Papers
Here is a list of papers of different issues from the IT world.
This is a paper to show some of the basics of using version control: Using Version Control
For people who are trying to learn how subnetting works, I have a paper that shows a simple way to understand the process. I created this as a way to teach the students I have in the Cisco Academy since the Cisco exam does subnetting on a much different level that other lower level certification. The paper is here.
This is a paper about the business side of eXtreme Programming, XP, process. This was my cap stone project for my Master's Degree. eXtreme Programming a Business Case
A few years ago I created an Internet Safety workshop for parents who had concerns about the Internet and their child. This is the booklet that I created for that workshop. Print this document out on two sides, then fold in half and staple the booklet together. The booklet is here.
A few years ago, in one of my security classes, we were talking about Pretty Good Privacy, PGP, and how it works. There was some confusion over its use of symmetrical and asymmetrical keys. Some of the class said one and others said the other. The answer is it uses both. This is due to the Web of trust it uses for key management. To help the students understand better I work a short paper on how it works. It is found How PGP Works
A few years ago, we were looking into converting our system from an on-premise deployment to a cloud based, Software As A Service (SaaS), deployment. As part of this review, I wrote a paper about the business case for the move to SaaS. There are many business advantages for a SaaS design so here is a modified version of what I presented to our upper management.