About.

Tony DeGonia

Solutions Architect | Cyber Security | Cloud Services
Highly Experienced Sales Engineer/Solution Architect seeking a new role to focus 100% effort on creating solutions that bring value to an appreciative employer and customer.

Contact Information

469 969 9422 (Cell)
Available anytime via email or cellphone.

12 I know what it is to be in need, and I know what it is to have plenty. I have learned the secret of being content in any and every situation, whether well fed or hungry, whether living in plenty or in want. 13 I can do all this through him who gives me strength.

- Philipians 4:12-13

Articles

1 What is H.264?

H.264 is an industry standard for video compression, the process of converting digital video into a format that takes up less capacity when it is stored or transmitted. Video compression (or video coding) is an essential technology for applications such as digital television, DVD-Video, mobile TV, videoconferencing and internet video streaming. Standardising video compression makes […]

The last 2 weeks have felt like 2 years

The last 2 weeks have felt like 2 years. as many of you know my Mother passed away on July 21, 2017 at 5:30 a.m. While that was devastating to my entire family it was a bittersweet day for my immediate family as we were given the joy of our first grandchild Eribella. She was […]

A Dream

7 Months of Searching for my Dream

To Dream or Not to Dream? Seven months ago, I lost my dream job, and it feels like a lifetime. Let’s face it, there may not really be any such thing as a dream job. Should there be? Perhaps yes, perhaps no. My best answer is… I don’t know. I mean if you have your […]

The Birth of Independence Day – July 4, 1776 or was it?

Independence Day When the initial battles in the Revolutionary War broke out in April 1775, few colonists desired complete independence from Great Britain, and those who did were considered radical. By the middle of the following year, however, many more colonists had come to favor independence, thanks to growing hostility against Britain and the spread […]

multicast routing protocol

Networking 101: Understanding Multicast Routing

Whether you’re watching a celebrity childbirth streaming live from Africa or just trying to help your enterprise network run more efficiently, understanding multicast routing is key. By Charlie Schluting | Posted Jul 27, 2006 Multicast has become a buzzword more than once in history. IP multicast means that one sender is sending data to multiple […]

UTM

Magic Quadrant for UTM (Unified Threat Management)

Published: 20 June 2017 ID: G00316047 Analyst(s): Jeremy D’Hoinne, Rajpreet Kaur, Adam Hils Summary SMB multifunction firewalls, or UTM, provide SMBs and distributed enterprises with multiple security functions in a single appliance. Network security leaders should use this research to evaluate performance, security, ease of use, local support and technology’s ability to handle new SMB practices. […]

BGP

Networking 101: Understanding BGP Routing

BGP – Border Gateway Protocol can be critical for successful enterprise network administration. BGP – The Border Gateway Protocol (BGP) is the routing protocol of the Internet, used to route traffic across the Internet. For that reason, it’s a pretty important protocol, and it can also be the hardest one to understand. From our overview […]

Fathers Day

The History of Fathers Day Explained

The nation’s first Fathers Day was celebrated on June 19, 1910, in the state of Washington. However, it was not until 1972–58 years after President Woodrow Wilson made Mother’s Day official–that the day honoring fathers became a nationwide holiday in the United States. MOTHER’S DAY: INSPIRATION FOR FATHERS DAY The “Mother’s Day” we celebrate today […]

job

6 Months Oh My… It is a job I cannot buy.

6 Months and still no job. In the last 6 months I have worked like crazy to find a job. To no avail, I have found myself and lost myself again. I have went from the highest of highs to the lowest of lows and even had to rethink everything. I have doubted everything about […]

IPSec - Internet Security Protocol

IPSec – Internet Protocol Security

IPSec is one of the new buzz words these days in the networking security area. It’s becoming very popular and also a standard in most operating systems. Windows 2000 fully supports IPSec and that’s most probably where you are likely to find it. Routers these days also support IPSec to establish secure links and to […]

IPSec VPN - Let Me Explain

Understanding VPN IPSec – Let Me Show You.

IPSec VPN protocols objective is to provide security services for IP packets such as encrypting sensitive data, authentication, protection against replay and data confidentiality. As outlined in our IPSec protocol article, Encapsulating Security Payload (ESP) and Authentication Header (AH) are the two IPSec security protocols used to provide these security services.  Analysing  the ESP and […]

Non-Technical Guide to Cybersecurity

Non-Technical Guide to Cyber Risk

Hello Everyone. There is a new resource for the non-technical people who read my posts that is wonderfully simple. I have no affiliation with this organization. It appears as though they are gathering leads to get the resource but, it is worth it. If you don’t know anything about cyber-security or cyber-risk UpGuard has done a […]

Video of the Month