Home > Topics

Articles

Errin O'ConnorSharePoint 2013 "Bring Your Own Device" (BYOD) Best Practices
As devices continue to be more advanced and major mobile carriers lower and/or offer near unlimited usage, the dividing lines between what is really a “corporate device” versus a “personal device” continue to blur. In a perfect world, users could use one device for both work and play but as we see in the news on a near weekly basis, information security is far from a perfect science .SharePoint expert Errin O’Connor brings insight into the “bring your own device” (BYOD) conundrum that so many organization face on a daily basis.
Continue reading...
By Errin O'ConnorOct 30, 2014
Paul DuvallVideo: Paul Duvall on DevOps and AWS
Paul Duvall, author of DevOps in AWS LiveLessons Video Training, talks about why video is great for learning DevOps, continuous integration, the difference between continuous delivery and continuous deployment, and what's so exciting about The Cloud.
Continue reading...
By Paul DuvallOct 30, 2014
Mark Edward SoperFixing Windows Devices That Can't Start
If you have a windows desktop or tablet that won't start, Mark Edward Soper will help you troubleshoot it, in this excerpt from The PC and Gadget Help Desk: A Do-It-Yourself Guide To Troubleshooting and Repairing. Mark covers BIOS configuration settings, Windows configuration issues, BIOS startup error messages and solutions, and Windows 7 and 8 error recovery and advanced boot options.
Continue reading...
By Mark Edward SoperOct 29, 2014
On the 20th Anniversary of Design Patterns
To celebrate the 20th anniversary of Design Patterns, we asked members of the community to comment on what the book and the patterns movement has meant to them. Here are their answers.
Continue reading...
By InformIT Editorial TeamOct 28, 2014

See More Articles

Blogs

Brad YaleWhy Open Source Matters: Musings from All Things Open 2014

A few months back I wrote a post titled "Why Open Source Matters: Musings from OSCON 2014". The post covered five reasons why Open Source matters. Those reasons were/are:


  1. Code, Glitches and Open Source Security
  2. Open Source Software
  3. GitHub
  4. The Stringent Control of Proprietary Software
  5. The Endless Ability to Test, Play and Alter

While those reasons still ring true, I want to use this space to center in on another topic speaking to why Open Source and OSS matters more than ever: project management and time constraints.

Continue reading...
By Brad YaleCommentsOctober 23, 2014
Topics: Information Technology,Software Development & Management,Python,Programming,Open Source,Ruby/Ruby on Rails,Web Services,Perl,Web Development,Mobile Application Development & Programming,Android,Ajax & JavaScript,PHP,Linux/UNIX/Open Source Operating Systems,HTML5 & Web Standards,Process Improvement,Business & Management
John  TraenkenschuhRisk Management Versus Vulnerability Analysis

Vulnerability Analysis is deceptively easy. Security Red Teaming requires more than that.

Continue reading...
By John TraenkenschuhCommentsOctober 21, 2014
Topics: Software Security,General Security and Privacy,Network Security,Security
Brad YaleHow the Internet Works: The Deep Web

The Deep Web. The Deepnet. The Invisible Web. The Hidden Web. 

Maybe you have heard of the Deep Web. Maybe you even know how to access the Deep Web. 

Chances are though, you've never heard of the Deep Web and you have no idea how to access it. The Deep Web sounds mysterious, elusive and somewhat dangerous. By all accounts, it is all these things. 

So, what is the deep web? How does the deep web work? How do you access it?

In this installment of "How the Internet Works", we tackle the mysterious Deepnet.   

Continue reading...
By Brad YaleCommentsOctober 21, 2014
Topics: The Web/Virtual Worlds/Social Networking,Home & Office Computing,Access,General Security and Privacy,Information Technology,Web Services,Information Management,Network Security,Data,Security,Business & Management
Brad YaleHow the Internet Works: A Call for Personal Security

It's very easy, after reading "The Snappening" Snapchat security breach news, to determine fault lies with users. It would be very easy and convenient to blame the leak not on the leakers, but on the users who sent sexually explicit materials to friends, lovers and strangers. This conclusion is easy to draw yet, it only skims the surface of the true issue at hand.  

Whatever you think of the materials leaked, the larger issue at play in "The Snappening" is how the public relates to, understands and uses public Internet architectures. If anything, "The Snappening" should serve as a beacon call for greater Internet security practice enlightenment. 

In this version of "How the Internet Works" we cover public Cloud architectures and the need for increased Internet security practices learning.  

Continue reading...
By Brad YaleCommentsOctober 13, 2014
Topics: Software Security,Access,General Security and Privacy,Information Technology,Web Services,Network Security,Data,Security,Cloud Computing

See More Blogs

Other Topics

Business & ManagementBusiness ApplicationsFinance & InvestingGeneral BusinessGlobal BusinessHuman ResourcesInformation ManagementManagement & StrategyPersonal DevelopmentSales & MarketingCertificationCisco CertificationCCDACCDPCCIECCIPCCNACCNPCCNP Security / CCSPCCNP Voice / CCVPCisco Qualified SpecialistCisco Networking AcademyCompTIAA+Network+Security+Microsoft CertificationMCADMCSAMCSDMCSEOther ITOther Non-TechnicalCloud Computing & VirtualizationDataAccessBusinessObjects/Crystal ReportsData Analytics and VisualizationDB2FileMakerInformation ManagementLotusMySQLSAPSQLSQL ServerEngineeringChemical EngineeringCommunications EngineeringGeneral Engineering & HardwareSemiconductor TechnologiesSix Sigma and Process ImprovementGraphics & Web DesignDreamweaver & FlashMicrosoft Expression StudioPhotoshop & AdobeVideo EditingHardwareUpgrading & RepairingHome & Office ComputingAppleeBay/Yahoo/GoogleEntertainment/Gaming/GadgetsHome NetworkingMac OS XMicrosoft ApplicationsMicrosoft Windows DesktopMicrosoft Windows ServerMicrosoft Windows Vista & Home ServerOther ApplicationsThe Web/Virtual Worlds/Social NetworkingInformation TechnologyMobile Application Development & ProgrammingAndroidHTML5 & Web StandardsiOSWindows PhoneNetworkingHome NetworkingNetwork Administration & ManagementNetwork Design & ArchitectureRouting & SwitchingStorageVoice/IP CommunicationsWireless/High Speed/OpticalOpen SourceAjax & JavaScriptLinux/UNIX/Open Source Operating SystemsPerlPHPPythonRuby/Ruby on RailsOperating Systems, ServerLinux/UNIX/Open SourceMAC OS X/OtherMicrosoft ServersMicrosoft System CenterMicrosoft Windows DesktopMicrosoft Windows Vista & Home ServerSolarisProcess ImprovementProgrammingAjaxAlgorithmsAndroidASP .NETC#C/C++GamesGeneral Programming/Other LanguagesGraphic ProgrammingHTML5/CSS/BlendJavaJavaScriptLotus Notes/Domino/XPagesMac and iOS ProgrammingPerlPHPPythonRationalRubyUser Interface (UI)Visual BasicVisual StudioWindows ProgrammingSecurityGeneral Security and PrivacyNetwork SecuritySoftware SecuritySoftware Development & ManagementAgileArchitecture and DesignManagement: Lifecycle, Project, TeamObject TechnologyRationalTestingUMLWeb DevelopmentAjax and JavaScriptASP.NETContent Management SystemsDreamweaver & FlashHTML/CSSMicrosoft Expression StudioPerlPHPPythonRuby/Ruby on RailsWeb ServicesCloud ComputingSOAWebSphereXML