Information Technology Community Portal
Welcome – From the Editor
Greetings from the Information Technology Board!
Welcome to our portal!
A unique characteristic of the MERLOT IT discipline is that we have designed its taxonomy to align with the undergraduate course topics recommended by CSAB (Computing Sciences Accreditation Board) – the lead society within ABET (Accreditation Board for Engineering and Technology) for accreditation of degree programs in computer science, information systems, software engineering, information technology, and cybersecurity, and is a co-lead society for systems engineering, and is a cooperating society for computer engineering, biological engineering, and information engineering technology. CSAB is governed by the two largest technical, educational, and scientific societies in computer and computer-related fields: The Association for Computing Machinery, Inc. (ACM) and the IEEE-Computer Society (IEEE-CS).
Accordingly, the MERLOT IT discipline portal has been endorsed by both the IEEE Computer Society and IEEE Education Society, and that endorsement is noted with a banner on the IT portal page.
Software Engineering Body of Knowledge Version 3 | IEEE Computer Society
SWEBOK V3.0 is the most recent completely revised and updated version of the internationally respected Guide to the...
Interactive Learning for Operation Analytics Topics (ILOAT)
The ILOAT is a self-paced digital resource developed for the Operation Analytics course to support self-directed...
UTHealth awarded nearly $10 million for public health informatics workforce development program
In order to develop a talent pipeline with individuals from diverse backgrounds in public health and data science to...
What are the features of Java used by Java web development company for web development? | Brainfuel Blog
Web development is still one of today’s most popular activities considering the acceptance of smartphones and allied...
Julia Data Science
This is an open-source and open access book on how to do Data Science using Julia. The book describes the basics of the...
August 2021 Healthcare Data Breach Report
There was a 44% month-over-month decrease in the number of reported healthcare data breaches in August 2021. 38...
July 2021 Healthcare Data Breach Report
High numbers of healthcare data breaches continued to be reported by HIPAA-covered entities and their business...
Predicting the future of healthcare: 10 takeaways from HIMSS21
Along with "guarded optimism" on the current state of the pandemic, some 19,000 on-site attendees in Las Vegas mulled...
Health Information Management: Federal Regulations
Federal regulations affecting Health information management
Samsung A11 FRP Bypass 2021
How to remove a google account from the Samsung Galaxy A11 phone after a factory reset. Samsung A11 FRP bypass 2021 FRP...
Samsung A21 FRP bypass with PC
How to remove a google account from the Samsung Galaxy A21 phone after a factory reset. Samsung A21 frp bypass with pc....
[New Method] All Samsung FRP Bypass 2021 - Android 10, 11
Today I show you how to remove all Samsung FRP bypass 2021 - android 10, 11 OS after the factory reset without any...
Clinical Decision Support (CDS) Artifact Design Assignment
This assignment gives students hands-on experience to develop clinical decision support artifacts.
¿Qué es la inteligencia artificial?
La Inteligencia Artificial está presente en nuestra vida. Convive con nostros cuando buscamos información en Google,...
Introduction to Database Systems
How were things managed before technology became a major influence in our lives? Tracking information was difficult...
How to make a Stock Trading App
Give your stock trading the power of automation of financial services, real-time quotes, fraud protection, stock...
Web and Mobile App Development
Idea Usher is a one-stop for all your digital needs; we make it simple even if your technology skills end at Candy Crush....
Backend and Fullstack Specialisation
This is an online program for software engineers to master Problem Solving & System Design and to take their learning to...
Learn more if you download the Apple Pay to Cash app, keep it safe
You can also use the Apple Cash app to send and receive money using the iPhone's messaging app. On the other hand, it can...
Asistente Digital TOMi 7
Es un sitio dirigido a docentes que esten interesados en conocer las funciones que ofrece la herramienta digital TOMi 7,...
What is a Binary Search Tree?
Welcome everyone who want to know more about Binary Search Tree to watch ! ur OER topic is “What is Binary Search Tree “....
Docker training course | Free Live Demo | 100% practical
OpsTrainerz offers comprehensive Docker training to meet the learning needs of both freshers as well as experienced...
Informatica Cloud Training | Informatica Cloud Online Training Course
Upgrade your career with HKR's Informatica cloud Certification Course Online ➔ Flexible Schedule ✔️Live Projects ✔️30 Hrs...
Cloud Computing for Small Businesses
Students reflect on what they have learned about cloud computing, do some research of their own, and discuss the pros and...
Jeremiah ChungChinese university of Hong Kong
JOAO GARDIMFATEC - Faculdade de Tecnologia Victor Civita
Fernanda MonteiroUniversity of Brasilia
Wingrove RouseClarence Fitzroy Bryant College
Fernando GomeroUniversidad Peruana de Ciencias Aplicadas
gadget feeGoa University
kim RyanCalvert Health department
Mark FosgateGlobal Tech College
Tracy Sheltonsan jose
Maya NatasyaUniversitas Bina Sarana Informatika
T. Arfan BawadiUniversitas Terbuka
Blockchain Development For CybersecurityNadcab Technology
Quality Analyst TrainingQuality Analyst Training
TYLER BeraState University of New York System - College at Oswego
Frank HartleRobert Morris University
Ria CastilloBatangas State University
Materials by Discipline
- Application Development (373)
- Business Process Management (63)
- Data and Information Management (97)
- Enterprise Systems and Architecture (1)
- Foundations of Information Systems (17)
- Human Computer Interaction (18)
- IS Project Management (13)
- IS Strategy, Management and Acquisition (6)
- IT Audit and Controls (11)
- IT Infrastructure (568)
- IT Security and Risk Management (57)
- Knowledge Management (14)
- Social Informatics (26)
- System Analysis and Design (130)
- Institute of Electrical and Electronics Engineers (IEEE)
- IEEE Education Society
- IEEE Computer Society
- Association for Computing Machinery (ACM)
- Certified Information Systems Security Professional (CISSP)
- Government Cybersecurity
- Certified Ethical Hacker (CEH)
- Consortium for Computing Sciences in Colleges (CCSC)
- Instructional Technology Council (ITC)
- The MASIE Center
- ACM Special Interest Group on Computer Science Education (SIGCSE)
- Online Learning Consortium (formerly Sloan-C)
- Association for Talent Development (ATD)
- The eLearning Guild
- Michigan Association for Computer Users in Learning (MACUL)
- Flipped Learning Network
- United States Distance Learning Organization
Journals & Publications
- Journal of Cybersecurity
- National Cybersecurity Institute Journal
- International Journal of Cyber–Security and Digital Forensics (IJCSDF)
- Journal of Information Assurance & Cybersecurity
- Journal of Cyber Security & Information Systems
- ACM TechNews
- Campus Technology Higher Education Technology Newsletters
- CIO Magazine
- eCampus News
- OLC Online Learning Journal
- Journal of Information Technology Education: Research (JITE:Research)
- Journal of Information Technology Education: Innovations in Practice (JITE:IIP)
- Journal of Information Technology Education: Discussion Cases (JITE:DC)
- Learning Solutions Magazine
- Network World
- Newsletters by O'Reilly (Free Registration gives you access to free newsletters, online discussions, and more.)
- Today's Campus
Information Technology on the Web
CrowdStrike expands Zero Trust support to macOS and Linux - SecurityBrief Asia
Jan 16, 2022 01:09 PM PST
Pandemic, zero trust fuel cybersecurity spending growth in Turkey - California News Times
Jan 16, 2022 11:46 AM PST
Crypto scam sites continue to draw Indians in droves - Mint
Jan 16, 2022 11:10 AM PST
Dept. of Education Working With Kansas Schools to Address Cybersecurity Issues - KFDI
Jan 16, 2022 10:59 AM PST
Ukraine says evidence suggests Russia behind cyberattack | Cybersecurity News | Al Jazeera
Jan 16, 2022 09:35 AM PST
This cybersecurity course bundle is on sale for only $40 - AOL
Jan 16, 2022 08:37 AM PST
Biden Official Credits Diplomacy With Russia for Arrest of Colonial Pipeline Hacker - Nextgov
Jan 16, 2022 08:28 AM PST
Secure-by-design solutions by Huawei at Intersec 2022 - Trade Arabia
Jan 16, 2022 07:37 AM PST
Green Information Technology (IT) Services Market to Witness - openPR.com
Jan 16, 2022 07:30 AM PST
Destructive Hacks Against Ukraine Echo Its Last Cyberwar | WIRED
Jan 16, 2022 07:19 AM PST
The importance of sandboxing for SMBs | TechRadar
Jan 16, 2022 07:18 AM PST
Ukraine claims Russia behind cyberattack in 'hybrid war' - Spectrum News
Jan 16, 2022 06:18 AM PST
Ukraine government agencies' computer systems infected with malware, Microsoft says | TheHill
Jan 16, 2022 05:59 AM PST
'We have to show strength': Calls grow for U.S. to deter Russian hackers - POLITICO
Jan 16, 2022 04:55 AM PST
Microsoft Discloses Malware Attack on Ukraine Govt Networks | Military.com
Jan 16, 2022 04:25 AM PST
Things to Consider Regarding the Executive Order on Cybersecurity - Citrix
Jan 16, 2022 03:23 AM PST
College students' achievements - Lakeland Ledger
Jan 16, 2022 02:54 AM PST
How is Data Dependency Changing the Cybersecurity Landscape - Analytics Insight
Jan 16, 2022 02:45 AM PST
What are the 3 cybersecurity cryptocurrencies to watch in the current year - TittlePress
Jan 16, 2022 02:26 AM PST
Chip Implants: Opportunities, Concerns and What Could Be Next - Government Technology
Jan 16, 2022 02:21 AM PST
Info Tech on Twitter
- RT @USCERT_gov: ⚠️ @CISAgov recommends network defenders review the Microsoft blog on destructive malware targeting Ukrainian organizations…6 hours ago | cyber
- White House says meeting advances open source software security work with industry partners dlvr.it/SH85Gr2 days ago | InsideCyber
- January 18th will be here faster than you think! Register before 5 p.m. ET at cvent.me/DXOyAN for @CISAgov’… twitter.com/i/web/status/1…2 days ago | cyber
- We're excited to have @lspitzner of @SANS join us in Scottsdale for our Regional Conference. Register to attend his… twitter.com/i/web/status/1…2 days ago | StaySafeOnline
- Student-facing learning analytics dashboards aim to improve learning by presenting students with actionable informa… twitter.com/i/web/status/1…2 days ago | educause
- #Ransomware is a common threat for small businesses. @NISTcyber provides an example of how ransomware attacks can h… twitter.com/i/web/status/1…2 days ago | StaySafeOnline
- Katko, top Republican on House Homeland Security, announces he won’t seek re-election dlvr.it/SH7mkK2 days ago | InsideCyber
- Mark your calendar for the #MemberQuickTalk Mentoring: Why Engage? On January 27. Make sure to join us to learn mor… twitter.com/i/web/status/1…2 days ago | educause
- RT @USCERT_gov: Ivanti has released security updates and workarounds for multiple products to address Log4j CVE-2021-44228. Learn more at…2 days ago | cyber
- "Organizations have started to negotiate their transition from the strategies they improvised for dealing with the… twitter.com/i/web/status/1…2 days ago | learningsolpub