274 results on '"COMPUTER network protocols"'
Search Results
52. IP to dominate in 1999 and beyond.
- Author
-
Lawson, Stephen and Kujubu, Laura
- Subjects
- *
COMPUTER network protocols , *TELECOMMUNICATION , *FORECASTING - Abstract
Forecasts the dominance of internet protocol (IP) in the telecommunications industry in the United States in 1999. Easier use of IP through the simplification of data storage system standards; Role of the Year 2000 computer crashes in promoting the trend; Benefits of having a single protocol for businesses.
- Published
- 1998
53. Steamlining IP.
- Author
-
Lawson, Stephen
- Subjects
- *
INTERNET , *MULTICASTING (Computer networks) , *MULTIMEDIA systems , *COMPUTER network protocols , *ENGINEERS - Abstract
Focuses on a team of engineers' plan to submit the Simple Multicast proposal to the Internet Engineering Task Force. Goal of overcoming the limitations of Internet Protocol Multicast technologies; Reduction of Web congestion; Opportunity for streaming multimedia applications to break through to mainstream use on the Internet.
- Published
- 1998
54. IPv6 cuts address chaos.
- Author
-
Talley, Brooks
- Subjects
- *
COMPUTER network protocols , *TECHNOLOGICAL innovations - Abstract
Evaluates IPv6, an upgraded IPv4 networking protocol. Elimination of IPv4's shortcomings due to the global Internet explosion; Ease in transition from IPv4 to IPv6; Specifications of IPv6's core elements; Drawbacks to IPv4; Capabilities and uses of IPv6.
- Published
- 1998
55. IP players gain network foothold.
- Author
-
Zieger, Anne
- Subjects
- *
COMPUTER network protocols , *TELECOMMUNICATION - Abstract
Examines the growing market share of Competitive Local Exchange Carriers and other service providers specializing in Internet protocol in the United States. Operations by Cincom Systems, Qwest Communications, Concentric Networks, American Digital Networks, Epoch Networks and Tele-Communications; Impact of the Internet protocol providers on traditional telecommunication carriers. INSET: IPV6--it's coming but is it better?, by Stephen Lawson..
- Published
- 1998
56. Can IP answer AT&T's call?
- Author
-
Kujubu, Laura and Scannell, Ed
- Subjects
- *
COMPUTER network protocols - Abstract
Reports on AT&T Corp.'s plan to move its entire network infrastructure to the Advanced Services Platform, an Internet protocol (IP) platform. Impact of the move on the information services offered by AT&T; Communication analysts' opinion towards AT&T's plan; Analysis of the IP technology.
- Published
- 1998
57. OMG ties in to Java.
- Author
-
Bowen, Ted Smalley and Cunningham, Cara
- Subjects
- *
COMPUTER network protocols , *JAVA programming language - Abstract
Focuses on the Object Management Group's (OMG) modification of its Internet Inter-ORB Protocol (IIOP) communications protocol to fully support Java. Groundwork to open the multiplatform programming language and run-time environment; Initial resistance of Sun Microsystems Computer Corp.'s JavaSoft division to support IIOP; Java Remote Method Protocol (JRMP) as the sole transport for the Java Remote Method Invocation.
- Published
- 1998
58. Shifting sands of standards.
- Subjects
- *
COMPUTER network protocols , *COMPUTER security standards , *STANDARDS - Abstract
Discusses efforts to help vendors standardize more quickly on ways for virtual private networks (VPN) system. to establish trust. Internet Engineering Task Force's emerging Internet protocol (IP) Security (IPSec) protocol; Designation of a number of technologies for users and systems to authenticate themselves; Major vendors honing their implementations of IPSec.
- Published
- 1998
59. Netscape puts weight behind LDAP directory.
- Author
-
Woollacott, Matthew
- Subjects
- *
COMPUTER network protocols - Abstract
Reports that Netscape Communications Corp. will preview its Version 3.0 of the Lightweight Directory Access Protocol during the Networld+Interop computer trade show after the week of April 28, 1997. Schedule for beta testing and release during the first half of 1998; Plan for a server-based registry; Offer of an offline replication of the directory for mobile clients.
- Published
- 1997
60. Directory detente in works.
- Author
-
Doan, Amy and Walsh, Jeff
- Subjects
- *
COMPUTER network protocols - Abstract
Reports on the establishment of a set of protocols that will integrate enterprise directories by eight computer companies. Lightweight Internet Person Schema to the Internet Engineering Task Force (IETF); Features of the Lightweight Directory Access Protocol (LDAP); Benefits of LDAP.
- Published
- 1996
61. Protocol gains backers.
- Author
-
Lawson, Stephen
- Subjects
- *
COMPUTER network protocols , *WORLD Wide Web , *COMPUTER industry - Abstract
Reports that computer vendors are backing a common way to share systems management information using open industry-standard protocols on the World Wide Web. Support for the Web-based Enterprise Management initiative; Schedule of product releases; Benefits of a common approach to network management.
- Published
- 1996
62. IETF tunneling standard will link virtual private networks.
- Author
-
Lawson, Stephen
- Subjects
- *
COMPUTER network protocols - Abstract
Reports on the development of Point to Point Tunneling Protocol (PPTP) by Microsoft Corp. and other companies and Layer 2 Forwarding by Cisco Systems Inc. Purpose of both protocols; Benefits of both protocols; Features and capabilities. INSET: Point to Point Tunneling Protocol (PPTP)..
- Published
- 1996
63. Tool sweeps away Web security fear.
- Author
-
Mills, Elinor
- Subjects
- *
WORLD Wide Web -- Security measures , *COMPUTER network protocols - Abstract
Reports on NSClean utility that prevents automatic caching in World Wide Web browsers. Features and capabilities; List price; Information on disk caching; Other computer network protocols used to prevent caching.
- Published
- 1996
64. IEEE's isoethernet manages bandwidth better.
- Author
-
Bort, Julie and Mehta, Diane
- Subjects
- *
COMPUTER network protocols , *VIDEOCONFERENCING - Abstract
Discusses the problems of videoconferencing over a local area network (LAN). IEEE's Isochronous Ethernet; Asynchronous Transfer Mode. INSETS: CU-SeeMe eyes the Internet, by Julie Bort.;Continuous presence: Four heads are better than one..
- Published
- 1995
65. Novell readies groupware upgrades.
- Author
-
Barney, Doug
- Subjects
- *
NOVELL software , *COMPUTER software , *COMPUTER network protocols - Abstract
Reports that Novell Inc. will be releasing Open Document Management API (ODMA) enabled upgrades to its groupware products. Version 4.1a of GroupWise; Enhancement Pack for conferencing and application development; Upgraded InForms electronic forms software; Version 4.0a of SoftSolutions document manager.
- Published
- 1994
66. Protocol analyzers.
- Author
-
Karon, Paul
- Subjects
- *
COMPUTER network protocols - Abstract
Discusses the computer network protocol analyzers. Polarization into two general camps; Role played by protocol analysis in local area network management; Open Systems Interconnect (OSI) set of standards; Product differentiation; Internet monitoring. INSET: The changing face of LAN analyzers..
- Published
- 1993
67. Novell to preview module that lets servers run as IP nodes.
- Author
-
Busse, Torsten
- Subjects
- *
COMPUTER network protocols - Abstract
Reports on Novell Inc.'s NetWare IP, a NetWare add-on that links NetWare servers to Internet Protocol (IP) backbone networks. Internet Packet Exchange (IPX) transport protocol option; Compatibility with NetWare servers, clients and services; Price.
- Published
- 1993
68. Coping in a New Era of Telecom.
- Author
-
Margulius, David L.
- Subjects
- *
INTERNET protocols , *COMPUTER network protocols , *INTERNET service providers , *INTERNET telephony , *TELECOMMUNICATION systems , *TECHNOLOGICAL innovations - Abstract
The article discusses a report released by Forrester entitled "The Four Stages of Enterprise Managed IP Communications." It was found that the report was based on a survey of European service providers that are trying to help large enterprises integrate communications applications such as basic and advanced telephony, audioconferencing, video, voicemail, and unified messaging, into a common infrastructure and operational framework. According to Forrester, such convergence will be enabled by innovations such as service-oriented communication applications and higher-capacity IP networks. The four stages according to Forrester is visibility, transformation, end-to-end service management and self-service.
- Published
- 2006
69. SIP Flood Fuels Need for Security.
- Author
-
McLoughlin, Stephanie and Moore, Cathleen
- Subjects
- *
COMPUTER network protocols , *COMPUTER network security , *COMPUTER security , *INTERNET telephony , *SYSTEMS software , *COMPUTER software - Abstract
This article reports on the need for better Session Initiation Protocol (SIP) traffic due to the growing interest in SIP-enabled communications as of October 2005. SIP is a signaling protocol used to establish connectivity between two session end points. Covergence will provide its answer to the SIP security question at Gartner Symposium/ITExpo this week by unveiling Eclipse, a Linux-based appliance that manages the connectivity and performance of SIP services and applications. Acting as both perimeter and internal defense system. Eclipse secures access to SIP applications and SIP-enabled PBXes and phones, making it a natural fit in VoIP security plans. Beyond VoIP, it can apply security policies to SIP traffic, monitor network capacity, and log and record application traffic to comply with industry regulations.
- Published
- 2005
70. Veritas Eases Exchange Archiving.
- Author
-
Harbaugh, Logan C.
- Subjects
- *
APPLICATION software , *SYMANTEC software , *EMAIL systems , *COMPUTER network protocols - Abstract
This article features the Veritas Enterprise Vault (EV) 6.0 application software from Symantec. Fully integrated with Microsoft Exchange and hooking into Veritas NetBackup on the back end, EV also supports any simple mail transfer protocol mail product. It can even archive the Microsoft New Technology File System and SharePoint Portal Server repositories. EV provides a flexible and easy-to-use set of tools, leveraging both Active Directory and the native capabilities of Exchange, as well as adding more of its own. Administrators have control over when e-mail is archived, how much is archived, and to which storage tier it is archived. INSET: Veritas Enterprise Vault 6.0.
- Published
- 2005
71. SOA Styles.
- Author
-
Udell, Jon
- Subjects
- *
CONFERENCES & conventions , *COMPUTER industry , *SIMPLE Object Access Protocol (Computer network protocol) , *COMPUTER network protocols - Abstract
This article presents the author's views on the first Start of Authority (SOA) Executive Forum conducted by Infoworld in San Jose, California and in New York, both in May 2005. The juxtaposition of the two events helped me reconcile a deep schism between two factions, which I will call the WS and Web 2.0 camps. The argument, which revolves around pairs of opposing and overloaded words--simplicity versus complexity, decentralization versus centralization, agility versus stability--has been going on for years, but it is gotten really loud in recent months. Like a pair of bookends, our two keynote speakers neatly bracketed the debate. In San Jose, Motorola CIO Toby Redshaw sketched out a SOA deployment that was music to the ears of WS-aligned vendors and standards makers. For Redshaw, the key to success is shared infrastructure: a central directory based on the oft-maligned UDDI standard, and an enterprisewide WS management system. At our New York event, though, Harvard Medical School CIO John Halamka told a very different story. His task was to streamline financial and clinical data exchange across New England's network of physicians, hospitals, and insurers. The solution relies on techniques that Web 2.0 advocates know and love: XML across HTTP, secured with Secure Sockets Layer. Simple Object Access Protocol and WS-Security are part of the mix now, but the system was up and running before those standards were done. And to this day, for political and logistical reasons, it remains a loose federation with little shared infrastructure or central control.
- Published
- 2005
72. Getting HTTP Right.
- Author
-
Udell, Jon
- Subjects
- *
HTTP (Computer network protocol) , *COMPUTER network protocols , *HYPERTEXT systems , *WORLD Wide Web , *COMPUTER software - Abstract
This article presents information on Web application frameworks that complies with the Web protocol's rules as of May 2005. According to the author, when he discussed the proper use of the Hypertext Transfer Protocol (HTTP) verbs POST and GET, the benefits and hazards seemed abstract. Recently, though, two compellingly concrete examples emerged. The first involved a collision between Google's new Web Accelerator and an application called Backpack, which is built with Ruby on Rails, a Web application framework for the Ruby programming language. This was an unfortunate but timely demonstration of what can go wrong when HTTP-based software fails to distinguish between requests that alter resources and requests that do not. The second example involved Coral, an open content distribution network, and underscored what can go right when the rules of the road are respected. The proxying and caching features of HTTP do much more than usually imagined.
- Published
- 2005
73. Services at Your Service.
- Author
-
McKean, Kevin
- Subjects
- *
COMPUTER input-output equipment , *COMPUTER software , *COMPUTER network protocols , *COMPUTER security , *WEB services - Abstract
This article discusses how a service layer makes service-oriented architectures (SOA) easier to manage and update. Most companies looking seriously at SOA do so in hopes of making a mishmash of existing hardware and software play together more smoothly. Such companies have much to gain from SOA. But they face a key challenge in that heterogeneous environments bring together a plethora of brands, platforms, protocols, security systems and more, making SOA standardization more difficult to achieve. Even if the chief architect of a company solves the problem by dictating, the Web services policy--the set of requirements for using any given service--must be abstracted from the services themselves in order for the SOA to scale. This is exactly the type of practical concern for which the InfoWorld SOA Executive Forum was created, to be held in San Jose, California, on May 5, 2005 and in New York on May 17, 2005. Eric Pulier, executive chairman of SOA Software, said that if an individual has exposed his or her applications as Web services but the security procedures and other policies are hard-coded into the applications, then every change requires him or her to re-code the applications. That is equivalent to an old-style tightly coupled application-to-application interface. The smart solution is to handle such complexities in a service layer, integral to the SOA. Some companies write this layer themselves, others seek a prepackaged solution such as the one offered by SOA Software. In either case, the service layer knows where each service resides, what it knows, and what it needs. It then acts as a nexus for communication, security and so forth. Upgrading a protocol, then, requires you to change the service layer rather than several applications.
- Published
- 2005
74. CORRECTION.
- Subjects
- *
COMPUTER network protocols - Abstract
Presents a correction to the review "HyperIP Streamlines Remote Replication," that was published in a previous issue of "InfoWorld."
- Published
- 2005
75. Inter-Tel Adds to Collaboration Wares.
- Subjects
- *
COMPUTER software , *COMPUTER network protocols , *USER interfaces , *WORLD Wide Web - Abstract
This article provides information on the two collaboration offerings: Linktivity WebDemo 4.0 software for real-time Web conferencing and collaboration, and Weblnteractive 4.0 collaboration software for support and online sales, released by Inter-Tel in December 2004. New features in Linktivity WebDemo include Secure Sockets Layer (SSL) support; 128-bit encryption; authentication through Windows, Lightweight Directory Access Protocol, or Radius; and improved search and query capabilities. Weblnteractive 4.0 also includes SSL support and 128-bit encryption, an enhanced user interface, and integration application program interfaces.
- Published
- 2005
76. Code, Debug, Distribute.
- Author
-
Yager, Tom
- Subjects
- *
WIRELESS Application Protocol (Computer network protocol) , *COMPUTER network protocols , *WIRELESS communications - Abstract
This article offers a look at Nokia's Preminet service, which extends a vendor's wireless application platform. Even with shareware, the secure delivery of software to buyers is the developer's problem, and not just for small shops. Large independent software vendors that target new markets face the same problem. There is little difference between the distribution and payment process for Garden Weasels and commercial software. Using the service is easy. The vendor develops the application, get it validated by Nokia, and they will take care of cataloging, distributing and receiving of payment. This is not a Yahoo storefront approach, which would be useless for selling software. Preminet takes the considerable complexity of the wireless distribution and payment network into consideration. Upon uploading the application, it is then added to the Preminet master catalog. Wireless operators choose applications from the larger catalog to offer to their subscribers. The subscriber searches for applications directly from his or her phone. When a purchase is made, the operator creates a secure link to the device, sends the software along with a signature guaranteeing its origin, and posts the amount of the purchase to the subscriber's wireless services bill.
- Published
- 2004
77. Its Master's Voice.
- Author
-
Udell, Jon
- Subjects
- *
AUTOMATIC speech recognition , *COMPUTER input-output equipment , *PATTERN recognition systems , *COMPUTER software , *EMAIL , *INTERNET , *COMPUTER network protocols , *BANDWIDTHS - Abstract
The article reflects on voice recognition software. I could never convinced myself to make dictation part of my routine working life but with each generation of hardware and with each version of the program, the gap between desire and reality has narrowed. For me, typing remains the most efficient way to produce error-free copy. Because recognition accuracy is such a difficult problem, dictation software has to pay very close attention to me. It has to learn everything it can about my speech pattens, vocabulary and writing style. Perhaps because people imagine that other application domains are not as challenging, other programs pay strikingly little attention that the people do. When I organize my E-mail or conduct research on the Web, I exhibit predictable pattens of behavior. People have long expected but rarely experienced personal productivity software that absorbs those patterns, automated repetitive chores and can be taught to improve its performance. Thin-client rich Internet applications cannot easily collect or exploit interaction data, with open protocols and plenty of bandwidth, anything is possible. Intelligent assistance in its most intimate form will initially be delivered on the desktop and will be closely bound to it.
- Published
- 2004
78. Media Gateway Widens Scope.
- Author
-
Rash, Wayne
- Subjects
- *
COMPUTER network protocols , *WIDE area networks , *ETHERNET , *PRIVATE branch exchanges , *LONG distance telephone service , *NETWORK routers - Abstract
The article deals with the IQ1500 intelligent media gateway from Versatel Networks Inc. The IQ1500 can act as a security gateway using topology hiding which works in much the same way as network address translation. The IQ1500 can choose to send local calls out via the public switched telephone network (PSTN) in every case and its able to route long distance through a wide-area network, it can discern if the Ethernet connection to the outside world goes down, and it will seamlessly transition calls to the PSTN, it also has its own conferencing bridge which means that the users do not have to buy the feature for the private branch exchanges. IQ1500 allows a great deal of flexibility in handling calls. Users can restrict some types of calls such as long distance or international to only certain users. A customer can even require the use of numeric codes such as PIN numbers or project codes before users are allowed to use services such as long distance. IQ1500 sets itself apart from other gateways because it runs applications that supplement the gateway functionality. The IQ1500 can be a media server, it can control SoftSwitch connections and it can run in a distributed environment. Versatel plans to offer IQroute, an edge routing application that allows the media gateway to choose the proper network for a call, either as a way to bypass bad connections or choose the lowest cost of best quality.
- Published
- 2004
79. IP Telephony: Why Wait?
- Author
-
Udell, Jon
- Subjects
- *
INTERNET telephony , *TELEPHONE systems , *COMPUTER network protocols , *TELECOMMUNICATION , *COMPUTER buses - Abstract
This article presents a personal opinion of using Internet Protocol telephony. The year 1994 was the year in which Byte Magazine's computer telephony cover story -- which 1 wrote -- proclaimed that integrated voice/data applications were right around the corner. Here we are in 2004, and they're still right around the corner. I'm having much fun with this year's Voice over Internet Protocol (VoIP) vogue, Skype. It's great to make free and encrypted long-distance phone calls using a wireless-fidelity-connected laptop and a Universal Serial Bus headset -- just like it was great last year to do the same kind of thing with iChat AV or with various predecessors dating back to the mid-1990s. Every time one of these solutions comes along, I give it a try. And every time so far, including Skype, the novelty soon fades. It's really, really hard to match the quality and consistent reliability of a nailed-up circuit. We'll get there eventually, I'm sure. There are dozens of ways in which personal computers can add value to the Public Switched Telephone Network. Caller ID screen pops, conference call setup, call logging, voice archiving, and user-programmable interactive voice response are just some of the productivity aids that we should all take for granted by now -- but that almost nobody can.
- Published
- 2004
80. Encrypted VoIP Gateway.
- Subjects
- *
VIRTUAL private networks , *INTERNET telephony , *COMPUTER networks , *COMPUTER network protocols - Abstract
This article features the Hybrid-Virtual Private Networks (VPN) Gateway from Net6. Net6 has enhanced its Hybrid-VPN Gateway to encrypt signaling paths for all voice over Internet Protocols (IP), including Single In-Line Package, H.323, and proprietary protocols from vendors Avaya, Cisco, and Nortel Networks. This includes a patent-pending Voice-over-Screen Script Language feature, peer-to-peer media routing for call control, and encryption at variable bit rates for both voice and video. The product has been tested with IP phones from major vendors. Pricing ranges from $1,500 to $40,000 for 10 to 2,000 concurrent tunnels.
- Published
- 2004
81. SurfControl Beefs Up Enterprise Content Filters.
- Subjects
- *
BLOGS , *WEBSITES , *COMPUTER security , *COMPUTER network protocols - Abstract
This article features the Web site filter 5.0 of SurfControl. SurfControl has updated its complete line of Internet content-filtering products. Web Filter 5.0 adds a spyware category to its threat database, as well as the ability to block p-to-p application sites. Administrators can now monitor all SurfControl installations from a single console. In addition, the product's filtering agent has been enhanced for greater accuracy. Instant Message Filter 2.5 supports the latest AIM, ICQ, MSN, and Yahoo! messaging protocols, as well as the BitTorrent, OpenNapster, and WinMX p-to-p networks. The Mobile Filter product facilitates filtering for remote or seldom-connected users. In a typical 500-user installation. Web Filter costs $19 per user. Instant Message Filter costs $9.50 per user, and Mobile Filter costs $6.65 per user with a $2,500 one-time server fee.
- Published
- 2004
82. Enter the Hot Zone.
- Author
-
Schwartz, Ephraim
- Subjects
- *
COMPUTER network protocols , *COMPUTER networks ,IEE WiMax & Mesh Networks Forum (2005 : London, England) - Abstract
This article focuses on the effort of WiMax Forum to expand its Wireless Fidelity (Wi-Fi) capabilities in the U.S. WiMax is not long-distance Wi-Fi. In fact, WiMax networks are not interoperable with Wi-Fi networks. For the most part, WiMax will use the licensed spectrum, which means service providers will have to pay the U.S. Federal Communications Commission for bandwidth. WiMax can also work in the unlicensed spectrum above 5 Gigahertz, but those frequencies require line of sight and work only at shorter distances, according to Ron Resnick, president and chairman of the WiMax Forum. Using those bands would effectively negate the long-distance value of WiMax. But using licensed spectrum does give operators the right to use greater output power. Thus, the first WiMax specification is for 75 Megabit per second at distances as far as 30 miles, although actual data throughput for individual users will vary depending on distance. Given that range, Resnick says that metropolitan zones based on WiMax will eventually compete with current Wi-Fi locations. Because the available spectrum for WiMax is so broad, the WiMax Forum is in the process of creating so-called profiles that address subsets of the full WiMax functionality, targeted at specific markets.
- Published
- 2004
83. iSCSI Gets Some Respect.
- Author
-
Francis, Bob
- Subjects
- *
ISCSI (Computer network protocol) , *COMPUTER network protocols , *INFORMATION storage & retrieval systems , *LOCAL area networks , *COMPUTER networks - Abstract
This article reports on the popularity of computer network protocol Internet SCSI (iSCSI), as of August 2004. An upgrade made by IBM to its TotalStorage Storage Area Network (SAN) Volume Control product included iSCSI support. IBM competitor Dell, through its partnership with EMC, offers a low-cost SAN with its AX100 product, which utilizes Fibre Channel. Dell officials plan to make AX100 available with iSCSI in the future. Users are also implementing the technology. Ken Walters, senior director of enterprise technology at the Public Broadcasting Service, says the iSCSI complement their existing SAN environment. Several companies are entering the market. In July 2004, Adaptec, a provider of iSCSI components, acquired Snap Appliance Network Attached Server (NAS) market. Snap recently announced its first iSCSI-enabled NAS array, the Snap Server 18000. Smaller companies are also announcing iSCSI offerings. Nimbus Data Systems released two iSCSI-based IPSes (Internet Protocol SAN), the Nimbus IPS-500 and Nimbus IPS-1000. iSCSI is a protocol for encapsulating SCSI commands into Transmission Control Protocol/Internet Protocol packets and for enabling block data transport via Internet Protocol networks.
- Published
- 2004
84. RSS Bandwidth Blues.
- Author
-
Dickerson, Chad
- Subjects
- *
INTERNET servers , *BROADBAND communication systems , *TELECOMMUNICATION systems , *COMPUTER network protocols , *WEB browsers , *HTTP (Computer network protocol) , *DIGITAL communications - Abstract
This article presents ways to make the Rich Site Summary (RSS) manageable on the server side. Approaches that would help RSS feed providers limit bandwidth consumption include Hypertext Transfer Protocol (HTTP) compression, which is a capability of Web servers and browsers. As an example of HTTP compression, most Web browsers send a header to Web servers indicating whether they accept compressed content. When browsers make requests to an Apache server with the mod gzip module installed, the Apache server applies gzip compression as clients request files. The result is a smaller file being sent to the client, thereby reducing bandwidth requirements. The second approach, on the other hand, is the use of the HTTP conditional Get Execute Trigger (GET). The logic behind a conditional GET request is that such a document has changed and that the conditional GET combined with HTTP compression can allegedly make a huge performance difference. Apparently, the annoyances in serving RSS have less to do with bandwidth and more to do with supporting regular surges of simultaneous connections from newsreaders. To solve such an annoyance, one can configure Web servers to handle a higher number of simultaneous connections.
- Published
- 2004
85. Federating Identity.
- Author
-
Udell, Jon
- Subjects
- *
IDENTIFICATION , *DISCLOSURE , *RIGHT of privacy , *COMPUTER network protocols , *COMPUTER networks - Abstract
This article argues that in establishing individual identity, there are plenty of cases where role-based access, certified by a remote authority, will suffice. Capturing the identity of individuals, along with personal information about them has become a habit. In a climate of increasing concern about privacy, it is a habit which people must learn to resist. Shibboleth, an approach to federation of identity that is rooted in the idea of selective disclosure, is gaining real traction in the higher education sector. The deployment enables students at Pennsylvania State University to use their home credentials to log into the Napster site. The protocol can offer the user the option to review and perhaps deny the release of the attributes the target server needs to make its authorization decision. Shibboleth's protocols overlap in many respects with those of the Liberty Alliance Project.
- Published
- 2004
86. Proof Is in the Packets.
- Author
-
Connolly, P. J.
- Subjects
- *
COMPUTER network protocols , *COMPUTER networks , *STANDARDS , *DATA transmission systems , *ELECTRONIC systems - Abstract
This article compares the use of transmission control protocol (TCP) and User Datagram Protocol (UDP) in testing the performance of computer networks. The basic difference between the two is simple enough: TCP is connection-oriented, using the endpoints to negotiate the data transfer, while UDP is connectionless, with no flow control or error checking. UDP is used most frequently for services that do not require much more than packet delivery and reassembly into datagrams. Network file service also uses UDP because the low overhead of the transport protocol easily accommodates large chunks of data. UDP is lighter on the wire than TCP, the negotiation and error-checking that takes place with TCP eats up bandwidth and is the price to pay for a reliable transport protocol.
- Published
- 2004
87. Calling for Standards.
- Author
-
Schwartz, Ephraim
- Subjects
- *
INTERNET telephony , *TELECOMMUNICATIONS standards , *COMPUTER network protocols , *INTERNETWORKING - Abstract
The article focuses on the standards issue surrounding voice over Internet Protocol (VoIP). Both Michael Frendo of Cisco and Lawrence Byrd at Avaya agree that Real-Time Transport Protocol is pretty much established as the standard for the bearer channel, the one that actually carries the voice. Byrd remarked that the challenge for the industry is to lock down the standards at the higher levels. Most industry players seem to be rallying around Session Initiation Protocol (SIP), a specification developed by the Internet Engineering Task Force. But SIP has a way to go before it can solve all the problems of VoIP. For example, there is no public standard for Cisco videoconferencing, nor does SIP address video yet. One big interoperability challenge will be between VoIP vendors and major telecommunication carriers, which are slowly moving toward VoIP links themselves. And then, of course, there is the issue of security. Frendo suggested one solution called Simple Traversal of User Datagram Protocol Through Network Address Translation/Translator that opens up pinholes in the firewall to allow voice to pass through.
- Published
- 2004
88. Guaranteed Delivery for SOAP.
- Author
-
Windley, Phillip J.
- Subjects
- *
SIMPLE Object Access Protocol (Computer network protocol) , *INTERNET servers , *COMPUTER network protocols , *COMPUTER networks - Abstract
The article evaluates Systinet Server for Java 5.0 from Systinet Corp. Systinet Server for Java is one of the more mature simple object access protocol (SOAP) servers available. Perhaps the most anticipated feature of the latest version is its support for WS-ReliableMessaging, a SOAP messaging specification developed by BEA, IBM, Microsoft and Tibco. Using WS-ReliableMessaging, SOAP server can guarantee the reliable delivery of messages over unreliable transport protocols. Systinet is the first vendor to implement the WS-ReliableMessaging specification in a shipping product. Systinet Server installs easily and runs on almost any operating system, either in standalone mode or in cooperation with other Java Environments, such as Apache Tomcat, BEA WebLogic, or IBM WebSphere. The server provides a Web-based interface for configuring the server and deploying and monitoring services. When a service is deployed, an administrator can use the management console to enable and disable it, monitor it for performance, and trace SOAP services without writing clients. The most fundamental infrastructure component for production-quality Web services is a SOAP server. The addition of WS-ReliableMessaging makes Systinet Server a must-have platform for building Web services-based applications.
- Published
- 2004
89. Fast Enough to Fail.
- Author
-
Dickerson, Chad
- Subjects
- *
INTERNET , *WIDE area networks , *INFORMATION technology , *OPEN source software , *COMPUTER software , *COMPUTER network protocols - Abstract
This article presents the opinion of the author on issues relating to the Internet. It is not often that the songs of the '80s hair metal bands intersect with information technology management, but our recent foray into setting up an open source Internet Message Access Protocol (IMAP) server at InfoWorld to deliver mail to the executive team's Treos had me singing a couple of lines from an early '80s Motley Crue hit. After we set up the server, we did in fact have something to show, but we encountered another unexpected problem that did leave us with no simple solution. The Cyrus IMAP server delivered electronic mail to the Treos flawlessly, but new trouble began when Kevin McKean tried to check his new IMAP account using Outlook 2002. His client would successfully log in but was unable to find any new messages. After digging through mailing lists and newsgroups, I made a startling discovery while I was too fast for Outlook. In the end, I was not so sure. Once again, I had entered a maze of open standards issues while trying to accomplish something that seemed ridiculously simple on the surface, which is to get electronic mail with Outlook via IMAP. I Knew McKean was going to want to use Outlook and I also knew that Outlook supported IMAP. so I was not particularly worried.
- Published
- 2004
90. SAP From the Inside Out.
- Subjects
- *
COMPUTER software , *COMPUTER network protocols , *COMPUTER networks , *COMPUTER systems - Abstract
This article reports on the launch of NetProcess service advertising protocol (SAP) management software version 6.0 from IntelliCorp in April 2004. NetProcess aims to smooth the road by automating the monitoring, auditing, and analysis of SAP installs, functions typically handled by consultants. IntelliCorp CEO George D'Auteuil jokingly refers to NetProcess as the magnetic resonance imaging for SAP because, he says, it offers deep diagnostic views into systems' internals without invasive tinkering.
- Published
- 2004
91. NEWS TICKER.
- Subjects
- *
COMPUTER industry , *COMPUTER network protocols , *MERGERS & acquisitions , *LOCAL area networks - Abstract
This section presents news briefs on issues relating to the computer industry worldwide as of April 2004. Responding to anti-trust regulators, Microsoft allegedly extends and simplifies its Microsoft Communications Protocol Program licensing to cover use of the protocols for certain server-to-server and server-to-non-Windows client communications. On the other hand, in the courts, the European Union suspends its review of the proposed PeopleSoft acquisition of Oracle while seeking increased information from Oracle. At Cisco, company officials recommend that its wireless local area network gear customers download a fresh patch containing a new protocol against attacks to capture user names and passwords within its products.
- Published
- 2004
92. IBM's ESB Plans Emerge.
- Author
-
Scannell, Ed
- Subjects
- *
COMPUTER buses , *COMPUTER network protocols , *INTERNET , *COMPUTER network architectures , *REAL-time computing , *WORLD Wide Web - Abstract
In fiscal 2004-2005, IBM will introduce a series of products that will solidify its enterprise service bus (ESB) strategy. The technologies will closely integrate the company's messaging protocols with its high-level integration tools to form a single infrastructure. This convergence is an attempt to reconcile into a single infrastructure all the low-level messaging protocols, such as Java Message Service (JMS), MQ, Internet Inter-Object Request Broker Protocol. Another step is to converge key application integration tools such as message transformation and business process management into what they refer to as WebSphere Business Integration version 6.0. This notion of an ESB connecting to a service-oriented architecture is very important because there is a plethora of standards and protocols that would be part of a real enterprise messaging system. IBM has been shipping products that developers use to build their own ESB, such as WebSphere Business Integration Broker, Event Broker, the Interchange Server it acquired from CrossWorlds, and Business Integration Workbench. The company has also integrated a number of messaging technologies into WebSphere such as JMS, and support for SOAP, UDDI, and WSDL.
- Published
- 2004
93. Web Services Alphabet Soup.
- Author
-
Udell, Jon
- Subjects
- *
COMPUTER network protocols , *WEB services , *INTERNET servers , *WORLD Wide Web - Abstract
Discusses the relevance of several Web services protocols. Examples of proposed standards for Web services; Information on the Microsoft Transaction Server; Recommended solution for standardizing the style of programming.
- Published
- 2004
94. ADIC, Adaptec Deliver iSCSI.
- Author
-
Shafer, Scott Tyler
- Subjects
- *
ISCSI (Computer network protocol) , *LIBRARIES , *COMPUTER network protocols , *MARKETING executives - Abstract
Reports on the decision of Advanced Digital Information to offer an iSCSI protocol in its smaller tape libraries. Other companies that provide iSCSI option; First libraries to get iSCSI connectivity; Comment from Jeff Eckard, product marketing manager at the company about the impact of iSCSI on tape libraries.
- Published
- 2004
95. HDTV at Your Corporate Fingertips.
- Author
-
Chee, Brian, Rash, Wayne, and Rist, Oliver
- Subjects
- *
HIGH definition television , *INTERNET , *MULTIMEDIA systems , *COMPUTER network protocols - Abstract
Evaluates the E5780 High Definition Encoder and the TT1280 High Definition Decoder from Tandberg Television. Significant features of high-definition television technology; Key settings for Tandberg Television's video-over-Internet protocol devices.
- Published
- 2004
96. Wi-Fi Buyer Beware.
- Author
-
Schwartz, Ephraim
- Subjects
- *
IEEE 802.11 (Standard) , *ETHERNET , *COMPUTER network protocols , *TECHNOLOGY , *COMPUTER science - Abstract
Reports on developments in Wi-Fi technology. Status of Wi-Fi compatibility between devices; Failure rate on 802.11b products; Information on Wi-Fi devices.
- Published
- 2003
97. A Fresh Look at VPNs.
- Author
-
McKean, Kevin
- Subjects
- *
VIRTUAL private networks , *COMPUTER network security , *PRIVATE networks , *IPSEC (Computer network protocol) , *COMPUTER network protocols - Abstract
Focuses on virtual private networks (VPN) based on the Security Sockets Layer standard. Security features of VPN based on the IPSec standard; Convenience offered by VPN; Benefits from the SSL standard.
- Published
- 2003
98. Not Your Father's NetWare.
- Author
-
Connolly, P. J.
- Subjects
- *
COMPUTER software , *ISCSI (Computer network protocol) , *INTERNET , *COMPUTER network protocols - Abstract
Features the NetWare 6.5 bundled software from Novell. Capabilities of the Nterprise Branch Office property of NetWare 6.5; Importance of the Internet small computer systems interface aspect of NetWare; Information on the process of installing NetWare 6.5.
- Published
- 2003
99. Permissions on the Edge.
- Author
-
Udell, Jon
- Subjects
- *
COMPUTER network protocols , *COMPUTER networks , *BUSINESS partnerships - Abstract
Discusses the development of Distributed Online Certificate Status Protocol from CoreStreet. Mechanisms for revoking a digital identification; Significance of certificate revocation list; Partnership between CoreStreet and Assa Abloy to enforce highly-granular card access policies without wired connections.
- Published
- 2003
100. Public Wi-Fi in a Death Spiral.
- Author
-
Schwartz, Ephraim
- Subjects
- *
WIRELESS communications , *COMPUTER network protocols , *COMMUNICATION & technology - Abstract
Comments on the move of SBC Communications, a major U.S. telecommunication company, to enter into the Wi-Fi market. Contention that the move of SBC Communications is bound to fail; Explanation on why Wi-Fi market has no potential for success; Place where Wi-Fi connectivity is suitable; Technical problem of Wi-Fi technology; Discussion on the Wi-Fi market in the U.S.
- Published
- 2003
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.