Information Technology Community Portal
Welcome – From the Editor
Greetings from the Information Technology Board!
Welcome to our portal!
A unique characteristic of the MERLOT IT discipline is that we have designed its taxonomy to align with the undergraduate course topics recommended by CSAB (Computing Sciences Accreditation Board) – the lead society within ABET (Accreditation Board for Engineering and Technology) for accreditation of degree programs in computer science, information systems, software engineering, information technology, and cybersecurity, and is a co-lead society for systems engineering, and is a cooperating society for computer engineering, biological engineering, and information engineering technology. CSAB is governed by the two largest technical, educational, and scientific societies in computer and computer-related fields: The Association for Computing Machinery, Inc. (ACM) and the IEEE-Computer Society (IEEE-CS).
Accordingly, the MERLOT IT discipline portal has been endorsed by both the IEEE Computer Society and IEEE Education Society, and that endorsement is noted with a banner on the IT portal page.
Fostering Research Integrity: The Hong Kong Manifesto for Assessing Researchers
The Hong Kong Manifesto for Assessing Researchers: Fostering Research Integrity (22nd May 2019 version/6th World...
Echo Dot 1st Generation Setup
Amazon Echo dot 1st generation device is one of the best smart speaker in the market today. Use the device, download the...
Microsoft Excel Tutorial: Remove Duplicate Values
As your worksheets get bigger and bigger, you will get duplicate data. You can spend hours or days trying to manually...
Microsoft Excel Tutorial: Quick Access Toolbar
The Quick Access Toolbar is a great tool that can seriously speed up your workflow. Most folks, however, don't realize...
Amazon Customer Service
If you are an Amazon device user and if you require any assistance navigate to our webpage and make a note of the Amazon...
Tips for Increasing Battery Life On Your Android Smartphone
For all of the benefits that owning an Android device brings, battery life is typically not listed among them. Although...
FXNetworks Channel Activation
FXNetworks channel activation is easy and to start with you can start adding the channel from the store. Choose the...
Web Accessibility for Developers Open Textbook
Web Accessibility for Developers is a technical book aimed primarily at programmers. Learn how to develop accessible...
123 hp com setup
The HP Office jet Pro 8710 provides high quality of printing results. Setup 123.hp.com/ojp8710 or call our toll free...
🦕 DinoRANK te desplaza y Enlazalia te enlaza - Para Madrid y el Mundo
Mi postulación al megaconcurso SEO 🦕 DinoRANK te desplaza y Enlazalia te enlaza para llevar a las #mujeresenseo a lo más...
Web Application Development Company, Mobile App Design & Development | NectarBits
NectarBits (Creative Apps Devs) is a leading Web & Mobile Application Development Company India, USA & Canada.With our...
kodi setup wizard
We know how to fix problems that occur while setting up Kodi media streaming player. If you are not familiar with Kodi...
Hulu Activation Code Help Call 888-451-3980
We have a team of Hulu tech support experts that offer the best-in-class services to customers who deal with Hulu...
Open Science by Design: Realizing a Vision for 21st Century Research
The 2019 National Academies report "Open Science by Design: Realizing a Vision for 21st Century Research" discusses the...
Phishing Protection & Defense Against Social Engineering Attacks - Los Angeles, California
Crimson IT provides best-in-class phishing and social engineering protection for your enterprise business or SMB in the...
Duplicate File Finder - How to Find and Remove Duplicate Files
Easy Duplicate Finder™ is a powerful tool to find and remove duplicate photos, documents, MP3s, videos, and more. It...
Citizen Science: Innovation in Open Science, Society and Policy
Citizen Science: Open Science, Society, and Policy is an excellent review of Citizen Science that brings together some of...
A Structured Review of Six Sigma Implementation in Casting Industries | Kumar | Thermal Science and Engineering
Thermal Science and Engineering ... With the use of Six Sigma in casting industries, rejection rate is reduced, customer...
Reverse Engineering: Recent Advances and Applications
La ingeniería inversa abarca un amplio espectro de actividades destinadas a la extracción de información sobre la...
Programación Orientada a Objetos en Java
Definiciones y demostración de Programación Orientada a Objetos (POO) en Java
SQL Injection Prevention Cheat Sheet - OWASP
SQL Injection attacks are one of the most common application vulnerabilities, and target the database, which is the...
Free Online Course: Six Sigma: Define and Measure from edX | Class Central
An introduction to the Six Sigma methodology and DMAIC cycle for process improvement with a focus on the Define and...
Mapping IT Governance to Software Development Process: From COBIT 5 to GI-Tropos
Mapping Software Development Process and IT govenance as well as management, explaining the COBIT 5 framework.
Software engineering of interactive educational resources for university student training in urban development courses
The article is devoted to the issues of improving the quality of training specialists in urban development with using...
Víctor Alfonso Vargas FonsecaUniversidad Autónoma de Nayarit
Ivan De Los SantosUniversity of Maryland System - University College
Paul CaptainUniversity of Nevada System - Las Vegas
Pawan KumarPawan Kumar
Ellen BjorgeCentral Washington University
Marc BayerState University of New York System - College at Buffalo (Buffalo State College)
mellisa brownCalifornia university
Carrie PajotteUniversity of Toronto
Raja RajeshHeston Kuwait
Harish SharmaAlbuquerque Institute for Mathematics and Science
Nancy PerezFlorida State University
Cihan MertInternational Black Sea University
amara davisnorton.com/setup %$% webroot.com/safe
Linda GalocyIndiana University System - Indiana University-Northwest
Alquiler de coches con Booking Centre OnlineRent A Car
David AbbeyOutllook services
Sylvester Rowe - Event Management SystemEvent Management System
Materials by Discipline
- Application Development (341)
- Business Process Management (49)
- Data and Information Management (94)
- Enterprise Systems and Architecture (2)
- Foundations of Information Systems (17)
- Human Computer Interaction (14)
- IS Project Management (13)
- IS Strategy, Management and Acquisition (5)
- IT Audit and Controls (10)
- IT Infrastructure (578)
- IT Security and Risk Management (57)
- Knowledge Management (10)
- Social Informatics (22)
- System Analysis and Design (129)
- Institute of Electrical and Electronics Engineers (IEEE)
- Association for Computing Machinery (ACM)
- Certified Information Systems Security Professional (CISSP)
- Government Cybersecurity
- Certified Ethical Hacker (CEH)
- Consortium for Computing Sciences in Colleges (CCSC)
- Instructional Technology Council (ITC)
- The MASIE Center
- ACM Special Interest Group on Computer Science Education (SIGCSE)
- Online Learning Consortium (formerly Sloan-C)
- Association for Talent Development (ATD)
- The eLearning Guild
- Michigan Association for Computer Users in Learning (MACUL)
- Flipped Learning Network
- United States Distance Learning Organization
Journals & Publications
- Journal of Cybersecurity
- National Cybersecurity Institute Journal
- International Journal of Cyber–Security and Digital Forensics (IJCSDF)
- Journal of Information Assurance & Cybersecurity
- Journal of Cyber Security & Information Systems
- ACM TechNews
- Campus Technology Higher Education Technology Newsletters
- CIO Magazine
- eCampus News
- OLC Online Learning Journal
- Journal of Information Technology Education: Research (JITE:Research)
- Journal of Information Technology Education: Innovations in Practice (JITE:IIP)
- Journal of Information Technology Education: Discussion Cases (JITE:DC)
- Learning Solutions Magazine
- Network World
- Newsletters by O'Reilly (Free Registration gives you access to free newsletters, online discussions, and more.)
- Today's Campus
Information Technology on the Web
What is the NIST SP 800-171 Cybersecurity Framework?
Jul 22, 2019 01:48 PM PDT
CISO to STEM ladies: Cybersecurity needs you
Jul 22, 2019 12:52 PM PDT
After subway meltdown, MTA board members call for cybersecurity probe
Jul 22, 2019 12:41 PM PDT
What VC Funding Reveals About the Future of Cybersecurity
Jul 22, 2019 12:30 PM PDT
Olivia Munn is starring in a new cybersecurity thriller about the Sony hack . . . for IT managers?
Jul 22, 2019 11:45 AM PDT
Why Check Point Software Technologies Remains a Top Cybersecurity Pick
Jul 22, 2019 10:48 AM PDT
Murray State University announces Center for Computer and Information Technology
Jul 22, 2019 10:03 AM PDT
The smartest cyber investment is collective action. Here's why
Jul 22, 2019 09:52 AM PDT
Rosslyn-Based Ostendio Moves to Make Cybersecurity Auditing More Accessible
Jul 22, 2019 09:41 AM PDT
Guardicore Selected as Finalist in Black Unicorn Awards for 2019
Jul 22, 2019 09:18 AM PDT
Cabinet overseeing drills for cybersecurity: official
Jul 22, 2019 08:56 AM PDT
CBO Estimates $31M Cost for State/Local Cybersecurity Act
Jul 22, 2019 08:33 AM PDT
Cybersecurity Risk: What does a 'reasonable' posture entail and who says so?
Jul 22, 2019 07:26 AM PDT
Israel to arm students on autism spectrum with cybersecurity skills
Jul 22, 2019 07:15 AM PDT
EU completes first phase of 5G cybersecurity risk assessment
Jul 22, 2019 07:03 AM PDT
Info Tech on Twitter
- "With the completely different mindset Agile requires, individuals struggle with new roles, new responsibilities an… twitter.com/i/web/status/1…1 hour ago | InSyncJennifer
- RT @FERPASherpa: Who said you can't do spring cleaning in the #summer? Check out this great infographic by @EDUCAUSEreview on the importanc…1 hour ago | EDUCAUSEreview
- Need some advice on getting the most out of your #DevLearn experience? Read more here: bit.ly/2LAArWm2 hours ago | learningsolpub
- Federal acquisitions meeting on #Huawei provides more questions than answers bit.ly/2M3Opj6 #cyber… twitter.com/i/web/status/1…2 hours ago | InsideCyber
- "New technologies are always appealing; but they run that risk that we’ll end up missing the point and going astray… twitter.com/i/web/status/1…2 hours ago | learningsolpub
- Latest news: #Trump flags #Huawei #5G risks for further study amid reports of company working with North Korea… twitter.com/i/web/status/1…
- “Learning Styles” Are a Myth emergingedtech.com/2019/07/learni… #edtech #learningstyles #scienceoflearning https://t.co/qKEVNTX032, photo: pic.twitter.com/qKEVNTX0323 hours ago | EmergingEdTech
- Trump flags Huawei 5G risks for further study amid reports of company working with North Korea dlvr.it/R8thdC
- Painter, ex-State Dept. #cyber chief, praises Senate #5G bill in call for including allies on network security… twitter.com/i/web/status/1…
- Gender classifications and their codification in institutional systems can serve as a catalyst for conversations ab… twitter.com/i/web/status/1…3 hours ago | educause