Tài liệu miễn phí Công Nghệ Thông Tin

Download Tài liệu học tập miễn phí Công Nghệ Thông Tin:Tin học văn phòng, Đồ họa - Thiết kế - Flash, Quản trị Web, Cơ sở dữ liệu, Quản trị mạng, Kỹ thuật lập trình, Hệ điều hành, Phần cứng, An ninh - Bảo mật, Chứng chỉ quốc tế, Thủ thuật máy tính, Điện - Điện tử, Kinh tế học, Hoá học, Xã hội học, Môi trường

Cisco Catalyst LAN Switching

This book covers switching from the basics to advanced features, such as multilayer switching, as they pertain to Cisco's Catalyst products. Because of the rapidly changing Catalyst product line, I was unable to include all the latest products. However, I am sure that this is one of the most up-to-date reference materials available.

8/29/2018 4:28:30 PM +00:00

crack-boson

tài liệu công nghệ thông tin bằng tiếng china

8/29/2018 4:28:30 PM +00:00

Delegate Or Suffocate

Management is delegation. Either learn to delegate or you will be buried in work that others could, and should, be doing. ‘Managing’ is the alternative to doing something yourself. Management responsibility is the del- egation of tasks to others, and the control of outcomes. If you could get everything done your- self, there would be no need for staff. If you cannot do everything yourself, there needs to be delegation. If there needs to be delegation, then someone must manage the assignments....

8/29/2018 4:28:29 PM +00:00

White Papers_Chapin_CCNAvsICND_vGK

This document is intended to help students determine whether or not they are ready to take our CCNA Boot Camp.Whether they are ready to start the CCNA curriculum or need a basic network fundamentals foundation first, this white paper can help them determine which path is right and how to begin each. Since students have varying degrees of knowledge, this paper is only intended as a “knowledge check” as to what additional training may be needed in order to attend our ICND1, ICND2, or CCNA Boot Camp. This document is not intended to be used as a final judgment of the student’s abilities or knowledge,...

8/29/2018 4:28:29 PM +00:00

An ITIL-Based Approach to Building Effective Storage Capacity Management in Support of ILM

Understanding the current state of your storage infrastructure—what capacity you have, where it is located, who is using it, who is paying for it, how efficiently it is being used, and how well it is meeting SLAs—is fundamental to intelligently planning, provisioning, and managing storage. Buying and deploying storage as it is often done on a per-project basis— based on loose estimates of immediate and future required capacity, application requirements, and response times—typically results in over-purchasing of hardware and poor allocation of resources. These are costlymistakes, with less than desired operational efficiencies, including the risk of outages when storage is simply unavailable....

8/29/2018 4:28:29 PM +00:00

Riskand Controls Management

In a 2004 survey of 200 IT professionals from 14 countries in the Americas, Asia/Pacific and Europe, the IT Governance Institute (ITGI) found that in 80% of organizations, IT management is solely responsible for defining and addressing IT risk impact. This widespread lack of involvement by business unit managers demon- strates a consistent—and alarming—gap in mapping technology risk to the business. Additionally, this gap als shows that most organizations have inadequate IT risk assessment processes across their enterprises. After all, the consumers themselves—those people that require and use technology services—must share ownership of business-related IT risks with IT management and executive management....

8/29/2018 4:28:29 PM +00:00

10 steps_whitepaper

In an economic climate of slow and cautious growth, IT is under intense pressure to manage costs and ensure that spending is well aligned with business drivers. Essentially, IT is being asked to run itself as a business — allocating resources where they will generate the most value while minimizing resources from nonproductive areas.

8/29/2018 4:28:29 PM +00:00

Got To Have Meeting

A meeting will not be successful unless someone has put some effort into its planning. Most meetings are undermanaged. If any other business activity were as poorly managed as the average meeting, those responsible would have their careers seriously abbreviated. The effectiveness, productivity, and ultimate success of a meeting is directly related to the amount of planning. Someone must take management responsibility seriously. This paper introduces the four stages of meeting management: planning, preparation, process management, and follow-up. It will explain deficiencies that can result during each stage and how to ensure each stage is effective....

8/29/2018 4:28:29 PM +00:00

IOS_Access Control Lists Made Easy

It is assumed that different readers will have different levels of experience with Access Control Lists (ACLs). Some will have no experience. Others will have dabbled with ACLs in lab envi- ronments. Still others will have extensive real-world experience with the implementation of ACLs. The goal of this white paper is to be interesting to readers with any level of ACL experi- ence. The ACL novice should gain an appreciation and understanding of what goes into the definition of an ACL. And hopefully the ACL expert can also gain an insight or two from the material....

8/29/2018 4:28:29 PM +00:00

Sarbanes_Oxley

Sarbanes-Oxley: Section 404 There are many elements to the SOX legislation, but Section 404: Management Assessment of Internal Controls is the part that addresses the internal control over financial reporting, where IAM’s related IT controls need to be carefully considered. Section 404 is creating a challenge for management and is one area where budget for addressing control issues is typically being directed.

8/29/2018 4:28:29 PM +00:00

2008_Salary Report

The IT profession has experienced dramatic changes within the past 10 years and the pace is not slowing. Just within the past year, we have seen: • Vista, a new OS from Microsoft • Leopard, a new OS from Apple • A new certification program from Cisco • A new certification program from Microsoft • A record year for data security breaches • An increase in the importance of balancing IT and business skills

8/29/2018 4:28:29 PM +00:00

Performance Appraisals

Performance Appraisals. Two words that can make the hair stand on end for both employees and managers. Poorly done, performance appraisals can leave you with underperformers who lack the direc- tion to change their behavior, good performers who feel unrecognized for their work, and, worse yet, problem employees who should be dismissed, but a lack of appropriate documenta- tion prevents this.

8/29/2018 4:28:29 PM +00:00

White Paper_Rogue AP2

Today, wireless networking is a reality from which IT managers cannot escape. Regardless of the size of an organization, where it is located, or what vertical market it serves, network users want it. No longer is wireless networking a fringe technology – it’s mainstream and it continues to expand at stellar growth rates within the enterprise marketplace.

8/29/2018 4:28:29 PM +00:00

Project Management Network Diagram

Fully understanding the Project Management Institute’s (PMI ) approach to project management can be diffi- cult. This is not because of the complexity of the material. The difficulty arises from having a body of knowl- edge that is structured for referencing, not learning. PMI divides the tasks associated with project management into 44 processes. There are also 44 different man- agement activities that must be completed, in a specific order .

8/29/2018 4:28:29 PM +00:00

An Introduction to PMI’s Project Management Life Cycle

This paper provides a review of the steps and stages associated with project management according to the Project Management Institute® (PMI). It is a primer for anyone new to the Project Management Body of Knowledge® (PMBOK®) and who is preparing to take the PMP exam. In order to understand how the Project Management Institute (PMI) recommends that projects be run it is nec- essary to understand the project management life cycle. The project management life cycle is the framework around which project management activities are structured. It is a key concept in formal project management according to PMI....

8/29/2018 4:28:29 PM +00:00

10 Tips for Creating Your Web Site

When looking for ways to build of your web site, even minor steps can make a huge difference. The most helpful information and best content will have little impact without simple protocols that make your Web site easier to use and more visually appealing. This paper focuses on 10 tips you can employ to ensure your web site is effec- tive from the day it goes live.

8/29/2018 4:28:29 PM +00:00

An Overview RHEL4

The Red Hat Enterprise Linux family has been designed to cover the full spectrum of corporate operating environments in a simple and consistent manner. The family is comprised of four products, two designed for server systems, two designed for client systems. There is a high level of commonality across the products, thereby ensuring that application support, user environments, and management tools are consistent. The products are primarily differentiated by the level of system architecture support, system size, and service offerings....

8/29/2018 4:28:29 PM +00:00

Finding Solutions by Being Aware of the

Now, just having a reactive mindset is not, in itself, a bad thing. For instance, if we don’t react immediately to putting our hand on a stove burner that has been turned on, we are going to get burnt! We use this reactive mindset in many areas of life. A machine breaks down so we buy a new machine. Or sales drop so we launch a new ad campaign. This is called event-driven behavior, which in itself is not a bad thing.

8/29/2018 4:28:29 PM +00:00

White Papers_AnalyticalBias

People are not naturally good decision makers.We tend to do superficial analyses of the choices available, and then make a quick decision based on personal biases and false assumptions. Not surprisingly, the results are poor-quality decisions. But what is a good decision? How do we know when we are making high-quality decisions with foresight rather than in hindsight? What are the quality standards?

8/29/2018 4:28:29 PM +00:00

Expert Reference Series-Benchmarksprove

This paper describes how database benchmarks demonstrate the performance of Red Hat Enterprise Linux AS and Oracle9i Database running on HP ProLiant hardware. Combined with the compelling Total Cost of Ownership model presented by this software and hardware combination, the paper shows why solutions such as this are rapidly replacing proprietary RISC/Unix and Microsoft Windows solutions.

8/29/2018 4:28:29 PM +00:00

White Papers_Ball_ITIL_v2

Information Technology Infrastructure Library (ITIL) has been around for 20 years, but interest within the United States has only increased in the last five years. ITIL is becoming the next big thing in Information Technology. It is the new industry buzz-word, the new certification, the new conference, and the new idea that the IT world feels it needs. This paper will describe the origin of ITIL, who controls the ITIL contents, who are the biggest users of ITIL, and why you should care about it. Throughout this paper, it will be important for you to remember that ITIL describes a framework of processes for the...

8/29/2018 4:28:29 PM +00:00

Expert Reference Series - Migrating_to_RHE

This whitepaper describes the features and benefits of the Red Hat Enterprise Linux product family. It briefly outlines factors that need to be considered when planning a migration from a consumer Red Hat Linux release, such as 8.0 or 7.1, to an Red Hat Enterprise Linux family product. It also discusses some of the issues associated with migrating applications from proprietary Unix, Microsoft Windows, and other Red Hat operating system environments.

8/29/2018 4:28:29 PM +00:00

Alternate Data Streams – What’s Hiding in Your Windows NTFS?

Hackers and malware authors have a strong motivation to keep you from finding their malicious software on your system. If you find it, you can delete it. If you delete it, the malware author doesn’t make money—yes, this is a for-profit business. Panda software, a respected anti-virus and anti-malware vendor, reports that from January – March of 2006, 70% of the malware released on the Internet was trying to make money for the authors in one way or another. For additional information on that report, visit http://www.pandasoftware.com/about_panda/press_room/Quarterly+PandaLabs+Report.htm....

8/29/2018 4:28:29 PM +00:00

PMP Exam Themes – the Perspective You Need To Develop To Be Prepared

However, do not let your experience override one of the underlying assumptions inherent in PMP exam questions. As far as the PMI and its exam are concerned, PMs should have, and therefore do have, ultimate authority for a project. In situational exam questions, it is assumed that the PM has the authority to do the right thing in every situation. This is a far cry from the reality that most people experience.

8/29/2018 4:28:29 PM +00:00

Expert Reference Series-RHL_to_RHEL

In recent years, Linux has been validated as an enterprise-worthy operating system, capable of managing the robust components of major production environments. IT professionals acknowledging the cost savings, scalability, and stability of Linux are deploying open source technologies at every opportunity. Most IT professionals are familiar with the Red Hat Linux retail product line and have been using Linux systems in business environments for some time. This paper outlines the Red Hat Enterprise Linux family of products and explains Red Hat's goal to become the complete open source technology provider. ...

8/29/2018 4:28:29 PM +00:00

Choose Routing Protocol

Choosing an IP routing protocol is an important step. The right protocol can make your routing operate efficiently, and the wrong one can make your life difficult. Each protocol has its own pros and cons, and works better in some situations than others. In this paper, we explore the strengths and weakness of RIP, EIGRP, OSPF, and IS-IS, and discuss when it is appropriate to use each. We will evaluate each protocol in terms of five criteria: • Convergence speed • Ease of use • Network topology required • Vendor support • IPv6 support...

8/29/2018 4:28:29 PM +00:00

White Papers_BestBothWorlds

Jamie looks for ways to reduce costs and improve efficiency in his business. His staff uses Microsoft operating systems exclusively, but he is tempted to move them onto Linux platforms. In his environment he can save tens of thousands of dollars in licensing fees. Plus he believes his current hardware will support Linux, whereas the next MS upgrade will cost him memory and cpu upgrades to meet necessary response times. At the same time, he fears everything he saves in bottom-line dollars will be lost in productivity costs if Linux-based applications don’t perform as well as the staff’s current programs....

8/29/2018 4:28:29 PM +00:00

White Papers_Bulleit_Conflict

Successful managers can effectively manage conflict. This ability is considered a core competency and is required of managers who want to grow and advance. Unfortunately, it is also one of the most difficult skills a manager can develop. The objective of this white paper is to illustrate team conflict symptoms and causes; to determine how to address team conflict using specific tools, skills, and processes; and to improve the ability of managers to build teams that can deal effectively with both healthy and unhealthy conflict....

8/29/2018 4:28:29 PM +00:00

White Papers_CA_BusServiceMgmt

Business activities and profitability increasingly depend on technology, challenging IT to optimize services based on business priorities. The most effective way to deliver business-optimized service is to adopt a process-driven, holistic approach to IT operations, shifting the focus from technology to important services, and measuring success from the service consumer’s perspective.

8/29/2018 4:28:29 PM +00:00

White Papers_Chapin_CCENTReview_d2

CCENT has been created to address the need for providing networking professionals with a solid practical understanding of modern TCP/IP networks built with Cisco hardware, and will certify practical skills required for entry-level network support positions. This certification will serve as the base of Cisco's certification pyramid. It is similar in nature to CompTIA's Network+ Certification and represents a tangible first step in earning your CCNA certification. This document is intended to help students gain an understanding of the basic network fundamentals prior to attending our ICND1 – Interconnecting Cisco Network Devices 1 course (and exam 640-822 ICND1) or our CCNA Boot Camp. This review is...

8/29/2018 4:28:29 PM +00:00