Home > Topics > Information Technology

Information Technology

Articles

Cisco Networking Academy's Introduction to Scaling Networks
This chapter introduces strategies that can be used to systematically design a highly functional network, such as the hierarchical network design model, the Cisco Enterprise Architecture, and appropriate device selections.
Continue reading...
By Cisco Networking AcademyApr 17, 2014
What Will 100 Gbps Broadband Satellite Technology Mean to You?
In planes, trains, ships, and automobiles, the advent of 30-100 Gbps connectivity via satellite will redefine "access." It's not just consumers either, as 50% of enterprise terminals are predicted to use high-capacity satellite platforms by 2020. What does the advent of 100 Gbps over satellite mean to us—and what will it cost? Technical futurist Leo Wrobel explains in this article.
Continue reading...
By Leo Wrobel, David Hartshorn, Sharon WrobelNov 6, 2013
Microsoft Project 2013 and the Project Management Domain
This chapter identifies accepted standards and methodologies that are in use within the field of project management and provides some examples of how they are used with Project.
Continue reading...
By Scott DaleyOct 31, 2013
What's New in System Center 2012 Orchestrator
This chapter from System Center 2012 Orchestrator Unleashed focuses on changes to Orchestrator in System Center 2012. If you have an OIS 6.3 background, reading this chapter can provide a smooth transition to understanding this System Center component. The chapter covers technology changes and discusses how Microsoft’s rebranding affects Orchestrator’s position in System Center. This chapter also provides a brief overview of the history of Orchestrator.
Continue reading...
By Kerrie Meyler, Anders Bengtsson, Marcus Oh, Kurt Van Hoecke, Pete ZergerOct 23, 2013

See More Information Technology Articles

Blogs

John  TraenkenschuhHeartbleed? You're too late.

Traenk offers a friendly reminder that this is shape of things to come...

Continue reading...
By John TraenkenschuhCommentsApril 11, 2014
Topics: The Web/Virtual Worlds/Social Networking,Home & Office Computing,Software Security,General Security and Privacy,Information Technology,Software Development & Management,Sales & Marketing,Programming,Open Source,Web Services,Networking,Network Security,Web Development,Network Administration & Management,Data,General Business,Architecture and Design,Security,Linux/UNIX/Open Source Operating Systems,HTML/CSS,Cloud Computing,Network Design & Architecture,Business & Management
Emily NaveThe IT List: What You Missed This Week on InformIT [4/4/14]
With today's "connected life" running 24/7, we recognize it's hard to keep up with all your favorite websites and tech resources. The IT List is here to help you cut through the noise. Check back each Friday for a quick digest of articles, resources, promotions, and other goodies worth a first or second look on InformIT.

Continue reading...
By Emily NaveCommentsApril 4, 2014
Topics: Home & Office Computing,Information Technology,Software Development & Management,Programming,Open Source,Web Services,Graphics & Web Design,Networking,Engineering,Web Development,Certification,Data,Mobile Application Development & Programming,Security,Hardware,Operating Systems, Server,Process Improvement,Business & Management
Emily NaveMicrosoft Press Products Now Available on InformIT

We are excited to announce Microsoft Press products are now available in the InformIT store, growing the number of valuable and trusted resources for Microsoft users and IT professionals.

Continue reading...
By Emily NaveCommentsApril 3, 2014
Topics: Home & Office Computing,Information Technology,Software Development & Management,Programming,Open Source,Web Services,Graphics & Web Design,Networking,Engineering,Web Development,Certification,Data,Mobile Application Development & Programming,Security,Hardware,Operating Systems, Server,Process Improvement,Business & Management
John  TraenkenschuhSpot the Hacker (Part I)

Traenk wonders aloud at the changing face of Security--and Hacking.

Continue reading...
By John TraenkenschuhCommentsMarch 25, 2014
Topics: Home & Office Computing,Software Security,General Security and Privacy,Information Technology,Information Management,Networking,Network Security,Management & Strategy,Global Business,Security,Business & Management

See More Information Technology Blogs