enterprise networks
Recently Published Documents


TOTAL DOCUMENTS

383
(FIVE YEARS 49)

H-INDEX

19
(FIVE YEARS 2)

2021 ◽  
Author(s):  
Min Guk I. Chi

The premise that Active Queue Management (AQM) is effective in both quantitative and qualitative settings in residential and enterprise networks has repeatedly been established in multiple papers from academic journals along with private studies in addressing bufferbloat, characterized as excessive latency because of heavy network utilization. However, the presence and understanding of bufferbloat mitigation is absent and not well-known in the Philippine Internet of Things space except enthusiasts, willing to take the time to examine the concept along with its benefits. Hence, this paper examines possible reasons as to why AQM is not widely adopted by Philippine consumers and industries in increasing productivity considering the COVID-19 Pandemic: a lack of basic understanding of bufferbloat and its implications, the complexity of the concept, the know-how required to execute its implementation being far too high, and the lack of perceived benefit by existing telecommunications players in the country.


2021 ◽  
Vol 10 (07) ◽  
pp. 01-04
Author(s):  
Jignesh Patel

Competition is fierce, and companies must team up to survive in an industry where specialized knowledge is sovereign. One of the largest, most critical, and most difficult parts of a business merger is the successful integration of the enterprise networks of the merger partners. BPO Systems has the expertise and skills to make your merger or acquisition a much smoother process. An attempt has been made to draw the results of only some of the earlier studies while analyzing the causes of failure of majority of the mergers in this exploratory Research paper. Making the mergers work successfully is not that easy as here we are not only just putting the two organizations together but also integrating people of two organizations with different cultures, attitudes and mindsets. While making the merger deals, it is necessary not only to make analysis of the financial aspects of the acquiring firm but also the cultural and people issues of both the concerns for proper post-acquisition integration and to make the combination successful.


2021 ◽  
Vol 23 (06) ◽  
pp. 833-839
Author(s):  
Prajwal S Telkar ◽  
◽  
Dr. Kiran V ◽  

A firewall is a guard of the network which inspects the packets based on the rules adopted to be executed in the threat environment. This is used to block the flow of undesirable content, forbids unauthorized remote access, and impedes immoral contents, assures security based on protocol and IP address, insulates seamless activity in Enterprise networks, shields conversation and coordination contents and thus this cybersecurity tool secures the system when administering on the internet with humongous amount of malicious data threatening the performance and data of the network structure. Cisco’s next-generation firewalls are equipped to combat the menace and in this project, initially, it is focused on the working of the FTD and analyzes the steps carried out in the processes. FMC is the graphical user interface to control FTD which is connected through the management interface. Various policies such as file policy, Prefilter policy, malware policies, provide the firewall to work more efficiently on the firewall. Additionally, these firewalls are equipped with a routing process to uphold the efficiency of the firewall which behaves as a router to establish a connection between the network nodes. The routing process is implemented using the firewall which is an IP routing software suite that provides a robust facility to adapt the firewall for routing conditions.


Author(s):  
Iffat Anjum ◽  
Mu Zhu ◽  
Isaac Polinsky ◽  
William Enck ◽  
Michael K. Reiter ◽  
...  

Author(s):  
Amee Trivedi ◽  
Camellia Zakaria ◽  
Rajesh Balan ◽  
Ann Becker ◽  
George Corey ◽  
...  

Contact tracing is a well-established and effective approach for the containment of the spread of infectious diseases. While Bluetooth-based contact tracing method using phones has become popular recently, these approaches suffer from the need for a critical mass adoption to be effective. In this paper, we present WiFiTrace, a network-centric approach for contact tracing that relies on passive WiFi sensing with no client-side involvement. Our approach exploits WiFi network logs gathered by enterprise networks for performance and security monitoring, and utilizes them for reconstructing device trajectories for contact tracing. Our approach is specifically designed to enhance the efficacy of traditional methods, rather than to supplant them with new technology. We designed an efficient graph algorithm to scale our approach to large networks with tens of thousands of users. The graph-based approach outperforms an indexed PostgresSQL in memory by at least 4.5X without any index update overheads or blocking. We have implemented a full prototype of our system and deployed it on two large university campuses. We validated our approach and demonstrate its efficacy using case studies and detailed experiments using real-world WiFi datasets.


2021 ◽  
Author(s):  
Anita Nair

<div>As organizations move most of their workloads to public cloud and remote work becomes more</div><div>prevalent today, enterprise networks become more exposed to threats both from inside and outside</div><div>the organization. The traditional Perimeter Security Model assumes that threats are always from the</div><div>outside. It assumes that firewalls, proxies, IDS, IPS and other state-of-the-art infrastructure and</div><div>software solutions curb most of the cyberattacks. However, there are loopholes in this assumption,</div><div>which the Zero Trust Model addresses. This paper discusses the Zero Trust Model and it’s mandates</div><div>and evaluates the model based on the various implementations by the leading industry players like</div><div>Google and Microsoft.</div>


Sign in / Sign up

Export Citation Format

Share Document