Technologycircle.blog

Please let us know your thoughts about our posts.

  • Week 10 blog post

    I do not take credit for creating the below information. I do not own the original writing.

    I am doing this for class assignment.

  • Blog post for week nine.

    I do not take ownership or credit for the resource which I will share in this post.

    I am writing this for my class assignment only.

    In my research of this week’s lesson, I found many resources that teach concepts of cybersecurity. One book is  

    Big Breaches: Cybersecurity Lessons for Everyone 

    Authors: Neil Daswani, Moudy Elbayadi 

    Rating: 4.8/5 

    This book breaks down several data breaches occurring in large companies, including Capital One, Equifax, and Facebook. It looks at the root cause of data breaches: phishing, malware, and software vulnerabilities. 

    Not only will you come out the other side with a more robust understanding of how data breaches happen, but you’ll also see lessons applied to the high-profile company examples that can make it easier to understand and recognize. 

    Topics Covered: 

    • What causes data breaches and corporate examples 
    • Habits and advice for highly effective security 
    • Technology defenses for fighting breaches 

    Buy on Amazon 

        This is only one resource. 

  • This article is only being shared as part of my assignment. I do not take credit for this information or claim any ownership whatsoever. The author is listed as David P.  Introduction to Segment Routing 

    Segment Routing is one of the new kids on the block in the routing area, and perfectly fits both the paradigm of autonomous networking, and the SDN approach with centralized and application-driven path control. In this document, I would like to share an introduction to Segment Routing, its roots, and its applications. 

    Segment Routing heavily reuses concepts from another two major technologies – Multi Protocol Label Switching (MPLS), and Source Routing. It is therefore advantageous to revisit their most important properties. 

    MPLS – A Quick Review 

    This article assumes basic understanding of MPLS inner mechanisms and forwarding process. For an introduction into MPLS in a manageable and not-burdensome way, I invite you to read a blog written earlier: MPLS History and building blocks 

    https://learningnetwork.cisco.com/s/blogs/a0D3i0000002SKP6EA0/introduction-to-segment-routing

  • Week seven blog post

    What is layer 1 and layer 2 in networking?

    Layer 1 provides the physical infrastructure and encoding schemes, ensuring that data can traverse the network medium accurately. Layer 2 builds upon this foundation, framing data and enabling devices to communicate efficiently.Oct 24, 2023

    Unveiling the Wonders of Ethernet: Layer 1 vs. Layer 2 – LinkedIn

    LinkedInhttps://www.linkedin.com › pulse › unveiling-wonders-et…

    I am posting this for my class. I do not own or take any credit for the above information. It is for viewing in my class environment.

  • Week six blog post

    There is an excellent source of information concerning IPv4 and IPv6 addresses and much more at Juniper.net. The title of the article is Understanding IPv4 and IPv6 Protocol Families. The link is: https://www.juniper.net./documentation/us/en

    I do not own the information and do not take credit for any information. This information is only to fulfill a class assignment.  

  • Week five blog post

    =

    CertBros on YouTube has an excellent video explaining port numbers. 

    https://study-ccna,com/ports-explained/ has an excellent explanation of port numbers also. 

    I do not own the information shown on these study guides. These names and links are only for my assignment for my class.

massa. Quisque non pharetra ex. Nam quis ipsum luctus, consectetur elit nec, interdum justo. Vivamus ac cursus purus. Pellentesque in justo mauris. Vivamus vitae imperdiet nisl. Ut eget leo sollicitudin, rutrum est id, sagittis turpis.

Aliquam pharetra lobortis lorem, ac scelerisque metus pretium quis. Maecenas vitae dui vel tellus viverra tincidunt in et quam. Aliquam sed urna id lacus tempor mollis vel nec nisi. Phasellus sed urna nec ligula egestas accumsan sed eu ante. Mauris sit amet nisi lorem. Curabitur feugiat ante sed eros tincidunt, ac facilisis enim iaculis. Nulla sodales ac lectus sit amet dictum. In volutpat urna vel leo egestas sagittis. Praesent ornare vulputate massa, non bibendum libero egestas in. Suspendisse semper, ante et faucibus aliquam, risus ligula bibendum eros, id varius lacus eros nec leo. Sed sit amet nibh in lorem ornare congue. Mauris nec massa auctor, interdum erat vitae, tristique tortor. Aliquam accumsan nec velit ut volutpat.

Section label

Week four blog post

The first HDD drive system was the IBM Model 350 Disk File and it appeared in 1956. It consisted of fifty 24 inch disks which could hold up to 3.75 MB of data. It was a huge device, weighing over a ton and had to be transported by fork lift.

Link: https://www.dataclinic.co.uk

I do not take credit for the information in this post.

I am using it for class assignment.