Information Technology Community Portal
Welcome – From the Editor
Greetings from the Information Technology Board!
Welcome to our portal!
A unique characteristic of the MERLOT IT discipline is that we have designed its taxonomy to align with the undergraduate course topics recommended by CSAB (Computing Sciences Accreditation Board) – the lead society within ABET (Accreditation Board for Engineering and Technology) for accreditation of degree programs in computer science, information systems, software engineering, information technology, and cybersecurity, and is a co-lead society for systems engineering, and is a cooperating society for computer engineering, biological engineering, and information engineering technology. CSAB is governed by the two largest technical, educational, and scientific societies in computer and computer-related fields: The Association for Computing Machinery, Inc. (ACM) and the IEEE-Computer Society (IEEE-CS).
Accordingly, the MERLOT IT discipline portal has been endorsed by both the IEEE Computer Society and IEEE Education Society, and that endorsement is noted with a banner on the IT portal page.
Interactive Learning for Operation Analytics Topics (ILOAT)
The ILOAT is a self-paced digital resource developed for the Operation Analytics course to support self-directed...
UTHealth awarded nearly $10 million for public health informatics workforce development program
In order to develop a talent pipeline with individuals from diverse backgrounds in public health and data science to...
What are the features of Java used by Java web development company for web development? | Brainfuel Blog
Web development is still one of today’s most popular activities considering the acceptance of smartphones and allied...
Julia Data Science
This is an open-source and open access book on how to do Data Science using Julia. The book describes the basics of the...
August 2021 Healthcare Data Breach Report
There was a 44% month-over-month decrease in the number of reported healthcare data breaches in August 2021. 38...
July 2021 Healthcare Data Breach Report
High numbers of healthcare data breaches continued to be reported by HIPAA-covered entities and their business...
Predicting the future of healthcare: 10 takeaways from HIMSS21
Along with "guarded optimism" on the current state of the pandemic, some 19,000 on-site attendees in Las Vegas mulled...
Health Information Management: Federal Regulations
Federal regulations affecting Health information management
Samsung A11 FRP Bypass 2021
How to remove a google account from the Samsung Galaxy A11 phone after a factory reset. Samsung A11 FRP bypass 2021 FRP...
Samsung A21 FRP bypass with PC
How to remove a google account from the Samsung Galaxy A21 phone after a factory reset. Samsung A21 frp bypass with pc....
[New Method] All Samsung FRP Bypass 2021 - Android 10, 11
Today I show you how to remove all Samsung FRP bypass 2021 - android 10, 11 OS after the factory reset without any...
Clinical Decision Support (CDS) Artifact Design Assignment
This assignment gives students hands-on experience to develop clinical decision support artifacts.
¿Qué es la inteligencia artificial?
La Inteligencia Artificial está presente en nuestra vida. Convive con nostros cuando buscamos información en Google,...
Introduction to Database Systems
How were things managed before technology became a major influence in our lives? Tracking information was difficult...
How to make a Stock Trading App
Give your stock trading the power of automation of financial services, real-time quotes, fraud protection, stock...
Web and Mobile App Development
Idea Usher is a one-stop for all your digital needs; we make it simple even if your technology skills end at Candy Crush....
Backend and Fullstack Specialisation
This is an online program for software engineers to master Problem Solving & System Design and to take their learning to...
Learn more if you download the Apple Pay to Cash app, keep it safe
You can also use the Apple Cash app to send and receive money using the iPhone's messaging app. On the other hand, it can...
Asistente Digital TOMi 7
Es un sitio dirigido a docentes que esten interesados en conocer las funciones que ofrece la herramienta digital TOMi 7,...
What is a Binary Search Tree?
Welcome everyone who want to know more about Binary Search Tree to watch ! ur OER topic is “What is Binary Search Tree “....
Docker training course | Free Live Demo | 100% practical
OpsTrainerz offers comprehensive Docker training to meet the learning needs of both freshers as well as experienced...
Informatica Cloud Training | Informatica Cloud Online Training Course
Upgrade your career with HKR's Informatica cloud Certification Course Online ➔ Flexible Schedule ✔️Live Projects ✔️30 Hrs...
Cloud Computing for Small Businesses
Students reflect on what they have learned about cloud computing, do some research of their own, and discuss the pros and...
Bitcoin Consumes More Electricity Than Most Countries in The World. Here's Why
The bitcoin market now exceeds $1 trillion with its price rising tenfold in a year, but focus is shifting towards the...
Blockchain Development For CybersecurityNadcab Technology
Quality Analyst TrainingQuality Analyst Training
TYLER BeraState University of New York System - College at Oswego
Frank HartleRobert Morris University
Ria CastilloBatangas State University
Mounira Taleb HacineKaty
Dennis GabonCentral Bicol State University of Agriculture
Tusingwire Michealoffice of the auditor general
Steve DavisState University of New York System - Empire State College
Joseph NkrumahACCRA INSTITUTE OF TECHNOLOGY
Enkli YlliBank of Albania
NFT Listing Development CompanyNFT Listing Development Company
bideep barmanB Borooah College
Tamara SorensenTamara Sorensen
Tebou TetiuraTA Training
Materials by Discipline
- Application Development (373)
- Business Process Management (63)
- Data and Information Management (97)
- Enterprise Systems and Architecture (1)
- Foundations of Information Systems (17)
- Human Computer Interaction (18)
- IS Project Management (13)
- IS Strategy, Management and Acquisition (6)
- IT Audit and Controls (11)
- IT Infrastructure (568)
- IT Security and Risk Management (57)
- Knowledge Management (14)
- Social Informatics (26)
- System Analysis and Design (129)
- Institute of Electrical and Electronics Engineers (IEEE)
- IEEE Education Society
- IEEE Computer Society
- Association for Computing Machinery (ACM)
- Certified Information Systems Security Professional (CISSP)
- Government Cybersecurity
- Certified Ethical Hacker (CEH)
- Consortium for Computing Sciences in Colleges (CCSC)
- Instructional Technology Council (ITC)
- The MASIE Center
- ACM Special Interest Group on Computer Science Education (SIGCSE)
- Online Learning Consortium (formerly Sloan-C)
- Association for Talent Development (ATD)
- The eLearning Guild
- Michigan Association for Computer Users in Learning (MACUL)
- Flipped Learning Network
- United States Distance Learning Organization
Journals & Publications
- Journal of Cybersecurity
- National Cybersecurity Institute Journal
- International Journal of Cyber–Security and Digital Forensics (IJCSDF)
- Journal of Information Assurance & Cybersecurity
- Journal of Cyber Security & Information Systems
- ACM TechNews
- Campus Technology Higher Education Technology Newsletters
- CIO Magazine
- eCampus News
- OLC Online Learning Journal
- Journal of Information Technology Education: Research (JITE:Research)
- Journal of Information Technology Education: Innovations in Practice (JITE:IIP)
- Journal of Information Technology Education: Discussion Cases (JITE:DC)
- Learning Solutions Magazine
- Network World
- Newsletters by O'Reilly (Free Registration gives you access to free newsletters, online discussions, and more.)
- Today's Campus
Information Technology on the Web
Contextual analytics, cybersecurity mesh and zero-touch service management to dominate IT in 2022
Dec 09, 2021 03:58 AM PST
What cybersecurity trends do company executives expect to see next year? - Help Net Security
Dec 09, 2021 03:48 AM PST
Students focus on cybersecurity | Jamestown Press
Dec 09, 2021 03:05 AM PST
Mosquito or shark bite? Data breaches across Central Mass. raise concern over cyberthreats
Dec 09, 2021 02:09 AM PST
Norton's 2022 cybersecurity predictions: More Crypto scams, deepfakes, and greater need ...
Dec 09, 2021 01:00 AM PST
Burnout in the Cybersecurity Community - Security Boulevard
Dec 08, 2021 11:31 PM PST
'Cybersecurity a key concern with CBDC' - The Hindu
Dec 08, 2021 11:02 PM PST
More than one-third of cybersecurity technologies used by companies in India outdated ...
Dec 08, 2021 10:54 PM PST
Cybersecurity Roundtable | Cooley | Global Law Firm
Dec 08, 2021 10:30 PM PST
How the personality of the CEO can weaken an organisation's cybersecurity | ITProPortal
Dec 08, 2021 09:03 PM PST
US Commerce Department Issues New Cybersecurity Export Controls On Intrusion And ... - Mondaq
Dec 08, 2021 08:20 PM PST
The Cybersecurity Skills Gap: Myth or Reality? | The State of Security - Tripwire
Dec 08, 2021 08:18 PM PST
TSA Issues Cybersecurity Rules for Transportation Sector - National Law Review
Dec 08, 2021 05:12 PM PST
Behind Atlanta's Growth as a Cybersecurity Hub - Hypepotamus
Dec 08, 2021 04:59 PM PST
Cybersecurity start-up bags ₹50-crore investment - The Hindu
Dec 08, 2021 04:52 PM PST
Congress can't even pass the easy cyber stuff - The Washington Post
Dec 08, 2021 04:42 PM PST
Report: Despite optimism, 65% of orgs can't achieve mature cybersecurity programs | VentureBeat
Dec 08, 2021 04:41 PM PST
Softbank backs $400m investment in Israeli industrial cybersecurity firm Claroty | The Times of Israel
Dec 08, 2021 04:35 PM PST
Cybersecurity can pose a risk in more than one way for financial advisors - CNBC
Dec 08, 2021 04:30 PM PST
Over a third of Indian companies use outdated cybersecurity technologies - Economic Times
Dec 08, 2021 04:16 PM PST
Info Tech on Twitter
- RT @ARCYBER: Go Army! From battlefields to cyberspace, we’re staying ahead of threats. Cheer on our Soldiers and their Marine Corps peers D…43 seconds ago | cyber
- The EDUCAUSE 2022 Top 10 IT Issues take an optimistic view of how technology can help make the higher education we… twitter.com/i/web/status/1…9 minutes ago | educause
- NIST plans to release request for information in kicking off cybersecurity framework update dlvr.it/SF2f7c
- FedRAMP program evolves to meet directives in cyber EO, stakeholder feedback on training dlvr.it/SF2f5T
- Government Accountability Office report on CMMC raises issues over initial pilots, communication with industry dlvr.it/SF2f3q
- Industry groups cite security and cost issues in urging FCC to halt certification for devices under 2020 mid-band s… twitter.com/i/web/status/1…
- RT @CISAJen: Happening tomorrow! Check it out 👉 cisa.gov/presidentscup #PresCup twitter.com/CISAgov/status…16 hours ago | cyber
- RT @EDUCAUSEJarret: Cyber Incident Reporting Under the Safeguards Rule? (Note that the rulemaking notice in question will be published in t…17 hours ago | educause
- "Although we’ve been a small #team, we’ve been successful in providing innovative and engaging #digitallearning exp… twitter.com/i/web/status/1…17 hours ago | learningsolpub
- RT @NISTcyber: DYK: The President’s Cup Cybersecurity Competition is aligned to the #NICEatNIST Framework! Learn more during the livestream…17 hours ago | cyber