CMST 385 Principles of Web Design and Technology is an undergraduate web design course taught at the University of Maryland University College. The online version of the class involves the use of WebTycho and weekly conferencing. For a long time, supplemental learning resources have been used in this class including videos, presentations and external reading materials to assist with student...
Human Cognition Factors in Online Messaging
In a hypothetical study, the Interaction Design and Information Architecture (IDIA) department at the University of Baltimore decided to promote their Humans Computers and Cognition (IDIA 640) course to prospective students already enrolled in the program and to those interested in the field. In order to foster interest in the program, it was decided that a banner or ticker should be deployed...
“We Choose the Moon” From a Human Attention Perspective
Web based games and interactive applications have become a common means of teaching a wide range of concepts throughout K-12 schools in the United States. With the declining costs of hardware and software coupled with the increase of available bandwidth and transfer speeds, the development of educational applications has advanced significantly in the last five years.
Evaluation of a Major News Website From a Human Cognitive Perspective
Over the last decade, a shift has occurred in the way many people access, read and watch current events and news. From the traditional newspapers and scheduled television news programs, we have moved to a more dynamic interactive medium, which dispenses information in a real-time format. News websites are a fairly young media; however they have evolved exponentially since the late 1990s to the...
Security of Information Systems Infrastructure of an International Airport
This is post 7 of 7 in the series “Cyberspace and Cybersecurity” Government Cybersecurity Initiative for a Universal Internet ID Malicious Code Intrusion Password Cracking – An Exercise Using Cain and Abel to Crack User Passwords What exactly is Cyberspace and Cybersecurity? Security Concerns with Outsourcing IT Services Baseline Security Analyzer – Testing a Standard...
Baseline Security Analyzer – Testing a Standard Installation of Windows Web Server 2008 R2
This is post 6 of 7 in the series “Cyberspace and Cybersecurity” Government Cybersecurity Initiative for a Universal Internet ID Malicious Code Intrusion Password Cracking – An Exercise Using Cain and Abel to Crack User Passwords What exactly is Cyberspace and Cybersecurity? Security Concerns with Outsourcing IT Services Baseline Security Analyzer – Testing a Standard...
Tips on How to be a Successful Blogger
For those that may be unfamiliar with its meaning, the term blog comes from the combination of the words web and log. Blogs can typically consist of entries that include comments on culture, hobbies or everyday life, occasionally featuring a video or music.
Security Concerns with Outsourcing IT Services
This is post 5 of 7 in the series “Cyberspace and Cybersecurity” Government Cybersecurity Initiative for a Universal Internet ID Malicious Code Intrusion Password Cracking – An Exercise Using Cain and Abel to Crack User Passwords What exactly is Cyberspace and Cybersecurity? Security Concerns with Outsourcing IT Services Baseline Security Analyzer – Testing a Standard...
Coldfusion 9 and IIS
I have been developing in ColdFusion for a while locally using the built in web server. Recently at work several of the projects I am involved with moved to an IIS production server. In order to test fully in my local environment I needed to install IIS and setup ColdFusion to use it as the server instead of its built in version.
What exactly is Cyberspace and Cybersecurity?
This is post 4 of 7 in the series “Cyberspace and Cybersecurity” Government Cybersecurity Initiative for a Universal Internet ID Malicious Code Intrusion Password Cracking – An Exercise Using Cain and Abel to Crack User Passwords What exactly is Cyberspace and Cybersecurity? Security Concerns with Outsourcing IT Services Baseline Security Analyzer – Testing a Standard...
Password Cracking – An Exercise Using Cain and Abel to Crack User Passwords
This is post 3 of 7 in the series “Cyberspace and Cybersecurity” Government Cybersecurity Initiative for a Universal Internet ID Malicious Code Intrusion Password Cracking – An Exercise Using Cain and Abel to Crack User Passwords What exactly is Cyberspace and Cybersecurity? Security Concerns with Outsourcing IT Services Baseline Security Analyzer – Testing a Standard...
Malicious Code Intrusion
This is post 2 of 7 in the series “Cyberspace and Cybersecurity” Government Cybersecurity Initiative for a Universal Internet ID Malicious Code Intrusion Password Cracking – An Exercise Using Cain and Abel to Crack User Passwords What exactly is Cyberspace and Cybersecurity? Security Concerns with Outsourcing IT Services Baseline Security Analyzer – Testing a Standard...
Aptana acquired by Appcelerator
Aptana, the company behind the popular programming Integrated Development Environment (IDE) Aptana Studio, announced today that they have been acquired by Appcelerator. Aptana has been the choice for many web development professionals for quite some time.
New Joomla 1.6 Pushes Enterprise Level Features
The new version of the popular Joomla Content Management System (CMS) was released early last week and has already reached over 115k in downloads. 1.6 has been in the making for some time and earlier beta versions have been tested over the last few month. The first release candidate (RC1) was made available for download on December 14th, 2010.
Get the Latest on ColdFusion at CFHour
One of the challenges of having a long commute to work is finding new and interesting ways to make the morning and evening drives more interesting. Over the last year I have found the perfect answer by subscribing to podcasts that I am interested in, which have also served to advance my own personal development and education.
MySpace More Layoffs and Reflecting on What Went Wrong
Last July, Inside the Webb reported on new changes coming to MySpace in an effort to streamline the overall design of the social networking giant. As reported at the time, the changes were long overdue, however overhauling such a large organization was no easy task.
New Cybersecurity Programs begin Second Semester at UMUC
The University of Maryland University College (UMUC) is getting ready to begin its second semester of offering their new Cybersecurity programs, which opened to students in the fall of 2010. Two masters programs as well as an additional specialization in one of their existing information technology degrees were introduced last semester, along with an undergraduate program.
Government Cybersecurity Initiative for a Universal Internet ID
This is post 1 of 7 in the series “Cyberspace and Cybersecurity” Government Cybersecurity Initiative for a Universal Internet ID Malicious Code Intrusion Password Cracking – An Exercise Using Cain and Abel to Crack User Passwords What exactly is Cyberspace and Cybersecurity? Security Concerns with Outsourcing IT Services Baseline Security Analyzer – Testing a Standard...
New Inside The Webb Layout with Genesis
It has been a while since the last major update to Inside The Webb, so I am pleased to post that today I completed customization of the new site layout using Studiopress Genesis WordPress theme framework.