Global corporate networks in Japan

1992 ◽  
Vol 30 (10) ◽  
pp. 64-69
Author(s):  
K. Tomaru ◽  
T.P. Tanaka ◽  
T. Katsube
Keyword(s):  
2010 ◽  
Vol 69 (18) ◽  
pp. 1653-1660
Author(s):  
Rasim Magamed ogly Alguliev ◽  
B. S. Agaev ◽  
T. Kh. Fataliev ◽  
T. S. Aliev

Author(s):  
Ronald M. Baecker

The last century has seen enormous leaps in the development of digital technologies, and most aspects of modern life have changed significantly with their widespread availability and use. Technology at various scales - supercomputers, corporate networks, desktop and laptop computers, the internet, tablets, mobile phones, and processors that are hidden in everyday devices and are so small you can barely see them with the naked eye - all pervade our world in a major way. Computers and Society: Modern Perspectives is a wide-ranging and comprehensive textbook that critically assesses the global technical achievements in digital technologies and how are they are applied in media; education and learning; medicine and health; free speech, democracy, and government; and war and peace. Ronald M. Baecker reviews critical ethical issues raised by computers, such as digital inclusion, security, safety, privacy,automation, and work, and discusses social, political, and ethical controversies and choices now faced by society. Particular attention is paid to new and exciting developments in artificial intelligence and machine learning, and the issues that have arisen from our complex relationship with AI.


Author(s):  
M O Petrosyan ◽  
I V Kovalev ◽  
P V Zelenkov ◽  
VV Brezitskaya ◽  
G A Prohorovich

2000 ◽  
Vol 32 (5) ◽  
pp. 789-804 ◽  
Author(s):  
Bill Pritchard

Network perspectives have recently been proposed as a theoretical base for research in economic geography. However, there is an unclear relationship between the advocacy of network approaches and the development of methodological tactics to frame related empirical research. By reference to one episode of corporate spatial behaviour—the establishment of a manufacturing facility in Thailand by the US-headquartered breakfast-cereal company, Kellogg—an organising framework for network-inspired economic geography is suggested. Kellogg's entry into Thailand is analysed in terms of the construction and mobilisation of relational networks producing five overlapping geographies: (1) geographies of place; (2) geographies of intrafirm trade and relations; (3) regional geographies of accumulation; (4) geographies of interfirm relations; and (5) geographies of consumption.


2015 ◽  
Vol 22 (5) ◽  
pp. 543-557 ◽  
Author(s):  
Juan C. Granda ◽  
Pelayo Nuño ◽  
Julio Molleda ◽  
Rubén Usamentiaga ◽  
Daniel F. García

Author(s):  
Сергій Миколайович Лисенко

The dynamic expansion of cyber threats poses an urgent need for the development of new methods, methods, and systems for their detection. The subject of the study is the process of ensuring the resilience of computer systems in the presence of cyber threats. The goal is to develop a self-adaptive method for computer systems resilience in the presence of cyberattacks. Results. The article presents a self-adaptive system to ensure the resilience of corporate networks in the presence of botnets’ cyberattacks. Resilience is provided by adaptive network reconfiguration. It is carried out using security scenarios selected based on a cluster analysis of the collected network features inherent cyberattacks. To select the necessary security scenarios, the proposed method uses fuzzy semi-supervised c-means clustering. To detect host-type cyberattacks, information about the hosts’ network activity and reports of host antiviruses are collected. To detect the network type attacks, the monitoring of network activity is carried out, which may indicate the appearance of a cyberattack. According to gathered in the network information concerning possible attacks performed by botnet the measures for the resilient functioning of the network are assumed. To choose the needed scenario for network reconfiguration, the clustering is performed. The result of the clustering is the scenario with the list of the requirement for the reconfiguration of the network parameters, which will assure the network’s resilience in the situation of the botnet’s attacks. As the mean of the security scenario choice, the semi-supervised fuzzy c-means clustering was used. The clustering is performed based on labeled training data. The objects of the clustering are the feature vectors, obtained from a payload of the inbound and outbound traffic and reports of the antiviral tool about possible hosts’ infection. The result of clustering is a degree of membership of the feature vectors to one of the clusters. The membership of feature vector to cluster gives an answer to question what scenario of the network reconfiguration is to be applied in the situation of the botnet’s attack. The system contains the clusters that indicate the normal behavior of the network. The purpose of the method is to select security scenarios following cyberattacks carried out by botnets to mitigate the consequences of attacks and ensure a network functioning resilience. Conclusions. The self-adaptive method for computer systems resilience in the presence of cyberattacks has been developed. Based on the proposed method, a self-adaptive attack detection, and mitigation system has been developed. It demonstrates the ability to ensure the resilient functioning of the network in the presence of botnet cyberattacks at 70 %.


Author(s):  
A. Danladi ◽  
G. P. Vasira

Fractal dimension is mathematically defined as a ratio of statistical complexity of network traffic; its significant manifestation can affect the network performance. In this work, two models of corporate computer networks have been developed using optimized network engineering tool (OPNET) technology. Raw packet generator (RPG) traffic was imposed on the corporate networks and modeled using H = 0.7 and D = 1.3, under the influence of Pareto distribution. Autocorrelation function and power law were used to confirm the presence of fractal traffic on the networks. Average Hurst index (H) of 50 and 100 workstations were estimated using aggregate of variance, absolute moment, periodogram and R/S methods as 0.627, 0.608 and its corresponding fractal dimensions (D) were obtained as 1.371 and 1.391 respectively. These results obtained mean, there is a manifestation of fractal traffic and delay is minimised on the network.  


Sign in / Sign up

Export Citation Format

Share Document