Filters (0) (reset filters)
Sort by: Date published | Number of comments | Appreciation | Title Ascending | Title Descending | Most popular
Results per page : Page 1 of 9 (45 Result(s))
  • < Prev
  • ...
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • ...
  • Next >
  • Redgate offers a selection of free PDF downloads of some of their books at this address:
    http://www.red-gate.com/community/books/#sqldev
    Any book that has the "Free PDF download" link is available once you enter your name and email on the subsequent page.
    The books are grouped into the following categories:

    • SQL Dev
    • SQL DBA
    • .Net
    • SysAdmin
    • Professional Development
    • Mini Books

  • Le management agile prend son envol en réponse à l'environnement turbulent, complexe et imprévisible. Ce contexte où les changements se succèdent à un rythme effréné, nécessite régulièrement des réactions rapides de la part des organisations.

  • 1) Etat de l'art

    • Le monde du big data

    D'où le big data vient-il ? Combien pèse-t-il dans le monde, en Europe,
    en France ? Comment l'État et les entreprises l'appréhendent-ils ?
    Quelles perspectives ? Qu'est-ce qu'une approche data centric ?
    • Big data et analyse prédictive
    • Comment la veille se remet en question face au big data
    • Big data et intelligence artificielle
    • Quelle normalisation pour le big data ?
    • Développement et perspectives de l'open data en France
    • Petit panorama d'initiatives open data
    • Droit : qu'est-ce qu'une donnée ?
    • Droit : enjeux des données personnelles

     2) Méthode
    • Mise en place de stratégies big data dans les entreprises
    • Les meilleures pratiques big data
    • Comment ouvrir ses données

     3) Outils
    • Les projets de learning centers
    • Le marché du big data et ses acteurs
    • Panorama des acteurs du big data et de la datavisualisation (fiches)

    4) Retours d'Expérience
    •  L'Argus de la presse, BlaBlacar, M6...

  • "DevOps can indeed be a positive influence on ITIL, enabling improvements in various processes across the service lifecycle. A more collaborative DevOps approach adds value in service strategy, by ensuring that operations and development functions are included during the development of overall IT business strategy. A DevOps approach also adds value during service design, by ensuring that design coordination includes active participation from both operations and development—resulting in the potential for designing improved functionality and performance, as well as operational support. During service transition, a DevOps approach facilitates the effectiveness and efficiency of both change management, and the process of release and deployment management. By encouraging greater collaboration between development, operations, and indeed all IT functions, a DevOps approach can facilitate knowledge management as well. During service operation a DevOps approach can help ensure closer collaboration between the service desk and backline support and development teams—resulting in more effective incident and problem management. It also emphasizes the need for applying automation to change management as well as release and deployment management "models—thereby facilitating the frequency of deployments, more consistent delivery of new and changed releases, and improved quality. Continual service improvement (CSI) also benefits from a greater level communication and collaboration between development and operations teams, resulting in a higher level of teamwork, synergy, and creativity. The result is a greater likelihood of identifying improvement opportunities across the lifecycle, many of which will be turned into formal CSI improvement proposals - some of which will be approved and chartered for implementation. The result: higher performance, lower costs, and improved service quality."

  • IBM Websphere Conference
    Conference provides good training about IBM WebSphere Products and it also provides detailed new features that have been introduced in the latest versions and it will be very helpful for me.

  • Deployment instructions for the CMS Lite application

  • Sample User Guide documentation

  • This document does not exist in English.

  • A PowerPoint presentation is a popular tool used by presenters in business and educational settings. Learn how to avoid common mistakes presenters make when using PowerPoint.

  • Inspired from a book by Mary and Tom Poppendieck, this presentation is an adaptation of the Lean Approach based on the Toyota Production System in the IT domain.
    Once the 7 Lean Software Development principles are revisited, 24 imaged viewpoints will provide a different approach to dealing with possible problems encountered in the field of IT.

  • See the Microsoft solution to manage your Private Cloud Infrastructure.

  • In this session we'll take the concepts introduced in Part 1 and go even deeper. We'll provide a technical overview of the new application model and end-user application catalog that delivers this flexible working environment. Learn how best to design and deploy an optimized Configuration Manager 2012 infrastructure as well as some best practices and tools for migrating from SCCM 2007.

  • Are you ready for Microsoft System Center 2012 Configuration Manager? We are excited about our most important release ever for client administrators. Configuration Manager 2012 is user-centric, manages heterogeneous devices and introduces a new way to deploy applications; these capabilities will help you enable the Consumerization of IT, reduce costs, and drive agility for your organization. But there is more...a NEW interface, improved setting management, role-based administration, and infrastructure reduction. Get up to speed on all the key new capabilities of Configuration Manager 2012. We'll also provide a quick overview of Windows Intune, for those looking for a cloud based management for their unmanaged PCs.

  • This event helps one to write proposal content with clarity and impact.
    Content
    The event includes a review of the factors of good business writing in general and proposals in particular. It includes an exercise improving sample text using MS Word tools and a critical review of sections from some real life proposals.

  • This content was suggested by Sempai Team.

    This document will explain you how to use SharePoint to :
    - Efficiently work with other people of the organization. For example, consult calendars to find out when team events take place.

    - Create a personal site (MySite), where you can manage and share information with other users, with a maximum capacity of 20MB

    - Find people, an expertise and data For example, by researching « Resource » on the Intranet, a practitioner having a specific competency or interest can be found.

    - Manage documents and Web content For example, the organization can deploy a process to manage the life expectancy of documents, the users consulting them, the authors of modifications, etc..

    - Host forms integrating with databases For example, to register for this training, a form was filled out in SharePoint.

  • This content was submitted by Amélie Desmarais.

    Microsoft Excel is an electronic spreadsheet that runs on a personal computer. You can use it to organize your data into rows and columns. You can also use it to perform mathematical calculations quickly. This tutorial teaches Microsoft Excel basics. Although knowledge of how to navigate in a Windows environment is helpful, this tutorial was created for the computer novice.

  • This content was submitted by Tuck Goh.

    Virtualization separates applications, desktops, machines, networks, data and services from their physical constraints. Virtualization is an evolving concept, encompassing a broad range of technologies, tools, and methods, and can bring significant operational benefits to organizations that choose to leverage them. As with any evolving technology, however, the risks also continue to evolve and are often less understood than risks associated with more traditional technologies.

    The intent of this Information Supplement is to provide guidance on the use of virtualization in accordance with the Payment Card Industry Data Security Standard (PCI DSS). For the purposes of this paper, all references are made to the PCI DSS version 2.0.

  • This content was submitted by Tuck Goh.

    The PCI DSS is a multifaceted security standard that includes requirements for security management, policies, procedures, network architecture, software design and other critical protective measures. This comprehensive standard is intended to help organizations proactively protect customer account data.

  • If you've ever been nervous about answering business emails, now is the time for you to learn tips and tricks to help you keep that sparkling professional image! Here we'll talk about format, spelling and grammar, and how to keep a perfect tone when responding to clients and those in the workplace.

    If you've never replied to a formal email, or you're just unsure of how you should go about professionally answering emails, let me steer you in the right direction. You'll learn some important tips and tricks for maintaining your professional image, as well as standard protocol for writing formal letters, both which are absolutely necessary for responding to emails.

  • This foundation level course provides participants with an understanding of ControlCenter 6.0 and how it is an integral component of EMC's offering. This course provides an overview of ControlCenter terminology, features, architecture, theory of operations, and management. This includes ControlCenter components, navigation, architecture, and environmental management.

  • This foundation level course provides participants with an understanding of ControlCenter 6.0 and how it is an integral component of EMC's offering. This course provides an overview of ControlCenter terminology, features, architecture, theory of operations, and management. This includes ControlCenter components, navigation, architecture, and environmental management.

  • This specialization level course provides participants with an understanding of the basic implementation and planning for EMC ControlCenter 6.0. Requirements and considerations for installation and upgrade of ControlCenter 6.0 reviewed in detail. This course is an elective component of the ControlCenter curriculum.

  • This foundation level course provides participants with an understanding of Symmetrix based Business Continuity solutions for local replication, and how these solutions are an integral component of EMC's offering. This course provides participants with an understanding of TimeFinder terminology, features, architecture, theory of operations, and management. The course covers TimeFinder/Clone, TimeFinder/Snap, and TimeFinder/Mirror functionality. TimeFinder/Clone Emulation is also presented to support Enginuity 5874 with Solutions Enabler 7.0 environments.

  • This foundation level course provides participants with an introduction to Symmetrix Disaster Recovery Facility (SRDF) products. This course supports the EMC Proven Professional Associate Certification.

  • This course introduces the EMC Symmetrix Management Console (SMC). SMC is a lightweight and functional stand-alone Symmetrix management tool. Students will learn to install the product in a typical environment and use it to monitor and manage Symmetrix arrays. The design goals and architecture of the product will be covered, and some comparisons given to other EMC Symmetrix management tools. A key part of the course includes recorded examples that will demonstrate how to install and administer Symmetrix Management Console, use it to configure the array, and to perform business continuity operations. These demonstrations support and supplement the details described in the presentation.

  • ControlCenter StorageScope Reporting is a specialist level class that uses built-in and customizable features to create advanced reporting solutions in a ControlCenter 6.0 environment. SRM Views and "Top 10" lists provide a quick insight to used and available ports as well as fabric information. Built-in StorageScope reports tell users about details about file system usage specified by host or network file systems discovered by ControlCenter. Advanced reporting scenarios utilize the customizable query building tool to perform a variety of tasks. These tasks include identifying host and array files not accessed within 180 days and identifying allocated host storage not used in a file system or volume group. The query builder also allows users to perform chargeback operations against groups in the ControlCenter Console, as well as monitor, manage, and trend raw array capacities. Finally, custom fields are demonstrated to show group membership for hosts.

  • This course provides participants with the basics about backup to disk in a LAN environment, using NS Series storage systems as the backup destination platform. Students review the underlying characteristics and recommendations, including NS Series optimization using ATA disks.

  • This foundation level course provides participants with an understanding of EMC NetWorker. The course provides an overview of NetWorker terminology, features, architecture, theory of operations, and management. This includes NetWorker components, and backup and recovery functions. The course supports the EMC Proven Professional Associate certification.

  • This foundation level course introduces students to the EMC NetWorker Module solution. The course supports the EMC Proven Professional Associate Backup and Recovery Certification.

  • This course provides an overview of new and enhanced features and functionality introduced with the NetWorker 7.4 release. Prior knowledge of NetWorker 7.3 is a prerequisite as this course only focuses on the differences since the 7.3 release.

  • This foundations level course introduces students to the basic EMC Disk Library (EDL) concepts and terminology, preparing them for further study of installation or implementation procedures. The main functionality of a EMC Disk Library and where it fits within the enterprise is presented. Features, functionality, and hardware/software architecture, up to and including version 3.2 of the emulation code including DL4000 Series is discussed. The course also covers the EMC Disk Libraries with deduplication version 1.2, including DL1500, DL3000. Historic information on older EDL models is given.

  • This course provides participants with the basics about backup to disk in a SAN environment using CX Series storage systems as the backup destination platform. Students will review the underlying characteristics and recommendations, including CLARiiON CX and Symmetrix DMX systems.

  • This course introduces students to the concepts and activities performed when integrating EMC NetWorker with different EMC Backup-to-Disk technologies. It starts with an overview of the backup product, its terms, functionality, and options for Backup-to-Disk environments. The course shows how to integrate the application with both Disk-aware and Tape emulation scenarios utilizing EMC technology (Celerra, CLARiiON, Symmetrix, and EMC Disk Library as backup destination devices).

  • This course provides participants with an introduction to EMC Avamar. It includes an overview of Avamar terminology, features, and components, including Avamar backup and restore functions. The course also reviews Avamar tools for monitoring and maintaining an Avamar system.

  • This course provides participants with an introduction to the EMC Data Protection Advisor product, version 5.0, including positioning, architecture and technical information. The course also covers how data gathering works in DPA.

  • This specialization level course provides a thorough exposure to EMC ControlCenter version 6.0.

  • This video instructor-led course explores EMC NetWorker 7.3 installation, backup, configuration, maintenance, management, and recovery. The course contains lectures, instructor demonstrations, lab demonstrations, and review questions.

  • This document presented at Oracle Open World 2010 by Naoki Izuta shows the extent of Fujitsu's offering in SPARC type servers.

  • Using tips and tools, you will be able to :
    Explain the steps of successful delegation
    Determine the main ways to ensure that the tasks delegated are carried out properly

  • Helpful tips and materials to organise meetings.

  • Learn Office with our self-paced training courses and videos:
    - Excel, Word, PowerPoint, Outlook, SharePoint...