{"id":128,"date":"2011-02-07T17:01:21","date_gmt":"2011-02-07T21:01:21","guid":{"rendered":"http:\/\/mail.ale.org\/?p=128"},"modified":"2011-02-07T17:11:49","modified_gmt":"2011-02-07T21:11:49","slug":"ale-central-mtg-for-thursday-february-17-2011","status":"publish","type":"post","link":"https:\/\/ale.org\/?p=128","title":{"rendered":"ALE CENTRAL MTG. for Thursday, February 17, 2011"},"content":{"rendered":"<p><strong><br \/>\nThe feature presentation for our ALE Central Meeting<br \/>\nat 7:30pm on Thursday, February 17th, 2011 will be: <font size=\"+1\"><\/p>\n<p>&#8220;Networking &#038; Network Security Basics&#8221;<\/font><br \/>\n    with Michael Trausch <\/strong><\/p>\n<p>Synopsis:<br \/>\n&#8211; Computer networks are something that we see simply everywhere<br \/>\nnow.  From the basic corner store to large corporate buildings, in most<br \/>\nhomes and nearly all businesses, there are networks, both wired and<br \/>\nwireless.  Networking technology continues to evolve as well, so<br \/>\nnetworking devices have gotten smaller and less expensive, while<br \/>\nimplementing networks has become easier and more automated.<br \/>\nThe big downside of this ubiquity and automation is that our networks<br \/>\nhave become harder to secure, particularly when they carry important<br \/>\ndata (for all values of &#8220;important&#8221; that may apply).<\/p>\n<p>&#8211; Security considerations exist throughout the network and at every<br \/>\nlevel of the technology, from the network edge(s), the centralized<br \/>\ngateways, and the various nodes (computer systems, embedded<br \/>\ndevices, or otherwise), throughout the software applications and<br \/>\non down to the most vulnerable component, the human users.<br \/>\nThis presentation will touch on aspects of all of these.<\/p>\n<p>Bio:<br \/>\nMichael B. Trausch (a.k.a. \u00e2\u20ac\u0153the genius who locked his keys in his car<br \/>\nat the January meeting\u00e2\u20ac\u009d) is an independent consultant and developer<br \/>\nperforming all manner of IT services using free software, including<br \/>\nnetwork systems administration and programming (in many different<br \/>\nand often disliked languages).  He works from home (when everything<br \/>\nis going well&#8230;) and devotes much of his time to parenting his five<br \/>\nyear old son, Benjamin.  He is an advocate for free software, public<br \/>\neducation, and freedom in general, accepting the responsibilities that<br \/>\ncome with it.  He is also obsessed with typography and Unicode, and<br \/>\ndrinks way too much coffee.  ;-)<br \/>\n[editors note: there is no such thing as too much coffee]<\/p>\n<p>Additional resources:<br \/>\n&#8211; Slides will be made available for download, as well as a list of<br \/>\nlinks to reading material that will cover all of the topics mentioned<br \/>\nin greater depth.<\/p>\n<p>=============<br \/>\nThe meeting will be held at Emory Law School in our<br \/>\nusual Gambrel Hall, room 1C venue.<br \/>\nOur meeting time frame is 7:30pm to ~9:30pm<br \/>\nDirections to Emory Law School can be found at<br \/>\n<a href=\"http:\/\/mail.ale.org\/?page_id=2\">http:\/\/ale.org\/?page_id=2<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The feature presentation for our ALE Central Meeting at 7:30pm on Thursday, February 17th, 2011 will be: &#8220;Networking &#038; Network Security Basics&#8221; with Michael Trausch Synopsis: &#8211; Computer networks are something that we see simply everywhere now. From the basic corner store to large corporate buildings, in most homes and nearly all businesses, there are [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,4],"tags":[],"class_list":["post-128","post","type-post","status-publish","format-standard","hentry","category-ale-central","category-announcements"],"_links":{"self":[{"href":"https:\/\/ale.org\/index.php?rest_route=\/wp\/v2\/posts\/128","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ale.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ale.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ale.org\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/ale.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=128"}],"version-history":[{"count":0,"href":"https:\/\/ale.org\/index.php?rest_route=\/wp\/v2\/posts\/128\/revisions"}],"wp:attachment":[{"href":"https:\/\/ale.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=128"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ale.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=128"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ale.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=128"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}