Home > Topics > Information Technology

Information Technology

Articles

Cisco Networking Academy's Introduction to Scaling Networks
This chapter introduces strategies that can be used to systematically design a highly functional network, such as the hierarchical network design model, the Cisco Enterprise Architecture, and appropriate device selections.
Continue reading...
By Cisco Networking AcademyApr 17, 2014
What Will 100 Gbps Broadband Satellite Technology Mean to You?
In planes, trains, ships, and automobiles, the advent of 30-100 Gbps connectivity via satellite will redefine "access." It's not just consumers either, as 50% of enterprise terminals are predicted to use high-capacity satellite platforms by 2020. What does the advent of 100 Gbps over satellite mean to us—and what will it cost? Technical futurist Leo Wrobel explains in this article.
Continue reading...
By Leo Wrobel, David Hartshorn, Sharon WrobelNov 6, 2013
Microsoft Project 2013 and the Project Management Domain
This chapter identifies accepted standards and methodologies that are in use within the field of project management and provides some examples of how they are used with Project.
Continue reading...
By Scott DaleyOct 31, 2013
What's New in System Center 2012 Orchestrator
This chapter from System Center 2012 Orchestrator Unleashed focuses on changes to Orchestrator in System Center 2012. If you have an OIS 6.3 background, reading this chapter can provide a smooth transition to understanding this System Center component. The chapter covers technology changes and discusses how Microsoft’s rebranding affects Orchestrator’s position in System Center. This chapter also provides a brief overview of the history of Orchestrator.
Continue reading...
By Kerrie Meyler, Anders Bengtsson, Marcus Oh, Kurt Van Hoecke, Pete ZergerOct 23, 2013

See More Information Technology Articles

Blogs

Brad YaleWhy Open Source Matters: Musings from All Things Open 2014

A few months back I wrote a post titled "Why Open Source Matters: Musings from OSCON 2014". The post covered five reasons why Open Source matters. Those reasons were/are:


  1. Code, Glitches and Open Source Security
  2. Open Source Software
  3. GitHub
  4. The Stringent Control of Proprietary Software
  5. The Endless Ability to Test, Play and Alter

While those reasons still ring true, I want to use this space to center in on another topic speaking to why Open Source and OSS matters more than ever: project management and time constraints.

Continue reading...
By Brad YaleCommentsOctober 23, 2014
Topics: Information Technology,Software Development & Management,Python,Programming,Open Source,Ruby/Ruby on Rails,Web Services,Perl,Web Development,Mobile Application Development & Programming,Android,Ajax & JavaScript,PHP,Linux/UNIX/Open Source Operating Systems,HTML5 & Web Standards,Process Improvement,Business & Management
Brad YaleHow the Internet Works: The Deep Web

The Deep Web. The Deepnet. The Invisible Web. The Hidden Web. 

Maybe you have heard of the Deep Web. Maybe you even know how to access the Deep Web. 

Chances are though, you've never heard of the Deep Web and you have no idea how to access it. The Deep Web sounds mysterious, elusive and somewhat dangerous. By all accounts, it is all these things. 

So, what is the deep web? How does the deep web work? How do you access it?

In this installment of "How the Internet Works", we tackle the mysterious Deepnet.   

Continue reading...
By Brad YaleCommentsOctober 21, 2014
Topics: The Web/Virtual Worlds/Social Networking,Home & Office Computing,Access,General Security and Privacy,Information Technology,Web Services,Information Management,Network Security,Data,Security,Business & Management
Brad YaleHow the Internet Works: A Call for Personal Security

It's very easy, after reading "The Snappening" Snapchat security breach news, to determine fault lies with users. It would be very easy and convenient to blame the leak not on the leakers, but on the users who sent sexually explicit materials to friends, lovers and strangers. This conclusion is easy to draw yet, it only skims the surface of the true issue at hand.  

Whatever you think of the materials leaked, the larger issue at play in "The Snappening" is how the public relates to, understands and uses public Internet architectures. If anything, "The Snappening" should serve as a beacon call for greater Internet security practice enlightenment. 

In this version of "How the Internet Works" we cover public Cloud architectures and the need for increased Internet security practices learning.  

Continue reading...
By Brad YaleCommentsOctober 13, 2014
Topics: Software Security,Access,General Security and Privacy,Information Technology,Web Services,Network Security,Data,Security,Cloud Computing
Brad YaleMobile Malware and Fake Apps: Hong Kong, China and The New York Times

For the past week or so, Hong Kong has erupted with peaceful demonstrations advocating for the ousting of the Chinese premiere and the right to peacefully and openly elect his replacement. While the Chinese premiere, Xi Jinping, looks to be going nowhere one thing has become clear - the mobile devices and Internet connections which helped to grow the nightly demonstrations are quietly suffering an inward meta problem - malware, viruses and fake applications.

As mobile platforms become more prominent and are used more robustly to organize, carry out financial transactions and conduct daily personal business, the time has come to address mobile malware and fake applications.

Continue reading...
By Brad YaleCommentsOctober 2, 2014
Topics: Windows Phone,Software Security,General Security and Privacy,Information Technology,Open Source,iOS,Mobile Application Development & Programming,Android,Security,HTML5 & Web Standards

See More Information Technology Blogs