GogoTraining IT Training Podcasts
Summary: GogoTraining.com
Podcasts:
How to include CSI principles in commonly used processes such as Incident, Problem, Service Level Management and Change management.
There are several different forms of virtualization. Each one has its own characteristics. They include: • Server hardware virtualization • Server software virtualization • Session virtualization • Application virtualization • Virtualization on the desktop The question is which one is right one to use? This will depend on the situation or the goals of the organization. In this broadcast we will examine each type of virtualization and guide you in selecting the correct virtualization technologies that meets your corporate goals. See pdf doc on website.
USV works by decoupling user data and settings , which make up the user profile, from personal computers and making it available to users from managed computers on the network. To accomplish this decoupling, a USV strategy can combine the use of the following three Windows technology components: Folder Redirection, Offline folders, and Roaming User Profiles. In this broadcast, we will look at the part of the USV and see how the fit into the overall scope of the project.
There are several specific questions to answer when designing a NAP architecture, and they can be put into three categories: • What are the current capabilities of the network infrastructure and computers? • Which is more important: cost or the robustness of the solution? • How do the client computers connect to the network: directly or through a VPN? NAP is a new platform and solution that controls access to network resources based on a client computer’s identity and compliance with corporate governance policy. In this broadcast, we will be answering these questions and more.
Active Directory Certificate Services (AD CS) provides a public key infrastructure (PKI) that can be used to distribute certificates from a trusted source to enable: • Secure data transmission to a known recipient through encryption • Signing of code and documents that confirms who the sender is and the data has not been tampered with in any way This broadcast will point out some of the key ingredients to confidently design an Active Directory Services Infrastructure.
This podcast will discuss how a well-designed file services form the basis for productive computing in many organizations, providing fast, reliable, and secure access to file resources while protecting data in the event of disaster. File Services is a critical infrastructure component in enabling and increasing the productivity of both business and IT workers. In this broadcast, we look at what are steps to configuring an efficient and product file services infrastructure.
Business Objects uses a visual, "drag-and-drop" interface to customize requests you make to the database to retrieve data. These requests, known as "queries," form the basis for your BusinessObjects reports and charts. Join Mike Simpson as he discusses "Creating Queries in BusinessObjects."
What are "Business Objects?" Is this some new-fangled product?Will this help me tame the mass of corporate data with which I have to struggle? How will I know which databases in my company have the data that I need, and how will I put those pieces of data together? Join Mike Simpson as he takes you on a survey of "Why in the World Are We Doing Business Objects."
Once the tables and charts for your report are ready, you will need to add you "final touches" – adding and customizing headers and footers, adding "free standing" cells that are user-defined rather than database-defined, and adding "hyperlinks" that open to Web pages. Join Mike Simpson as he takes you through "Putting the Final Touches on Your Report."
BusinessObjects provides numerous pre-packaged formulas for performing financial calculations and formatting strings, numbers and dates, as well as providing you with the capability of creating your own formulas to automate report-related calculations. BusinessObjects further allows you to save those formulas in "variables" which are nearly indistinguishable from the details, dimensions and measures that BusinessObjects use to create reports. Join Mike Simpson as he shows you how to make your life easier using "Formulas and Variables in BusinessObjects."
A BusinessObjects document stores multiple 'reports' – formatted responses to queries, organized as tables or charts. Reports can be subdivided into sections and have calculations performed upon those sections. Join Mike Simpson and learn how to create and customize "Reports in BusinessObjects."
Windows Deployment Services is a replacement for Remote Installation Services in Windows Server 2003. There are certain things that you need to consider before deploying the Windows Deployment Services infrastructure. In this radio broadcast, we will be exploring the requirements for deploying Windows Deployment Services.
This radio show will discuss the differences between a Data Guard failover and a switchover. It will also discuss the operating system and physical hardware requirements.
This radio show will discuss Oracle’s new feature in 11g, Active Data Guard. During this presentation, Steve will discuss its implementation and features.
This radio show will discuss how to implement Flashback Database and Data Guard. Steve will discuss the drawbacks and advantages of Flashback and Data Guard. During this presentation, Steve will also identify any ‘gotchas’ when implementing Data Guard and Flashback database.