- Filter by:
-
Content Type
-
Topic
- Networking (1281)
- Security (1109)
- Hardware (1084)
- Mobility (972)
- Data Management (811)
- Enterprise Software (569)
- Cloud (551)
- Big Data (506)
- Software (389)
- E-Commerce (71)
- Developer (61)
- Virtualization (47)
- Storage (16)
- Data Centers (15)
- Project Management (9)
- Tech & Work (8)
- CXO (4)
- SMBs (2)
-
Rethinking Disaster Recovery: The Impact of Cloud Computing
Developing new strategies to reduce IT service disruptions without increasing costs is a challenge plaguing many organizations across multiple industries. Traditional solutions to enhance business continuity tend to be expensive and they still leave the organization highly vulnerable to system failures. In this paper, the authors examine the resiliency challenges...
Download Now -
A Survey on Security Attacks in Mobile Ad Hoc Networks
The recent and rapid advancements in the technology and the distinct features of MANETs have made the use of MANETs more prevalent. With the ever increasing applications, the weakness of these networks against a variety of attacks has been unveiled. MANETs doesn't have clear and efficient mechanisms to detect or...
Download Now -
Android System for LAN Monitoring
Computers are connected in a network. In collages students try to access blocked websites or they do not concentrate on their lab assignment. To prevent such kind of problems the authors came up with this android system which can be used for monitoring the LAN network. In college, the network...
Download Now -
Protocols for Implementing Histogram LOB in chord Networks
Peer-to-peer networks have grown most important now-a-days. Load balancing is the most important feature for networks. In this paper, the authors provide here with load balancing techniques for peer-to-peer networks. They further provide here with protocols for chord networks. Here they provide two protocols for load balancing techniques. Their first...
Download Now -
Security Threats in Mobile Ad Hoc Networks - A Survey
Mobile Ad hoc NETworks (MANETs) is a class of wireless networks that have been researched extensively over the recent years. The security challenges arise due to MANET's self-configuration and self-maintenance capabilities. In comparison to wired network the mobile ad hoc network is more exposed to being attacked. Because of its...
Download Now -
Access Control Model for Data Stored on Cloud Computing
Cloud Computing (CC) is an Internet based computing technology having shared scalable infrastructure that can be used as service by users. Simply CC can be referred as hardware & software deliverable using Internet that is also as a service. Regardless of its popularity large organizations, enterprises are reluctant to move...
Download Now -
Sharing of Data in Cloud Using Key Aggregation
Information sharing is a vital functionality in cloud storage. For secure, efficient and flexible sharing of data with others in cloud storage is studied. The new public-key cryptosystems is described that produce constant-size cipher-texts such that efficient delegation of decryption rights for any set of cipher-texts are possible. The novelty...
Download Now -
Enhancement of Message Oriented Middleware for Multiple Types of SOA Applications
Service-Oriented Architecture (SOA) refers to a software paradigm to develop systems comprising of a collection of services of which the services communicate with each other to reach a specified goal. The communication does not only engage simple data passing but also involve the connection of two or more services coordinating...
Download Now -
A Novel Framework for Multiparty Access Control in Online Social Networks
In this paper, online social networks offer attractive interactions and information sharing and also will raise a number of security and privacy issues. Online social networks will allow users to restrict access to shared data and currently do not provide any mechanism to enforce privacy concerns over data associated with...
Download Now -
Review of Personalized Recommendation System with User Interest in Social Network
Recommendation System (RS) is the tool, which help to find interesting and relevant items or products. With the popularity of social network, ever more users like to share their real life experiences, such as blogs, ratings and reviews. New latest aspects of social networking like interpersonal influence and interest based...
Download Now