Tài liệu miễn phí Công Nghệ Thông Tin
Download Tài liệu học tập miễn phí Công Nghệ Thông Tin:Tin học văn phòng, Đồ họa - Thiết kế - Flash, Quản trị Web, Cơ sở dữ liệu, Quản trị mạng, Kỹ thuật lập trình, Hệ điều hành, Phần cứng, An ninh - Bảo mật, Chứng chỉ quốc tế, Thủ thuật máy tính, Điện - Điện tử, Kinh tế học, Hoá học, Xã hội học, Môi trường
This book covers switching from the basics to advanced features, such as multilayer switching, as
they pertain to Cisco's Catalyst products. Because of the rapidly changing Catalyst product line, I
was unable to include all the latest products. However, I am sure that this is one of the most
up-to-date reference materials available.
8/29/2018 4:28:30 PM +00:00
tài liệu công nghệ thông tin bằng tiếng china
8/29/2018 4:28:30 PM +00:00
Management is delegation. Either learn to delegate or you will be buried in work that others
could, and should, be doing.
‘Managing’ is the alternative to doing something yourself. Management responsibility is the del-
egation of tasks to others, and the control of outcomes. If you could get everything done your-
self, there would be no need for staff. If you cannot do everything yourself, there needs to be
delegation. If there needs to be delegation, then someone must manage the assignments....
8/29/2018 4:28:29 PM +00:00
This document is intended to help students determine whether or not they are ready to take our CCNA Boot
Camp.Whether they are ready to start the CCNA curriculum or need a basic network fundamentals foundation
first, this white paper can help them determine which path is right and how to begin each. Since students
have varying degrees of knowledge, this paper is only intended as a “knowledge check” as to what additional
training may be needed in order to attend our ICND1, ICND2, or CCNA Boot Camp. This document is not
intended to be used as a final judgment of the student’s abilities or knowledge,...
8/29/2018 4:28:29 PM +00:00
Understanding the current state of your storage infrastructure—what capacity you have,
where it is located, who is using it, who is paying for it, how efficiently it is being used, and
how well it is meeting SLAs—is fundamental to intelligently planning, provisioning, and
managing storage. Buying and deploying storage as it is often done on a per-project basis—
based on loose estimates of immediate and future required capacity, application
requirements, and response times—typically results in over-purchasing of hardware and
poor allocation of resources. These are costlymistakes, with less than desired operational
efficiencies, including the risk of outages when storage is simply unavailable....
8/29/2018 4:28:29 PM +00:00
In a 2004 survey of 200 IT professionals from 14
countries in the Americas, Asia/Pacific and Europe, the
IT Governance Institute (ITGI) found that in 80% of
organizations, IT management is solely responsible for
defining and addressing IT risk impact. This widespread
lack of involvement by business unit managers demon-
strates a consistent—and alarming—gap in mapping
technology risk to the business. Additionally, this gap als
shows that most organizations have inadequate IT risk
assessment processes across their enterprises. After all,
the consumers themselves—those people that require
and use technology services—must share ownership
of business-related IT risks with IT management and
executive management....
8/29/2018 4:28:29 PM +00:00
In an economic climate of slow and cautious growth, IT is
under intense pressure to manage costs and ensure that
spending is well aligned with business drivers. Essentially,
IT is being asked to run itself as a business — allocating
resources where they will generate the most value while
minimizing resources from nonproductive areas.
8/29/2018 4:28:29 PM +00:00
A meeting will not be successful unless someone has put some effort into its planning. Most
meetings are undermanaged. If any other business activity were as poorly managed as the
average meeting, those responsible would have their careers seriously abbreviated.
The effectiveness, productivity, and ultimate success of a meeting is directly related to the
amount of planning. Someone must take management responsibility seriously.
This paper introduces the four stages of meeting management: planning, preparation, process
management, and follow-up. It will explain deficiencies that can result during each stage and
how to ensure each stage is effective....
8/29/2018 4:28:29 PM +00:00
It is assumed that different readers will have different levels of experience with Access Control
Lists (ACLs). Some will have no experience. Others will have dabbled with ACLs in lab envi-
ronments. Still others will have extensive real-world experience with the implementation of
ACLs. The goal of this white paper is to be interesting to readers with any level of ACL experi-
ence. The ACL novice should gain an appreciation and understanding of what goes into the
definition of an ACL. And hopefully the ACL expert can also gain an insight or two from the
material....
8/29/2018 4:28:29 PM +00:00
Sarbanes-Oxley: Section 404
There are many elements to the SOX legislation, but
Section 404: Management Assessment of Internal
Controls is the part that addresses the internal control
over financial reporting, where IAM’s related IT controls
need to be carefully considered. Section 404 is creating a
challenge for management and is one area where budget
for addressing control issues is typically being directed.
8/29/2018 4:28:29 PM +00:00
The IT profession has experienced dramatic changes
within the past 10 years and the pace is not slowing.
Just within the past year, we have seen:
• Vista, a new OS from Microsoft
• Leopard, a new OS from Apple
• A new certification program from Cisco
• A new certification program from Microsoft
• A record year for data security breaches
• An increase in the importance of balancing IT
and business skills
8/29/2018 4:28:29 PM +00:00
Performance Appraisals. Two words that can make the hair stand on end for both employees
and managers.
Poorly done, performance appraisals can leave you with underperformers who lack the direc-
tion to change their behavior, good performers who feel unrecognized for their work, and,
worse yet, problem employees who should be dismissed, but a lack of appropriate documenta-
tion prevents this.
8/29/2018 4:28:29 PM +00:00
Today, wireless networking is a reality from which IT managers cannot escape. Regardless of the size of an
organization, where it is located, or what vertical market it serves, network users want it. No longer is
wireless networking a fringe technology – it’s mainstream and it continues to expand at stellar growth rates
within the enterprise marketplace.
8/29/2018 4:28:29 PM +00:00
Fully understanding the Project Management Institute’s (PMI ) approach to project management can be diffi-
cult. This is not because of the complexity of the material. The difficulty arises from having a body of knowl-
edge that is structured for referencing, not learning.
PMI divides the tasks associated with project management into 44 processes. There are also 44 different man-
agement activities that must be completed, in a specific order .
8/29/2018 4:28:29 PM +00:00
This paper provides a review of the steps and stages associated with project management according to the
Project Management Institute® (PMI). It is a primer for anyone new to the Project Management Body of
Knowledge® (PMBOK®) and who is preparing to take the PMP exam.
In order to understand how the Project Management Institute (PMI) recommends that projects be run it is nec-
essary to understand the project management life cycle. The project management life cycle is the framework
around which project management activities are structured. It is a key concept in formal project management
according to PMI....
8/29/2018 4:28:29 PM +00:00
When looking for ways to build of your web site, even minor steps can make a huge difference. The most helpful
information and best content will have little impact without simple protocols that make your Web site easier to
use and more visually appealing. This paper focuses on 10 tips you can employ to ensure your web site is effec-
tive from the day it goes live.
8/29/2018 4:28:29 PM +00:00
The Red Hat Enterprise Linux family has been designed to cover the full
spectrum of corporate operating environments in a simple and consistent
manner. The family is comprised of four products, two designed for server
systems, two designed for client systems. There is a high level of commonality
across the products, thereby ensuring that application support, user
environments, and management tools are consistent. The products are
primarily differentiated by the level of system architecture support, system
size, and service offerings....
8/29/2018 4:28:29 PM +00:00
Now, just having a reactive mindset is not, in itself, a bad thing. For instance, if we don’t react immediately to
putting our hand on a stove burner that has been turned on, we are going to get burnt! We use this reactive
mindset in many areas of life. A machine breaks down so we buy a new machine. Or sales drop so we launch a
new ad campaign. This is called event-driven behavior, which in itself is not a bad thing.
8/29/2018 4:28:29 PM +00:00
People are not naturally good decision makers.We tend to do superficial analyses of the choices available, and
then make a quick decision based on personal biases and false assumptions. Not surprisingly, the results are
poor-quality decisions.
But what is a good decision? How do we know when we are making high-quality decisions with foresight
rather than in hindsight? What are the quality standards?
8/29/2018 4:28:29 PM +00:00
This paper describes how database benchmarks demonstrate the performance
of Red Hat Enterprise Linux AS and Oracle9i Database running on HP ProLiant
hardware. Combined with the compelling Total Cost of Ownership model
presented by this software and hardware combination, the paper shows why
solutions such as this are rapidly replacing proprietary RISC/Unix and Microsoft
Windows solutions.
8/29/2018 4:28:29 PM +00:00
Information Technology Infrastructure Library (ITIL) has been around for 20 years, but interest within the
United States has only increased in the last five years. ITIL is becoming the next big thing in Information
Technology. It is the new industry buzz-word, the new certification, the new conference, and the new idea that
the IT world feels it needs. This paper will describe the origin of ITIL, who controls the ITIL contents, who are
the biggest users of ITIL, and why you should care about it. Throughout this paper, it will be important for you
to remember that ITIL describes a framework of processes for the...
8/29/2018 4:28:29 PM +00:00
This whitepaper describes the features and benefits of the Red Hat Enterprise
Linux product family. It briefly outlines factors that need to be considered when
planning a migration from a consumer Red Hat Linux release, such as 8.0 or
7.1, to an Red Hat Enterprise Linux family product. It also discusses some of
the issues associated with migrating applications from proprietary Unix,
Microsoft Windows, and other Red Hat operating system environments.
8/29/2018 4:28:29 PM +00:00
Hackers and malware authors have a strong motivation to keep you from finding their malicious software on
your system. If you find it, you can delete it. If you delete it, the malware author doesn’t make money—yes,
this is a for-profit business. Panda software, a respected anti-virus and anti-malware vendor, reports that from
January – March of 2006, 70% of the malware released on the Internet was trying to make money for the
authors in one way or another. For additional information on that report, visit
http://www.pandasoftware.com/about_panda/press_room/Quarterly+PandaLabs+Report.htm....
8/29/2018 4:28:29 PM +00:00
However, do not let your experience override one of the underlying assumptions inherent in PMP exam questions.
As far as the PMI and its exam are concerned, PMs should have, and therefore do have, ultimate authority
for a project. In situational exam questions, it is assumed that the PM has the authority to do the right thing
in every situation. This is a far cry from the reality that most people experience.
8/29/2018 4:28:29 PM +00:00
In recent years, Linux has been validated as an enterprise-worthy operating
system, capable of managing the robust components of major production
environments. IT professionals acknowledging the cost savings, scalability, and
stability of Linux are deploying open source technologies at every opportunity.
Most IT professionals are familiar with the Red Hat Linux retail product line and
have been using Linux systems in business environments for some time. This
paper outlines the Red Hat Enterprise Linux family of products and explains Red
Hat's goal to become the complete open source technology provider. ...
8/29/2018 4:28:29 PM +00:00
Choosing an IP routing protocol is an important step. The right protocol can make your routing
operate efficiently, and the wrong one can make your life difficult. Each protocol has its own
pros and cons, and works better in some situations than others. In this paper, we explore the
strengths and weakness of RIP, EIGRP, OSPF, and IS-IS, and discuss when it is appropriate to
use each. We will evaluate each protocol in terms of five criteria:
• Convergence speed
• Ease of use
• Network topology required
• Vendor support
• IPv6 support...
8/29/2018 4:28:29 PM +00:00
Jamie looks for ways to reduce costs and improve efficiency in his business. His staff uses Microsoft operating
systems exclusively, but he is tempted to move them onto Linux platforms. In his environment he can save tens
of thousands of dollars in licensing fees. Plus he believes his current hardware will support Linux, whereas the
next MS upgrade will cost him memory and cpu upgrades to meet necessary response times. At the same time,
he fears everything he saves in bottom-line dollars will be lost in productivity costs if Linux-based applications
don’t perform as well as the staff’s current programs....
8/29/2018 4:28:29 PM +00:00
Successful managers can effectively manage conflict. This ability is considered a core competency and is
required of managers who want to grow and advance. Unfortunately, it is also one of the most difficult skills a
manager can develop.
The objective of this white paper is to illustrate team conflict symptoms and causes; to determine how to
address team conflict using specific tools, skills, and processes; and to improve the ability of managers to build
teams that can deal effectively with both healthy and unhealthy conflict....
8/29/2018 4:28:29 PM +00:00
Business activities and profitability increasingly depend on technology, challenging
IT to optimize services based on business priorities. The most effective way to deliver
business-optimized service is to adopt a process-driven, holistic approach to IT
operations, shifting the focus from technology to important services, and measuring
success from the service consumer’s perspective.
8/29/2018 4:28:29 PM +00:00
CCENT has been created to address the need for providing networking professionals with a solid practical
understanding of modern TCP/IP networks built with Cisco hardware, and will certify practical skills required
for entry-level network support positions.
This certification will serve as the base of Cisco's certification pyramid. It is similar in nature to CompTIA's
Network+ Certification and represents a tangible first step in earning your CCNA certification.
This document is intended to help students gain an understanding of the basic network fundamentals prior to
attending our ICND1 – Interconnecting Cisco Network Devices 1 course (and exam 640-822 ICND1) or our
CCNA Boot Camp. This review is...
8/29/2018 4:28:29 PM +00:00