4D networking takes a clean-slate approach to network control, and is guided by three principles: Network-level objectives that can be expressed as goals for the network in its entirety; timely and accurate network-wide views of topology, traffic and events; and providing direct control to network operators. If 4D does indeed overtake IP as the go-to networking protocol, it could have massive implications for networks as we know them - but given IP's track record, we wouldn't hedge our bets on that happening anytime too soon.Required
Next Gen FireWall
Next-generation firewalls (NGFWs) are deep-packet inspection firewalls that move beyond port/protocol inspection and blocking to add application-level inspection, intrusion prevention, and bringing intelligence from outside the firewall. An NGFW should not be confused with a stand-alone network intrusion prevention system (IPS), which includes a commodity or nonenterprise firewall, or a firewall and IPS in the same appliance that are not closely integrated.Read More
Eyes On Infinite Dimension
Our surveillance research is aimed at developing advanced security solutions based on computer vision and pattern recognition technologies and advanced embedded systems. In addition to this theme is continued research into robust biometrics suitable for CCTV and mobile deployment. The team has won a number of awards for its biometrics research and is well-embedded in the international research community.read more
Enterprise Level Application Architecture
Applications architecture is the science and art of ensuring the suite of applications being used by an organization to create the composite architecture designing app is scalable, reliable, available and manageable.
The applications architecture is specified on the basis of business and functional requirements. This involves defining the interaction between application packages, databases, and middleware systems in terms of functional coverage. This helps identify any integration problems or gaps in functional coverage. A migration plan can then be drawn up for systems which are at the end of the software life cycle or which have inherent technological risks.
Beware! Your data can kidnapped
The concept is simple: Your computer gets infected with a virus that encrypts your files until you pay a ransom. It's extortion taken to its networked extreme. The criminals provide step-by-step instructions on how to pay, sometimes even offering a help line for victims unsure how to buy bitcoin. The price is designed to be cheap enough for people to pay instead of giving up: a few hundred dollars in many cases. Those who design these systems know their market, and it's a profitable one.read more