Network Computing

 

Instant messaging has become a necessary tool not just on consumer and daily user level, but also widely adopted on enterprise aspect for its spontaneous and intuitive interface. This can be observed obviously since the desktop PC era. Especially in today’s globalized business environment, instant messaging is gaining higher momentum on enterprise adoptions and on both desktop and mobile communication devices. The nature of mobile instant messaging allows individuals to communicate simultaneously with one or more others and in today’s corporate settings, there is almost zero tolerance for communication failure. This has become a major challenge for corporate IT management as there may be more unplanned downtimes and unexpected cyber attacks to happen due to heavy traffic and reliance on mobile instant messaging. Therefore, it is a major challenge for IT management staff to ensure secured and steady network infrastructures.

Today, many hospitals wards have been implemented with wireless network infrastructures for healthcare uses. By leveraging the concepts of IoT (Internet of Things) to connect medical devices and patient data to the cloud, medical staff can optimize their efficiency while reducing unnecessary workloads when traveling around wards. In fact, a fast-growing reliance on connected healthcare devices has been observed in hospitals in both developing and developed nations.

DDoS, the abbreviation of “Distributed Denial-of-Service”, is a malicious attempt against websites, servers, or networks unavailable to provide its services or resources to its intended users. Usually, targets of DDoS are high-profile sites such as government agencies, giant corporations, financial institutions, major cloud service providers, telecommunication businesses, and politically related groups. The following article will discuss the background and types of DDoS attacks, and also get into the methods of prevention and protection.

With the rapid rise of BYOD (Bring Your Own Device) phenomenon contributed by the widespread of smart mobile devices, the increasing implementations of wireless accessing points (APs) in corporate environments have become an attraction for potential network intrusion and data theft. As software-based measures have been found with numerous loopholes, corporations have to rely on hardware-assistance for total solution in BYOD environment. The following will discuss the BYOD situations in details and present a hardware-assisted total solution with multiple advantages including Intel x86 firewall architecture and high-port density, which are optimally deployable for BYOD settings.

With the exponential growth of mobile Internet devices and the rise of Cloud Computing, end-users demand faster, more powerful and more secured Internet services. This unprecedented demand has presented a new challenge which Internet service provider and IT system operators maintain and manage their network traffic. To ensure smooth network traffic, an all new enhanced architecture is necessary in order to handle the various types of data packets and security instructions. In other words, performance, power efficiency, scalability and reliability are the major factors in network traffic management.

In an era where high speed networks are affordable and readily available, video streaming in high quality over IP has replaced the costly video broadcasting over analog or lease lines as a more flexible and cost-effective solution. Compare with regular data transmission, stricter requirements must be met for streaming broadcast-level video over an open Internet, where uneven deliveries, packet loss and buffering are unacceptable. For high quality video broadcast services such as video on demand (VOD) and over the top (OTT), user experience very much depends on continuous and seamless packet delivery over an open Internet.

In order to provide access to data on any device at locations such as stadiums, shopping centers and medium-sized branch offices as well as campuses, content providers and telecom companies are required to build their information superhighways on both wired and wireless networks that deliver enterprise-scale capacity, stringent performance and reliability.

第 6 頁,共 9 頁