Broadband

We're your source for information and discussions about Broadband technology.

  • Webcasts // Oct 2014

    Gaining The Upper Hand In Today's Cyber Security Battle

    Threat intelligence uses the symptoms of an attack to foster an understanding of who the attackers are and what their motives and capabilities may be offering the insight necessary to develop a proactive stance and thwart attackers. Read More..

    Sponsored By IBM

  • Webcasts // Nov 2014

    Attacking Mobile Broadband Modems Like a Criminal Would

    While there has certainly been some interesting research into the security of mobile broadband modems, or \"Dongles\", in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    The Business Value of Cloud-Managed Wireless Networks - IDC Webinar

    Cloud-managed Wi-Fi promises greater networking efficiencies and flexibility in managing, scaling and upgrading the wireless network. But cloud-managed Wi-Fi may not be the right solution for everyone. Watch this webcast to hear IDC analyst and Vice President, Rohit Mehra, discuss the critical factors to take into account as you...

    Provided By Hewlett-Packard

  • Webcasts // Jan 2014

    Trustworthy Secure Modular Operating System Engineering

    The presenter will present Mirage OS, a modular library operating system developed from scratch in the functional programming language OCaml. Each service, called unikernel, is an OCaml application using libraries such as a TCP/IP stack, DNS. It is either compiled to a Xen virtual machine image or to a Unix...

    Provided By SecurityTube.net

  • Webcasts // Aug 2012

    C 2012: Cassandra in Rackspace Cloud Monitoring

    In this webcast, the presenter going to explain about Rackspace Cloud Monitoring which is a highly-available API-driven monitoring system built to scale up to 1 million active checks. The product also introduces a lot of new and unique features such as a powerful and flexible DSL for specifying alarm thresholds.

    Provided By Oleksiy Kovyrin

  • Webcasts // Oct 2014

    Gaining The Upper Hand In Today's Cyber Security Battle

    Threat intelligence uses the symptoms of an attack to foster an understanding of who the attackers are and what their motives and capabilities may be offering the insight necessary to develop a proactive stance and thwart attackers. Read More..

    Sponsored By IBM

  • Webcasts // Aug 2012

    C 2012: Cassandra in Rackspace Cloud Monitoring

    In this webcast, the presenter going to explain about Rackspace Cloud Monitoring which is a highly-available API-driven monitoring system built to scale up to 1 million active checks. The product also introduces a lot of new and unique features such as a powerful and flexible DSL for specifying alarm thresholds.

    Provided By Oleksiy Kovyrin

  • Webcasts // Nov 2014

    Attacking Mobile Broadband Modems Like a Criminal Would

    While there has certainly been some interesting research into the security of mobile broadband modems, or \"Dongles\", in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Trustworthy Secure Modular Operating System Engineering

    The presenter will present Mirage OS, a modular library operating system developed from scratch in the functional programming language OCaml. Each service, called unikernel, is an OCaml application using libraries such as a TCP/IP stack, DNS. It is either compiled to a Xen virtual machine image or to a Unix...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    The Business Value of Cloud-Managed Wireless Networks - IDC Webinar

    Cloud-managed Wi-Fi promises greater networking efficiencies and flexibility in managing, scaling and upgrading the wireless network. But cloud-managed Wi-Fi may not be the right solution for everyone. Watch this webcast to hear IDC analyst and Vice President, Rohit Mehra, discuss the critical factors to take into account as you...

    Provided By Hewlett-Packard