Advanced Search

Diversity: Becoming Your Best in a Multi-cultural Setting

Introduction Puzzle:  The Biases We Bring Diversity:  Differences or Perceptions Exercise:  Breaking out of Current Paradigms The Impact of Disparate Treatment Video:  30 minute Blue Eyed Experiment Group Work and Discussion of Video The Impact of Inclusion Group Work:  Story of the Misfit Team Discussion:  When Employees Do Not Feel Part of the Team Misperceptions…

MPLS

Overview of Routing and MPLS Layer 3 Routing Native Hop-by-Hop Network Layer Routing Next Hop Selection Functions Label Switching MPLS Forwarding Paradigm Integration of IP and ATM Advantages of MPLS Forwarding over Conventional Network Layer Forwarding Why MPLS? Label Switch Routers (LSRs) LSR Basics ATM LSRs LSR Routing Operation MPLS Labels MPLS Labels Basics Label…

Leading People to Embrace Change

Part I:  Defining the Impact of Change Sources of project success Human factors at work Impact of organizational change in IT projects Why IT projects provoke such a reaction Resistance to change Why employees resist change Why managers resist change Causes of poor organizational change management What happens when resistance to change is not managed…

IPv4/v6 and Migration

Day 1   IP Networking & IPv4 Introduction Packet Network Concepts OSI Model IETF Model IP Networks in Transition IP Networks In Depth Layer 1:  The Physical Layer Circuits (General Concepts) Electrical Circuits   Optical Circuits WDM SONET/SDH   Layer 2:  The Data Link Layer Local Area Networks Network Access MAN WAN    Layer 3:…

Diversity: Managing in a Multi-cultural Setting

Introduction Puzzle:  The Biases We Bring Diversity:  Differences or Perceptions Exercise:  Breaking out of Current Paradigms The Impact of Disparate Treatment Video:  30 minute Blue Eyed Experiment Group Work and Discussion of Video The Impact of Inclusion Group Work: Story of the Misfit Team Discussion:  When Employees Do Not Feel Part of the Team Misperceptions…

Dealing with Difficult Behavior

Introduction There are no difficult individuals, only difficult behavior Types of and reasons for difficult behavior Case study:  Difficult behavior Exercise:  What we have control over and what we don’t Understanding What Causes Difficult Behavior Inventory:  Diagnosing differences in personalities and approaches to work Communication style and decision making style differences Attitudes toward work:  Recognizing…

MPBN

Technology Overview:  Access Networks Roadmap to 4G GSM/GPRS/EDGE UMTS 3GPP releases 3.9G release (LTE/SAE) Circuit Switched Technology:  Signaling SS7 overview SS7 over ATM SS7 over IP – SIGTRAN The Transport network in Soft Switch Solutions ATM Technology ATM technology overview ATM networking AAL1 AAL2 AAL5 IP over ATM SDH/SONET IP:  Internet Protocol IPv4 packet format…

Cyber Security & Cyber Warfare

Introduction to Cybersecurity Information Security Fundamentals Confidentiality, Integrity, Availability Disclosure, Deception, Disruption, Usurpation Security Policies vs. Mechanisms Trust and Assurance Cyber Systems and Security Systems and Networks; Hardware and Software Protocol vs. Platform Attacks Attack and Exploitation Tools Defensive Tools Critical Infrastructure and Key Resources (CIKR) Industrial Control Systems Supervisory Control and Data Acquisition (SCADA)…

IPv6 Implementation

IPv6 Protocol In Depth with comparison to IPv4 Addressing Address Space Address Allocation Address Lifetime Address Mask Address Prefix Address Resolution Protocol (ARP) Address Scope Address Types Private and Public Addresses Unspecified Address Communications trace Domain Name System (DNS) DNS Discovery DNS Assignment Dynamic Host Configuration Protocol (DHCP) DHCP in a Mobile IP Environment File…

Cyber Space & Cyber Conflict Policy

Introduction to Cyberspace History of Cyberspace Brief History of the Internet Brief History of Internet Policy Societal Reliance on the Internet and Cyber Power Cyberspace as a Warfare Dimension Defining Cyberspace, Control, and Borders Cyber Actors:  Governments, Quasi-governments, Private Entities, Intermediaries Cybercrime and Cybersecurity Discussion of the Threats Defining the Risks Internet Governance History: ARPANET/NSFNET…