Dr. Severance taught the online course "Internet History, Technology, and Security" using the Coursera teaching platform in July 2012, free to all who wished to register. The course had over 56,000 registered students fr..
Merit's recent extensive statewide fiber builds have required extensive route planning, permitting, environmental review and crew oversight to comply with local, state and federal requirements. Andrea Kline, environmenta..
Users of the Michigan Cyber Range will take advantage of a notional town we call Alphaville. The town includes the usual locations and services common to a small town in the US, but in this case these locations represent..
Webinar featuring Charles Antonelli of the University of Michigan, delivered on December 22, 2011. The webinar provides an overview of High Performance Computing (HPC) in theory and how to use a computing cluster in prac..
A key factor of an effective cybersecurity program is knowing your vulnerabilities before attackers do. Hackers breach organizations by taking advantage of vulnerabilities within networks. Attackers pour over every inch ..
Hardly a day goes by without the report of a new security breach. Servers are hacked, malware infects systems, laptops are stolen, thumb drives are lost, and confidential documents find their way onto the web. Have any o..
This presentation introduces Academica, Wayne State University’s self-developed, open source, future-facing academic portal. In addition to a project overview and demo, this presentation will discuss the development pr..
Watch a short video introduction to MeritMail Collaboration Suite and learn about the key features of Merit Network's premier email, calendaring, and document sharing service. ..
Any organization that has multiple physical locations (such as a multi-campus university, school district or ISD) faces questions about how to provide a common level of network service at all locations--ideally with all ..