This is an alert ×
Merit Collection
CMU's New Data Center: Managing a Big Move
42:43

CMU's New Data Center: Managing a Big Move

Over the summer CMU moved into a new campus data center. The center is in a new building, is located above-grade to avoid flooding, has up-to-date electrical and air handling equipment, and is expandable for future growt..

Cloud Media & WebConnect training
48:27

Cloud Media & WebConnect training

Nicole Trinka trains on Cloud Media & WebConnect

Configuration Management Using Puppet (MJTS meeting, October 11, 2012)
15:40

Configuration Management Using Puppet (MJTS meeting, October 11, 2012)

Puppet is an IT management software product, available in enterprise and open source versions, that allows administrators to automate repetitive tasks, quickly deploy applications, and manage configuration changes within..

Creating 21st Century Communication Services: Next Generation Applications, Advanced Technologies, and Global Facilities (Joe Mambretti)
49:13

Creating 21st Century Communication Services: Next Generation Applications, Advanced Technologies, and Global Facilities (Joe Mambretti)

Increasing demand for new applications, major technology innovation (especially related to optical components), and rapidly changing economics are motivating the creation of fundamentally new digital communication servic..

Creating a Secure State (David Behen)
33:45

Creating a Secure State (David Behen)

This presentation will discuss the growing threat facing cybersecurity and what Michigan is doing to be prepared.

DRDoS Attacks: Latest Threats and Countermeasures
30:40

DRDoS Attacks: Latest Threats and Countermeasures

In a distributed reflective denial-of-service (DRDoS) attack, requests are sent to to unsecured public servers such as DNS resolvers and NTP servers, spoofing the IP address of a victim. The servers in turn flood the vic..

Dealing with Wireless Networks and Device Proliferation
59:02

Dealing with Wireless Networks and Device Proliferation

Webinar featuring Dave Mexicotte of Cisco Systems, delivered on October 27, 2011. The webinar discusses how organizations can deal with the proliferation of wireless devices and deliver high quality wireless LAN service ..

Discussions on the Michigan Cyber Range
05:58

Discussions on the Michigan Cyber Range

The Michigan Cyber Range prepares cybersecurity professionals for detecting, preventing, and thwarting cyber-attacks in a real-world setting. Like a test track or a firing range, the Michigan Cyber Range enables individu..

EMU's Information Assurance Program (MJTS Meeting, March 21, 2012)
23:18

EMU's Information Assurance Program (MJTS Meeting, March 21, 2012)

EMU's Information Assurance Program. Presentation by Gerald "Skip" Lawver of Eastern Michigan University at MJTS meeting, March 21, 2012

Essential IT Services for Higher Education
47:12

Essential IT Services for Higher Education

Merit Staff discuss the IT Services that can be essential tools for the success of higher education institutions. Merit Services discussed during this February 18, 2014 webinar include MeritMail Collaboration Suite, Meri..

Search this collection

Sub-collections