Tony DeGonia

Consultant - Cyber Security, Cloud Services, Physical Security

Highly proficient, knowledgeable and motivated Sales Engineer with a successful track record of sales success across 2 decades. Motivated professional who excels at delivering quality service while exceeding revenue benchmarks on a consistent basis. Well versed in multiple security domains including, cyber, cloud, networking and physical (IP/CCTV). Equally comfortable installing and deploying cutting edge technology, negotiating sales contracts from SMB to Large Enterprise or speaking/training on an advanced technology subjects to an audience of 400 or more. I am available for immediate employment either via W2 or 1099. If you are a client and would like to contract my services as a consultant please contact me via email or telephone and we can discuss the issues and my rates at that time. Thank you for visiting my website.

Cyber Security Proficiency

%

Cloud Services Proficiency

%

Networking Proficiency

%

Physical Security Proficiency

%

Bible verse of the day

But since sexual immorality is occurring, each man should have sexual relations with his own wife, and each woman with her own husband.

Login

You are not logged in.
Wills Point, TX
50°
clear sky
humidity: 87%
wind: 5mph NNE
H 55 • L 53
62°
Mon
66°
Tue
60°
Wed
58°
Thu
Weather from OpenWeatherMap

Articles

I write and curate articles for this site that I think may be helpful, educational and even some that are original works. I am also a published author of a number of articles on different technology subjects, not just through my own website but through nationally known channels as well. I have also been quoted for numerous articles as a subject matter expert in the fields of Managed Services and Cloud Services.

Search our Articles

Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages

What is a Subnet?

A subnet is division of an IP network (internet protocol suite), where an IP network is a set of communications protocols used on the Internet and other similar networks. It (more…)

UTM

Magic Quadrant for Security Information and Event Management

Published: 04 December 2017 ID: G00315428 Analyst(s): Kelly M. Kavanagh, Toby Bussa Summary Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. Advanced users seek SIEM (more…)

H.264/AVC 4×4 Transform and Quantization

1 Overview In an H.264/AVC codec, macroblock data are transformed and quantized prior to coding and rescaled and inverse transformed prior to reconstruction and display (Figure 1). Several transforms are specified (more…)

H.264/AVC Picture Management

1 Introduction This document introduces the parameters and processes involved in managing coded frames within the H.264/AVC standard. This document is informative only and readers should refer to the standard (more…)

H.264/AVC Loop Filter

1 Introduction This document describes the methods of filtering reconstructed blocks in an H.264 video compression codec. 2 Description of reconstruction filter A filter can be applied to every decoded (more…)

H.264/AVC Context Adaptive Variable Length Coding

1 Introduction The H.264 / AVC standard specifies two types of entropy coding: Context-based Adaptive Binary Arithmetic Coding (CABAC) and Variable-Length Coding (VLC). The Variable-Length Coding scheme is described in (more…)

H.264/AVC Inter Prediction

1 Introduction This document describes the methods of predicting inter-coded macroblocks in P-slices in an H.264 video compression codec. Inter prediction creates a prediction model from one or more previously encoded (more…)

1 What is H.264?

H.264 is an industry standard for video compression, the process of converting digital video into a format that takes up less capacity when it is stored or transmitted. Video compression (more…)

UTM

Magic Quadrant for UTM (Unified Threat Management)

Published: 20 June 2017 ID: G00316047 Analyst(s): Jeremy D’Hoinne, Rajpreet Kaur, Adam Hils Summary SMB multifunction firewalls, or UTM, provide SMBs and distributed enterprises with multiple security functions in a single (more…)

BGP

Networking 101: Understanding BGP Routing

BGP – Border Gateway Protocol can be critical for successful enterprise network administration. BGP – The Border Gateway Protocol (BGP) is the routing protocol of the Internet, used to route (more…)

IPSec - Internet Security Protocol

IPSec – Internet Protocol Security

IPSec is one of the new buzz words these days in the networking security area. It’s becoming very popular and also a standard in most operating systems. Windows 2000 fully (more…)

IPSec VPN - Let Me Explain

Understanding VPN IPSec – Let Me Show You.

IPSec VPN protocols objective is to provide security services for IP packets such as encrypting sensitive data, authentication, protection against replay and data confidentiality. As outlined in our IPSec protocol (more…)

Microsoft - WannaCry

Experts: Cyberattack hard to mimic – WannaCry

Anick Jesdanun, AP Technology Writer Associated Press May 13, 2017 WannaCry Ransomware. NEW YORK (AP) — The cyberextortion attack hitting dozens of countries spread quickly and widely thanks to an unusual (more…)

Member of The Internet Defense League

Member Infragard North Texas

Subscribe to Our Newsletter

Subscribe to our newsletter and join 14 other subscribers. Get all the latest content: Blog Posts, Podcasts, Training Videos and more all written or curated by Tony DeGonia.

Social Media