Blog

Results 1-12 of 168 results
  1. Types of 3D Printing Materials, Part Two

    Types of 3D Printing Materials, Part Two

    ABS Acrylonitrile butadiene styrene (ABS) is popular for good reason. It’s tough, more temperature tolerant than some other choices, easy to extrude from the printer’s nozzles and, starting at about $20 for a 1 kilogram spool, it is the least ...

  2. Email Authentication - Is It Enough?

    Email Authentication - Is It Enough?

    Email authentication is a method of validating that the sender of an email is authenticated to the domain it purports to be sent from. In other words, if I send you an email from  it would be run through a series of authentication ...

  3. Funds Awarded to MOREnet Shared Collection With OverDrive to Help K-12 Schools

    The Missouri State Library is pleased to announce it has awarded $27,000 to support the MOREnet Shared Digital Collection with OverDrive. The funding will be used to improve hold times on popular titles and to purchase new titles based on feedback ...

  4. Types of 3D Printing Materials, Part One

    Types of 3D Printing Materials, Part One

    There are many types of materials out there for fused deposition modeling (FDM) 3D printing. These materials vary in strength, heat resistance, even smell. Before you buy 3D filament, here are a few considerations: Printer support: Not all 3D ...

  5. Getting Started Teaching App Development

    Developing your own apps for mobile devices is fun and surprisingly easy and inexpensive to get started with. Here is how to plan for teaching app development. Pick a platform: Making apps for iOS uses different coding and processes than making an ...

  6. Tor - The Onion Router

    Tor - The Onion Router

    Tor is software that will allow the user to move throughout the Internet anonymously. It will encrypt and use multiple layers of nodes and relays to avoid identification and censorship. The software is maintained by the Tor Project, a nonprofit ...

  7. Zoom Quick Tips

    Zoom Quick Tips

    Zoom Quick Tips

  8. Malware - The Hidden Enemy

    Malware - The Hidden Enemy

    Malware is the collective name for malicious code variants, including viruses, that is meant to deliver as much damage and disruption as possible to your device and/or network. It can be delivered to your device in numerous ways. You may visit an ...

  9. Hacker Tracker: A Virtual Cybersecurity Camp

    MOREnet is glad to partner with the University of Missouri Department of Electrical Engineering and the Mizzou Center for Cyber Education, Research and Infrastructure to be part of the team hosting Hacker Tracker, a virtual cybersecurity camp for ...

  10. To Phish or Not to Phish?

    To Phish or Not to Phish?

    That is the question. There are plenty of arguments to share when it comes to phishing simulations in the workplace. Many people feel like it is not fair to “trick” their staff, shame them for falling for the phish or deal with the push back for ...

  11. MOREnet KIDS: The K-20 Interoperable Data Solution

    MOREnet KIDS: The K-20 Interoperable Data Solution

    As key stakeholders in educational institutions make decisions to mold the best learning environment for today’s students, accurate and comprehensive data is crucial to influence the desired outcome. Many of our members currently struggle with ...

  12. EKANS: The Smart Ransomware

    EKANS: The Smart Ransomware

    Ransomware is getting smarter. The EKANS variant has the ability to target potential victims, attacking industrial control systems and then confirming the target by resolving the domain to its IP lists. If the target is not the intended victim, the ...

Results 1-12 of 168 results