GogoTraining IT Training Podcasts show

GogoTraining IT Training Podcasts

Summary: GogoTraining.com

Podcasts:

 Java 6 Core Packages | File Type: audio/mpeg | Duration: Unknown

Java is a powerful general-purpose programming language that can accomplish many tasks. Java groups its programming power into re-usable units called packages (akin to libraries in other languages.) Join Mike Simpson as he reviews Java 6's “core packages” and details how each of these packages handles some key programming task.

 Object Oriented Programming in Java 6 | File Type: audio/mpeg | Duration: Unknown

Java uses objects – data structures that combine data and behaviors that operate on that data – to represent real-world entities and provide solutions to programming problems. But programming in objects is different from traditional structured programming. Join Mike Simpson as he explains how objects help make your programming life easier on “Object Oriented Programming in Java 6.”

 New Features In Java 6 | File Type: audio/mpeg | Duration: Unknown

Java 6 offers exiting new database, security, management and serviceability improvements. Join Mike Simpson as he takes you on a tour of “New Features in Java 6.”

 Choosing the security certification that is right for you | File Type: audio/mpeg | Duration: Unknown

Description: Mark Edmead will discuss the differences between general and technical based certification to help you select the path that works best for your career goals.

 Vulnerability and Penetration Testing | File Type: audio/mpeg | Duration: Unknown

Description: CISSP trainer Mark Edmead will discuss the importance of vulnerability and penetration testing. The goal is to find your weeknesses before the hackers.

 Introduction to VMware ESX and vCenter-Minimizing unplanned down time | File Type: audio/mpeg | Duration: Unknown

In this radio show, Larry Karnis will be talking about how to deliver high service availability by eliminating or minimizing the causes of unplanned VM down time. Unplanned down time is caused by the failure of a server. By virtualizing workloads, we can minimize or eliminate unplanned VM down time by using VMware High Availability clusters to reassign VMs to new hosts and boot them up - automatically whenever a physical host fails. By employing VMware Fault Tolerence, we can eliminate unplanned down time completely. Fault Tolerence duplicates a running VM in real time. If the host running the Fault Tolerent VM fails, the duplicate FT VM is simply scheduled to run on a secondary ESX server. The cut over completes with no loss in service and no loss of I/Os or data.

 The value of the CISSP certification | File Type: audio/mpeg | Duration: Unknown

How valuable is the CISSP certification? How the CISSP certification can enhance your career? CISSP trainer Mark Edmead will answer these and other questions regarding the value of the CISSP certification in your professional career.

 Do I have the right qualifications to take the CISSP test? | File Type: audio/mpeg | Duration: Unknown

Description: Not everyone can qualify for the CISSP certification. What is required to become certified? CISSP trainer Mark Edmead will detail the qualifications needed to obtain the CISSP certification.

 Do I need to be an expert in ALL of the CISSP CBK? | File Type: audio/mpeg | Duration: Unknown

Description: The CISSP exam covered 10 areas of information security. Do you need to be an expert in all 10 areas? CISSP trainer Mark Edmead will discuss what you need to know in order to pass the CISSP certification test.

 Best Practices Security Information for Routing | File Type: audio/mpeg | Duration: Unknown

Before you enable the routing functions of Routing and Remote Access, you should carefully review your network infrastructure so that you can configure Routing and Remote Access to best meet your needs for security and functionality. Security for Routing and Remote Access can be considered in three parts: securing the server running Routing and Remote Access, securing the network traffic between the server and its clients, and using secure authentication methods. In this broadcast we will be covering best practices security information for routing.

 The Improve Phase Of Six Sigma | File Type: audio/mpeg | Duration: Unknown

This radio show presents an overview of the elements of the Improve Phase of Six Sigma. Join Shelia M. Harden as she provides an in-depth look at this phase.

 Hibernate and EJB3 | File Type: audio/mpeg | Duration: Unknown

Hibernate helps simplify the building of Java EE applications using Enterprise Java Bean (EJB) 3.0 format beans. How does Hibernate and annotations help to create EJB applications? Where do Hibernate and annotations make your development life easier? Join Mike Simpson as he answers these (and other) questions on a tour of "Hibernate and EJB3".

 Difference Between Array And Hash In Ruby | File Type: audio/mpeg | Duration: Unknown

Join Dr. Biswajit Panja as he explains how both array and hash are used to store data in Ruby. For the creation of array, an array name is used and the data is stored. To access the elements of the array, an array name with an index is provided. In hash key -> value is used. For each value a key is provided. The value can be accessed using the key.

 Crystal Reports 2008 Top Six (Not Five!) Tips | File Type: audio/mpeg | Duration: Unknown

In this radio show, host Philip Wiest teaches us his top six time-saving tips for Crystal Reports users.

 Recovery Catalog Advantages | File Type: audio/mpeg | Duration: Unknown

In this radio show Steve Hamilton will discuss the advantages of using Oracles Recovery Catalog. We will touch on the four basic reasons for using the recovery catalog and how it could benefit the day to day operations of the Oracle DBA.

Comments

Login or signup comment.