Expert reference series of white papers

Xem 1-13 trên 13 kết quả Expert reference series of white papers
  • This document is intended to help students determine whether or not they are ready to take our CCNA Boot Camp.Whether they are ready to start the CCNA curriculum or need a basic network fundamentals foundation first, this white paper can help them determine which path is right and how to begin each. Since students have varying degrees of knowledge, this paper is only intended as a “knowledge check” as to what additional training may be needed in order to attend our ICND1, ICND2, or CCNA Boot Camp.

    pdf13p duypha 06-08-2009 82 23   Download

  • Understanding the current state of your storage infrastructure—what capacity you have, where it is located, who is using it, who is paying for it, how efficiently it is being used, and how well it is meeting SLAs—is fundamental to intelligently planning, provisioning, and managing storage. Buying and deploying storage as it is often done on a per-project basis— based on loose estimates of immediate and future required capacity, application requirements, and response times—typically results in over-purchasing of hardware and poor allocation of resources.

    pdf1p minhtuan 06-08-2009 124 50   Download

  • It is assumed that different readers will have different levels of experience with Access Control Lists (ACLs). Some will have no experience. Others will have dabbled with ACLs in lab envi- ronments. Still others will have extensive real-world experience with the implementation of ACLs. The goal of this white paper is to be interesting to readers with any level of ACL experi- ence. The ACL novice should gain an appreciation and understanding of what goes into the definition of an ACL. And hopefully the ACL expert can also gain an insight or two from the material....

    pdf15p minhtuan 06-08-2009 117 33   Download

  • Today, wireless networking is a reality from which IT managers cannot escape. Regardless of the size of an organization, where it is located, or what vertical market it serves, network users want it. No longer is wireless networking a fringe technology – it’s mainstream and it continues to expand at stellar growth rates within the enterprise marketplace.

    pdf10p duypha 06-08-2009 52 3   Download

  • This white paper provides an outline of how to judge the quality of decisions by analyzing how effectively the risks associated with various options have been analyzed.We begin with a definition for quality control in decision making. This definition is then related to the four steps of the decision making process and finally to the three types of error (risk) that occur in each of the four steps.

    pdf9p thuxuan 06-08-2009 50 2   Download

  • Choosing an IP routing protocol is an important step. The right protocol can make your routing operate efficiently, and the wrong one can make your life difficult. Each protocol has its own pros and cons, and works better in some situations than others. In this paper, we explore the strengths and weakness of RIP, EIGRP, OSPF, and IS-IS, and discuss when it is appropriate to use each. We will evaluate each protocol in terms of five criteria: • Convergence speed • Ease of use • Network topology required • Vendor support • IPv6 support...

    pdf21p phongthinh 06-08-2009 142 43   Download

  • Performance Appraisals. Two words that can make the hair stand on end for both employees and managers. Poorly done, performance appraisals can leave you with underperformers who lack the direc- tion to change their behavior, good performers who feel unrecognized for their work, and, worse yet, problem employees who should be dismissed, but a lack of appropriate documenta- tion prevents this.

    pdf9p minhtuan 06-08-2009 108 33   Download

  • In a 2004 survey of 200 IT professionals from 14 countries in the Americas, Asia/Pacific and Europe, the IT Governance Institute (ITGI) found that in 80% of organizations, IT management is solely responsible for defining and addressing IT risk impact. This widespread lack of involvement by business unit managers demon- strates a consistent—and alarming—gap in mapping technology risk to the business. Additionally, this gap als shows that most organizations have inadequate IT risk assessment processes across their enterprises.

    pdf9p duypha 06-08-2009 98 22   Download

  • A meeting will not be successful unless someone has put some effort into its planning. Most meetings are undermanaged. If any other business activity were as poorly managed as the average meeting, those responsible would have their careers seriously abbreviated. The effectiveness, productivity, and ultimate success of a meeting is directly related to the amount of planning. Someone must take management responsibility seriously. This paper introduces the four stages of meeting management: planning, preparation, process management, and follow-up.

    pdf17p minhtuan 06-08-2009 70 13   Download

  • In the maze of wireless networking developments, the one factor often overlooked is the promised throughput capabilities versus the actual bandwidth that is available. Picking up an 802.11g wireless access point and wireless adaptor, you probably expect that you will be getting a bandwidth availability of 54mb-per-second (mbps). Oops. Don’t get too upset when you find out that the actual bandwidth you get is substantially lower. In this paper you will learn why the bandwidth you expect disappears into thin air....

    pdf8p duypha 06-08-2009 56 13   Download

  • When looking for ways to build of your web site, even minor steps can make a huge difference. The most helpful information and best content will have little impact without simple protocols that make your Web site easier to use and more visually appealing. This paper focuses on 10 tips you can employ to ensure your web site is effec- tive from the day it goes live.

    pdf8p duypha 06-08-2009 48 9   Download

  • In an economic climate of slow and cautious growth, IT is under intense pressure to manage costs and ensure that spending is well aligned with business drivers. Essentially, IT is being asked to run itself as a business — allocating resources where they will generate the most value while minimizing resources from nonproductive areas.

    pdf15p phongthinh 06-08-2009 60 8   Download

  • Management is delegation. Either learn to delegate or you will be buried in work that others could, and should, be doing. ‘Managing’ is the alternative to doing something yourself. Management responsibility is the del- egation of tasks to others, and the control of outcomes. If you could get everything done your- self, there would be no need for staff. If you cannot do everything yourself, there needs to be delegation. If there needs to be delegation, then someone must manage the assignments....

    pdf10p phongthinh 06-08-2009 70 6   Download

Đồng bộ tài khoản