Skip to main content

Home/ IT architecture/ Group items tagged security

Rss Feed Group items tagged

anonymous

FCAPS | Tobias InternationalTobias International - 0 views

  •  
    FCAPS is the ISO Telecommunications Management Network model and framework for network management. FCAPS is an acronym for Fault, Configuration, Accounting, Performance, Security
Manish Shah

Just one system and complete control on accessing the resources! - 1 views

  •  
    'Just one application and you are sorted', access control management is an important aspect while one is dealing with confidential information or document where maintaining confidentiality is a major concern. An access control system checks the authorization of the individuals in order to give the right to access a specific area or resources. A newer invention is in the field of biometrics to enhance the security to a greater extent.
Manish Shah

Visitor Management System: Installation Operation Maintenance - 0 views

  •  
    Gone are the days of primitive visitor management! Electronic devices for visitor management are the need of the day. Areas with a large number of visitors adopt visitor management system to keep a track of the people checking in and out of the building. Schools use the system to prevent crime against children. Highly secured government offices install this device to control unauthorized access to sensitive data.
Manish Shah

Face Recognition - An Identification Technique - 0 views

  •  
    Biometrics parameters like face, eye cornea, fingerprints or many other parts of human body are used for identification purpose in many security systems or agencies. These biometrics parameters for each and every person have own unique properties.
Manish Shah

Biometric Face Detection System - Face Detection Is a Reliable Technology - 0 views

  •  
    Facial recognition is emerging as the most successful biometric application in use. However, controversies also revolve around the security solution. There have been incidents of biometric face detection systems, not being able to identify correct faces. Not-so-often failures of the device to perform gave rise to debates.
Philipp Arytsok

8 SOA mistakes architects should avoid - 0 views

  • 8 SOA mistakes architects should avoid
  •  
    A pessimistic approach towards SOA seems to prevail in some blogs. But these opinions strike me by surprise. In the industries I am working for - public sector, healthcare and Defense/ public security - SOA is predominant and you will find only rare examples of tenders where SOA is not highlighted as the guiding principle for the whole architecture. SAP's CTO Vishal Sikka has already provided the community with some very helpful insights concerning these discussions. I just want to add some points from an architect's point of view: From my point of view it is not the SOA approach itself which should be questioned but the way how we architects sometimes work on SOA. Some of the mistakes that are listed below I have encountered during my SOA projects. Others are based on discussions with other architects and decision makers inside and outside SAP, from customers and from partners. My intention is simple: I want to help to avoid these mistakes in the future and to strengthen the SOA approach which is for me without an alternative.
John Pol

Why to Buy Online Data Back Up Services - 0 views

  •  
    Whether you use your computer for personal or business use, your data loss can be extremely disastrous in whatever way. Your information is something that you need to keep secure! This is the reason why you should avail regular data backup!
anonymous

IT architecture IBM patterns - 0 views

  •  
    IT architecture patterns. Redbook from IBM describing a lot of IT architecture patterns including network, security, proxies, integration services.
Manish Shah

Visitor Management System, Biometric Visitor Management System - 0 views

  •  
    Visitor management system is an ideal security solution to track visitors. We offer visitor management solutions based on face recognition for all type of business.
anonymous

Dell authorization for Servers and Storage - 0 views

  •  
    Baynetwork is proud to annouce that it is becoming an authorized reseller of Dell and Force 10 Networks. Dell provides an incredible partner and resource for us by manufacturing the highest quality server and storage hardware. Force 10 Networks makes robust and efficient ethernet routing, switching and security hardware for high performance networks.
anonymous

MirageOS - 0 views

shared by anonymous on 28 Oct 15 - No Cached
  •  
    MirageOS is a library operating system that constructs unikernels for secure, high-performance network applications across a variety of cloud computing and mobile platforms.
‹ Previous 21 - 40 of 74 Next › Last »
Showing 20 items per page