NEC Corporation

Displaying 1-40 of 62 results

  • White Papers // Sep 2013

    A Privacy-Protection Data Processing Solution Based on Cloud Computing

    Following the diffusion of cloud-based services and the consequent increase in the opportunities for handling sensitive data, concerns about leakage and abuse of such data has been increasing. In order to deal with these concerns, this paper introduces suitable countermeasures. These are a technology for preventing data leakage by processing...

    Provided By NEC Corporation

  • White Papers // Sep 2013

    Towards Trustworthy Cloud Storage

    While public clouds are widely used for flexible deployment of online services such as video on demand, email, file sharing, etc., most enterprises still shy away from outsourcing sensitive data to public clouds because of security issues associated with storing data within a potentially untrusted cloud provider. In this paper,...

    Provided By NEC Corporation

  • White Papers // Sep 2013

    Express5800 Server Series and iStorage M Series Storages Contributing to Data Center Power Saving

    The rapid dissemination of mobile terminals and widespread growth in the corporate use of cloud services in recent years have been promoting concentration of IT equipment to data centers. One of the issues of the data center is how to improve the efficiency of the IT equipment concentration in environments...

    Provided By NEC Corporation

  • White Papers // Sep 2013

    Development of Technology to Control Radio Signal Interference for LTE Femtocell Base Stations to Achieve Stable Communications Quality Anywhere

    Demand is accelerating for reliability that mobile communications services can be used in a stable way. In order to cope with the increasing data traffic volume of mobile communications, there is a growing need to install more femtocell base stations covering small indoor areas, in addition to macrocell base stations...

    Provided By NEC Corporation

  • White Papers // Mar 2013

    Efforts to Solve the Congestion Problems of Mobile Communications Services During Major Natural Disasters

    A communications outage may occur as a result of congestion of the mobile communications networks or of multiple and simultaneous physical damages to the transmission lines and communications facilities that comprise the mobile communications networks. Such issues may all be caused by a massive and concentrated occurrence of calls and...

    Provided By NEC Corporation

  • White Papers // Mar 2013

    Implementing Secure Communications for Business-Use Smart Devices by Applying OpenFlow

    The use of smart devices such as Smartphones and tablet terminals makes it possible to benefit from various business services through multiple wireless networks such as 3G, LTE (long-term evolution) and Wi-Fi. Meanwhile, an important issue in the use of smart devices in business is how to ensure security. The...

    Provided By NEC Corporation

  • White Papers // Mar 2013

    Towards a User-Friendly Security-Enhancing BYOD Solution

    Bring Your Own Device (BYOD) is attracting considerable attention now-a-days. In BYOD scenarios, enterprises wish to integrate their employees' mobile devices in enterprise operations (e.g., reading emails and editing documents). This clearly raises serious security concerns since the mobile device in question is not under the control of the enterprise...

    Provided By NEC Corporation

  • White Papers // Mar 2013

    Introduction of Video Communications Cloud Services Compatible with Multiple Devices

    Against the background of an aging population, combined with a diminishing number of children as well as prolonged economic stagnation, there is an ongoing trend in which many public institutions and private enterprises are choosing cloud services for the sake of cost reduction. At the same time, their review of...

    Provided By NEC Corporation

  • White Papers // Mar 2013

    ConforMeeting: A Real-time Conference System Compatible with Smart Devices for Conducting Paperless Meetings

    The recent increase in the diversity of work styles demands changes in the people working environments. People are expecting to work in their favorite places and at their most convenient times, rather than working in a certain place like an office during certain hours. The \"ConforMeeting\" series resolves this issue....

    Provided By NEC Corporation

  • White Papers // Mar 2013

    Smart Device Content Distribution Platform Service Using the BIGLOBE Hosting

    In this paper the authors introduce a platform service for use in distributing content to smart devices. The main targets are the enterprises that want to distribute proprietary content (music, movies, etc.) to consumers via smart devices. The service includes functions such as one that is available by integrating and...

    Provided By NEC Corporation

  • White Papers // Mar 2013

    Remote Desktop Software that Supports Usability of Smart Devices

    An increase in the introduction of enterprise based smart devices has been highlighting issues regarding their introduction, such as effective utilization of existing assets, inheritance of user interfaces and avoidance of the risk of information leaks. The remote desktop for smart devices is a software product designed to solve introduction...

    Provided By NEC Corporation

  • White Papers // Mar 2013

    UNIVERGE Mobile Portal Service: A Smart Device Utilization Platform Optimized for BYOD

    The dissemination of smart devices is rapidly increasing the need for BYOD (\"Bring Your Own Device\"), the use of individually-owned terminals in business. The UNIVERGE mobile portal service allows a variety of smart devices owned by individual employees to safely use the e-mail, address book and groupware systems of their...

    Provided By NEC Corporation

  • White Papers // Mar 2013

    BIGLOBE Cloud Hosting Supports Building of High Quality Services

    BIGLOBE Cloud Hosting is a public cloud of a genuine Japanese IaaS type, which has been awarded numerous prizes by major business magazines. BIGLOBE has been providing various modes of high quality hosting services to businesses for ten years, cultivating servers, networks, storage and virtualization technologies, while improving the functions...

    Provided By NEC Corporation

  • White Papers // Mar 2013

    Smart Mobile Cloud Contributing to the Use of Smart Devices

    Smart devices such as smart phones and tablet terminals are gaining remarkable popularity as their utilization spreads among both consumers and enterprises. As various services are now deployed on smart devices and the volume and complexity of such services are increasing more than ever, it is now necessary for the...

    Provided By NEC Corporation

  • White Papers // Mar 2013

    Authentication Solution Optimized for Smart Devices

    Recently, users of smart devices such as Smartphones and tablet terminals have been increasing both in the business and individual markets. In the business environment, the innovative use of smart devices has already begun and situations in which employees perform business tasks from outside the office by using smart devices...

    Provided By NEC Corporation

  • White Papers // Mar 2013

    Solutions Supporting the Utilization of Smart Devices: System Introduction Case Studies

    Smart devices such as Smartphones and tablet terminals, which have disseminated under the leadership of general consumers, are beginning to be used as IT devices within enterprises. They not only meet the simple need for the replacement of mobile phones, but their abundant features such as light weight, mobility, low...

    Provided By NEC Corporation

  • White Papers // Mar 2013

    Smart Device Management/Security Solutions Regardless of OS or Carrier

    The rapid dissemination of smart devices in recent years has been changing usage from the initial personal use to business use. However, smart devices are often involved in incidents such as theft or loss, so terminal management and security measures are indispensable for business use. This has led to the...

    Provided By NEC Corporation

  • White Papers // Dec 2012

    Information Assessment System Supporting the Organization and Utilization of Data Stored on File Servers

    The information explosion is becoming a real issue, and the amount of information stored on file servers is continuously bloating, making the identification, organization and utilization of information on file server's difficult jobs. The latest version V2.1 of the information assessment tool, a tool for \"Visualization,\" \"Slimming,\" \"Activation\" and \"Optimization\"...

    Provided By NEC Corporation

  • White Papers // Dec 2012

    Express5800/Scalable HA Server Achieving High Reliability and Scalability

    Locating the target data as close as possible to the CPU is of importance in the high-speed processing of a large amount of big data. The express5800/scalable HA server series are servers optimized for use as big data processing platforms capable of using a large-capacity memory of up to 2TB....

    Provided By NEC Corporation

  • White Papers // Dec 2012

    Large-Capacity, High-Reliability Grid Storage: iStorage HS Series (HYDRAstor)

    With the rapid increase in corporate data that must be stored long-term, such as the backup of management information and the archiving of e-mails with customers, the need for safe, easy storage of big data has been rising higher than ever. HYDRAstor is a grid storage system that meets these...

    Provided By NEC Corporation

  • White Papers // Dec 2012

    Extremely-Large-Scale Biometric Authentication System - Its Practical Implementation

    The process of confirming or identifying individuals is an essential component of many social scenarios. As a result, the usefulness of biometric authentication technology using the biometric information of individuals is emphasized, and its use in passports and immigration control is being adopted at an accelerating pace. The Indian Unique...

    Provided By NEC Corporation

  • White Papers // Dec 2012

    MasterScope: Features and Experimental Applications of System Invariant Analysis Technology

    MasterScope middleware is an integrated operation management software suite. MasterScope collects operational and performance metrics from target IT systems and analyzes them comprehensively in order to detect and locate system failures. Detected events and failures will be notified to the operator and workarounds can be applied to recover from failures....

    Provided By NEC Corporation

  • White Papers // Dec 2012

    M2M and Big Data to Realize the Smart City

    M2M technology enables the people to control \"Things\" and to collect various kinds of information from \"Things\". M2M solution CONNEXIVE with the aim of building the next-generation \"Ambient Information Society\". This will help realize a safe and secure lifestyle and a revitalized industrial base. While making the best use of...

    Provided By NEC Corporation

  • White Papers // Dec 2012

    Development of Ultrahigh-Sensitivity Vibration Sensor Technology for Minute Vibration Detection, its Applications

    A vibration sensor is a device that corresponds to the auditory and tactile organs of the human body. The real world is flooded with vibration information generated by humans, goods and environments. The authors recently developed vibration sensor can collect minute waveform data that has been hitherto undetectable and has...

    Provided By NEC Corporation

  • White Papers // Dec 2012

    Text Analysis Technology for Big Data Utilization

    Since a huge amount of the texts included in big data consists of data created by humans for communicating information or expressing intentions to other humans, it is an important information source containing valuable information. This paper introduces some of the recent research. Included are: the recognizing textual entailment technology...

    Provided By NEC Corporation

  • White Papers // Dec 2012

    The Most Advanced Data Mining of the Big Data Era

    Recently, the acquisition of knowledge from big data analysis is becoming an essential feature of business efficiency. However, the analysis of big data can be troublesome because it often involves the collection and storage of mixed data based on different patterns or rules (heterogeneous mixture data). This has made the...

    Provided By NEC Corporation

  • White Papers // Dec 2012

    Scalable Processing of Geo-tagged Data in the Cloud

    Driven by the rapid growth of the mobile internet and the increasing adoption of Machine-To-Machine (M2M) technology, the amount of location data generated by location-enabled mobile devices is growing at an unprecedented rate. The explosive growth of the mobile internet calls for scalable infrastructures capable of processing large amounts of...

    Provided By NEC Corporation

  • White Papers // Dec 2012

    Ultrahigh-Speed Data Analysis Platform \"InfoFrame DWH Appliance\"

    Extraction of valuable information from big data requires not only the traditional analytic approach but also an ad hoc analytic approach that can appraise data from different angles. With the aim of achieving timely extraction of valuable information, the need for ad hoc analysis of big data is increasing rapidly....

    Provided By NEC Corporation

  • White Papers // Dec 2012

    UNIVERGE PF Series: Controlling Communication Flow with SDN Technology

    OpenFlow and Software Defined Network (SDN) are attracting recent attention as next-generation network technologies which, in conjunction with ICT resources such as virtual servers, are capable of improving cloud data center operation efficiency. Big data multiplies and changes every day, and the quantity of data and the required computing/processing capability...

    Provided By NEC Corporation

  • White Papers // Dec 2012

    InfoFrame Table Access Method for Real-Time Processing of Big Data

    The recent increase in sensor devices and the computerization of all kinds of information have brought about an explosive increase in the amount of data. The era of big data is characterized by an increasing need to create new value and new business through the real-time processing of large amounts...

    Provided By NEC Corporation

  • White Papers // Dec 2012

    InfoFrame DataBooster for High-speed Processing of Big Data

    The age of the information explosion has recently been raising various opportunities for big data analysis. On the other hand, the progress in hardware developments has seen a significant increase in the capacities of mountable memories. The InfoFrame DataBooster has been meeting the needs for high-speed processing of big data...

    Provided By NEC Corporation

  • White Papers // Dec 2012

    InfoFrame Relational Store, a New Scale-Out Database for Big Data

    Existing relational databases experience problems when used with big data because they cannot deal flexibly with increases in the amount of data and number of accesses (scaling out). On the other hand, key-value store is an advanced technology but it is also troubled by the problem of lacking data access...

    Provided By NEC Corporation

  • White Papers // Dec 2012

    OSS Hadoop Use in Big Data Processing

    Development of technologies for the processing of \"Big data\" has recently been advanced by network-related enterprises. Apache Hadoop is attracting attention as an OSS that implements storage and distributed processing of petabyte-class big data by means of scaling out based on the above technologies. It has conducted the test for...

    Provided By NEC Corporation

  • White Papers // Jun 2012

    SaaS-Based ERP \"EXPLANNER for SaaS\" to Support the Growth of Enterprises

    The evolution of cloud technology has led to a rapid expansion of the use of the cloud in enterprise systems. SaaS model services have previously been used in the non-mission critical domain such as in groupware. However, they are now expected to spread rapidly as the adopted model of enterprise...

    Provided By NEC Corporation

  • White Papers // May 2012

    A Framework for Detecting Insider Threats Using Psychological Triggers

    Malicious insiders are difficult to detect and prevent, because insiders such as employees have legitimate rights to access organization's resources in order to carry out their responsibilities. To overcome this problem, the authors have developed a framework that detects suspicious insiders using a psychological trigger that impels malicious insiders to...

    Provided By NEC Corporation

  • White Papers // Jun 2010

    Approach to Enterprise Cloud Computing

    More enterprises are positively considering the adoption of cloud computing. The cloud computing market is growing in the fields of consumer services and enterprise front-office task, with American IT vendors currently playing a leading role. On the other hand, by entering these fields at an early stage providing \"Cloud-oriented Service...

    Provided By NEC Corporation

  • White Papers // Jun 2010

    Management System Reforms

    In this paper the authors reducing and restructuring costs while strengthening internal controls. This will be achieved by steering away from their previous dispersed system to a new centralized system, standardizing their business operations (business processes, IT, codes, and infrastructure), and shifting from individual ownership to shared usage based on...

    Provided By NEC Corporation

  • White Papers // Jun 2010

    Business Model Consulting

    In order to deal effectively with changes in the business environment, a review of the management mechanism itself is necessary. A solution to this issue might be to promote \"Standardization of the business process and of IT\" and to optimize the management system by means of \"IT, without owing it.\"...

    Provided By NEC Corporation

  • White Papers // Jun 2010

    SaaS Platform Services

    With recognition of the cloud computing, SaaS and PaaS have been increasing and the need to incorporate these technologies in business operating systems has also been increasing. This paper introduces the \"SaaS platform service,\" which is a PaaS that provides the functions required for the development of SaaS applications for...

    Provided By NEC Corporation

  • White Papers // Jun 2010

    SystemDirector Enterprise for Improving the Development Efficiency of Multitenancy Compatible Applications

    The rapid development of IT technology including the web and virtualization technologies and the increased need for on-demand type applications by business users have promoted rapid developments in SaaS (Software as a Service) via internet. In order to provide multiple service user enterprises (tenants) with applications as services it is...

    Provided By NEC Corporation

  • White Papers // May 2012

    A Framework for Detecting Insider Threats Using Psychological Triggers

    Malicious insiders are difficult to detect and prevent, because insiders such as employees have legitimate rights to access organization's resources in order to carry out their responsibilities. To overcome this problem, the authors have developed a framework that detects suspicious insiders using a psychological trigger that impels malicious insiders to...

    Provided By NEC Corporation

  • White Papers // Dec 2012

    Information Assessment System Supporting the Organization and Utilization of Data Stored on File Servers

    The information explosion is becoming a real issue, and the amount of information stored on file servers is continuously bloating, making the identification, organization and utilization of information on file server's difficult jobs. The latest version V2.1 of the information assessment tool, a tool for \"Visualization,\" \"Slimming,\" \"Activation\" and \"Optimization\"...

    Provided By NEC Corporation

  • White Papers // Sep 2013

    A Privacy-Protection Data Processing Solution Based on Cloud Computing

    Following the diffusion of cloud-based services and the consequent increase in the opportunities for handling sensitive data, concerns about leakage and abuse of such data has been increasing. In order to deal with these concerns, this paper introduces suitable countermeasures. These are a technology for preventing data leakage by processing...

    Provided By NEC Corporation

  • White Papers // Sep 2013

    Towards Trustworthy Cloud Storage

    While public clouds are widely used for flexible deployment of online services such as video on demand, email, file sharing, etc., most enterprises still shy away from outsourcing sensitive data to public clouds because of security issues associated with storing data within a potentially untrusted cloud provider. In this paper,...

    Provided By NEC Corporation

  • White Papers // Sep 2013

    Express5800 Server Series and iStorage M Series Storages Contributing to Data Center Power Saving

    The rapid dissemination of mobile terminals and widespread growth in the corporate use of cloud services in recent years have been promoting concentration of IT equipment to data centers. One of the issues of the data center is how to improve the efficiency of the IT equipment concentration in environments...

    Provided By NEC Corporation

  • White Papers // Dec 2012

    Express5800/Scalable HA Server Achieving High Reliability and Scalability

    Locating the target data as close as possible to the CPU is of importance in the high-speed processing of a large amount of big data. The express5800/scalable HA server series are servers optimized for use as big data processing platforms capable of using a large-capacity memory of up to 2TB....

    Provided By NEC Corporation

  • White Papers // Dec 2012

    Large-Capacity, High-Reliability Grid Storage: iStorage HS Series (HYDRAstor)

    With the rapid increase in corporate data that must be stored long-term, such as the backup of management information and the archiving of e-mails with customers, the need for safe, easy storage of big data has been rising higher than ever. HYDRAstor is a grid storage system that meets these...

    Provided By NEC Corporation

  • White Papers // Dec 2012

    Extremely-Large-Scale Biometric Authentication System - Its Practical Implementation

    The process of confirming or identifying individuals is an essential component of many social scenarios. As a result, the usefulness of biometric authentication technology using the biometric information of individuals is emphasized, and its use in passports and immigration control is being adopted at an accelerating pace. The Indian Unique...

    Provided By NEC Corporation

  • White Papers // Dec 2012

    MasterScope: Features and Experimental Applications of System Invariant Analysis Technology

    MasterScope middleware is an integrated operation management software suite. MasterScope collects operational and performance metrics from target IT systems and analyzes them comprehensively in order to detect and locate system failures. Detected events and failures will be notified to the operator and workarounds can be applied to recover from failures....

    Provided By NEC Corporation

  • White Papers // Dec 2012

    M2M and Big Data to Realize the Smart City

    M2M technology enables the people to control \"Things\" and to collect various kinds of information from \"Things\". M2M solution CONNEXIVE with the aim of building the next-generation \"Ambient Information Society\". This will help realize a safe and secure lifestyle and a revitalized industrial base. While making the best use of...

    Provided By NEC Corporation

  • White Papers // Dec 2012

    Development of Ultrahigh-Sensitivity Vibration Sensor Technology for Minute Vibration Detection, its Applications

    A vibration sensor is a device that corresponds to the auditory and tactile organs of the human body. The real world is flooded with vibration information generated by humans, goods and environments. The authors recently developed vibration sensor can collect minute waveform data that has been hitherto undetectable and has...

    Provided By NEC Corporation

  • White Papers // Dec 2012

    Text Analysis Technology for Big Data Utilization

    Since a huge amount of the texts included in big data consists of data created by humans for communicating information or expressing intentions to other humans, it is an important information source containing valuable information. This paper introduces some of the recent research. Included are: the recognizing textual entailment technology...

    Provided By NEC Corporation

  • White Papers // Dec 2012

    The Most Advanced Data Mining of the Big Data Era

    Recently, the acquisition of knowledge from big data analysis is becoming an essential feature of business efficiency. However, the analysis of big data can be troublesome because it often involves the collection and storage of mixed data based on different patterns or rules (heterogeneous mixture data). This has made the...

    Provided By NEC Corporation

  • White Papers // Dec 2012

    Scalable Processing of Geo-tagged Data in the Cloud

    Driven by the rapid growth of the mobile internet and the increasing adoption of Machine-To-Machine (M2M) technology, the amount of location data generated by location-enabled mobile devices is growing at an unprecedented rate. The explosive growth of the mobile internet calls for scalable infrastructures capable of processing large amounts of...

    Provided By NEC Corporation

  • White Papers // Jun 2010

    Approach to Enterprise Cloud Computing

    More enterprises are positively considering the adoption of cloud computing. The cloud computing market is growing in the fields of consumer services and enterprise front-office task, with American IT vendors currently playing a leading role. On the other hand, by entering these fields at an early stage providing \"Cloud-oriented Service...

    Provided By NEC Corporation

  • White Papers // Jun 2010

    Management System Reforms

    In this paper the authors reducing and restructuring costs while strengthening internal controls. This will be achieved by steering away from their previous dispersed system to a new centralized system, standardizing their business operations (business processes, IT, codes, and infrastructure), and shifting from individual ownership to shared usage based on...

    Provided By NEC Corporation

  • White Papers // Jun 2010

    Business Model Consulting

    In order to deal effectively with changes in the business environment, a review of the management mechanism itself is necessary. A solution to this issue might be to promote \"Standardization of the business process and of IT\" and to optimize the management system by means of \"IT, without owing it.\"...

    Provided By NEC Corporation

  • White Papers // Jun 2012

    SaaS-Based ERP \"EXPLANNER for SaaS\" to Support the Growth of Enterprises

    The evolution of cloud technology has led to a rapid expansion of the use of the cloud in enterprise systems. SaaS model services have previously been used in the non-mission critical domain such as in groupware. However, they are now expected to spread rapidly as the adopted model of enterprise...

    Provided By NEC Corporation

  • White Papers // Jun 2010

    SaaS Platform Services

    With recognition of the cloud computing, SaaS and PaaS have been increasing and the need to incorporate these technologies in business operating systems has also been increasing. This paper introduces the \"SaaS platform service,\" which is a PaaS that provides the functions required for the development of SaaS applications for...

    Provided By NEC Corporation

  • White Papers // Jun 2010

    SystemDirector Enterprise for Improving the Development Efficiency of Multitenancy Compatible Applications

    The rapid development of IT technology including the web and virtualization technologies and the increased need for on-demand type applications by business users have promoted rapid developments in SaaS (Software as a Service) via internet. In order to provide multiple service user enterprises (tenants) with applications as services it is...

    Provided By NEC Corporation

  • White Papers // Jun 2010

    Mashup Platform \"Open Service Repository/Enterprise Gateway\"

    The use of cloud services is expected to expand further in the future and the main requirements for them includes the customization of the services provided to suit existing jobs, use of multiple services for improving the ease of use for all and the combination of external services with existing...

    Provided By NEC Corporation

  • White Papers // Jun 2010

    Shared IT Platform Service \"RIACUBE\"

    The shared IT platform service \"RIACUBE\" introduced in this paper is a service product combining the operation/maintenance technologies that have been designed based on experience in its diverse outsourcing operations together with an advanced data center platform and various product technologies. \"Advancement of open technology has led to the creation...

    Provided By NEC Corporation

  • White Papers // Jun 2010

    Service Execution Platform \"WebOTX\" To Support Cloud Computing

    The trend toward reductions in IT investments due to the current economic climate has tended to focus the authors' attention on cloud computing because it does not require initial capital investment. Nevertheless, even in the cloud environment, the needs of business system infrastructures are essentially the same. The WebOTX operational...

    Provided By NEC Corporation

  • White Papers // Jun 2010

    Data Center Operation for Cloud Computing Age Implemented with MasterScope Ver. 8

    Optimization of IT costs and the \"Cloud computing service\" that is expected to deal quickly and flexibly with changes in future business procedures are currently attracting attention. This paper introduces the requirements of the data center operations management methods that form the foundation for the use by enterprises of cloud...

    Provided By NEC Corporation

  • White Papers // Jun 2010

    Commercialization of the \"Cloud Platform Suite\" and Endeavors Toward a High-Efficiency Server

    The momentum for use of \"Cloud services\" has recently been showing strong gains among enterprises. This is a result of dissemination of the new IT usage mode, which is to use IT without ownership. This paper introduces the cloud platform suite product packages consisting of innovative cloud computing platforms. These...

    Provided By NEC Corporation

  • White Papers // Sep 2013

    Development of Technology to Control Radio Signal Interference for LTE Femtocell Base Stations to Achieve Stable Communications Quality Anywhere

    Demand is accelerating for reliability that mobile communications services can be used in a stable way. In order to cope with the increasing data traffic volume of mobile communications, there is a growing need to install more femtocell base stations covering small indoor areas, in addition to macrocell base stations...

    Provided By NEC Corporation

  • White Papers // Mar 2013

    Efforts to Solve the Congestion Problems of Mobile Communications Services During Major Natural Disasters

    A communications outage may occur as a result of congestion of the mobile communications networks or of multiple and simultaneous physical damages to the transmission lines and communications facilities that comprise the mobile communications networks. Such issues may all be caused by a massive and concentrated occurrence of calls and...

    Provided By NEC Corporation

  • White Papers // Mar 2013

    Implementing Secure Communications for Business-Use Smart Devices by Applying OpenFlow

    The use of smart devices such as Smartphones and tablet terminals makes it possible to benefit from various business services through multiple wireless networks such as 3G, LTE (long-term evolution) and Wi-Fi. Meanwhile, an important issue in the use of smart devices in business is how to ensure security. The...

    Provided By NEC Corporation

  • White Papers // Mar 2013

    Towards a User-Friendly Security-Enhancing BYOD Solution

    Bring Your Own Device (BYOD) is attracting considerable attention now-a-days. In BYOD scenarios, enterprises wish to integrate their employees' mobile devices in enterprise operations (e.g., reading emails and editing documents). This clearly raises serious security concerns since the mobile device in question is not under the control of the enterprise...

    Provided By NEC Corporation

  • White Papers // Mar 2013

    Introduction of Video Communications Cloud Services Compatible with Multiple Devices

    Against the background of an aging population, combined with a diminishing number of children as well as prolonged economic stagnation, there is an ongoing trend in which many public institutions and private enterprises are choosing cloud services for the sake of cost reduction. At the same time, their review of...

    Provided By NEC Corporation

  • White Papers // Mar 2013

    ConforMeeting: A Real-time Conference System Compatible with Smart Devices for Conducting Paperless Meetings

    The recent increase in the diversity of work styles demands changes in the people working environments. People are expecting to work in their favorite places and at their most convenient times, rather than working in a certain place like an office during certain hours. The \"ConforMeeting\" series resolves this issue....

    Provided By NEC Corporation

  • White Papers // Mar 2013

    Smart Device Content Distribution Platform Service Using the BIGLOBE Hosting

    In this paper the authors introduce a platform service for use in distributing content to smart devices. The main targets are the enterprises that want to distribute proprietary content (music, movies, etc.) to consumers via smart devices. The service includes functions such as one that is available by integrating and...

    Provided By NEC Corporation

  • White Papers // Mar 2013

    Remote Desktop Software that Supports Usability of Smart Devices

    An increase in the introduction of enterprise based smart devices has been highlighting issues regarding their introduction, such as effective utilization of existing assets, inheritance of user interfaces and avoidance of the risk of information leaks. The remote desktop for smart devices is a software product designed to solve introduction...

    Provided By NEC Corporation

  • White Papers // Mar 2013

    UNIVERGE Mobile Portal Service: A Smart Device Utilization Platform Optimized for BYOD

    The dissemination of smart devices is rapidly increasing the need for BYOD (\"Bring Your Own Device\"), the use of individually-owned terminals in business. The UNIVERGE mobile portal service allows a variety of smart devices owned by individual employees to safely use the e-mail, address book and groupware systems of their...

    Provided By NEC Corporation

  • White Papers // Mar 2013

    BIGLOBE Cloud Hosting Supports Building of High Quality Services

    BIGLOBE Cloud Hosting is a public cloud of a genuine Japanese IaaS type, which has been awarded numerous prizes by major business magazines. BIGLOBE has been providing various modes of high quality hosting services to businesses for ten years, cultivating servers, networks, storage and virtualization technologies, while improving the functions...

    Provided By NEC Corporation

  • White Papers // Jun 2010

    Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment

    In the cloud computing environment, changing in the resource volume or configuration according to the users' needs is required. As the cloud computing environment spreads, importance of IT/network resource operation increases. For example, swiftness of configuration changes and flexibility of resource deployment are required. Therefore, this research and development has...

    Provided By NEC Corporation

  • White Papers // Mar 2008

    High-Speed Probe Information Collection/Analysis Using Data Stream Processing Platform

    Expectations are increasing for the advanced telematics services that collect the massive data uploaded from automobiles (mobile objects) to a center in order to utilize the results of analyses. The implementation of these services is dependent on an information communication technology capable of collecting massive data and analyzing massive data...

    Provided By NEC Corporation

  • White Papers // Mar 2007

    Cooperative Security Breaks the Limits of Traditional Security Measures

    Just as broadband networking, high-performance and light-weight laptops and useful applications have significantly improved enterprise IT environments, the targets and complexities of security management have also tended to increase significantly. Actions against security problems are now required to be performed in no delay. The resulting movement of information and its...

    Provided By NEC Corporation

  • White Papers // Mar 2007

    Business Content Security: Present Issues and Future Outlook for its Employment

    In daily business work site, a huge amount of electronic documents are produced, stored in server computers or personal computers, and distributed. These documents contain a large number of highly confidential information. Unfortunately, these documents are not managed safely enough so that the risk of a possible leakage of confidential...

    Provided By NEC Corporation

  • White Papers // Mar 2007

    Coordinated Implementation of Facilities and Information Security Systems

    In response to the increasing risk of information leakage, this paper proposes a new direction, incorporating the concept of area security management. In the past, management for people, goods, PCs, networks and information content was implemented individually, however, if all management was coordinated based on \"Integrated ID management,\" it would...

    Provided By NEC Corporation