•Who Are the Cloud Computing Actors? Examines the five different types of actors in a cloud computing environment.
•What the X is XaaS? This article looks at the latest trend in cloud computing.
•Cloud Security as a Service (SecaaS) Helps Organizations Sort Out Their Cloud Security Needs Cloud security can be a daunting requirement for organizations, because the security is supplied off premises and managed by an outside vendor. Cloud security as a service provides the guidance you need to acquire the cloud security you need.
•Cloud Computing Deployment: Public, Private, Hybrid, Community Enterprises have a number of choices in deploying a cloud computing infrastructure, including public, private, community, and private cloud offerings. We look at the characteristics of each.
•Services in the Cloud: SaaS, Paas, IaaS Cloud services come in a range of choices, enabling the customer to access cloud-provided applications (SaaS), cloud platforms (PaaS), or cloud infrastructure (IaaS).
•Cloud Computing, Cloud Networking, and Cloud Storage: The Basics A look at the key elements of clouds, including cloud computing, cloud networking, and cloud storage.
•Ethernet in the Home Now Includes Powerline Ethernet and Power Over Ethernet Despite the widespread use of Wi-Fi in home networks, Ethernet still has an important, and in some cases, indispensible role to play. We look at how Ethernet has made a comeback in the home.
•Ubiquitous Ethernet: Home, Enterprise, Data Center, Wide Area Networks Ethernet is the predominant wired networking technology. We look at its use in homes, offices, data centers, enterprises, and wide-area networks.
•Gigabit Ethernet Ethernet operating at speeds of a gigabit per second or more is the dominant wired local area networking scheme.
•Cryptographic Use of Random Numbers: Randomness and Unpredictability Exploring the difference between randomness and unpredictability and the application of each in cryptography.
•The Base Rate Fallacy Complicates Intrusion Detection An overview of a startling result from probability.
•Evaluate System Security Using Attack Surfaces and Attack Trees A look at two useful tools for security assessment.
•Important Security Documents from NIST A useful set of security documents, freely available.
•TLS Heartbeat Protocol and the Heartbleed Exploit Simply Explained A concise overview.
•The Evolution of the NIST Secure Hash Algorithm, From SHA-1 to SHA-3 The NIST standard SHA is the dominant secure hash function, implemented in a wide variety of security protocols and cryptographic applications. It has become an indispensible building block for security software. Accordingly, NIST has continued to evolve SHA over the past 20 years to meet new cryptographic threats to the security of the algorithm.
•Types of Malware (Malicious Software) from A to Z: Part 1; Part 2; Part 3 Malware comes in a bewildering variety of forms and uses numerous angles of attack to compromise computer security. This three-part series examines the many types of malware.
•Modern Security Design Principles Help in Design and Evaluation Drawing on years of experience in developing and deploying security products and services, the computer security community has come to rely on five modern security design principles to augment the classic list of eight principles.
•Use Fundamental Security Design Principles to Design or Evaluate Security Products Eight classic security design principles are still in use today and are an essential tool in evaluating security features and products.
•Fog Computing is the Key to Successful Internet of Things Deployment Showing how fog computing is essential to IoT.
•RFID Uses and Functionality—What you need to know A look at the main application areas and functionalities.
•How RFID Works An overview of this ubiquitous technology.
•URLs: The Basics A look at the structure of Uniform Resource Locators.
•What is Quality of Experience (QoE)? This article explains what QoE is and why it is important.
•What is Quality of Service (QoS)? This article explains what QoS is and why it is important.
•Internet Mechanisms Need to Deal with Both Elastic and Inelastic Traffic A look at the requirements for two different types of traffic.
•What is This Thing Called the Internet of Things? An overview.
•What is a Deeply Embedded System? An explanation of this commonly used term.
•The Internet-Based Presence Service An overview of this essential tool for employee communication and collaboration.
•An Introduction to Internet Standards and Internet RFCs Internet standards and Internet RFCs govern the operation of the Internet and the protocols used to communicate across the Internet.
•DevOps—What's That? An overview of this up and coming trend.
•Mobile Data Traffic is Growing Rapidly The impact of mobile data on enterprise networks.
•Standards Developing Organizations, Industry Consortia, and Open Source Projects A look at the many organizations making standards.
•The Network Hierarchy: Access, Distribution, and Core Networks An overview of the “standard” enterprise network organization.
•Unified Communications: The Foundation of Enterprise Networking This article provides an overview of the elements and benefits of UC.
•Network Convergence is the Basis for Modern Enterprise Networking A look at the basic concepts.
•Service-Oriented Architecture (SOA): What You Need to Know This article provides a basic overview.
•The IEEE 802 Networking Standards An overview of the major groups of standards developed by IEEE 802.
•The Evolution of Cellular Networks, from 1G to 5G A look at the characteristics of each generation.
•Microcells, Picocells, Femtocells: Essential Building Blocks for 4G and 5G Networks An introduction to types of cells in cellular networks.
•OFDMA and SC-FDMA Enable High-Speed Wireless Networking An introduction to these two important technologies
•Multiple-Input Multiple Output (MIMO) Antennas Essential for Today's Wireless Networks An introduction to MIMO
•Keeping Current on Networking and IT Industry Trends If you are looking for authoritative, up-to-date information about networking and IT industry trends, the following websites offer a wide range of easily accessible information. These sites can be visited regularly, used as a research tool, and offer email newsletters.
•Keeping Current on Networking and Related Technologies If you are looking for authoritative, up-to-date information about networking technology, the following websites offer a wide range of easily accessible information. These sites can be visited regularly, used as a research tool, and offer email newsletters.
•Digital Signal Encoding A key design issue in transmitting digital signals is the encoding scheme. Factors such as efficiency, synchronization, and error resistance come into play. We survey the most important schemes currently in use.
SOFTWARE DEFINED NETWORKS and NETWORK FUNCTIONS VIRTUALIZATION
•Security Considerations for Software Defined Networking (SDN) The challenges and opportunities with SDN related to network security.
•SDN and NFV Support Cloud Computing A discussion of the role of SDN and NFV in cloud computing.
•SDN and NFV need DevOps How DevOps supports SDN and NFV.
•Representational State Transfer (REST) is a key element of SDN A look at SDN’s northbound interface.
•What is Network Functions Virtualization (NFV)? An overview of NFV.
•Standards for SDN An overview of the organizations involved in developing standards for SDN.
•OpenFlow is Essential for turning Software Defined Networking from Theory to Reality An overview of the elements of the SDN architecture.
•Software Defined Network Architecture Promotes Flexibility, Performance, and Security An overview of the elements of the SDN architecture.
•Software Defined Networking Establishes a New Networking Order We look at the nature and impact of SDNs.
•Assessing Servers and Network Devices with SPEC Benchmarks A look at the gold standard for performance assessment.
•Arithmetic Mean, Geometric Mean, Harmonic Mean: Which Should You Use? An important question for doing performance analysis.
•An Overview of Big Data Defines big data and looks at infrastructure issues.
•Business Data Storage and Management Technologies are Building Blocks for Big Data These technologies are the foundation of big data systems.