Networking

As cloud computing grows, how will it impact the network and communications technologies and management?

  • White Papers // Apr 2015

    A Review On: Network Security and Cryptographic Algorithm

    Security is the most challenging aspects in the internet and network application. These days the applications like Internet and networks are growing very fast, thereby the importance and the value of the exchanged data over the internet or other media types are increasing. For secure communication, the cryptography is essential....

    Provided By Creative Commons

  • White Papers // Apr 2015

    Proposed Approach for Intrusion Detection on KDD Dataset by Hybrid Classifiers

    With the growing threat of attackers over the network the effective intrusion detection is needed to secure the information. Before applying the classifiers the dataset is needed to be collected. With the rapid increase of internet technology, the malicious activities on the network are also increasing. So the use of...

    Provided By Creative Commons

  • White Papers // Apr 2015

    An Analytical Study of Various Types of Intrusion Detection System for Securing MANET

    Due to the vulnerable nature of MANET (Mobile Ad-hoc NETwork) there will be the necessity of protecting the data and information from the attackers whom evil eyes on MANET as it is infrastructure less network. So, it is applicable in various fields for the communication purposes such as in rescue...

    Provided By Creative Commons

  • White Papers // Apr 2015

    MANET: Security Issues and Behavior Analysis of Routing Protocol Using NS-2

    A Mobile Ad-hoc NETwork (MANET) is formed with wireless mobile devices (nodes) without the need for existing network infrastructure. Security design in MANET is complicated because of its features including lack of infrastructure, mobility of nodes; dynamic topology and open wireless medium. Due to this MANET suffer from much security...

    Provided By Creative Commons

  • White Papers // Mar 2015

    Forbes Insights - Boost Innovation With Video Communications

    Video communications and videoconferencing have been a part of corporate life for decades. It already is a staple of executive conference rooms, and many larger organizations maintain in-house or contracted video capabilities for special events and presentations. Now, thanks to easy-to-use technology and affordable options, a wide range of employees...

    Provided By Cisco Systems

  • Case Studies // Mar 2015

    One Secure Wireless Network for All Global Delivery Centers

    Mindtree is a global information technology consulting firm specializing in corporate IT services and solutions. Their challenges are to connect more employees and devices, comply with stringent security requirements and manage network access from a single and simple interface. They chose Cisco to overcome these challenges. They have implemented centralized...

    Provided By Cisco

  • Research // Mar 2015

    Cisco Annual Security Report 2015

    Despite advances by the security industry, criminals continue to evolve their approaches to break through security defenses. New threat intelligence and trend analysis in the Cisco 2015 Annual Security Report show that attackers are realizing that bigger and bolder are not always better. Understand how attackers are using gaps between...

    Provided By Cisco Systems

  • White Papers // Mar 2015

    The Benefits of Web-Based Facility Management Software

    Traditional facility management systems and software are fading out due to the rise in fluid and fully integrated web-based alternatives. Web-based software includes everything a facility manager needs to ensure long-term success in a cost-efficient manner. Since facility managers require immediate access to centralized information, it is crucial that this...

    Provided By FacilityONE

  • White Papers // Mar 2015

    Collaboration Unchained: Tapping the Potential of Unified Communications

    Emails, phone calls, and in-person meetings remain fundamental to how many large organizations communicate—internally and externally. However, the emergence of collaborative technologies is enabling customers, competitors and employees to innovate, disrupt and challenge the ways in which work gets done and value is created. This report produced with WSJ. Custom...

    Provided By NTT Communications

  • Downloads // Mar 2015

    Find, Analyze and Resolve Your Toughest Performance Issues on SQL Server -- FAST

    Slow SQL Server performance? Don't let yourself get tangled up in volumes of server health metrics. Get to the root cause of performance problems in just four clicks. Only SolarWinds Database Performance Analyzer correlates SQL response time with server health metrics - in a single view - to quickly pinpoint...

    Provided By SolarWinds

  • White Papers // Mar 2015

    Work the Way You Live - Google for Work

    What if you could make people as productive at work as they are in their personal lives? Perhaps that sounds a little funny. But we live in what Google Chairman Eric Schmidt calls “the new digital age”— an age that is naturally mobile, connected and collaborative. An age where we...

    Provided By Google, Inc.

  • White Papers // Mar 2015

    Building the New Workplace - Google for Work

    Sometime in the last decade, we crossed into a fresh phase of the digital era. A new generation of companies born in the cloud—like Airbnb (lodging), Snapchat (messaging), Uber (transportation) and Zillow (real estate)—are using entirely new business models to disrupt the status quo. Google Chairman Eric Schmidt calls this...

    Provided By Google

  • White Papers // Mar 2015

    EMA Report Data Capture and Network Forensics, State-of-the-Market: IBM Security QRadar Incident Forensics vs. Other Industry Tools

    In this analyst report, EMA compare IBM Security QRadar Incident Forensics vs other industry tool and shows why IBM scored the highest overall rating with a score of 3.92. Read More..

    Provided By IBM

  • White Papers // Mar 2015

    IBM Software: IBM Security Identity Governance & Administration

    This Frost & Sullivan best practices research paper details why IBM have been provided their 2014 Customer Value Leadership in the Mobile Identity and Access Management because of IBM's outstanding performance. Read More..

    Provided By IBM

  • White Papers // Mar 2015

    IBM Cyber Security Intelligence Index Report

    This report is based on cyber security event data that IBM Managed Security Services collected between April 2012 and March 2013 in the course of monitoring client security devices and data derived from responding to and performing forensics on cyber security incidents. Read More..

    Provided By IBM

  • White Papers // Mar 2015

    Laying the groundwork for a New Level of Wireless Access Performance

    CommScope has developed this paper in order to provide guidance and recommendations for enterprise IT professionals who are charged with designing and deploying the cabling infrastructure to support their rapidly expanding needs for wireless access.

    Provided By Anixter

  • White Papers // Mar 2015

    CommScope Report: Category 8 Cabling Standards Update

    CommScope’s Standards Advisor provides updates on TIA specifications—under development and completed—covering the following technologies: Power over Ethernet, telecommunications physical network security, distributed antenna system (DAS) cabling, high performance structured cabling (HPSC), mode conversion, and fibre-optic test procedures. It also provides brief updates from standards activities within INCITS T11 (Fibre Channel);...

    Provided By Anixter

  • White Papers // Mar 2015

    CommScope Report: NGBASE-T Cabling Requirements

    A recent technical report from CommScope provides an in-depth update on the latest IEEE developments for NGBASE-T and associated cabling specifications in the Telecommunications Industry Association (TIA), and in the International Organisation for Standardisation (ISO)/International Electrotechnical Committee (IEC) in support of this application.

    Provided By Anixter

  • White Papers // Mar 2015

    Review on Address Generation for Wimax De-Interleaver

    WiMAX (Worldwide interoperability for Microwave Access) technology brings a new ingredient in today's mobile community. Since it provides the ability for service providers to deploy new era Broadband service, a low complexity and new technique is proposed to efficiently implement the address generation circuitry for de-interleaver in WiMAX transceiver eliminating...

    Provided By International Journal for Technological Research in Engineering (IJTRE)

  • Case Studies // Mar 2015

    Webroot Helps 443 Networks Strengthen Brand and Network Security Platform

    Webroot provides intelligent cybersecurity for endpoints that harnesses collective threat intelligence to protect the Internet of everything. Their challenges are to improve the coverage and accuracy of their URL categorization services, enhance their capabilities in analyzing the reputation and content of websites visited by end users. They chose 443 Networks...

    Provided By 443 Networks

  • White Papers // Mar 2015

    Threshold Based Approach to Detect DDoS Attacks in Cloud

    Cloud computing environment is very much prone to intrusion attacks due to modern-days new attacks and hence security of cloud computing is very much required. People will move towards cloud services until and unless they are not having full reliance in its security. Although various measures are taken place from...

    Provided By International Journal of Innovative Research in Information Security (IJIRIS)

  • White Papers // Mar 2015

    Review on Cryptography Algorithms in Network Security

    Network security, now-a-days, is the most important and challenging aspect in networking application. Cryptographic algorithms are basically called as encryption algorithms, contains mathematical procedures for encryption data. There are numerous encryption algorithms techniques having different strengths. Mainly strength of algorithm depends on computer system used for generation of keys. Secret...

    Provided By Creative Commons

  • Case Studies // Mar 2015

    Credit Union Installs A Virtual Vault for Data

    The small IT staff at the 4Front Credit Union had to secure its networks and customer data from attack while complying with PCI and GLBA data privacy regulations. The credit union's IT staff fully secured its networks and data, plus streamlined its regulatory compliance, by engaging Dell SecureWorks managed services,...

    Provided By Dell

  • White Papers // Mar 2015

    A Review on the Network Security Related to Wireless Sensor Network

    Network security is vital for securing all information that passed through network computer; hence network security is the most important element in information security. Security is one of the critical concern occurred in WSN due to limitations in computing and fixed resource. Wireless sensor network have a broad area of...

    Provided By Creative Commons

  • White Papers // Mar 2015

    IDS and IPS System in Multi-Tier Web Applications

    In the age of information technology, the facets of work and availability of everything on the internet services so the internet service and applications have become an inextricable part of day-to-day life, enabling communication and the management of personal information from anywhere. To accommodate this increase in application and data...

    Provided By Creative Commons

  • White Papers // Mar 2015

    A Survey on Various Routing Attacks and Risk Aware Mechanism for MANET

    Mobile Ad-hoc NETworks (MANETs) are a set of mobile nodes which are self-configuring and connected by wireless links automatically as per the defined routing protocol. The key feature of MANETs is the absence of a central management agency or a fixed infrastructure. Since the most devastating damage to MANET is...

    Provided By Creative Commons

  • White Papers // Mar 2015

    New-Multi-Phase Distribution Network Intrusion Detection

    Cloud security is one of most important issues that have attracted a lot of research and development effort in past few years. Attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denial-of-Service (DDoS). This paper proposes a multiphase distributed vulnerability detection, measurement...

    Provided By Creative Commons

  • White Papers // Feb 2015

    A Primer on IPv4 Scarcity

    With the ongoing exhaustion of free address pools at the registries serving the global demand for IPv4 address space, scarcity has become reality. Networks in need of address space can no longer get more address allocations from their respective registries. In this paper, the authors frame the fundamentals of the...

    Provided By Cornell University

  • White Papers // Feb 2015

    The Intelligent Flexible Cloud

    Network applications and services today are nearly unrecognizable from a few decades ago. The diversity, scale, and dynamic evolution of apps, services, data, and devices have led to a corresponding evolution within service provider environments. Public, private, and hybrid clouds are ascendant. Software-based approaches to more agile network management and...

    Provided By ARM

  • Research // Feb 2015

    Definitive Guide to Advanced Threat Protection

    Despite billions spent annually on traditional perimeter and endpoint-based security defenses, advanced threat actors cause enterprises and government agencies to make headlines every day - for all the wrong reasons. This eGuide explores recent innovations in perimeter and host-based advanced threat protection technology, combined with new network forensics capabilities, are...

    Provided By FireEye

  • Videos // Feb 2015

    Moving Beyond Proxies

    Proxy deployments today have outlived their usefulness and practicality. They have joined a long list of legacy products, providing limited security functionality against today’s advanced threats. There was a time when proxies fulfilled a need traditional firewalls could not meet - visibility into web traffic starting with categorization of HTTP...

    Provided By Palo Alto Networks

  • White Papers // Feb 2015

    Revolutionizing the Future Workplace

    A variety of technological, demographic and cultural forces are converging at this unique moment in history and stand poised to revolutionize the workplace of the future. Customers are demanding the ability to access the marketplace from anywhere, anytime and on any device; newer employees now expect the flexibility to collaborate...

    Provided By Polycom, Inc.

  • Case Studies // Feb 2015

    Spanish University Supports New Services with Network Upgrade

    The University of Granada (UGR) is a public university located in the city of Granada (Spain). Their challenges are to support collaboration between researchers, teachers and students worldwide, support e-learning and access to online resources, including HD video resources and help ensure network security and stability. They chose Cisco to...

    Provided By Cisco

  • White Papers // Feb 2015

    Six Steps to Creating a Highly Collaborative Video Culture

    Polycom and Quocirca surveyed over 800 business video conferencing users around the world on the state of video adoption. The global findings have identified the top six key things to consider when creating a highly collaborative video culture. And it is not just about reducing travel!Download this infographic to discover...

    Provided By Polycom, Inc.

  • White Papers // Feb 2015

    Dynamic Cluster Based Intrusion Detection System in Mobile Ad-hoc Networks

    Security is an important concern in mobile ad-hoc network environment caused by nature of dynamic topology. In Mobile Ad-hoc NETwork (MANET) multiple nodes moves from one position to another position in same transmission range due mobility. In this paper, the authors have described a design and implementation of dynamic cluster...

    Provided By Creative Commons

  • White Papers // Feb 2015

    Security in the Age of Enterprise Technology

    Windstream brings you the latest Nemertes report on how to use network security to create more business opportunities and remove stumbling blocks to progress. The following report will help you gain advantage through proactive use of network security: Enabling business through new services and process improvements Aligning lines...

    Provided By Windstream Communications

  • White Papers // Feb 2015

    High-Level Portable Programming Language for Optimized Memory Use of Network Processors

    Network Processors (NPs) are widely used for programmable and high-performance networks; however, the programs for NPs are less portable, the number of NP program developers is small, and the development cost is high. To solve these problems, this paper proposes an open, high-level, and portable programming language called \"Phonepl\", which...

    Provided By Scientific Research

  • White Papers // Feb 2015

    Dynamic Capacity Allocation in OTN Networks

    A dynamic Optical Transport Network (OTN) has the advantage of being able to adjust the connection capacity on demand in order to respond to variations on traffic patterns or to network failures. This feature has the potential to reduce operational costs and at the same time to optimize networks resources....

    Provided By Scientific Research

  • White Papers // Feb 2015

    Survey on Different Types of Security Threats on Wireless Sensor Networks

    A Wireless Sensor Network (WSN) consists of spatially distributed autonomous sensors. WSNs are vulnerable to security attacks due to the broadcast nature of radio transmission. This paper provides a study of different types of security attacks in WSNs. The focus has been on the sleep deprivation torture (denial-of-sleep) attack which...

    Provided By Creative Commons

  • White Papers // Feb 2015

    Survey on Geographical Routing Protocols in Network-Centric Warfare Paradigm

    "Mobile Ad-hoc NETwork (MANET) allows portable devices to establish communication independent of a central infrastructure. The wireless links in this network are highly error prone and can go down frequently due to mobility of nodes. Therefore, routing in MANET is a critical task due to highly dynamic environment. Efficient Routing...

    Provided By Creative Commons