Over the summer CMU moved into a new campus data center. The center is in a new building, is located above-grade to avoid flooding, has up-to-date electrical and air handling equipment, and is expandable for future growt..
Nicole Trinka trains on Cloud Media & WebConnect
Puppet is an IT management software product, available in enterprise and open source versions, that allows administrators to automate repetitive tasks, quickly deploy applications, and manage configuration changes within..
Increasing demand for new applications, major technology innovation (especially related to optical components), and rapidly changing economics are motivating the creation of fundamentally new digital communication servic..
This presentation will discuss the growing threat facing cybersecurity and what Michigan is doing to be prepared.
In a distributed reflective denial-of-service (DRDoS) attack, requests are sent to to unsecured public servers such as DNS resolvers and NTP servers, spoofing the IP address of a victim. The servers in turn flood the vic..
Webinar featuring Dave Mexicotte of Cisco Systems, delivered on October 27, 2011. The webinar discusses how organizations can deal with the proliferation of wireless devices and deliver high quality wireless LAN service ..
The Michigan Cyber Range prepares cybersecurity professionals for detecting, preventing, and thwarting cyber-attacks in a real-world setting. Like a test track or a firing range, the Michigan Cyber Range enables individu..
EMU's Information Assurance Program. Presentation by Gerald "Skip" Lawver of Eastern Michigan University at MJTS meeting, March 21, 2012
Merit Staff discuss the IT Services that can be essential tools for the success of higher education institutions. Merit Services discussed during this February 18, 2014 webinar include MeritMail Collaboration Suite, Meri..