Filters (0) (reset filters)
Sort by: Date published | Number of comments | Appreciation | Title Ascending | Title Descending | Most popular
Results per page : Page 1 of 7 (33 Result(s))
  • < Prev
  • ...
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  • Next >
  • To keep up to date with all the technologies in SQL Server, the DBA or developer who wants to stay ahead is faced with the struggle of constant learning. With every new release, it seems that at least one entirely new application platform appears, alongside innumerable additions to, and improvement of, existing features. How do you keep up while avoiding information overload, unnecessary detours and dead-ends?

    The SQL Server Stairways is our solution to this problem. Designed to smooth out even the steepest learning curve, each Stairway is a SQL tutorial series focused on a single topic and is arranged into no more than a dozen easily-navigable tutorials that we call 'steps'. Each step is the length of a typical magazine tutorial, and emphasizes practical, hands-on learning, with just enough background theory to help you understand the topic at a deeper level.

    Using straightforward language and avoiding jargon and marketing babble, each Stairway tutorial series is designed to take you from zero knowledge of a particular SQL Server topic, to a level of practical understanding that will allow you to start using that feature in a production environment. The learning gradient is steady and manageable, but also brisk. You won't be wasting time.

    Our team of Stairway Editors, including Kalen Delaney and Brad McGehee, have selected technical topics that all SQL Server DBAs and developers can benefit from mastering, and have persuaded leading experts in those fields to author them.

  • Redgate offers a selection of free PDF downloads of some of their books at this address:
    http://www.red-gate.com/community/books/#sqldev
    Any book that has the "Free PDF download" link is available once you enter your name and email on the subsequent page.
    The books are grouped into the following categories:

    • SQL Dev
    • SQL DBA
    • .Net
    • SysAdmin
    • Professional Development
    • Mini Books

  • The fun way to learn about Agile/Scrum, prepare for Scrum Master certification / Agile certification (CSM, CSPO, PSM, or PMI-ACP), and debunk popular misconceptions.
    There are six videos addressing
    Introduction to Scrum
    Backlog Refinement Meeting
    Sprint Planning Meeting
    Daily Scrum Meeting
    Sprint Review Meeting
    Sprint Retrospective Meeting
    Each has quizes to stress learning.

    Also links to other content to understand Agile & Scrum.

  • IBM Websphere Conference
    Conference provides good training about IBM WebSphere Products and it also provides detailed new features that have been introduced in the latest versions and it will be very helpful for me.

  • Presentation material form IDUG 2012 North America sessions.
    There are 3 streams:-
    - sessions for DB2 LUW (Linux, Unix & Windows)
    - sessions for DB2 z/OS (i.e. mainframe)
    - sessions for both platforms

    *** Use WITHIN Fujitsu only please, do not share outside ! ***

  • Presentation material form IDUG 2012 North America sessions.
    There are 3 streams:-
    - sessions for DB2 LUW (Linux, Unix & Windows)
    - sessions for DB2 z/OS (i.e. mainframe)
    - sessions for both platforms

    *** Use WITHIN Fujitsu only please, do not share outside ! **

  • Presentation material form IDUG  2012 North America sessions.
    There are 3 streams:-
    - sessions for DB2 LUW (Linux, Unix & Windows)
    - sessions for DB2 z/OS (i.e. mainframe)
    - sessions for both platforms

    *** Use WITHIN Fujitsu only please, do not share outside ! **

  • Presentation material form IDUG 2010 and 2011 North America sessions.
    There are 3 streams:-
    - sessions for DB2 LUW (Linux, Unix & Windows)
    - sessions for DB2 z/OS (i.e. mainframe)
    - sessions for both platforms

    *** Use WITHIN Fujitsu only please, do not share outside ! **

  • Presentation material form IDUG 2010 and 2011 North America sessions.
    There are 3 streams:-
    - sessions for DB2 LUW (Linux, Unix & Windows)
    - sessions for DB2 z/OS (i.e. mainframe)
    - sessions for both platforms

    *** Use WITHIN Fujitsu only please, do not share outside ! **

  • Presentation material form IDUG 2010 and 2011 North America sessions.
    There are 3 streams:-
    - sessions for DB2 LUW (Linux, Unix & Windows)
    - sessions for DB2 z/OS (i.e. mainframe)
    - sessions for both platforms

    *** Use WITHIN Fujitsu only please, do not share outside ! ***

  • See the Microsoft solution to manage your Private Cloud Infrastructure.

  • In this session we'll take the concepts introduced in Part 1 and go even deeper. We'll provide a technical overview of the new application model and end-user application catalog that delivers this flexible working environment. Learn how best to design and deploy an optimized Configuration Manager 2012 infrastructure as well as some best practices and tools for migrating from SCCM 2007.

  • Are you ready for Microsoft System Center 2012 Configuration Manager? We are excited about our most important release ever for client administrators. Configuration Manager 2012 is user-centric, manages heterogeneous devices and introduces a new way to deploy applications; these capabilities will help you enable the Consumerization of IT, reduce costs, and drive agility for your organization. But there is more...a NEW interface, improved setting management, role-based administration, and infrastructure reduction. Get up to speed on all the key new capabilities of Configuration Manager 2012. We'll also provide a quick overview of Windows Intune, for those looking for a cloud based management for their unmanaged PCs.

  • End users are bringing consumer devices into the organization! iPhones, iPads, Tablets and Smartphones are now part of the corporate environment. New desktop technologies such as VDI, Tablets, Consumerization, among other pressures, are causing many IT environments to consider re-architecting their desktop infrastructure. Learn how to separate myths from facts, learn how to develop a strategy focused on meeting your users desktop requirements based on roles / personas, rather than implying that one technology fits all, and discover Microsoft and partner solutions that enable a Flexible Workstyle.

  • Learn how to make the magic from the keynote come to life for your organization. Get an overview of the key improvements in System Center 2012, the design principles for 2012, how those features will benefit your organization, and finally how you can implement within your organization to achieve business value.

  • 1st presentation in a complete set of 8.
    Cloud computing and the delivery of true IT as a Service is one of the most profound industry shifts in decades. Join Jeff Woolsey, Principle Program Manager, Microsoft's Management and Security Division, as he shares Microsoft's vision for cloud computing and shows how System Center 2012, as part of the Microsoft private cloud, will enable you to deliver the promise of cloud computing in your organization today.

  • A thought leadership presentation on the basic concepts of modeling including the history, definition and taxonomy of the Unified Modeling Language (UML).

    Use Cases are discussed as well as a high level explanation of the main concepts associated with the architectural level process analysis technique.

    This is not a presentation on use case diagramming.

  • In the context of the upcoming Solution Architecture career path this module covers the process and techniques of Requirement documentation.
    It covers all major steps including requirement determination, analysis and validation.
    We believe this is an important aspect that applies to most of our delivery projects.

  • In the context of the upcoming Solution Architecture career path this module covers the process and techniques of Requirement Documentation.
    It covers all major steps including requirement determination, analysis and validation.
    We believe this is an important aspect that applies to most of our delivery projects.

  • In the context of the upcoming Solution Architecture career path this module covers the process and techniques of Requirement Documentation. It covers all major steps including requirement determination, analysis and validation.
    We believe this is an important aspect that applies to most of our delivery projects.

  • This content was submitted by Ivar Alexander.

    Thought Leadership Presentation:
    This session will cover the latest Automated Process Discovery (APD) technology available from Fujitsu.

    This latest release includes process discovery technology, and adds new management aspects by providing ongoing monitoring and governance of the processes in place.

    The presentation will cover a high level view of the capabilities and architecture of the solution.

  • This content was suggested by Sempai Team.

    Fujitsu is a leading IT services company that designs, builds and operates IT systems and services for clients in both the public and private industries.

  • This content was recommended by Pierre Hamel.

    A data-rich study of who is buying cloud and why. Aimed at vendors trying to figure out their targeting criteria and sales/marketing targets.

  • This content was submitted by Annick Savard.

    We leverage the combination of cloud computing and Software as a Service (SaaS), with its emphasis on productively creating well-tested, maintainable, reusable code, to let "one-pizza" teams of Berkeley undergrads design, develop, test, and deploy their own SaaS applications. Iteration-based agile development rewards regular progress, test-first design results in students actually enjoying testing, and cloud computing showcases deployed projects to friends, colleagues, and future employers, all while students absorb "big ideas" such as higher-order programming and metaprogramming.
    I'll also discuss other uses of cloud computing at Berkeley from lower-division through graduate CS courses.

  • This content was submitted by Chris Hammond-Thrasher.

    Alternate title: Why I Have Tape Covering My Webcam.

    For years security professionals have been telling us not to follow links or open attachments from untrusted sources, not to click "Ignore" on your browser's security pop-ups, and not to insert untrusted thumb drives into your USB ports. Do you want to see what can happen with your own eyes? This prensentation will show you how to download, install, configure, and use the basic features of Dave Kennedy's open source hacker tool, the Social Engineering Toolkit.

  • This content was submitted by Jean-Yann Riviere.

    As cloud computing begins to mature, managing the opportunities and security challenges becomes crucial to business development.
    Cloud Security Alliance guidance in its third edition seeks to establish a stable, secure baseline for cloud operations.

    Cloud Security Alliance is :
    Global, not-for-profit organization
    Over 23,000 individual members, 100 corporate members, 50 chapters

    Corporate members : Google, Ebay, AT&T, CA, HP, Hitachi, Microsoft, PGP, Novell, RSA, Symantec, Thales etc...

  • This hacker tooltalk from the Fujitsu Edmonton Security Lab explores the Kismet open source Wi-Fi analysis tool. Learn how to set up a low cost Wi-Fi hacker lab, sniff unencrypted Wi-Fi packets without detection, and even crack WEP keys with Kismet.

  • The SSL / TLS protocol is arguably the most important encryption protocol in use today - protecting everything from our Facebook session to our online banking transactions. This brief presentation from the Fujitsu Edmonton Security lab explores why the SSL protocol is designed the way it is, provides some advise for users and developers, and finishes with a lesson in security architecture using card magic.

  • The new system, which employs electronic card holders equipped with e-paper and Fujitsu's proprietary wireless communications technologies, guides patients to examination rooms or diagnostic testing rooms and is connected to an electronic medical record system. This enables detailed guidance information to be delivered to the electronic card holder of individual patients during their visit, from check-in and calling patients when the doctor is ready to see them, through to payment.

  • Fujitsu washable tag is highly durable and flexible UHF RFID tag.

  • Fujitsu provides a highly reliable biometric authentication system based on palm vein pattern recognition technology. PalmSecure™ features industry-leading authentication accuracy with extremely low false rates, and the non-intrusive and contactless reader device provides ease of use with virtually no physiological restriction for all users

  • Digital Media introduces a smarter, more dynamic way of advertising to customers or communicating with staff Leveraging Fujitsu's TELentice™ system, a proven, robust technology, they enable you to easily schedule and send any combination of video, animation, text, audio and visuals directly to PCs, plasma screens, LCD screens, mobile phones, PDAs, Point-of-Sale displays, kiosks, ATMs or websites. Digital Media Solutions are already being used in Australia and around the world by many different organisations to distribute video announcements, advertisements, promotions, news, educational material and information.

  • Sales Battle Card
    Description of Fujitsu Global Cloud Platform IaaS offering and guidelines.