- CCENT and CCNA Certification 2013: Which Exam Should You Take?
- Mar 26, 2013
- If you are considering taking the exams to become certified as a Cisco Certified Entry Networking Technician (CCENT) or Cisco Certified Network Associate (CCNA), this article by Cisco expert Michelle Plumb will help you decide which exams you should take.
|
- CCENT/CCNA Exam Strategies for Success
- Mar 26, 2013
- Planning to take a CCNA or CCENT exam? Anthony Sequeira prepares you as much as possible for your new exam with some tried and true Cisco written certification exam strategies for success.
|
- IPv6 According to ICND1 Version 2
- Mar 26, 2013
- Anthony Sequeira examines many of the key facts that one should know about the next generation of the Internet Protocol suite, IPv6, at the modified CCENT level. This article also serves as a guide for understanding the scope of what is
covered in the new ICND1.
|
- Network Management According to ICND2 Version 2
- Mar 26, 2013
- Anthony Sequeira points out the facts you need to know about networking management technologies that are now part of the CCNA.
|
- What the New CCNA Version 2 Means to Your Career
- Mar 26, 2013
- Cisco networking expert Anthony Sequeira dives into what is covered on the new ICND1v2 and ICND2v2 exams and explains how those required skills will shape your IT career.
|
- What to Expect from Interconnecting Cisco Network Devices 1 (ICND1v2.0)
- Mar 26, 2013
- This article by Cisco expert Michelle Plumb covers the areas that you will learn to start into the world of Cisco networking as they relate to the latest release of the ICND1 exam.
|
- What to Expect from Interconnecting Cisco Network Devices 2 (ICND2v2.0)
- Mar 26, 2013
- To see if achieving a CCNA certification is the right career path for you, check out the topics presented by Cisco expert Michelle Plumb that you will learn in the latest version of the ICND2 exam.
|
- How Mobile Networks Work
- Mar 14, 2013
- This chapter describes how cellular networking works — and how these networks relate to the other wireless networks you employ on a daily basis.
|
- Applied Big Data Analysis in the Real World with MapReduce and Hadoop
- Jan 23, 2013
- In the third article in this series, Java programming expert Steven Haines demonstrates how to build a meaningful Hadoop MapReduce application to analyze hourly website usage from a set of Apache HTTP Server logs.
|
- Building a MapReduce Application with Hadoop
- Jan 16, 2013
- In the second article in this series on Java programming and Hadoop, Java programming expert Steven Haines explains what a MapReduce application is and how to build a simple one.
|
- Big Data Analysis with MapReduce and Hadoop
- Jan 9, 2013
- Steven Haines presents an overview of Hadoop’s architecture and demonstrates, from a high-level, how to build a MapReduce application.
|
- Secure By Design? Techniques and Frameworks You Need to Know for Secure Application Development
- Dec 19, 2012
- What do you know about developing secure robust software? Randy Nash discusses several available techniques and frameworks for secure application development.
|
- A Practical Guide to Advanced Networking: IPv6
- Dec 11, 2012
- This chapter looks at IPv6, the IP addressing system that has been developed to replace IPv4.
|
- How to Contribute to Open Source Projects
- Dec 11, 2012
- As an experienced open source developer, David Chisnall gives an overview of some of the various ways that users can easily help ensure that the projects that they care about are of a high quality.
|
- What Is Bluetooth Low Energy?
- Nov 21, 2012
- Robin Heydon explains what BlueTooth low energy is, as well as relevant device types, design goals, and terminology.
|
- CCNP Security VPN: Advanced Easy VPN Authorization
- Nov 12, 2012
- This chapter enables you to prepare for the deployment of an advanced authorization scheme for your remote users, allowing you to control the level of access granted to them based on such information as their internal department, username, IP address, and so on, using the familiar local group policies that are configured on the ASA device.
|
- Hurricane Sandy and Widespread Telecom Outages: How Poor Disaster Recovery Measures Made the Aftermath Even Worse
- Nov 9, 2012
- In the wake of Hurricane Sandy, Leo Wrobel expalins how the reliability of wireless service in a disaster has become increasingly critical as more Americans ditch their landlines in favor of cell phones.
|
- Best Practices for Deploying Secure Cisco IP Telephony Solutions
- Oct 31, 2012
- Akhil Behl offers a brief discussion of why it's important to secure IP Telephony Networks, how to go about it, and the actual deployment thereof.
|
- CCNP Security Firewall Cert Guide: Configuring ASA Interfaces
-
By
David Hucaby
- Oct 24, 2012
- This chapter covers the following topics from the 642-618 exam objectives: Configuring Physical Interfaces, Configuring VLAN Interfaces, Configuring Interface Security Parameters, Configuring the Interface MTU, and Verifying Interface Operation.
|
- Creating Your Own VPN
- Oct 23, 2012
- Security expert Eric Geier shows you how to set up a VPN to securely access your PC or network when you’re away, and to secure your Internet connection when using Wi-Fi hotspots.
|