![GogoTraining IT Training Podcasts show](/assets/missing_medium.png)
GogoTraining IT Training Podcasts
Summary: GogoTraining.com
Podcasts:
Understand how the 20 planning process help develop the project management plan and its subsidiary plans.
Language Integrated Query, or LINQ, is an important Microsoft .NET data access technology that brings uniform syntax and universal data access to the world of managed language data query. In this topic, we review the main concepts behind Microsoft's LINQ technology.
There are several fundamental reasons why Linux doesn't, and indeed can't, exhibit deterministic, real-time behavior. Nevertheless, a lot of work has gone into improving the latency and determinism of the kernel to the point that today, you can get fairly decent performance for all but the most demanding applications.
Have you been confused as to which comes first in the IT Service Management world? How do ITSM and Business Services connect? What comes first? This show explains the differences and where to start when looking at enhancing IT Service Management in your organization.
Microsoft Silverlight is a powerful web application development framework for developing rich media and graphical user interfaces within the web browser. It brings managed programming to most browsers, including Internet Explorer, Firefox, Safari, and Opera. In this topic, we explore how to start making use of Microsoft's Silverlight technology within ASP.NET.
Just what is this open source phenomenon anyway? Is the software really free? Well, yes and no. It depends on what you mean by "free." This program explores the implications of open source in terms of what you get from it and what your obligations are in return.
In Software Development Life Cycle (SDLC), we have the steps of 1. Collecting Requirements 2. Analysis 3. Design 4. Implementation 5. Maintenance. Unified Modeling Language (UML) helps to create the blueprint of software. It provides diagrammatic representation of Use case diagram, Conceptual diagram, Interaction diagram, and Class diagram. Using Class diagram of UML the actual implementation can be done.
So you know you want to implement ITSM - but how do you start? This show discusses the need to engage folks to move forward and discusses effective strategies for brainstorming and Stakeholder Engagement methods. After all, IT Service Management has an element of 'what's in it for me' that needs to be successfully articulated to optimize any implementation.
AJAX is an acronym that stands for Asynchronous JavaScript and XML. It is not the name of any specific technology. Rather, it refers to a general approach to web site development that is centered on improving the user’s web browser experience. In this topic, we discuss the concepts and technologies behind Microsoft's AJAX implementation, which is named ASP.NET AJAX.
Learn about conflict management tools and techniques that are commonly used for managing project teams
Entity Relationship (ER) model is used in database design. Designing is the most important step in database development. If there are any flaws in the design, there will be flaws in the implementation, which is expensive to fix. ER model collect the Entity, Attribute and Relationship from given requirements to draw diagram. This design/diagram can easily be mapped to tables for implementation using any DBMS software.
How many of us have ever found ourselves in the situation where we are not sure what path to take next in implementing IT Asset Management and we have no idea what to watch for to get us on the ‘right’ path? This discussion focuses on how we can move from being an Alice in the scenario described by the Cheshire Cat of having paths that lead ‘somewhere’ to more of a Dorothy on a path which actually gets to the Emerald City. Not that ITAM will lead us to an Emerald City, but these key points will help us to navigate some common risks in implementing ITAM while we have some fun along the way in a metamorphosis of sorts between fictional characters.
Learn about the inputs, tools, techniques, and outputs for developing and building project teams.
In public key cryptosystem two keys are used for authentication. There are three different types of application, encryption/decryption, digital signatures and key exchange. In encryption/decryption the sender encrypts the message using a public key and the receiver decrypts it using a private key. In digital signature the sender sends the message with a signature which is been generated using the private key of the sender. Two parties cooperate to generate a common key in the key exchange method. Two widely used algorithms for public key cryptosystem are RSA and Diffie-Hellman.
Learn what project management methodologies and techniques are commonly used for managing project teams.