For Training Seekers

Java
  • Enterprise Foundations
  • Modeling Components with JavaBeans
  • Enterprise Data and JDBC
  • Network and Web Communications
  • CORBA, RMI, and DCOM Communications
  • Naming, Directory, Trading, and Activation Services
  • Transaction and Messaging services
  • System Assurance and Security
  • Java Security Features
  • Enterprise Web Enabling
  • Java Servlets and JavaServer Pages
  • Enterprise Applications and Enterprise JavaBeans
  • Advanced Enterprise JavaBeans and Application Integration
  • User Interface and Servlet Design
  • Struts and XML/XSL Web Interfaces
  • Controller, Domain and Data Mapping Design.
  • Unit and Functional Testing.
.NET Technologies
  • .NET Enterprise Servers
  • Visual Basic.NET
  • C#
  • .NET Compact Framework
  • Web Services, SOAP, WSE, SOA, UDDI
  • Windows .NET Server
  • Windows CE.NET
  • COM Interop
  • ASP.NET, ADO.NET
  • GDI+ and OpenGL
UNIX system and network administrators
  • Installing UNIX
  • Making file systems
  • Setting up users
  • Configuring a local printer
  • Installing a package
  • Backing up the file system
  • Monitoring system performance
  • Configuring NFS
Linux
Our offerings include:
  • Linux Core Build Fast Track
  • Core Build Design and Certification
  • UNIX to Linux Migrations
  • Workload Migrations
  • SUSE Linux Enterprise Server Management Design & Implementation
  • SUSE Linux Enterprise Server Version Upgrades
  • SUSE Linux Enterprise Desktop Migrations
Technical Training
For SUSE Linux Enterprise Server
  • Take advantage of our SUSE Linux Enterprise Server training
  • Become a Certified Linux Administrator, Professional, or Engineer
For SUSE Linux Enterprise Desktop
  • Take advantage of our SUSE Linux Enterprise Desktop training
  • Become a Certified Linux Desktop Administrator
Sil Additional Training Information
  • View a list of all Novell Training
  • Learn about your training method options
  • Locate a training partner
Sun Solaris Latest patches
Access to the system
  • Limit Root Access
  • If secure shell is being used to access the systems.
  • Limit su capabilities
  • Remote Access files
  • Keep access log
Run level and network services
  • Stop unnecessary services at run levels
  • Stop unnecessary and insecure network services
Ip module
  • Control the IP Behavior
  • To see a list of all parameter for a particular driver
  • To get value of a particular parameter
Sadmind daemon vulnerability
  • Protecting against sadmind vulnerability
  • Completely disable the sadmind
  • Increase the level of security
Root Kit
  • Srload
Red Hat Features

Virtualization on Red Hat Enterprise Linux 5
  • Virtualization is provided in all Server products and is optionally available for Client products
  • Storage and extended server virtualization are provided with Red Hat Enterprise Linux Advanced Platform
  • Red Hat Network supports virtualizized guest operating systems
  • virt-manager, libvirt/virsh management tools
  • Learn more about Red Hat Enterprise Linux 5 Virtualization
Kernel and Performance
  • Based on the Linux 2.6.18 kernel
  • Support for multi-core processors
  • Broad range of new hardware support
  • Updated crash dump capability provided by Kexec/Kdump
  • Support for Intel Network Accelerator Technology (IOAT)
  • Numerous enhancements for large SMP systems
  • Enhanced pipe buffering
  • IPv4/IPv6 fragmentation offload and buffer management
  • Dynamically switchable per-queue I/O schedulers
  • Kernel buffer splice capability for improved I/O buffer operations
Packaging

Transition of previous Red Hat Enterprise Linux AS, ES, WS and Red Hat Desktop offerings with simplified server and client products:
  • View version comparison chart
  • View subscription comparison chart
Servers:
  • Red Hat Enterprise Linux Advanced Platform - formerly known as Red Hat Enterprise Linux AS
  • Red Hat Enterprise Linux - formerly known as Red Hat Enterprise Linux ES
  • View server comparison chart
Desktops:
  • Red Hat Enterprise Linux Desktop - formerly known as Red Hat Desktop
  • Red Hat Enterprise Linux Desktop with Workstation option - formerly known as Red Hat Enterprise Linux WS
  • View desktop comparison chart
Security
  • SELinux enhancements include Multi-Level Security and targeted policies for all services
  • SEtroubleshooter GUI simplifies SELinux management
  • Integrated directory and security capabilities
  • IPSEC enhancements improve security and performance
  • ExecShield enhancements, such as a call frame Canary word, strengthen hacker defenses
  • New Audit features provide powerful new search/reporting and real-time monitoring
Networking & Interoperability
  • Network storage enhancements include Autofs, FS-Cache, and iSCSI support
  • IPv6 support and conformance enhancements
  • Improved Microsoft ® file/print and Active Directory integration
Desktop
  • Desktop enhancements include updated configuration tools, applications, and laptop support
  • Foundational Stateless Linux features (X autoconfigure, NetworkManager, etc.)
  • Improved ACPI support with features such as suspend to disk
  • Smart card login - with PKI/Kerberos authentication
  • Integrated multimedia support
  • Enhanced plug and play hardware support (cameras, printers, scanners, etc.)
  • Network Manager provides automatic wired and wireless network configuration
  • Enhanced graphics using AIGLX/Compiz (with fading, transparency, etc.)
Evelopment Environment
  • Enhanced application development tools including SystemTap profiler and Frysk debugger
  • GCC 4.1 and glibc 2.4 toolchain
Storage
  • Support for root device multipath IO (MPIO) improves availability
  • Single system/guest version of Red Hat Global File System included in the base server product
  • Block device data encryption support
Management
  • Numerous installer improvements make system configuration simpler
  • Yum/Pup-based updater for Red Hat Network
  • Conga cluster and storage management (with Advanced Platform)
IBM Dynamic infrastructure Solutions
  • Asset management
  • Business continuity and resiliency
  • Energy efficiency
  • Information infrastructure
  • Security
  • Service management
  • Virtualization
Flexible sourcing options
  • Cloud computing
  • Managed support services
  • Outsourcing
Resources
  • Dynamic Infrastructure journal
  • Dynamic Infrastructure on Facebook
  • Follow the dynamic infrastructure conversation on Twitter:
  • Dyninfra
  • News
  • Events
  • Webcasts
  • White papers
  • Videos
  • Analyst papers
  • Podcasts
  • RSS feed
IBM products and services support a dynamic infrastructure
  • IBM CloudBurst
  • IBM Smart Business Services (Cloud)
  • IBM Servers
  • IBM Storage
  • IBM Retail Store Solutions
  • IBM Software
  • IBM Services
  • IBM Global Financing
  • IBM Systems Lab Services and Training
Migrate to IBM
  • Reduce IT Costs & Complexity
  • Increase application Performance
Business Analyst
  • Brainstorming
  • JAD (Joint Application Design)
  • Business Data Modeling
  • Entity Relationship Diagrams
  • Use Case Diagrams
  • Work Flow Analysis
  • Activity Diagrams
  • Data Flow Diagrams
  • Decision Tables
  • Structured Testing principles and methods
  • Structured Walkthroughs
  • Black Box requirements-based Testing including Boundary value Analysis
  • System Testing (Regression, volume, stress, usability, performance tests)
  • Mapping Business Analysis tools to project development phases for waterfall and iterative methodologies
  • Object-Oriented tools for the Business Analyst, using UML 2
  • Use case and Class Diagrams
SAP Training
  • SAP ABAP Programming W/EDI/ALE & BAPI
  • SAP FI/CO (Financial Accounting/Controlling)
  • SAP B/W (Business Information Warehouse)
  • SAP MM w/ WM (Material Management with Warehouse Management)
  • SAP SD (Sales and Distribution)
  • SAP CRM (Customer Relationship Management)
  • SAP APO (Advanced Planner Optimizer)
  • SAP Net weaver (XI)
  • SAP Net weaver (Enterprise Portal 6.0)
Data Warehouse
  • Dimensional Data Modeling (Subject Area, Star Schema & Snow Flake).
  • Executive Dashboards.
  • Meta Data Management and Critical Success Factors.
  • INFORMATICA.
  • COGNOS REPORTNET / BUSINESS OBJECTS.
  • Data Mining Primitives and System Architecture.
  • Transformation including Data Cleansing and Standardization.
  • Performance Tuning.
  • Planning, Infrastructure and Platforms in Data Warehouse.
  • DW Database Design (OLAP, MOLAP, ROLAP & HOLAP).
  • Decision Support System (DSS) / Executive Information System (EIS).
  • Analytical Characterization and Class Comparision.
  • Data Mining Algorithms.
  • Predictive / Explanatory / Data Reduction models.
  • Mining Association Rules, Classification and Prediction.
Quality Assurance Functional Testing
  • Test your product against its specifications
  • Installation Testing.
  • Requirement/Use Case based/Black box testing.
  • Failure Injection Testing.
  • User Acceptance Simulation Testing.
  • Regression Testing.
Integration Testing
  • Referential/Data Integrity Testing.
System Testing
  • Load Testing.
  • Performance Testing.
  • Stress Testing.
  • Volume Testing.
  • Integration Testing.
Sample of Testing Tools Utilized
  • Load Runner.
  • JMeter.
  • Quick Test Professional.
  • Win runner.
  • Wily Introscope.
  • Performance Center

For Companies

Read More...

For job seekers

Read More...

For Training Seekers

  • Java
  • .NET Technologies
  • UNIX system and network administrators
  • Linux
  • Technical Training

Read More...