Information Technology Community Portal
Welcome – From the Editor
Greetings from the Information Technology Board!
Welcome to our portal!
A unique characteristic of the MERLOT IT discipline is that we have designed its taxonomy to align with the undergraduate course topics recommended by CSAB (Computing Sciences Accreditation Board) – the lead society within ABET (Accreditation Board for Engineering and Technology) for accreditation of degree programs in computer science, information systems, software engineering, information technology, and cybersecurity, and is a co-lead society for systems engineering, and is a cooperating society for computer engineering, biological engineering, and information engineering technology. CSAB is governed by the two largest technical, educational, and scientific societies in computer and computer-related fields: The Association for Computing Machinery, Inc. (ACM) and the IEEE-Computer Society (IEEE-CS).
Accordingly, the MERLOT IT discipline portal has been endorsed by both the IEEE Computer Society and IEEE Education Society, and that endorsement is noted with a banner on the IT portal page.
New Materials
-
NIH Preprint Pilot: iSearch COVID-19 Portfolio
The iSearch COVID-19 portfolio is NIH's comprehensive, expert-curated source for publications and preprints related to...
-
192.168.1.1 - Default Router Admin Login - 192.168.0.1
192.168.1.1 and 198.168.0.1 are default IP address of routers to access the control panel dashboard and setting of...
-
General Data Protection Regulation (GDPR) Compliance Guideline
The EU General Data Protection Regulation went into effect on May 25, 2018, replacing the Data Protection Directive...
-
Coronavirus Disease Research Community - COVID-19 | Zenodo
Zenodo's Coronavirus Disease Research Community COVID-19 collects research inputs that may be relevant to the Coronavirus...
-
OSF: Coronavirus Outbreak Research Collection
The Center for Open Science (COS) has launched April 23, 2020 in response to the urgent and ongoing need for aggregated...
-
COVID-19 Data Portal
The aim of the COVID-19 Data Portal is to facillitate data sharing and analysis, and to accelerate coronavirus research....
-
Best Digital Marketing Serviices | Digital Marketing Agency
What exactly is Digital Marketing? If you are thinking about hiring a digital marketing services company in Islamabad,...
-
Neural Covidex: COVID-19 AI-Open Data Mining Search Engine
Scientists and researchers can now quickly, freely, and easily search through over 45,000+ scholarly articles, medical...
-
Data Dryad - Publish and Preserve your Data
The Dryad Digital Repository is a cross-disciplinary, curated resource that makes research data, discoverable, freely...
-
Harvard Dataverse: Cross-Disciplinary Repository
Harvard Dataverse is a free cross-disciplinary repository open to all researchers from any discipline, both inside and...
-
Scientific American
Scientific American is the essential guide to the most awe-inspiring advances in science and technology, explaining how...
-
ORCID: Connecting Research & Researchers
ORCID provides a "persistent identifier" (an ORCID) that you own and control, and that distinguishes you from every other...
-
10 Skills You Didn't Know Could Land You an IT Job
Soft skills matter in IT careers more than many people think. The ability to communicate, analyze and stay organized,...
-
Information Security in Big Data: Privacy and Data Mining - IEEE Journals & Magazine
The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s...
-
Cloud Computing – What Auditors need to know
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable...
-
10 Common Process Improvement Mistakes and How to Avoid Them
For those new to process analysis and improvement efforts, they can seem daunting. Even those steeped in process...
-
Process Frameworks
If you’re looking to benchmark, manage content, or define business processes, process frameworks save you time and effort...
-
Global Health Informatics to Improve Quality of Care
Learn how to design health information and communication technology (ICT) solutions for the developing world.
-
Implementation of an Evidence-Based Electronic Health Record (EHR) Downtime Readiness and Recovery Plan
This OJNI report dives into the implementation of EHRs and downtime readiness and recovery plans.
-
EduCat: Free Online Tools for Students and Writers
Save time and energy with EduCat! Students, writers, everybody can benefit from our free tools. Subscribe to be the first...
-
Aplicativo do VCE: Vocabulário de Controle Externo do Tribunal de Contas da União
Um tesauro é um instrumento da Ciência da Informação que padroniza a entrada de dados nos sistemas e auxilia a...
-
VCE: vocabulário de controle externo do Tribunal de Contas da União | Portal TCU
O VCE - Vocabulário de Controle Externo é o Tesauro do Tribunal de Contas da União. Iniciado em 2011, tem por objetivo...
-
BARE BONES 101: A BASIC TUTORIAL ON SEARCHING THE WEB
So, you're still getting those 1,670,000+ responses to your search queries on the Web, and you're still too busy to do...
-
Equivalente Thevening y Norton
Video explicativo sobre los métodos de resolución de circuitos basados en los teoremas de Thevenin y Norton.
New Members
-
Rohit RanaRohit Rana -
Alex VarsakopoulosEPIKINONIA -
Shariful IslamDeakin University
-
kanoote softNone
-
Vanessa IsagaDe La Salle Lipa -
Srikanth ParasuramNone -
epic sportsepicsports -
Ada NwokejiStudent Chat Ltd -
Janet LehrRiverside City College -
Jocelyn HerrodNone -
ADITYA RAJMANENiskayuna Central School District -
Jessica GrevenbergLee College -
Tyrone VerdellNone -
Emmanuel Enrique Cardeña BojórquezCECyTEQROO Playa del Carmen I -
John SolomonNevas Technologies
-
Gamze BİRİCİKAtayurt Schools -
Nalin GunawardanaCybersecurity -
Technologynews24x7 comTEHNOLOGYNEWS24x7 -
Laurens van MourikLSIB -
Vasa BuraphadejaAssumption University -
Jill Carnahan-JarvisPikeville College -
Sarah NicholsNone -
David RenderIGen8X Institute
Materials by Discipline
- Application Development (336)
- Business Process Management (62)
- Data and Information Management (93)
- Enterprise Systems and Architecture (2)
- Foundations of Information Systems (18)
- Human Computer Interaction (16)
- IS Project Management (13)
- IS Strategy, Management and Acquisition (5)
- IT Audit and Controls (11)
- IT Infrastructure (568)
- IT Security and Risk Management (56)
- Knowledge Management (13)
- Social Informatics (24)
- System Analysis and Design (129)
Professional Organizations
- Institute of Electrical and Electronics Engineers (IEEE)
- IEEE Education Society
- IEEE Computer Society
- Association for Computing Machinery (ACM)
- Certified Information Systems Security Professional (CISSP)
- Government Cybersecurity
- Certified Ethical Hacker (CEH)
- Consortium for Computing Sciences in Colleges (CCSC)
- Instructional Technology Council (ITC)
- The MASIE Center
- ACM Special Interest Group on Computer Science Education (SIGCSE)
- Online Learning Consortium (formerly Sloan-C)
- Association for Talent Development (ATD)
- The eLearning Guild
- Michigan Association for Computer Users in Learning (MACUL)
- Flipped Learning Network
- United States Distance Learning Organization
Journals & Publications
- Journal of Cybersecurity
- National Cybersecurity Institute Journal
- International Journal of Cyber–Security and Digital Forensics (IJCSDF)
- Journal of Information Assurance & Cybersecurity
- Journal of Cyber Security & Information Systems
- ACM TechNews
- Campus Technology Higher Education Technology Newsletters
- CIO Magazine
- Computerworld
- eCampus News
- OLC Online Learning Journal
- Journal of Information Technology Education: Research (JITE:Research)
- Journal of Information Technology Education: Innovations in Practice (JITE:IIP)
- Journal of Information Technology Education: Discussion Cases (JITE:DC)
- Learning Solutions Magazine
- Network World
- Newsletters by O'Reilly (Free Registration gives you access to free newsletters, online discussions, and more.)
- Today's Campus
Information Technology on the Web
-
Cybersecurity Lessons From The Department Of War's New Cyber Framework - Forbes
Feb 20, 2026 11:21 AM PST
-
AHA recommends 'zero trust' for cybersecurity - RamaOnHealthcare
Feb 20, 2026 10:39 AM PST
-
Cybersecurity stocks fall after Anthropic unveils Claude Code Security | Seeking Alpha
Feb 20, 2026 10:39 AM PST
-
PANW vs. CSCO: Which Cybersecurity Stock Is a Buy Right Now? - February 20, 2026
Feb 20, 2026 10:33 AM PST
-
How Blockchain is Strengthening Cybersecurity in the Modern Age - San Angelo Standard-Times
Feb 20, 2026 09:21 AM PST
-
Analysis-New Cybersecurity Rules for US Defense Industry Create Barrier for Some Small Suppliers
Feb 20, 2026 09:16 AM PST
-
US Treasury Department offers secure AI advice to financial-services firms
Feb 20, 2026 09:10 AM PST
-
BeyondTrust Remote Support exploitation ramps up with backdoors, remote tools
Feb 20, 2026 09:10 AM PST
-
New cybersecurity rules for US defense industry create barrier for some small suppliers | Reuters
Feb 20, 2026 09:07 AM PST
-
Cybersecurity News: CISA's DELL order, Android AI malware, browsers as weak link
Feb 20, 2026 09:01 AM PST
-
Indian American scientist Yuvraj Agarwal wins prestigious cybersecurity award
Feb 20, 2026 08:34 AM PST
-
Computer science professor studies the intersection of cybersecurity and AI - UGA Today
Feb 20, 2026 08:31 AM PST
-
EU4Digital Academy: three free cybersecurity training courses - EU NEIGHBOURS east
Feb 20, 2026 08:25 AM PST
-
NetChoice Files Suit Challenging South Carolina Age-Appropriate Code Design
Feb 20, 2026 07:39 AM PST
-
Friend or foe? AI: The new cybersecurity threat and solutions | TechRadar
Feb 20, 2026 07:18 AM PST
-
Malaysia's VentureTECH invests $7.16M to strengthen national digital resilience in cybersecurity
Feb 20, 2026 07:03 AM PST
-
Cybercrime Magazine Releases Its First YouTube Short, More On The Way
Feb 20, 2026 07:01 AM PST
-
PANW vs. CSCO: Which Cybersecurity Stock Is a Buy Right Now? - Yahoo Finance
Feb 20, 2026 06:53 AM PST
-
Claroty Team82 warns of growing cybersecurity risks in legacy LonTalk protocols across ...
Feb 20, 2026 06:08 AM PST
-
Is Your Cybersecurity Tool Stack Hurting Your Security? - Mondaq
Feb 20, 2026 05:28 AM PST