November 2, 2012  11:13 PM

A Few Fundamental Features of IPv6 Internetworking – Part II



Posted by: Robert Davis
Authentication, Availability Management, Cloud Computing, Configuration Management, Encapsulating Security Payload, ICT, Information and Communication Technology, Information Technology Service Management, Infrastructure Management, Internet, Internet Governance, Internet Protocol Security, IPSec, IT Hardware, IT Security, Multiprocessing, Service Delivery

Packet-switched networking model As presented in the article A Few Fundamentals of Networking Electronically Encoded Data, data must be organized for transmission. Thus, the creation of usable telecommunication packets requires appending a unique header to the message destined...


November 1, 2012  3:28 AM

A Few Fundamental Features of IPv6 Internetworking – Part I



Posted by: Robert Davis
Authentication, Availability Management, Cloud Computing, Configuration, Encapsulating Security Payload, ICT, Information and Communication Technology, Information Technology Service Management, Infrastructure Management, Internet, Internet Governance, Internet Protocol Security, IPSec, IT Architecture, IT Hardware, IT Security, Multiprocessing, Service Delivery

The Internet is a worldwide system of computer networks in which users at any one computer can, if they have permission, get information from any other connected computer. Internet protocols are a support structure for...


July 27, 2012  11:39 PM

IT Hardware Duplicity and Echo Checks – Part II



Posted by: Robert Davis
Configuration Management, Control Methods, Echo Check, Hardware Controls, Information Communication Technology, Information Security, Infrastructure Management, Integrity, Internet, IT Architecture, IT Configuration, IT Hardware, IT Security, Risk Management

Duplicate operations may be performed on independent IT hardware components or on the same component. Alternatively, the repeat operation may be complimentary to the initial operation, such as where a read is performed after a write to check what was written. Duplicate operations are commonly...


July 25, 2012  12:08 AM

IT Hardware Duplicity and Echo Checks – Part I



Posted by: Robert Davis
Configuration Management, Control Methods, Echo Check, Hardware Controls, Information Communication Technology, Information Security, Infrastructure Management, Integrity, Internet, IT Architecture, IT Configuration, IT Hardware, IT Security, Risk Management

[caption id="attachment_1352" align="alignleft" width="285"]

Bookmark and Share     0 Comments     RSS Feed     Email a friend


July 21, 2012  12:16 AM

IT Hardware Redundancy Checks Using Parity Bits – Part IV



Posted by: Robert Davis
Configuration Management, Hardware Controls, Information Communication Technology, Information Security, Infrastructure Management, Integrity, Internet, IT Architecture, IT Configuration, IT Hardware, IT Security, Risk Management

Reducing data reliability and integrity risks from IT hardware When properly deployed, parity bits can be utilized to detect communication errors between IT hardware items. An advantage of the double parity bit is that an error is defined in two dimensions:...


July 18, 2012  1:51 AM

IT Hardware Redundancy Checks Using Parity Bits – Part III



Posted by: Robert Davis
Configuration Management, Hardware Controls, Information Communication Technology, Information Security, Infrastructure Management, Integrity, Internet, IT Configuration, IT Hardware, IT Security, Risk Management

Parity bits as a foundation for redundancy checks One of the simplest error detection schemes is parity checking. Classically, parity checks are deployed to maintain information integrity. Parity checks are generally considered a hardware control that requires calculation for...


July 13, 2012  11:50 PM

IT Hardware Redundancy Checks Using Parity Bits – Part II



Posted by: Robert Davis
Configuration Management, Hardware Controls, Information Communication Technology, Information Security, Infrastructure Management, Integrity, Internet, IT Configuration, IT Hardware, IT Security, Risk Management

How electronically encoded bits become redundant Generation of extra bits for a redundancy check is derived from the relevant data and, therefore, bears a logical relationship to the data. This logical relationship is only a control association and has no modifying effect on...


July 10, 2012  11:51 PM

IT Hardware Redundancy Checks Using Parity Bits – Part I



Posted by: Robert Davis
Configuration Management, Hardware Controls, Information Communication Technology, Information Security, Infrastructure Management, Integrity, Internet, IT Configuration, IT Hardware, IT Security, Risk Management

When properly deployed, parity bits can be utilized to detect communication errors between IT hardware items and enable corrective measures. Specifically, redundancy checks are a method of inspecting for errors in IT processing. The application of


June 9, 2009  9:33 PM

Digital Rights Management – Part IV



Posted by: Robert Davis
DRM, IAP, Information Asset Protection, Information Security Governance, Intellectual Property Right, Internet, Internet Governance, IPR, ISG, Trust Management, WIPO, World Intellectual Property Organization, World Trade Organization, WTO

IPR protection requirements shape complex and challenging management issues. Audio and visual material protection is especially problematic due to the existence of the various known vulnerabilities, and...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: