TATA Communications

Displaying 1-21 of 21 results

  • White Papers // Sep 2013

    A Security Framework in Cloud Computing Infrastructure

    In a typical cloud computing diverse facilitating components like hardware, software, firmware, networking, and services integrate to offer different computational facilities, while Internet or a private network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud system delimit the benefits of cloud computing...

    Provided By TATA Communications

  • White Papers // Jun 2013

    Smartphone Security by Cloud Computing

    Smartphone usage has been continuously growing in recent times. Smartphone's offer Personal Computer (PC) functionality to the end user, hence they are vulnerable to the same sorts of security threats as desktop computers. Cloud computing is a new computing paradigm and a breakthrough technology of recent times. Its growing popularity...

    Provided By TATA Communications

  • White Papers // Mar 2013

    Security and Privacy Issues in Cloud Computing

    Cloud computing transforms the way Information Technology (IT) is consumed and managed, promising improved cost efficiencies, accelerated innovation, faster time-to-market, and the ability to scale applications on demand (Leighton, 2009). According to Gartner, while the hype grew exponentially during 2008 and continued since, it is clear that there is a...

    Provided By TATA Communications

  • White Papers // Mar 2013

    Analyzable Enterprise Models Using Ontology

    While a considerable amount of research on enterprise ontologies exists, work showing how to use ontologies for Enterprise Architecture (EA) analysis is scarce. The authors present their ongoing work on creating analyzable enterprise models using EA-based ontological representation. Their contributions are twofold: first, they show how an existing EA modeling...

    Provided By TATA Communications

  • White Papers // Mar 2013

    Inter-Cloud Data Security Strategies

    Cloud computing is a complex infrastructure of software, hardware, processing, and storage that is available as a service. Cloud computing offers immediate access to large numbers of the world's most sophisticated supercomputers and their corresponding processing power, interconnected at various locations around the world, proffering speed in the tens of...

    Provided By TATA Communications

  • White Papers // Mar 2013

    Cloud Computing -An Approach With Modern Cryptography

    In this paper, the authors are proposing an algorithm which uses AES technique of 128/192/256 bit cipher key in encryption and decryption of data. AES provides high security as compared to other encryption techniques along with RSA. Cloud computing provides the customer with the requested services. It refers to applications...

    Provided By TATA Communications

  • White Papers // Jan 2013

    Increasing Security in Cloud Environment

    The concept of cloud computing was introduced to meet the increase in demand for new application for a project, and to provide a large storage facility whenever or wherever a user needs it. The cloud system facility helped many industries as well as individual users to get authentic software at...

    Provided By TATA Communications

  • White Papers // Dec 2012

    A Heuristic Reputation Based System to Detect Spam Activities in a Social Networking Platform, HRSSSNP

    The introduction of the social networking platform has drastically affected the way individuals interact. Even though most of the effects have been positive, there exist some serious threats associated with the interactions on a social networking website. A considerable proportion of the crimes that occur are initiated through a social...

    Provided By TATA Communications

  • White Papers // Nov 2012

    Business Intelligence on the Cloud Overview, Use Cases and RoI

    The use of Business Intelligence (BI) in the cloud is a game-changer, as it makes BI affordable and easily available as compared to traditional BI. It is expected that customers will slowly but surely migrate from in-house BI to BI in the cloud. Cloud Computing was a big topic of...

    Provided By TATA Communications

  • White Papers // Sep 2012

    Cloud Adoption Lifecycle

    This paper can help an organization in adopting the cloud platform. It shows various stages to go through, from 'What' (Foresee) to 'What Else' (Reinvigorate), in adoption of cloud based infrastructure and services. At the end of this paper an organization would know what are the various stages involved and...

    Provided By TATA Communications

  • White Papers // Aug 2012

    Simulating Business Processes - A Review of Tools and Techniques

    There is a great need for simulation of dynamic/temporal aspects of business processes. The current standard for modeling business processes is BPMN and in this review, the various techniques and tools that use BPMN for simulation are studied. The review also points to shortcomings in BPMN support for simulation and...

    Provided By TATA Communications

  • White Papers // Aug 2012

    A Connected Enterprise-Transformation Through Mobility and Social Networks

    Due to rapid changes in business dynamics, there is a growing demand to encourage social conversations/exchanges and the ability to connect and communicate with peers, partners, customers and other stakeholders anytime, anywhere which drives the need of mobile-enable, the existing enterprise applications. This paper highlights a distinct set of needs...

    Provided By TATA Communications

  • White Papers // Apr 2012

    Business Intelligence on the Cloud: Overview and Use Cases

    The use of Business Intelligence (BI) in the cloud is a game-changer, as it makes BI affordable and easily available as compared to traditional BI. It is expected that customers will slowly but surely migrate from in house BI to BI in the cloud. Cloud Computing was a big topic...

    Provided By TATA Communications

  • White Papers // Mar 2012

    Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) have emerged as a promising concept to meet the challenges in next-generation wireless networks such as providing flexible, adaptive, and reconfigurable architecture while offering cost-effective solutions to service providers (Akyildiz et al., 2005). WMNs are multi-hop networks consisting of mesh routers (MRs), which form wireless mesh...

    Provided By TATA Communications

  • White Papers // Jul 2011

    A Component Abstraction for Business Processes

    With continued increase in business dynamics, it is becoming increasingly harder to deliver purpose-specific business system in the ever-shrinking window of opportunity. As business systems for the same intent tend to be similar but never the same, they have considerable overlap with well-defined differences. Software product line engineering techniques attempt...

    Provided By TATA Communications

  • White Papers // Mar 2011

    Moving From Legacy Systems to Cloud Computing

    Companies must internally address any technology, business process, or security concerns they may have before considering a migration to cloud computing. Once they have made that decision, they should choose the right service and deployment method that best suits their business. Finally, they must select a provider with the experience,...

    Provided By TATA Communications

  • White Papers // Dec 2010

    Edge Assisted Fast Binarization Scheme for Improved Vehicle License Plate Recognition

    Identity of a motor vehicle is usually through its license plate. Automatic vehicle license plate recognition has several applications in intelligent traffic management systems. In this paper, the authors propose and describe a fast edge assisted adaptive binarization technique for improved extraction of text from license plate images captured using...

    Provided By TATA Communications

  • White Papers // May 2010

    Worth Their Watts? - An Empirical Study of Datacenter Servers

    The management of power consumption in datacenters has become an important problem. This needs a systematic evaluation of the as-is scenario to identify potential areas for improvement and quantify the impact of any strategy. The authors present a measurement study of a production datacenter from a joint perspective of power...

    Provided By TATA Communications

  • White Papers // Feb 2010

    Cloud-Based Security Evolution Not Revolution

    Malicious malware and Distributed Denial of Service (DDoS) attacks are wreaking havoc on today's businesses. Over the past few years, these attacks have evolved from random hacking incidents to something far more sinister - criminal acts such as extortion, market manipulation and cyber terrorism. Cleanup is extremely complex and costly...

    Provided By TATA Communications

  • White Papers // Jan 2010

    Marketing To The Masses With On-Demand CRM

    Marketers are facing a more challenging environment than ever. Not only has the number of campaigns and general marketing activities increased inside most organizations, but these activities are growing in complexity. Multichannel marketing has become a given, but managing a high volume of cross-channel campaigns can be difficult without the...

    Provided By TATA Communications

  • White Papers // Jun 2009

    A Distributed Intrusion Detection System Using Cooperating Agents

    The current intrusion detection systems have a number of problems that limit their configurability, scalability and efficiency. There have been some propositions about distributed architectures based on multiple independent agents working collectively for intrusion detection. However, these distributed intrusion detection systems are not fully distributed as most of them centrally...

    Provided By TATA Communications

  • White Papers // Mar 2013

    Security and Privacy Issues in Cloud Computing

    Cloud computing transforms the way Information Technology (IT) is consumed and managed, promising improved cost efficiencies, accelerated innovation, faster time-to-market, and the ability to scale applications on demand (Leighton, 2009). According to Gartner, while the hype grew exponentially during 2008 and continued since, it is clear that there is a...

    Provided By TATA Communications

  • White Papers // Mar 2013

    Inter-Cloud Data Security Strategies

    Cloud computing is a complex infrastructure of software, hardware, processing, and storage that is available as a service. Cloud computing offers immediate access to large numbers of the world's most sophisticated supercomputers and their corresponding processing power, interconnected at various locations around the world, proffering speed in the tens of...

    Provided By TATA Communications

  • White Papers // Mar 2013

    Cloud Computing -An Approach With Modern Cryptography

    In this paper, the authors are proposing an algorithm which uses AES technique of 128/192/256 bit cipher key in encryption and decryption of data. AES provides high security as compared to other encryption techniques along with RSA. Cloud computing provides the customer with the requested services. It refers to applications...

    Provided By TATA Communications

  • White Papers // Jan 2013

    Increasing Security in Cloud Environment

    The concept of cloud computing was introduced to meet the increase in demand for new application for a project, and to provide a large storage facility whenever or wherever a user needs it. The cloud system facility helped many industries as well as individual users to get authentic software at...

    Provided By TATA Communications

  • White Papers // Sep 2012

    Cloud Adoption Lifecycle

    This paper can help an organization in adopting the cloud platform. It shows various stages to go through, from 'What' (Foresee) to 'What Else' (Reinvigorate), in adoption of cloud based infrastructure and services. At the end of this paper an organization would know what are the various stages involved and...

    Provided By TATA Communications

  • White Papers // Apr 2012

    Business Intelligence on the Cloud: Overview and Use Cases

    The use of Business Intelligence (BI) in the cloud is a game-changer, as it makes BI affordable and easily available as compared to traditional BI. It is expected that customers will slowly but surely migrate from in house BI to BI in the cloud. Cloud Computing was a big topic...

    Provided By TATA Communications

  • White Papers // Feb 2010

    Cloud-Based Security Evolution Not Revolution

    Malicious malware and Distributed Denial of Service (DDoS) attacks are wreaking havoc on today's businesses. Over the past few years, these attacks have evolved from random hacking incidents to something far more sinister - criminal acts such as extortion, market manipulation and cyber terrorism. Cleanup is extremely complex and costly...

    Provided By TATA Communications

  • White Papers // Jan 2010

    Marketing To The Masses With On-Demand CRM

    Marketers are facing a more challenging environment than ever. Not only has the number of campaigns and general marketing activities increased inside most organizations, but these activities are growing in complexity. Multichannel marketing has become a given, but managing a high volume of cross-channel campaigns can be difficult without the...

    Provided By TATA Communications

  • White Papers // Mar 2011

    Moving From Legacy Systems to Cloud Computing

    Companies must internally address any technology, business process, or security concerns they may have before considering a migration to cloud computing. Once they have made that decision, they should choose the right service and deployment method that best suits their business. Finally, they must select a provider with the experience,...

    Provided By TATA Communications

  • White Papers // Mar 2012

    Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) have emerged as a promising concept to meet the challenges in next-generation wireless networks such as providing flexible, adaptive, and reconfigurable architecture while offering cost-effective solutions to service providers (Akyildiz et al., 2005). WMNs are multi-hop networks consisting of mesh routers (MRs), which form wireless mesh...

    Provided By TATA Communications

  • White Papers // Dec 2010

    Edge Assisted Fast Binarization Scheme for Improved Vehicle License Plate Recognition

    Identity of a motor vehicle is usually through its license plate. Automatic vehicle license plate recognition has several applications in intelligent traffic management systems. In this paper, the authors propose and describe a fast edge assisted adaptive binarization technique for improved extraction of text from license plate images captured using...

    Provided By TATA Communications

  • White Papers // Dec 2012

    A Heuristic Reputation Based System to Detect Spam Activities in a Social Networking Platform, HRSSSNP

    The introduction of the social networking platform has drastically affected the way individuals interact. Even though most of the effects have been positive, there exist some serious threats associated with the interactions on a social networking website. A considerable proportion of the crimes that occur are initiated through a social...

    Provided By TATA Communications

  • White Papers // Nov 2012

    Business Intelligence on the Cloud Overview, Use Cases and RoI

    The use of Business Intelligence (BI) in the cloud is a game-changer, as it makes BI affordable and easily available as compared to traditional BI. It is expected that customers will slowly but surely migrate from in-house BI to BI in the cloud. Cloud Computing was a big topic of...

    Provided By TATA Communications

  • White Papers // May 2010

    Worth Their Watts? - An Empirical Study of Datacenter Servers

    The management of power consumption in datacenters has become an important problem. This needs a systematic evaluation of the as-is scenario to identify potential areas for improvement and quantify the impact of any strategy. The authors present a measurement study of a production datacenter from a joint perspective of power...

    Provided By TATA Communications

  • White Papers // Jun 2009

    A Distributed Intrusion Detection System Using Cooperating Agents

    The current intrusion detection systems have a number of problems that limit their configurability, scalability and efficiency. There have been some propositions about distributed architectures based on multiple independent agents working collectively for intrusion detection. However, these distributed intrusion detection systems are not fully distributed as most of them centrally...

    Provided By TATA Communications

  • White Papers // Sep 2013

    A Security Framework in Cloud Computing Infrastructure

    In a typical cloud computing diverse facilitating components like hardware, software, firmware, networking, and services integrate to offer different computational facilities, while Internet or a private network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud system delimit the benefits of cloud computing...

    Provided By TATA Communications

  • White Papers // Jun 2013

    Smartphone Security by Cloud Computing

    Smartphone usage has been continuously growing in recent times. Smartphone's offer Personal Computer (PC) functionality to the end user, hence they are vulnerable to the same sorts of security threats as desktop computers. Cloud computing is a new computing paradigm and a breakthrough technology of recent times. Its growing popularity...

    Provided By TATA Communications

  • White Papers // Aug 2012

    Simulating Business Processes - A Review of Tools and Techniques

    There is a great need for simulation of dynamic/temporal aspects of business processes. The current standard for modeling business processes is BPMN and in this review, the various techniques and tools that use BPMN for simulation are studied. The review also points to shortcomings in BPMN support for simulation and...

    Provided By TATA Communications

  • White Papers // Mar 2013

    Analyzable Enterprise Models Using Ontology

    While a considerable amount of research on enterprise ontologies exists, work showing how to use ontologies for Enterprise Architecture (EA) analysis is scarce. The authors present their ongoing work on creating analyzable enterprise models using EA-based ontological representation. Their contributions are twofold: first, they show how an existing EA modeling...

    Provided By TATA Communications

  • White Papers // Jul 2011

    A Component Abstraction for Business Processes

    With continued increase in business dynamics, it is becoming increasingly harder to deliver purpose-specific business system in the ever-shrinking window of opportunity. As business systems for the same intent tend to be similar but never the same, they have considerable overlap with well-defined differences. Software product line engineering techniques attempt...

    Provided By TATA Communications

  • White Papers // Aug 2012

    A Connected Enterprise-Transformation Through Mobility and Social Networks

    Due to rapid changes in business dynamics, there is a growing demand to encourage social conversations/exchanges and the ability to connect and communicate with peers, partners, customers and other stakeholders anytime, anywhere which drives the need of mobile-enable, the existing enterprise applications. This paper highlights a distinct set of needs...

    Provided By TATA Communications