Tài liệu Công Nghệ Thông Tin

Download tài liệu Công Nghệ Thông Tin:Tin học văn phòng, Đồ họa - Thiết kế - Flash, Quản trị Web, Cơ sở dữ liệu, Quản trị mạng, Kỹ thuật lập trình, Hệ điều hành, Phần cứng, An ninh - Bảo mật, Chứng chỉ quốc tế, Thủ thuật máy tính, Điện - Điện tử, Kinh tế học

Critical Thinking

Critical thinking is the art of raising what is subconscious in our reasoning to the level of con- scious recognition. It is the art of taking control of our thinking processes so as to understand the pathway and inputs that our thinking employs. Critical thinkers understand the mechanics of reasoning (thinking). They use this understand- ing to manage the unconscious influences that contribute to their decision-making processes. By taking charge of the thinking process, critical thinkers develop an understanding of what they do not know about a particular subject, and make better decisions as a result....

8/29/2018 4:28:29 PM +00:00

The Executive Guide to Business Analyst and Project Management Terminology

CAPM®: Certified Associate Project Manager; certification offered by PMI; requires less experience than PMP®. Capability: the functionality of the specified system. Cause-and-effect diagram: combines brainstorming and concept mapping to identify and consider a range of causes and impacts relative to a problem; also referred to as a fishbone diagram or an Ishikawa diagram.

8/29/2018 4:28:29 PM +00:00

Service-Oriented Architecture: What Is It and How Can It Help Your Business?

Service-oriented architecture, or SOA, is a hot topic in business today. You may have read about service-oriented architectures and are wondering how they can affect your business as well as how they can be of use to you. By looking at it from both a real-world perspective as well as a technical perspective, you will forge a solid understanding of service-oriented architecture from which you can jump off to implementing this technology within your business.

8/29/2018 4:28:29 PM +00:00

7Types of Hard CISSP Exam Questions and How To Approach Them

The first thing most people hear about the CISSP examination is how difficult or unfair the questions are. Although this may be a good warning, it does not begin to prepare you to do well on the exam itself. For some of the CISSP exam questions, just knowing the facts is not enough. These questions are referred to as “hard questions“. This paper examines seven types of hard questions you are likely to see on the CISSP examination and the best approaches for solving them.

8/29/2018 4:28:29 PM +00:00

7 More Red Hat® Linux™ Tips and Tricks

Are you looking for a quick and simple reference guide to help you navigate Red Hat® LinuxTM systems? Look no further. Global Knowledge and Red Hat have assembled a second set of Tips and Tricks written by Red Hat Certified Engineers® (RHCEs) to give you an edge on managing these systems: 1. If a file has a link count greater than 1, is there a simpler way to find out what other file names are hard-linked to it? 2. Which interface is eth0? 3. Quick-and-dirty automounts 4. How can I make dd give me a progress report? 5. Tar vs. Star—The battle of xattrs 6. New default...

8/29/2018 4:28:29 PM +00:00

Successfully Managing Remote Teams

Managing teams can be a challenge. When you try to manage teams across different geographical regions and perhaps time zones, you have a situation that can be difficult for even the best manager. Remote teams have become more common in the workplace. They satisfy the need for accessing specialized expertise at a cost savings. With advances in technology, there is now a broad array of communication methods to enable remote teams to function more smoothly and cohesively.

8/29/2018 4:28:29 PM +00:00

Simple Tricks To Ace the Subnetting Portion of Any Certification Exam

Subnetting seems to be a battle of fighting bits, decimal numbers, and countless methods and processes to convert from one to the other. While the methods may be confusing, the mathematics behind them is the same for all. In this paper, you will learn some of the simpler ways to figure out many of the subnetting questions that you will find on the industry certification tests.

8/29/2018 4:28:29 PM +00:00

Top 10 Reasons Why TCP Is Reliable

The protocol used on the Internet for reliable communication is the Transmission Control Protocol (TCP). In this paper, you will learn some of the essentials of TCP by looking at 10 of the top features that make it reliable. In-depth knowledge of protocols can help you in many ways. It enables more efficient troubleshooting. It allows you to understand how firewalls and routers limit the flow of dangerous information in and out of your networks. Our discussion in this white paper is a good introduction, but it does not represent a full, detailed analysis of TCP....

8/29/2018 4:28:29 PM +00:00

Number Systems Decoded

Let’s consider a simple base 10 number, 1585. The number is structured in a very orderly way. To begin with, note that the digits all come from the decimal symbol set (0, 1, 2, 3, 4, 5, 6, 7, 8, and 9) and that the symbol 5 appears twice in the number.

8/29/2018 4:28:29 PM +00:00

Geek-Speak Glossary: A Manager’ s Guide to IT T er minolo gy

SIP’s popularity has grown enormously over the past few years. A big boost in support came in November 2000, with the acceptance of SIP by the 3rd Generation Partnership Project (3GPP). 3GPP is composed of standards organizations in China, Europe, Japan, North America and South Korea, and is dedicated to the proliferation of a third-generation wireless global standard. More specifically, this organization focuses on the development of standards for the Universal Mobile Telecommunications System (UMTS). Furthermore, the 3GPP developed the IMS (IP Multimedia Subsystem), which defines the way VoIP services will be implemented over General Packet Radio Services (GPRS) and UMTS cellular networks....

8/29/2018 4:28:29 PM +00:00

How To Use the Six Laws of Persuasion during a Negotiation

Why have TV sitcoms used canned laugh tracks for years? Producers wouldn’t employ them unless they actually are successful in eliciting audience laughter and, subsequently, higher ratings. Part of the reason you laugh along anyway in spite of your annoyance lies in how you decide what is socially “correct” behavior. If you don’t know exactly what to do, you rely on others around you (or the virtual TV audience) to help you find the way to properly react. You think if others are engaging in a specific behavior, it must be the proper thing to do. Hence, you laugh in spite of yourself, or if...

8/29/2018 4:28:29 PM +00:00

Cisco Unified Communications: Unifying Communications Infrastructure

Gateway devices and Call Managers are not limited to geographical boundaries. A properly designed system would easily provide the scalability, redundancy and fault tolerance that highly available networks require. The unified communications approach relates very closely to the Internet model that the Department of Defense designed. The Cisco Call Manager server clustering approach represents a highly available network model that can meet disaster recovery requirements when aligned with the proper underlying quality of service (QoS)- enabled infrastructure. QoS is the glue of the network that guarantees the quality level necessary for real-time communications, such as voice and video....

8/29/2018 4:28:29 PM +00:00

Voice over IP Open-Source Platforms and the Session Initiation Protocol

SIP’s popularity has grown enormously over the past few years. A big boost in support came in November 2000, with the acceptance of SIP by the 3rd Generation Partnership Project (3GPP). 3GPP is composed of standards organizations in China, Europe, Japan, North America and South Korea, and is dedicated to the proliferation of a third-generation wireless global standard. More specifically, this organization focuses on the development of standards for the Universal Mobile Telecommunications System (UMTS). Furthermore, the 3GPP developed the IMS (IP Multimedia Subsystem), which defines the way VoIP services will be implemented over General Packet Radio Services (GPRS) and UMTS cellular networks....

8/29/2018 4:28:29 PM +00:00

TCP/IP Sleuthing – Troubleshooting TCP/IP Using Your Toolbox

You just received another late evening page from the help desk. “I have a problem with my network access, it just doesn’t work!” What should you do next? Troubleshoot! Troubleshooting is a necessary part of supporting any network installation. Determining and repairing problems can consume a lot of time, especially if you don’t know what to do or how to do it correctly and quickly. In this paper, I will explain how you might consider troubleshooting different problems that could exist in your network. These techniques can all be performed using some of the common tools available in modern operating systems....

8/29/2018 4:28:29 PM +00:00

The Case for Virtual Local Area Networks (VLANs)

In the history of Ethernet, the virtual LAN is a recent addition. The VLAN was introduced to solve a number of networking issues. In this whitepaper you will learn about the evolution of Ethernet, the reasons VLANs were introduced, and the ways that VLANs can be used. You will also learn about the networking standards that address the VLAN implementation.

8/29/2018 4:28:29 PM +00:00

User’s Guide to Office 2007 – No Need To Wait, Deploy It Now

It seems we are always dragged kicking and screaming into the newest operating system, programs, or hardware systems. This case is no different. Office 2007 is quite an initial adjustment and might scare many at their first encounter with the new interface. After using Office 2007 for the past year, there is nothing you could offer me to go back to the previous version. I hope to calm your fears, open new avenues, and even help you to have a smooth deployment.

8/29/2018 4:28:29 PM +00:00

Virtual PC’s Enhanced Rollout and Troubleshooting

It isn’t very often that we are fortunate enough to have free software that actually is useful. VM Systems and Microsoft both have free offerings in the virtual PC market. This paper will deal with one of Microsoft’s offerings, Virtual PC. This paper will give you a tour of the product, installation requirements, file structure, new enhancements, and possibilities. Only Virtual PC will be covered here. Virtual Server is another program made for running server software and is quite different in its interface and scope. Look for a future paper on the Virtual Server product....

8/29/2018 4:28:29 PM +00:00

SharePoint: How It’s Leveraged and How It Works

SharePoint is Microsoft’s document management technology, and has been in use under various product names for more than five years. Despite its longevity, many computer users are unaware of its existence and fewer still understand how the technology simplifies the network environment for end-users. But every organization that generates content can benefit from using SharePoint. Some smaller organizations will require only WSS 3.0, but most organizations will get maximum benefit by implementing MOSS 2007. Some examples of how existing organizations are using SharePoint include:...

8/29/2018 4:28:29 PM +00:00

Using Prince2 to Enhance guide experience and knowledge base

PMI's guide to the project management body of knowledge (hereafter referred to as pmbok guide) provides an encyclopedic approach to best practice project management, serving as a critical reference in delivering seccessful projects. Due to its breadth of coverage, though, people who have studied the pmbok guide (including pmp's) are often unsure as to how to begin their projects, and how to structure them.

8/29/2018 4:28:29 PM +00:00

The OSI Model: Understanding the Seven Layers of Computer Networks

The Open Systems Interconnection (OSI) model is a reference tool for understanding data communications between any two networked systems. It divides the communications processes into seven layers. Each layer both performs specific functions to support the layers above it and offers services to the layers below it. The three lowest layers focus on passing traffic through the network to an end system. The top four layers come into play in the end system to complete the process.

8/29/2018 4:28:29 PM +00:00

7 Things Every System Administrator Should Know About OpenSSH

OpenSSH is an open-source implementation of the SSH (Secure SHell) protocols, originally developed in 1995 by Tatu Ylönen. SSH-based tools provide secure client/server connections and are usually designed to replace older remote-access tools like rsh and telnet. Unlike their predecessors, SSH-based tools encrypt their transmissions, making it difficult or impossible for intruders to “sniff” important information, such as passwords, from the data stream. SSH implementations exist for every major platform including Microsoft Windows. This paper will focus on the OpenSSH implementation....

8/29/2018 4:28:29 PM +00:00

Red hat -Why Open Source Software

The open source security position challenges the failing status quo. Increasing security issues underline the fact that the proprietary hide-the-code approach is not working.

8/29/2018 4:28:29 PM +00:00

Better Security through Access-List Management

Security is becoming more and more common in every environment, regardless how big or small the network happens to be. Anytime we think of security, the first thing that comes to our minds is the implementation of firewalls. What if firewalls are not available in your network? What if your firewalls are only meant for connectivity from the outside world? Or, better yet, what if firewalls are controlled by different groups in your organization, and you want to do something to protect your network internally between departments and/or maybe your budget doesn’t allow you to get firewalls. Can you get somewhat similar...

8/29/2018 4:28:29 PM +00:00

Router Essentials

Every time we teach a class to get students started with Cisco and networking technologies, there are always some common things that bug and stop students from getting some basic topics.We, as instructors, are always asked if there is a basic to the basic course they are taking. That’s why we are putting this router training white paper out—to help students with some of those “basic of the basic concepts.” This paper won’t attempt to answer all your questions, but it will definitely help with some of those concepts to make your class experience more enjoyable....

8/29/2018 4:28:29 PM +00:00

Solving the Mysteries of Subnetting

Subnetting is a complicated topic that has confused students for a very long time. However, subnetting is an important topic for many different certifications with various vendors, including Cisco. In the real world environment, people are used to just punching in the numbers in many of the free subnet calculators that are readily available on the internet. For exam purposes, you still have to do this in a very fast manner since many exams are time-based and you don’t have the luxury of spending those precious minutes on any single question. This whitepaper will solve some of those age-old and...

8/29/2018 4:28:29 PM +00:00

Switching Essentials

In every introductory class we teach we get students who are either puzzled about router essentials or switching essentials or both. This switching essentials white paper will give you the basics that will make learning about switching a little less painless when you sit in a course like ICND1, ICND2, CCNA Boot Camp or BCMSN. Switching is an interesting topic. It could be an easy thing in your network, or it could be something that keeps you up nights. Switching can be simple, allowing us to connect our users from various systems (host systems and phones), or it can be a...

8/29/2018 4:28:29 PM +00:00

Using Windows Vista on a Corporate Mobile Network

Can you remember the frustration you felt the last time you needed to work on a document but couldn’t connect to the network to use it? What about the last time you wanted to write an email or get some work done on the Internet, but you had to go to a different location where you could use a networked system? Multiply these problems and frustrations by every employee who has every experienced them and you will understand, if you don’t already, why wireless networking is becoming a requirement in many offices....

8/29/2018 4:28:29 PM +00:00

Changes in Windows Server 2008 and Group Policy Architecture

Now that now that new Windows technology (in the dual garb of Windows Vista and the Windows 2008 Server) has arrived on the scene, many network planners are taking a closer look at some of the architectural changes that Microsoft has made to the Group Policy structure. The underlying concept of Group Policy hasn't changed – it's still fundamentally a Great Big Network Registry Editor. Make a setting, and Group Policy enforces it for you from that point forward. (Of course, Group Policy goes beyond Registry settings to include a variety of security and software installation capabilities, too.)...

8/29/2018 4:28:29 PM +00:00

What You Need To Know About Server 2008 Core Edition

Back in the days of Windows 3.1, you could choose what Windows components you wanted to install. In fact, I remember doing the math at that time, and the number of possible component combinations was in the hundreds of thousands, if not more. If you didn't want a component, you could tell Windows that you didn't want it, and by George, you wouldn't get it.

8/29/2018 4:28:29 PM +00:00

An Introduction to Windows Server 2008 Server Manager

When you take your first look at Windows Server 2008, you'll find that many of the traditional tools that graced Server 2003 are still around: the Computer Management console; the System Information utility; the Services console; and so forth. Administrative Tools are still in a Start menu folder named Administrative Tools, and you can start feeling fairly comfortable with the GUI if you have background with prior versions of Windows.

8/29/2018 4:28:29 PM +00:00