Best Practices for the Unknown: Wearables, Devices & Things
|
|
- Ralph Henry
- 6 years ago
- Views:
Transcription
1 1_Q&A
2 Best Practices for the Unknown: Wearables, Devices & Things Bill Weir Senior Product Development Engineer & Developer Advocate, AT&T Pete Rembiszewski Principal Product Development Engineer, AT&T
3 Exploring the Unknown Image credit: NASA/CXC/JPL-Caltech/STScI/NSF/NRAO/VLA
4
5 When Facing the Unknown don t panic!
6 The Unknown Can Be Scary, But You probably know more than you think
7 And to Help Face the Unknown We have some best practices & strategies to help with the stuff you don t know
8 Areas We Will Cover 1. Network 2. Design/Verify 3. Data 4. Security/Privacy
9 Network Best Practices Image credit: NASA/CXC/JPL-Caltech/STScI/NSF/NRAO/VLA
10 Network Issues Are in Your Future Overloaded mobile networks could face a failure rate upwards of 30% for Machine-to-Machine (M2M) and Internet of Things (IoT) sessions 1 1. Cellwize White Paper Network Congestion Could See 30% Failure Rate for M2M and IoT
11 The Unknown Can Be Challenging But there are things you can do right now: Find the best tools and measure progress Increase your knowledge Follow best practices Be prepared to fail and move on quickly
12 Find the Best Tools Various tools measure network performance Speedtest HTTPing Wireshark tcpdump And ARO from AT&T ARO was designed just for wireless networks
13 ARO is A Great Tool In 2012 we launched ARO ARO is AT&T Application Resource Optimizer ARO can help you resolve future network issues
14 Network Best Practices: ARO ARO - Application Resource Optimizer Free diagnostic tool designed for wireless Shows how app is handling data & transfers ARO uncovers hidden issues Makes recommendations to fix them!
15 Measure Your Progress Bandwidth: maximum data transfer rate Throughput: rate of data transfer Latency: delay between network nodes Jitter: variation in packet delay Error rate: % of corrupted bits Measure & adjust to improve performance
16 Increase Your Network Knowledge Learn from your mistakes Study proven protocols & standards Learn how to manage connections Learn how to constantly improve
17 Network Best Practices Be strategic about your connections Know that you don t have all the answers Ask the right questions Define your true network requirements before you commit to a design
18 Follow Best Practices Consider the implications of your choices Avoid signal storms/traffic jams Bundle and batch Update only when there is a change
19 Follow Best Practices If possible Thread downloads (vs. serial) Remove redirects Pre-fetch files that are often used or expected Group connections TCP persistent connections HTTP Pipelining
20 Follow Best Practices: Grouping ARO shows when connections are not grouped Imagine an app that: 1. Downloads 1 file every 60s 2. Downloads 2nd file every 60s 3. Sends Analytics every 60s 54 seconds airtime 38J of energy used
21 Follow Best Practices: Grouping ARO shows when connections are well grouped Imagine same app But the connections are grouped together 14 seconds airtime 16J of energy used 68% Energy Savings
22 Design & Verification Strategies Image credit: NASA/CXC/JPL-Caltech/STScI/NSF/NRAO/VLA
23 Design Challenges of the Future The only equation you need to know: (H + S + C) n = W H = Hardware S = Software C = Connectivity W = Work Performed
24 Design Challenges Choices? Endless options can equal endless capabilities or endless confusion Cloud Service
25 Design Challenges Hardware Beacons Server Cloud Service Sensors Gateway Wearables Mobile Devices
26 Design Challenges Software/Versions Embedded Linux Cloud Service Arduino OSX ios Android
27 Design Challenges Connectivity BT 3G Cloud Service Fiber WiFi LTE
28 Design Challenges Business Logic First Thoughts - What may I immediately need to react to? Minimal Data Local Decision Short Term Retention Location Alert Cloud Service High Temperature Alarm Low Battery
29 Design Challenges Business Logic Second Thoughts - What will take some of time to react to? - Moderate Data, Moderate Retention Cloud Service Rain Sensor - No Rain Data Usage Tracking Steps
30 Design Challenges Business Logic Third Thoughts - What will take me a long time to figure out? - Lot s of Data, Remote Decision, Long Term Retention Cloud Service Seasonal Power Needs
31 Design Solutions Ways to Flatten the Landscape Libraries APIs Middleware
32 Design Solutions Maintenance Challenges Device Updates Replacing Hardware Power Consideration Connectivity Implications
33 Verify with ARO Tools you need ARO TCPDUMP Virtualbox Small footprint Linux image
34 Different Traffic Patterns = Different Ways of Thinking Device Local Connectivity Hub or Proxy Wireless Network Server Local Proxy Wearable Thermostat Agent Wireless Network Device or Local Hub Internet Network Service Network Proxy Direct to Network Service API Gateway VPN Mobile Device Remote Sensor Agent Agent Network Proxy or Gateway Wireless Network Network Service Network Service or API
35 Capturing IoT and Service Data Device Local Connectivity Hub or Proxy Wireless Network Server Agent Device or Local Hub Network Service Limited to No UI Limited or No Access Android & ios Execute ARO TCPDump TCPDump May not be able to capture on IoT devices (No UI or Access) Use ARO collector on android device as hotspot or paired with wearable Use ARO on wearable android devices Use TCPDUMP to capture PCAP file
36 Validating APIs and SDKs Wireless Network Device SDK API Network Service or API Android or ios ARO Client Response Request TCPDump Test SDK and API logic with real use cases (Roll your own apps) Capture trace on supported device (Android or ios) Use TCPDUMP to capture PCAP file
37 Android Emulator (Android Studio) Xcode ARO Network Attenuator Internet Ability to Adjust Network Speed (UL & DL) Latency Packet Loss Block Domain ~~~ ~~~ ~~~~ ~~~
38 Design, Build, Verify, Deploy Repeat Capture a PCAP via TCPDUMP OR Implement Fixes Transfer the Trace Files Process the Trace Study the trace using the Analyzer Capture an ARO Trace Gather a trace using the Collector
39 Data Strategies Image credit: NASA/CXC/JPL-Caltech/STScI/NSF/NRAO/VLA
40 Data Issues in the Future Data created by the Internet of Things is projected to hit Zettabytes by 2019, according to Cisco. 1 A zettabyte is a trillion gigabytes 1.
41 Data Best Practices: Storage Data will come from everywhere & anywhere You will need flexibility & scalability Build adequate storage solutions Embrace the Cloud
42 Data Best Practices: Data Questions Questions about data timing How often do you need to update your data? How much data do you need to make a decision? How soon do you need that decision? Do I need all of this data? Are you sending duplicate data?
43 Data Best Practices: Prefetching Anticipate user behavior & use prefetching Send whatever data which is required next Requires that you understand user behavior And understand your data Use common sense & study user interaction relative to the data
44 Data Best Practices: Avoid Duplication Duplicate downloads slow response time Does the data really need updating? Check to see if you are sending duplicate data Dupes can be reduced by caching Use HTTP 304 codes to check for freshness
45 Data Best Practices: HTTP Headers You can rely on proven standards like HTTP Understand how HTTP really works Submit correct directions in the headers Don t Use Etags Not Efficient Cache Control is Faster/More Efficient
46 Security & Privacy Strategies Image credit: NASA/CXC/JPL-Caltech/STScI/NSF/NRAO/VLA
47 Security & Privacy Issues in the Future Within two years, 90% of all IT networks will have an IoT-based security breach 1 1. December, 2014 International Data Corporation - IDC FutureScape: Worldwide Internet of Things 2015 Predictions Web Conference
48 Security & Privacy Contributing Factors Increased Complexity Disparate Hardware & Software Broader Attack Surface Device Limitations And the Big Carrot LOTS OF DATA
49 Security & Privacy Challenges Endless Options for Hackers? Embedded Linux Arduino BT 3G Cloud Service LTE Fiber OSX WiFi ios Android
50 Security & Privacy Broader Attack Surface
51 Security & Privacy Solutions Choices for Developers = Choices for Hackers ios
52 Security & Privacy Data Messages Purchases Pictures Temperature Cloud Service Medical Location Contacts Pictures
53 Security & Privacy Solutions ARO Can Help: Verify SSL is Being Used Without SSL..POST /auth/login? username=knitterdad&password=asdfghjkl.. Trace.pcap With SSL.i? wo ŽŽØv =iêìì.s 5j& OžtÇuSL ÒÎ%Mï! éuó
54 Security & Privacy Solutions ARO Can Help: Verify Third Party APIs Outbound & Inbound Traffic Host: i661.myserver.com I recognize these domains Host: Host: Where is this going?
55 Conclusion Image credit: NASA/CXC/JPL-Caltech/STScI/NSF/NRAO/VLA
56 Areas We Covered 1. Network 2. Design/Verify 3. Data 4. Security/Privacy
57 Take Away Remember that you don t have all the answers
58 Take Away But you may know more than you realize
59 Take Away Research before you design
60 Take Away Reduce complexity
61 Take Away Measure & adjust to improve performance
62 Take Away Secure your data
63 Take Away And use ARO
64 And Finally don t panic!
65 Learn More Developer.att.com/ARO Contact Bill: Contact Pete:
66
67 1_Q&A
68 1_Q&A
Intelligent Edge Computing and ML-based Traffic Classifier. Kwihoon Kim, Minsuk Kim (ETRI) April 25.
Intelligent Edge Computing and ML-based Traffic Classifier Kwihoon Kim, Minsuk Kim (ETRI) (kwihooi@etri.re.kr, mskim16@etri.re.kr) April 25. 2018 ITU Workshop on Impact of AI on ICT Infrastructures Cian,
More informationDemocratized Performance Test Platform. Open source, enterprise ready modular platform, that is tool chain friendly.
Democratized Performance Test Platform Open source, enterprise ready modular platform, that is tool chain friendly. Democratized Performance Test Platform Open source, enterprise ready modular platform,
More informationWhy Most IoT Projects Fail And how to ensure success with OSIsoft and Cisco Kinetic
Why Most IoT Projects Fail And how to ensure success with OSIsoft and Cisco Kinetic Presented by Stephen Friedenthal, IoT Solutions Architect About Cisco Systems, Inc. San Fran Companies want to derive
More informationNCP VPN Path Finder for Juniper SRX Gateways
NCP VPN Path Finder Technology In many cases, IPsec and SSL VPN are complementary, because they solve different problems. This complementary approach allows a single device to address all remote-access
More informationB U I L D I N G O N T H E G A T E W A Y. Copyright 2015, Oracle and/or its affiliates. All rights reserved.
B U I L D I N G O N T H E G A T E W A Y Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
More informationPowering the Internet of Things with MQTT
Powering the Internet of Things with MQTT By Ming Fong Senior Principal Development Engineer Schneider-Electric Software, LLC. Introduction In the last ten years, devices such as smartphones, wearable
More informationSaaS Providers. ThousandEyes for. Summary
USE CASE ThousandEyes for SaaS Providers Summary With Software-as-a-Service (SaaS) applications rapidly replacing onpremise solutions, the onus of ensuring a great user experience for these applications
More informationLaunch Smart Products With End-to-End Solutions You & Your Customers Can Trust
Solution Brief: Launch Smart Products With End-to-End Solutions You & Your Customers Can Trust DeviceTone, our ready to run "connect, manage and enable" solution for product companies, makes secure connectivity,
More informationHigh Performance: What These Apps Did May Shock You
High Performance: What These Apps Did May Shock You Doug Sillars ARO Technical Lead Tiffany Kinkade ARO Developer Advocate Doug Sillars ARO Technical Lead @Dougsillars Tiffany Kinkade ARO Developer Advocate
More informationAT&T Developer Program
AT&T Developer Program Application Resource Optimizer (ARO) User Guide Publication Date: August 13, 2014 Legal Disclaimer This document and the information contained herein (collectively, the "Information")
More informationAT&T Developer Program
AT&T Developer Program Application Resource Optimizer (ARO) Testing Guide Publication Date: April 27, 2015 Legal Disclaimer This document and the information contained herein (collectively, the "Information")
More informationThousandEyes for. Application Delivery White Paper
ThousandEyes for Application Delivery White Paper White Paper Summary The rise of mobile applications, the shift from on-premises to Software-as-a-Service (SaaS), and the reliance on third-party services
More informationAT&T Developer Program
AT&T Developer Program Application Resource Optimizer (ARO) Testing Guide Publication Date: August 13, 2014 Legal Disclaimer This document and the information contained herein (collectively, the "Information")
More informationNetwork Design and Management. Nixu Ltd.
Network Design and Management Nixu Ltd. Contents Network Design and Management The FCAPS Model High Availability solutions SNMP protocol Nixu Ltd. 2/31 Network Design and Management Network Design and
More informationBuilding a Future-Proof Data- Processing Solution with Intelligent IoT Gateways. Johnny T.L. Fang Product Manager
Building a Future-Proof Data- Processing Solution with Intelligent IoT Gateways Johnny T.L. Fang Product Manager Abstract To date, most discussions about the Industrial Internet of Things (IoT) have been
More informationMicro Focus Desktop Containers
White Paper Security Micro Focus Desktop Containers Whether it s extending the life of your legacy applications, making applications more accessible, or simplifying your application deployment and management,
More informationMobile Transport Layer
Mobile Transport Layer 1 Transport Layer HTTP (used by web services) typically uses TCP Reliable transport between TCP client and server required - Stream oriented, not transaction oriented - Network friendly:
More informationLecture 15 Networking Fundamentals. Today s Plan
Lecture 15 Networking Fundamentals Slides attributed to Neil Spring Today s Plan Talk about networking in general Layers, Routing Specifically about IP and TCP Service model, what TCP provides Work our
More informationAT&T Developer Program
AT&T Developer Program Application Resource Optimizer (ARO) User Guide Publication Date: April 27, 2015 Legal Disclaimer This document and the information contained herein (collectively, the "Information")
More informationCisco Cloud Security. How to Protect Business to Support Digital Transformation
Cisco Cloud Security How to Protect Business to Support Digital Transformation Dragan Novakovic Cybersecurity Consulting Systems Engineer January 2018. Security Enables Digitization Digital Disruption,
More informationWhitepaper. IoT Protocols. PAASMER Support for Protocols. Website:
Whitepaper IoT Protocols PAASMER Support for Protocols Website: www.mobodexter.com www.paasmer.co 1 Table of Contents 1. Introduction 3 2. IoT Protocols 4 3. Connectivity Protocols 5 4. Application Layer
More informationAT&T SD-WAN Network Based service quick start guide
AT&T SD-WAN Network Based service quick start guide After you order your AT&T SD-WAN Network Based service, you can: Create administrator accounts Log in to the SD-WAN orchestrator Configure business policy
More informationA quick guide to the Internet. David Clark 6.978J/ESD.68J Lecture 1 V1.0 Spring 2006
A quick guide to the Internet David Clark 6.978J/ESD.68J Lecture 1 V1.0 Spring 2006 Why should you care? People say: Why doesn t the Internet Protect me from spam. Control porn Keep terrorists from plotting
More informationUSING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT
USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT Tom Gibbings Market Development Manager 2017 WIND RIVER. ALL RIGHTS RESERVED. IOT IS CHANGING HOW WE LIVE AND WORK 2 2017 WIND RIVER.
More informationIntelligent Load Balancing: Persistence Balance
More Bandwidth. More Reliability. More Survivability Intelligent Load Balancing: Persistence Balance Application Note Understanding Outbound Balance Routing The BODi delivers a simple, cost effective way
More informationHypertext Transport Protocol HTTP/1.1
Hypertext Transport Protocol HTTP/1.1 Jim Gettys Digital Equipment Corporation, ISBU Visiting Scientist, World Wide Web Consortium 10/17/96 20-Apr-01 1 Acknowledgments HTTP/1.1 Authors Roy Fielding (UCI)
More informationAn Implementation of Fog Computing Attributes in an IoT Environment
An Implementation of Fog Computing Attributes in an IoT Environment Ranjit Deshpande CTO K2 Inc. Introduction Ranjit Deshpande CTO K2 Inc. K2 Inc. s end-to-end IoT platform Transforms Sensor Data into
More informationFlash: an efficient and portable web server
Flash: an efficient and portable web server High Level Ideas Server performance has several dimensions Lots of different choices on how to express and effect concurrency in a program Paper argues that
More informationFog Computing. ICTN6875: Emerging Technology. Billy Short 7/20/2016
Fog Computing ICTN6875: Emerging Technology Billy Short 7/20/2016 Abstract During my studies here at East Carolina University, I have studied and read about many different t types of emerging technologies.
More informationIntroduction to mobile performance testing
Introduction to mobile performance testing Igor Markov, Shlomi Zalma, Shane Evans, Wilson Mar June 11 & 13, 2013 HP LoadRunner components End User Client(s) Internet/WAN Application Server(s) Database
More informationWarpTCP WHITE PAPER. Technology Overview. networks. -Improving the way the world connects -
WarpTCP WHITE PAPER Technology Overview -Improving the way the world connects - WarpTCP - Attacking the Root Cause TCP throughput reduction is often the bottleneck that causes data to move at slow speed.
More informationNetwork Defenses 21 JANUARY KAMI VANIEA 1
Network Defenses KAMI VANIEA 21 JANUARY KAMI VANIEA 1 Similar statements are found in most content hosting website privacy policies. What is it about how the internet works that makes this statement necessary
More informationSD-WAN. Evolving Beyond MPLS in the Enterprise Network. 55 Water Street, 32nd Floor New York, NY (877)
SD-WAN Evolving Beyond MPLS in the Enterprise Network 55 Water Street, 32nd Floor New York, NY 10041 1 (877) 963-8663 www. Overview Public, private and hybrid cloud services, unified communications/ collaboration,
More informationVirtuLocity VLNCloud Software Acceleration Service Virtualized acceleration wherever and whenever you need it
VirtuLocity VLNCloud Software Acceleration Service Virtualized acceleration wherever and whenever you need it Bandwidth Optimization with Adaptive Congestion Avoidance for Cloud Connections Virtulocity
More informationAdaptive Video Acceleration. White Paper. 1 P a g e
Adaptive Video Acceleration White Paper 1 P a g e Version 1.0 Veronique Phan Dir. Technical Sales July 16 th 2014 2 P a g e 1. Preface Giraffic is the enabler of Next Generation Internet TV broadcast technology
More informationLecture 04 Introduction: IoT Networking - Part I
Introduction to Industry 4.0 and Industrial Internet of Things Prof. Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 04 Introduction: IoT Networking
More informationThe Future of Network Infrastructure & Management
WHITE PAPER The Future of Network Infrastructure & Management Software-defined networks, cloud management and LTE offer the ability to adapt a network to the changing workforce. Future Look: New Way to
More informationCS551 End to End Argument [Saltzer81a]
CS551 End to End Argument [Saltzer81a] Bill Cheng http://merlot.usc.edu/cs551-f12 1 The End-to-end Argument Deals with where to place protocol functionality (e.g., encryption, reliability, ordering, duplication
More informationEnabling Performance & Stress Test throughout the Application Lifecycle
Enabling Performance & Stress Test throughout the Application Lifecycle March 2010 Poor application performance costs companies millions of dollars and their reputation every year. The simple challenge
More informationCisco Tetration Analytics
Cisco Tetration Analytics Enhanced security and operations with real time analytics John Joo Tetration Business Unit Cisco Systems Security Challenges in Modern Data Centers Securing applications has become
More informationNetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience.
NetAlly Application Advisor Monitor End User Experience for Local and Remote Users, Distributed Sites and Applications Part of the OptiView Management Suite (OMS) OMS provides the breadth of visibility
More informationTRex Realistic Traffic Generator
DEVNET-1120 TRex Realistic Traffic Generator Hanoch Haim, Principal Engineer Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco
More informationTECHNICAL WHITE PAPER DECEMBER 2017 VMWARE HORIZON CLOUD SERVICE ON MICROSOFT AZURE SECURITY CONSIDERATIONS. White Paper
TECHNICAL WHITE PAPER DECEMBER 2017 VMWARE HORIZON CLOUD SERVICE ON MICROSOFT AZURE SECURITY CONSIDERATIONS White Paper Table of Contents Executive Summary... 3 Audience.... 3 Introduction.... 3 Architecture....
More informationAWS Lambda. 1.1 What is AWS Lambda?
Objectives Key objectives of this chapter Lambda Functions Use cases The programming model Lambda blueprints AWS Lambda 1.1 What is AWS Lambda? AWS Lambda lets you run your code written in a number of
More informationHOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS
HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS Danielle M. Zeedick, Ed.D., CISM, CBCP Juniper Networks August 2016 Today s Objectives Goal Objectives To understand how holistic network
More informationSeminar report Google App Engine Submitted in partial fulfillment of the requirement for the award of degree Of CSE
A Seminar report On Google App Engine Submitted in partial fulfillment of the requirement for the award of degree Of CSE SUBMITTED TO: SUBMITTED BY: www.studymafia.org www.studymafia.org Acknowledgement
More informationIntelligent Mobile App Testing
White Paper Intelligent Mobile App Testing The field of software functional testing is undergoing a major transformation. What used to be an onerous manual process took a big step forward with the advent
More informationStanislav Harvan Internet of Things
Stanislav Harvan v-sharva@microsoft.com Internet of Things IoT v číslach Gartner: V roku 2020 bude na Internet pripojených viac ako 25mld zariadení: 1,5mld smart TV 2,5mld pc 5mld smart phone 16mld dedicated
More informationManaging Remote Medical Devices Through The Cloud. Joel K Young SVP of Research and Development & CTO Digi International Friday, September 9 11:30AM
Managing Remote Medical Devices Through The Cloud Joel K Young SVP of Research and Development & CTO Digi International Friday, September 9 11:30AM Overview The Connectivity and Access Problem What information
More informationChapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms
Overview Chapter 13 TRANSPORT Motivation Simple analysis Various TCP mechanisms Distributed Computing Group Mobile Computing Winter 2005 / 2006 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer
More informationData Analytics for IoT: Applications to Security and Privacy. Nick Feamster Princeton University
Data Analytics for IoT: Applications to Security and Privacy Nick Feamster Princeton University Growing Market for IoT Analytics More than 25 billion devices by 2020 Each of these devices generates data.
More informationCSE/EE 461 HTTP and the Web
CSE/EE 461 HTTP and the Web Last Time The Transport Layer Focus How does TCP share bandwidth? Topics AIMD Slow Start Application Presentation Session Transport Network Data Link Fast Retransmit / Fast
More informationAT&T Developer Program Application Resource Optimizer (ARO)
AT&T Developer Program Application Resource Optimizer (ARO) Testing Guide Publication Date: 1/31/2017 Legal Disclaimer This document and the information contained herein (collectively, the "Information")
More informationTHE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS
THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS By Bill Graham and Michael Weinstein WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Driven by the convergence of cloud technology, rapidly
More informationMoving to a New Business Phone System
Moving to a New Business Phone System BroadSoft White Paper OneCloudNetworks is an authorized BroadSoft Service Provider 2015 BroadSoft. All Rights Reserved. Introduction Phone systems have been installed
More informationCircadence Presentation. May 1, Gary Morton/Dave Frick
Circadence Presentation May 1, 2012 Gary Morton/Dave Frick Circadence Overview Corporate Overview Privately held/headquartered in Boulder (founded 1993) Originally an on-line gaming company (VR1) Divested
More informationIpswitch: The New way of Network Monitoring and how to provide managed services to its customers
BRKPAR-2333 Ipswitch: The New way of Network Monitoring and how to provide managed services to its customers Paolo Ferrari, Senior Director Sales Southern Europe, Ipswitch, Inc. WhatsUp Gold Jan 2018 Agenda
More informationNever Drop a Call With TecInfo SIP Proxy White Paper
Innovative Solutions. Trusted Performance. Intelligently Engineered. Never Drop a Call With TecInfo SIP Proxy White Paper TecInfo SD-WAN product - PowerLink - enables real time traffic like VoIP, video
More informationBuilding a Secure Wireless Network. Use i and WPA to Protect the Channel and Authenticate Users. May, 2007
Agenda: Securing Wireless Networks Building a Secure Wireless Network Joel M Snyder Senior Partner Opus One jms@opus1.com Using encryption and authentication Handling unauthenticated users Managing RF
More informationApigee Edge Cloud. Supported browsers:
Apigee Edge Cloud Description Apigee Edge Cloud is an API management platform to securely deliver and manage all APIs. Apigee Edge Cloud manages the API lifecycle with capabilities that include, but are
More informationIP Mobility vs. Session Mobility
IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when
More informationSecure Access Troubleshooting Rewrite related issues (Core/Web Based Access)
Secure Access Troubleshooting Rewrite related issues (Core/Web Based Access) Published June 2015 Why do certain web-based applications have issues through the rewrite engine compared to accessing the resource
More informationCloudCheck TruSpeed. Reliably Fast Broadband & Wi-Fi for the Home. June,
CloudCheck TruSpeed June, 2018 Reliably Fast Broadband & Wi-Fi for the Home 1 6-1-2018 ASSIA Overview Who is ASSIA? A fast-growing profitable cloud data-science software-solutions company Enables reliably
More informationWhat s New for Oracle Internet of Things Cloud Service. Topics: Oracle Cloud. What's New for Oracle Internet of Things Cloud Service Release 17.4.
Oracle Cloud What's New for Oracle Internet of Things Cloud Service Release 17.4.5 E70360-16 December 2017 What s New for Oracle Internet of Things Cloud Service As soon as new and changed features become
More informationVoice, Video and Data Convergence:
: A best-practice approach for transitioning your network infrastructure White Paper The business benefits of network convergence are clear: fast, dependable, real-time communication, unprecedented information
More informationVirtuLocity VLN Software Acceleration Service Virtualized acceleration wherever and whenever you need it
VirtuLocity VLN Software Acceleration Service Virtualized acceleration wherever and whenever you need it Bandwidth Optimization with Adaptive Congestion Avoidance for WAN Connections model and supports
More informationRethink the Network It is more than just transport
Rethink the Network It is more than just transport Christian Buhrow cbuhrow@extrahop.com Founded in 2007 in Seattle (USA) ; well-funded, rapidly emerging market leader Global leadership in wire data analysis
More informationValidate Pre-Deployment and Live Networks and Applications
IxChariot 8 Validate Pre-Deployment and Live Networks and Applications Key Features New HTML5-based web interface zero client installation; browser-based IxChariot 8 is a new version of the industry's
More information5G From Fixed Wireless Today to Mobility & Transformative Improvements by 2019
5G From Fixed Wireless Today to Mobility & Transformative Improvements by 2019 5G is rapidly climbing the hype cycle. Qualcomm has even claimed it could be as transformative as electricity. Wireless network
More informationSolutions For Your Internet Of Things
Solutions For Your Internet Of Things 29 March 2017 Arun Shankar Our Journey Nov 14 stealth Sep 15 Jul 16 Sep 16 Nov 16 Feb 17 Founded in Japan 5K+ clients US launch Europe launch 2017 More exciting things
More informationICN & 5G. Dr.-Ing. Dirk Kutscher Chief Researcher Networking. NEC Laboratories Europe
ICN & 5G Dr.-Ing. Dirk Kutscher Chief Researcher Networking NEC Laboratories Europe Performance and Security Today User Equipment Access Network Core/Service Network Application Servers 2 NEC Corporation
More informationWiZi-Cloud: Application-transparent Dual ZigBee-WiFi Radios for Low Power Internet Access
WiZi-Cloud: Application-transparent Dual ZigBee-WiFi Radios for Low Power Internet Access Tao Jin, Guevara Noubir, Bo Sheng College of Computer and Information Science Northeastern University InfoCom 2011,
More informationThoughtSpot on AWS Quick Start Guide
ThoughtSpot on AWS Quick Start Guide Version 4.2 February 2017 Table of Contents Contents Chapter 1: Welcome to ThoughtSpot...3 Contact ThoughtSpot... 4 Chapter 2: Introduction... 6 About AWS...7 Chapter
More informationFUJITSU Cloud Service K5 - API Management Service Description
FUJITSU Cloud Service K5 - API Management Service Description August 8, 2018 1. API Management Service Overview API Management Service is built on Apigee Edge, an integrated API platform product provided
More informationVirtual Support Engineer Remote Access and Monitoring Solutions for OEMs & System Integrators
Virtual Support Engineer Remote Access and Monitoring Solutions for OEMs & System Integrators Rev 5058-CO900C Virtual Support Engineer Simple and Secure Connectivity Real-time Alarming Data Collection
More informationApigee Edge Cloud - Bundles Spec Sheets
Apigee Edge Cloud - Bundles Spec Sheets Description Apigee Edge Cloud is an API management platform to securely deliver and manage all APIs. Apigee Edge Cloud manages the API lifecycle with capabilities
More informationAWS Reference Architecture - CloudGen Firewall Auto Scaling Cluster
AWS Reference Architecture - CloudGen Firewall Auto Scaling Cluster Protecting highly dynamic AWS resources with a static firewall setup is neither efficient nor economical. A CloudGen Firewall Auto Scaling
More informationWEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING
WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING A STRONG PARTNER COMPANY Link11 - longstanding security experience Link11 is a European IT security provider, headquartered in Frankfurt, Germany
More informationProblem Code: #ISR13. College Code :
Ministry Category : Indian Space Research Organisation (ISRO) Problem statement : Detect security breaches or anomalies in Network traffic using Network log analysis Team Leader Name : Vipin George Problem
More informationFrequently Asked Questions
Frequently Asked Questions FAQ December Revision Table of Contents General... 3 Agent Deployment... 5 Cloud Administration... 8 Security... 10 Purchase... 10 Support... 11 Page 2 of 11 justsamit Frequently
More informationSTATEFUL TCP/UDP traffic generation and analysis
XENATM STATEFUL TCP/UDP traffic generation and analysis Ideal for validating firewalls, switches, routers, NAT routers, proxies, load-balancers, bandwidth shapers and more. VULCAN LAYER 4-7 GIGABIT ETHERNET
More informationInternet Platform Management. We have covered a wide array of Intel Active Management Technology. Chapter12
Chapter12 Internet Platform Management The Internet is like alcohol in some sense. It accentuates what you would do anyway. If you want to be a loner, you can be more alone. If you want to connect, it
More informationKEY FINDINGS INTERACTIVE GUIDE. Uncovering Hidden Threats within Encrypted Traffic
KEY FINDINGS INTERACTIVE GUIDE Uncovering Hidden Threats within Encrypted Traffic Introduction In a study commissioned by A10 Networks, Ponemon surveyed 1,023 IT and IT security practitioners in North
More informationManaging Wi-Fi With CloudCheck
Managing Wi-Fi With CloudCheck ASSIA Software Solutions Reliably Fast Broadband & Wi-Fi for the Home 1 June 6 2018 ASSIA Overview Market Leader in Diagnostics and Optimization Software DSL & Optical Broadband
More informationVirtual Support Engineer
Virtual Support Engineer Remote Access and Monitoring Solutions for OEMs & System Integrators Rev 5058-CO900C Copyright 2012 Rockwell Automation, Inc. All rights reserved. Copyright 2012 Rockwell Automation,
More informationSynchronized Security
Synchronized Security Revolutionizing Advanced Threat Protection Per Söderqvist Sales Engineer Nordics and Baltics 1 A Proven Market Leader Endpoint Encryption Leader UTM Unified Threat Management EPP
More informationBROADBAND FORUM S USER SERVICES PLATFORM (USP)
BROADBAND FORUM S USER SERVICES PLATFORM (USP) UTILIZING NEW TECHNOLOGIES TO CONTROL AND MANAGE DEVICES IN THE HOME JOHN BLACKFORD - PRODUCT MANAGEMENT DIRECTOR, ARRIS TABLE OF CONTENTS INTRODUCTION...
More informationFUJITSU Cloud Service K5 - API Management Service Description
FUJITSU Cloud Service K5 - API Management Service Description March 22, 2018 1. API Management Service Overview API Management Service is built on Apigee Edge, an integrated API platform product provided
More informationABSTRACTING CONNECTIVITY FOR IOT WITH A BACKHAUL OPERATOR
ABSTRACTING CONNECTIVITY FOR IOT WITH A BACKHAUL OPERATOR NIGEL CHADWICK VIDEO TRANSCRIPT Welcome! What s your name and what do you do? Hi, it s Nigel Chadwick. I m one of the founders of Stream Technologies.
More informationDesign your network to aid forensics investigation
18th Annual FIRST Conference Design your network to aid forensics investigation Robert B. Sisk, PhD, CISSP Senior Technical Staff Member IBM Baltimore, Maryland USA Master Outline Introduction Incident
More informationI am a Data Nerd and so are YOU!
I am a Data Nerd and so are YOU! Not This Type of Nerd Data Nerd Coffee Talk We saw Cloudera as the lone open source champion of Hadoop and the EMC/Greenplum/MapR initiative as a more closed and
More informationPreparing your network for the next wave of innovation
Preparing your network for the next wave of innovation The future is exciting. Ready? 2 Executive brief For modern businesses, every day brings fresh challenges and opportunities. You must be able to adapt
More informationOutline 9.2. TCP for 2.5G/3G wireless
Transport layer 9.1 Outline Motivation, TCP-mechanisms Classical approaches (Indirect TCP, Snooping TCP, Mobile TCP) PEPs in general Additional optimizations (Fast retransmit/recovery, Transmission freezing,
More information40,000 TRANSFORM INFRASTRUCTURE AT THE EDGE. Introduction. Exploring the edge. The digital universe is doubling every two years
TRANSFORM INFRASTRUCTURE AT THE EDGE Dell EMC enables robust, efficient edge computing virtually anywhere with micro Modular Data Centers Introduction Edge computing is becoming one of the biggest buzzwords
More informationWHITEPAPER MOVING TO A NEW BUSINESS PHONE SYSTEM
WHITEPAPER MOVING TO A NEW BUSINESS PHONE SYSTEM Introduction Phone systems have been installed in offices of all different sizes for more than 40 years, providing a vital service to the business. Since
More informationCS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking
: Computer Networks Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking Remember this picture? How did the switch know to forward some packets to B and some to D? From the address in the packet
More informationSmart and Secured Infrastructure. Rajesh Kumar Technical Consultant
Smart and Secured Infrastructure Rajesh Kumar Technical Consultant IoT Use Cases Smart Cities Connected Vehicles / V2X / ITS Industrial Internet / IIoT / Industry 4.0 Enterprise IoT / Smart Buildings Technical
More informationCisco Application Policy Infrastructure Controller Data Center Policy Model
White Paper Cisco Application Policy Infrastructure Controller Data Center Policy Model This paper examines the Cisco Application Centric Infrastructure (ACI) approach to modeling business applications
More informationNEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS
NEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS INNOVATORS START HERE. EXECUTIVE SUMMARY The Internet of Things (IoT) is no longer a fanciful vision. It is very much with us, in everything from
More informationPimp My Data Grid. Brian Oliver Senior Principal Solutions Architect <Insert Picture Here>
Pimp My Data Grid Brian Oliver Senior Principal Solutions Architect (brian.oliver@oracle.com) Oracle Coherence Oracle Fusion Middleware Agenda An Architectural Challenge Enter the
More information