Here is a list of papers of different issues from the IT world.
For people who are trying to learn how subnetting works, I have
a paper that shows a simple way to understand the process. I
created this as a way to teach the students I have in the Cisco Academy
since the Cisco exam does subnetting on a much different level that
other lower level certification. The paper is
here.
A few years ago I created an Internet Safety workshop for parents who
had concerns about the Internet and their child. This is the booklet
that I created for that workshop. Print this document out on two sides,
then fold in half and staple the booklet together. The booklet is
here.
A few years ago, in one of my security classes, we were talking about
Pretty Good Privacy, PGP, and how it works. There was some confusion
over its use of symmetrical and asymmetrical keys. Some of the class
said one and others said the other. The answer is it uses both. This
is due to the Web of trust it uses for key management. To help the
students understand better I work a short paper on how it works. It
is found
How PGP Works
A few years ago, we were looking into converting our system from an
on-premise deployment to a cloud based, Software As A Service (SaaS),
deployment. As part of this review, I wrote a paper about the business
case for the move to SaaS. There are many business advantages for a SaaS
design so
here
is a modified version of what I presented to our upper management.