Knowledge

  • White Papers // Apr 2012

    Windows 8 Reality

    Windows 8 is a Tablet OS first and foremost. Microsoft is designing Windows 8 to run on any type of form-factor, but its roots will be the slate or tablet style of interface. Personally, I know it will be hard for me to adapt at first, but it is time...

    Provided By Global Knowledge

  • White Papers // Apr 2012

    12 Steps to Bring Your Own Device (BYOD) Success

    IT departments have multiple opportunities and challenges as a result of the Bring Your Own Device (BYOD) invasion. The most common opportunity is to reinforce enterprise network security from both the inside and the outside. Supporting BYOD also offers more monitoring and tracking of activities that provide a more detailed...

    Provided By Global Knowledge

  • White Papers // Sep 2012

    Building a Cisco Certification Lab

    Building a flexible lab environment is an essential and critical part of any certification study environment. The first step, either the CCENT or CCNA, requires an environment that is complete enough to cover all of the exam topics, but simple and inexpensive enough to easily construct. Learning concepts is important,...

    Provided By Global Knowledge

  • White Papers // Jan 2011

    Introduction to Negotiation: A Primer for "Getting to Yes"

    Negotiation is a dialogue intended to resolve disputes, to produce an agreement on courses of action, to bargain for individual or collective advantage, or to craft outcomes to satisfy various interests. It is the primary method of alternative dispute resolution. This white paper focuses primarily on the negotiation process, different...

    Provided By Global Knowledge

  • White Papers // May 2010

    Overview of IT Service Managment Using the IT Infrastructure Library (ITIL)

    This white paper introduces managers with an interest in information technology to the ITIL. You will become familiar with ITIL processes and understand where ITIL fits within your organization. You will be able to identify the benefits available from ITIL and craft a high-level business case for ITIL adoption in...

    Provided By Global Knowledge

  • White Papers // May 2011

    SP1 for Windows 7 and Windows Server 2008 R2: What's New?

    This white paper examines the new features and updates in Service Pack 1 (SP1) for Windows 7 and SP1 for Windows Server 2008 R2, both of which were released on February 22, 2011. Although the two service packs are mostly independent of each other in updates and features, they do...

    Provided By Global Knowledge