Tag list

Web-based IAM Protocols

This post contains web-based Identity and Access Management (IAM) protocols. OpenID allows to use an account from another service. List of Web-based IAM Protocols Web-based Many of these protocols are used in combination to achieve Single Sign-on (SSO) or federation.…

Colleges of Computer Engineers in Spain

This post summarizes colleges, associations or guilds of computer engineers in Spain. National College of Computer Engineers in Spain Consejo de Colegios de Ingeniería Informática (CCII) is a national association in Spain of all regional Colleges of Computer Engineers of…

IT Massive Open Online Courses

This post features Masive Open Online Course (MOOC) sites List of IT MOOC Sites List of popular MOOC sites: EdX EdX was founded by MIT and Harvard. Official website Udemy Official webite Coursera Coursera website MOOC.org Official website DataCamp Official…

Geographic Information System

This post features IT technologies to work with geographic and geographic data. This post is an introduction to GIS. Geospatial Data Structures Geographic data structures featured on this post: GeoJSON GeoJSON official website GIS Digital Images Types of GIS digital…

International Cybersecurity Organizations

This post features international cybersecurity organizations. To find European Union cybersecurity organizations, please check this post. List of International Cybersecurity Organizations List of International Cybersecurity Organizations: FIRST FIRST (Forum of Incident Response and Security Teams) is a global association of…

Open Licenses

An open license, also called free license, in the context of digital content, concedes a set of conditions to an original work that grants permission for anyone to make use, modify and distribute, that work as long as they follow…

AAA Network Protocols

This post summarizes Authentication, Authorization and Accountability (AAA) protocols or AAA network protocols. Do not confuse the AAA protocols with the authentication protocols like EAP, CHAP and PAP. Authentication protocols works in the OSI layers 2 and 3, and AAA…

Functional Programming Languages

This post discuss about functional programming languages, it means, programming languages that use the functional paradigm. In functional programming languages, a desired result is declared as the value of a series of function evaluations, uses evaluation of mathematical functions and…