Monday, April 21, 2025

The Connected World: Why Network Access and Management Matter More Than Ever

In today’s hyperconnected world, our devices don’t just operate—they collaborate. From your phone syncing with your smart TV to your laptop communicating with a remote server halfway across the globe, it’s all powered by networks. These connections are the backbone of modern life, enabling instant access to information, entertainment, services, and each other.

But beneath this convenience lies a complex world of network infrastructure and management that most people don’t see—and often take for granted.


A Brief History of Computer Networking

Let’s rewind a bit. In the 1820s, Charles Babbage introduced the Difference Engine, one of the earliest computing machines. Fast-forward to 1943, and the ENIAC arrived: a massive, vacuum-tube-powered computer capable of complex calculations. Then came the transistor revolution, packing more power into smaller devices. By the 1970s, microprocessors containing thousands of transistors changed the game—and today, CPUs contain upwards of 100 billion transistors (Liu & Wong, 2024).

Back in the day, using a computer meant being physically present at the machine. But the 1960s saw the birth of networks, enabling users to access centralized computers remotely. These early connections laid the foundation for modern networking, including LANs, MANs, and WANs. The decision to adopt TCP/IP as a universal communication protocol allowed the Internet to scale globally, transforming how we live and work. Petrosyan (2024) reported that by 2019, there were 1.01 billion internet hosts worldwide.


Under the Hood: Network Hardware Explained

Connecting to the Internet isn’t just about plugging in a cable or logging onto Wi-Fi. Behind the scenes, your computer’s CPU processes instructions with help from RAM and storage devices like SSDs. But to communicate with other systems, it also needs a Network Interface Card (NIC)—either wired or wireless.

This NIC connects to a router or switch, which in turn links to a modem. The modem’s job? Translate digital signals into forms that can travel over ISP infrastructure like phone lines or fiber optic cables. From there, your data hops across routers until it reaches its destination—whether that’s a streaming service, cloud app, or file server.


Programming and Applications: Making Networks Work

Software is what gives networks their intelligence. Through programming, we create systems that monitor and manage data traffic. For example, firewalls are programmed to recognize and block malicious activity. Modern networks also use encryption, like TLS (Transport Layer Security), to secure data from prying eyes.

Applications themselves have evolved too. Many are now web-based, meaning you can run them from any browser with an Internet connection—whether it’s for productivity, entertainment, or finance.


The Architecture That Keeps Us Online

As demand skyrocketed, networks had to evolve. Early connections used dial-up lines with limited speeds. But with DSL, cable, and now fiber optics, we’re pushing past 25 Gb/s. Wireless technology also stepped up, with Wi-Fi 6/6E reaching speeds of up to 9.6 Gb/s—outperforming many wired connections.

To manage this explosion in demand, especially from cloud-based services, businesses are turning to solutions like Software-Defined WAN (SD-WAN). These systems offer flexibility, resilience, and performance by intelligently routing traffic through multiple ISPs (Cisco Systems, n.d.).


Securing the Networked World

More connections mean more opportunities—for innovation, but also for cyber threats. Hackers, data breaches, and outages are real risks. Network administrators use a combination of tools—firewalls, antivirus software, and monitoring systems—to detect and stop threats before they cause damage.

Protecting personally identifiable information (PII) and business data is crucial. With proper network management, organizations can maintain uptime, ensure privacy, and deliver seamless service even in the face of disruptions.


Final Thoughts

We live in a world where connectivity is a given, but it’s not magic—it’s technology, carefully managed and constantly evolving. From the early days of mainframes to today’s global Internet, networks have transformed the way we work, play, and interact. And as we continue to build our digital future, strong network management will be key to keeping everything fast, safe, and reliable.


References

Cisco Systems, Inc. (n.d.). What is SD-WAN? https://www.cisco.com/c/en/us/solutions/enterprise-networks/sd-wan/what-is-sd-wan.html

Liu, M. & Wong, H.-S. P. (2024, March 28). How we’ll reach a 1 trillion transistor GPU. IEEE Spectrum. https://spectrum.ieee.org/trillion-transistor-gpu

Petrosyan, A. (2024, February 13). Number of worldwide internet hosts in the domain name system (DNS) from 1993 to 2019. Statista. https://www.statista.com/statistics/264473/number-of-internet-hosts-in-the-domain-name-system/

Monday, April 14, 2025

Protecting What Matters: Why Data Security Should Be Everyone’s Priority

In today’s hyper-connected world, data is everywhere—and so are the threats that come with it. From personal devices to massive enterprise networks, every system that connects to the internet becomes a potential target. Whether it’s financial records, private communications, or sensitive business intel, the information we store digitally needs to be protected at all costs.

But what are we protecting it from? And how can we defend against the growing arsenal of digital attacks?


What We’re Up Against: The Most Common Cyber Threats

Cyberattacks come in many forms, each with its own tactic and target. Some are designed to steal data, others to destroy it, and some simply aim to wreak havoc. Here are a few of the most common:

🔥 Malware

Short for "malicious software," malware includes viruses, worms, and spyware.

  • Viruses spread through user interaction—like opening an infected file—and can corrupt or delete system data.

  • Worms take it further by self-replicating across networks with no human help, often crashing systems or installing backdoors.

  • Spyware quietly monitors your activity, capturing everything from passwords to banking details.

💰 Ransomware

Ransomware locks you out of your system or encrypts your files until you pay a fee—often in cryptocurrency. A major example was the Colonial Pipeline attack, where 100 million gallons of fuel delivery were disrupted, costing $4.4 million in ransom. Not all ransoms guarantee recovery, and the damage can extend far beyond the dollar amount.

🎯 Phishing, Pharming & Social Engineering

These attacks target people, not systems.

  • Phishing tricks you into revealing sensitive info via fake emails, texts, or websites.

  • Pharming redirects you to fraudulent websites even when you enter the correct URL.

  • Social engineering manipulates users into giving up access—sometimes by pretending to be IT support or leaving USB drives in public places.

🚫 Denial of Service (DoS) Attacks

These attacks aim to crash websites or networks by overwhelming them with traffic. A Distributed Denial of Service (DDoS) attack can involve thousands of devices. From UDP floods to Ping of Death attacks, these assaults can cripple services and disrupt businesses.


Why Systems Are So Vulnerable

Computers don’t make decisions—they just follow instructions. If malicious code sneaks in and tells a system to do something damaging, it does so without question. Whether it's an infected email attachment or an unpatched vulnerability, attackers only need one weak spot to get in.

And while internet-connected systems are obvious targets, even offline devices are at risk. A planted USB stick or an unlocked workstation can be all it takes.


Spotting the Signs of a Breach

If a system starts crashing unexpectedly, files become inaccessible, or users see ransom demands on their screen, you’re likely dealing with an active breach. Other symptoms include:

  • Sluggish performance

  • Unusual network activity

  • Unexpected pop-ups or warnings

  • Locked or encrypted files

Identifying these early can limit damage and speed up recovery.


How to Stay Protected

Cybersecurity isn’t about one single solution—it’s about layered defenses. Here are some best practices for keeping systems and data safe:

🔒 Strong Passwords & Physical Security

Use complex, unique passwords—preferably 14 characters or more. Lock your workstation when stepping away. A strong password is hard to crack, but it’s much easier for hackers to just trick someone into revealing it.

🧠 User Awareness & Training

Train users to recognize phishing attempts, suspicious links, and social engineering tactics. Many cyberattacks succeed not because of weak software, but because of unprepared users.

🛡️ Security Tools

  • Antivirus software can detect and remove known malware threats.

  • Firewalls monitor and filter incoming and outgoing traffic.

  • Network monitoring tools can spot anomalies, such as DDoS attempts.

🚨 Incident Response

If a breach occurs, disconnect the compromised device immediately. Then call in cybersecurity experts to assess the damage, apply patches, and ensure the attacker can’t get back in.

🧰 Adopt a Framework

Following a standard like the NIST Cybersecurity Framework helps organizations stay proactive. It provides clear guidance on identifying, protecting, detecting, responding to, and recovering from cyber threats.

“Keeping information safe is so important, working in this part of technology requires a lot of focus, discipline, and a clear understanding of security concepts.”
TestOut Corp. (2024)


Final Thoughts

Cybersecurity is no longer just the IT department’s problem—it’s everyone’s responsibility. As attackers evolve, so must our defenses. Staying informed, alert, and proactive is key to keeping personal and organizational data safe.

Whether you’re managing servers or checking your email at work, understanding the risks—and how to avoid them—helps protect what matters most.


Reference

TestOut Corp. (2024). Certmaster learn tech+. http://www.testout.com

Thursday, April 10, 2025

How Technology Is Transforming the Financial Industry—From the Inside Out

Working in the financial industry doesn’t always mean you're counting money or approving loans. I work behind the scenes—in the technology department of a credit union—and while I don’t directly interact with members, I get a front-row seat to how critical technology has become to every corner of the organization.

A Tech-Driven Workplace

Even without firsthand experience in our member-facing roles, one thing is clear: technology powers everything. Whether it's a teller at a branch or someone processing a loan remotely, every employee relies on at least one computer—many use tablets or mobile devices as well. These tools connect them to our core financial systems, where transactions are processed and sensitive financial data is stored.

In many cases, our tools extend beyond in-house systems. Cloud-based platforms, such as our loan application software, make it possible to streamline workflows and scale our services. Long gone are the days of paper records and file cabinets. Today, digital literacy is non-negotiable—you need to know your way around a computer to work in this industry.

But it’s not just about functionality. Security and resilience are just as important. With nearly 200 servers split between a primary data center and a disaster recovery site, we’ve built our infrastructure to withstand even the most catastrophic events—yes, even a meteor strike. Our business continuity strategy includes full duplication of critical systems across geographic locations to ensure we’re always up and running.


The Road Ahead: Technology’s Growing Role

As technology continues to evolve, so does its influence on the financial industry. One of the most exciting shifts is the rise of digital banking. We’re actively improving our online and mobile banking channels to meet the expectations of younger, more tech-savvy members. These platforms not only offer convenience—they also allow us to process more transactions simultaneously, without requiring staff to be involved in every interaction.

And that’s just the beginning.

Quantum computing is on the horizon, promising the ability to handle even higher volumes of transactions with fewer physical servers. Meanwhile, artificial intelligence is already making its way into our workflows. From automating loan approvals to handling routine tasks, AI is freeing up human employees to focus on more complex, value-driven work.


A Glimpse Into the Future

Looking ahead, I believe technology will continue to drive efficiency, accuracy, and scalability in finance. Over the next decade, we’ll likely see a shift in roles—fewer customer-facing employees, and more tech professionals specializing in systems administration, application development, and business intelligence.

The financial institutions that thrive will be the ones that not only adopt new technologies but embrace them as core to their strategy and operations.


Final Thoughts

Technology is no longer a support function in finance—it’s a foundational pillar. Whether you’re managing infrastructure or building member-facing applications, the future of this industry belongs to those who understand and innovate with technology.

Thursday, April 3, 2025

What I Learned from Pinging and Tracing the Web

 Ever wonder how fast your device connects to different parts of the world—or what path it takes to get there? I recently ran a few ping and traceroute tests from my home PC, and the results were both surprising and informative. Here's what I found.

Pinging Across the Globe

To kick things off, I pinged three websites from my PC based in Arizona:

  • Google.com

    • ✅ 4 packets sent, 4 received—no losses

    • 📶 Speeds ranged from 62ms to 78ms, with an average of 71ms

  • japan.kantei.go.jp (The official site of Japan’s Prime Minister)

    • ✅ 4 packets sent, 4 received—again, no losses

    • 📶 Response times ranged from 53ms to 65ms, averaging 60ms

  • artificialintelligenceact.eu (A site for EU AI legislation)

    • ✅ 4 packets sent and received

    • 📶 But the speeds were all over the place—from 112ms to 144ms, with an average of 135ms

Despite being based in Arizona, pinging a Japanese government site was faster than connecting to the EU site, even though Japan is further away. Interesting, right? More on that in a minute.


Following the Path with Traceroute

Next, I ran traceroutes to the same three websites to see the path my data took.

  • Google.com

    • 🛣 14 hops to reach the final IP: 142.250.68.238

    • ⚠️ Hops 5 and 6 showed possible packet loss, with a spike up to 220ms on one attempt at hop 5

  • japan.kantei.go.jp

    • 🛣 11 hops total, but 6 didn’t respond or timed out

    • 🕒 The final hop had an average response time of 73ms

  • artificialintelligenceact.eu

    • 🛣 17 hops, 3 of which didn’t respond

    • 🕒 The final hop clocked in with an average of 144ms

Timeouts don’t always mean something's broken—some routers are simply configured not to respond to ping or traceroute requests. Still, they’re helpful when diagnosing connection issues.


What These Tests Taught Me

At first glance, you might expect that the further away a site is, the slower the connection. But that’s not always the case.

Despite the Japan site being physically further from Arizona than the EU site, it had a much faster round-trip time (RTT). After a little digging with an IP lookup tool, I found that:

  • japan.kantei.go.jp is hosted in Seattle, WA

  • artificialintelligenceact.eu is hosted in Cedar Knolls, NJ

  • google.com connects to a server in Phoenix, AZ

So, even though the Japan site is associated with Asia, it’s actually hosted just a few states away—explaining the speedy RTT.

Meanwhile, the traceroute to Google revealed a slowdown around hops 5 and 6. That’s a perfect example of why traceroute is a useful tool. If you suspect a website is slow or unreachable, traceroute can pinpoint whether the issue is with your own network—or somewhere farther down the line.

In my case, I sometimes run these tests when people report website issues. If I can see responses beyond our internal network and firewall, I know the problem isn't on our end.


Final Thoughts

Tools like ping and traceroute are simple but powerful ways to diagnose network performance. They can uncover everything from packet loss to misconfigured routers—and they’re great for understanding how the internet really works under the hood.

So the next time a website feels slow, don’t just blame your Wi-Fi. Take a few moments to run these tests—you might be surprised by what you find.

Applying Algorithmic Design and Data Structures

  Object-oriented programming languages rely heavily on algorithms and data structures to solve problems efficiently. Because the types of...