GogoTraining IT Training Podcasts show

GogoTraining IT Training Podcasts

Summary: GogoTraining.com

Podcasts:

 What Is Programming? | File Type: audio/mpeg | Duration: Unknown

Join Mary Abdill in this radio show, as she explores some of the different types of computer programs, also known as programs. Her discussion will aso talk a little about what a programmer actually does.

 Perl FAQ ( Frequently Asked Questions) | File Type: audio/mpeg | Duration: Unknown

Join Tom Vaughan’s discussion on the overview of the Perl FAQs 1 through 4. Many questions about Perl have been asked and answered in the FAQs. It would be advantageous to skim the FAQs before exerting undue exertion when trying to solve a Perl issue.

 Drowning In Data That’s Voluminous And Ambiguous? – Use Crystal Reports! | File Type: audio/mpeg | Duration: Unknown

In this radio show, host Philip Wiest explains Crystal Reports as a reporting tool for the 21st Century and the need that employers and decision makers have for reports that summarize and clarify their large warehouses of data – data that is Voluminous and Ambiguous.

 Inheritance In Object Oriented Programming | File Type: audio/mpeg | Duration: Unknown

In object oriented programming we can inherit the public method of one class into another class, which is called inheritance. This helps to avoid writing the same code again. In inheritance there are two main classes: Base class, and Derived class. Derived class inherits the public functions of a base class.

 The Analyze Phase Of Six Sigma | File Type: audio/mpeg | Duration: Unknown

In this radio show, Shelia M. Harden provides an in-depth overview of the elements of the Analyze Phase in Six Sigma.

 Bridging Hibernate And Struts | File Type: audio/mpeg | Duration: Unknown

Hibernate and Struts implement the model and view layers, respectively, of the popular Model-View-Controller (MVC) architectural model. But how do you seamlessly bring information from Hibernate into Struts, and vice versa? Join Mike Simpson as he emulsifies these two popular open-source products with pleasing results on "Bridging Hibernate and Struts”.

 Google Chrome OS | File Type: audio/mpeg | Duration: Unknown

In this radio show, Matthew Trachtenberg introduces Chrome OS to the listener and covers the basics of what it is and where it fits into the computing world. He covers the release timeline and discusses the upcoming “Tablet wars” that are shaping up for later this year. You will also have the opportunity to participate in the next show by giving your comments that will be incorporated into an upcoming radio show.

 Linux Network Servers | File Type: audio/mpeg | Duration: Unknown

In this radio show, James Lee discusses different Linux network servers including Apache httpd, sendmail, bind and samba.

 Encryption Part Two | File Type: audio/mpeg | Duration: Unknown

Join Michael Statia as he continues his discussion on the basics of symmetric encryption. This radio show includes how symmetric encryption functions and its strengths and weaknesses.

 Physical Security | File Type: audio/mpeg | Duration: Unknown

Join Michael Statia’s discussion on the issues revolving around physical security and what can be done to strengthen physical security.

 Security Building Blocks | File Type: audio/mpeg | Duration: Unknown

This radio show discusses the basic building blocks used to build a secure organization. Join Michael Statia’s explanation of Least Privilege, Mandatory Vacation and Job Rotation.

 Encryption Part Five | File Type: audio/mpeg | Duration: Unknown

Join Michael Statia in the conclusion of his five part series on encryption. This radio show will discuss the basics of hybrid cryptosystems and will examine how different cryptographic systems can be brought together to form a powerful system. SSL and digital signatures of hybrid cryptosystems will also be discussed.

 Encryption Part Four | File Type: audio/mpeg | Duration: Unknown

Listen to Michael Statia’s discussion on the basics of hashing in the area of encryption. In this radio show he will also discuss how hashing is used to guard the integrity of information.

 Encryption Part One | File Type: audio/mpeg | Duration: Unknown

In this radio show, Michael Statia discusses the basics of encryption including why encryption is important and how it is used. He includes a brief history of encryption and some examples of it in use.

 Encryption Part Three | File Type: audio/mpeg | Duration: Unknown

The basics of asymmetric encryption are discussed in part three of the encryption radio show series. Michael Statia’s discussion includes the strengths and weaknesses of asymmetric encryption and how it functions.

Comments

Login or signup comment.