Category IT

System Virtualization

This post is an introduction to system virtualization. It is part of a series of articles about virtualization. Description of System Virtualization System virtualization implies that a system (such as an operating system is virtualized). Because it was the first…

Cloud Service Modules

This post features cloud service modules. List of Cloud Service Modules Cloud service modules featured on this post: Storage Archive Storage Amazon S3 Glacier Amazon S3 Glacier classes website Azure Archive Storage Azure Archive Storage Google Storage Coldline and Archive…

OT Security

Operational technologies (OT) are hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial equipment, assets, processes and events.. You can read an introduction to OT on this post. OT Security (OT-Sec), Industrial…

Free and Open Source Software Foundations

There are foundations that support and get funds for free and open source software (FOSS). Foundations allow to have vendor-independent organizations that manage FOSS projects, improving neutrality. An example of vendor-dependent FOSS project is Java. This post features a list…

Computer Network Protocols

Network protocols can be classified by the OSI layer where they operate. Computer Network Protocols by OSI Layer This section informs lists computer network protocols by their OSI layer. OSI layer are, in incremental order: Data Link OSI Layer Protocols…

IT Security Legislation

This post features regulations related to IT security. The post focuses on regulations that establish IT security controls. If you want to know regulations that prosecute malicious behavior related to computers or IT and IT crime, please check this post.…