Ahorra 5 meses con 1 año de Premium al 35% dto ¡Lo quiero!

Podcasts de program

More On the Squid Proxy Server

This radio show describes the Squid proxy server and its various uses.

Añadir a ... 

Linux and IPv6

Linux supports IPv6 as well as IPv4. In this radio show we will discuss why IPv6 was designed,...

Añadir a ... 

Apache Webservers- The Next Steps

The Apache webserver is modular, allowing the administrator to add functionality to the server....

Añadir a ... 

ITIL: Roles and Responsibilities for Planning, Protection and Optimization

Discussion of what a Capacity Manager, Availability Manager, ITSCM Manager and Security Manager...

Añadir a ... 

ITIL: CSI in Complementary Governance Standards, Frameworks, Models and Quality Systems

Use of CSI is not exclusive to ITIL. Improvement appears in complementary governance standards,...

Añadir a ... 

ITIL: Roles in CSI

A short exploration of the roles which are discussed in the CSI stage of the Lifecycle.

Añadir a ... 

ITIL: ITSCM – the Importance of Testing

Consideration of the various types of testing, and the potential impact to the organization.

Añadir a ... 

ITIL: Security – Awareness and Education

Consideration of the impact of education and awareness on the culture for security in the...

Añadir a ... 

ITIL: Common Techniques for Improving Availability

This talk covers the common techniques such as the Expanded Incident Lifecycle, CFIA, SFA etc.

Añadir a ... 

ITIL: Implementing CSI Day to Day

How to include CSI principles in commonly used processes such as Incident, Problem, Service Level...

Añadir a ... 

ITIL: Capacity Management – is It Still Important?

Covering the aspects of Capacity Management and consideration of the need for Capacity Management...

Añadir a ... 

ITIL: Assessment

A short review of the key elements of Assessment, when to carry out an assessment, how it can be...

Añadir a ... 

ITIL: Kotter’s 8 Step Change Model and CSI

Brief overview of the 8 steps of Kotter’s model and how it can be used with CSI in the Service...

Añadir a ... 

Planning Virtualization – Selecting the Right Type

There are several different forms of virtualization. Each one has its own characteristics. They...

Añadir a ... 

Planning User State Virtualization

USV works by decoupling user data and settings , which make up the user profile, from personal...

Añadir a ... 

Planning Network Access Protection

There are several specific questions to answer when designing a NAP architecture, and they can be...

Añadir a ... 

Planning Active Directory Certificate Services Infrastructure

Active Directory Certificate Services (AD CS) provides a public key infrastructure (PKI) that can...

Añadir a ... 

Designing File Service Infrastructure

This podcast will discuss how a well-designed file services form the basis for productive...

Añadir a ... 

Why In The World Are We Doing BusinessObjects

What are "Business Objects?" Is this some new-fangled product?Will this help me tame the mass of...

Añadir a ... 

Creating Queries in BusinessObjects

Business Objects uses a visual, "drag-and-drop" interface to customize requests you make to the...

Añadir a ...