Whitepaper for China Unicom's Edge-Cloud

February 21, 2018

As the information technology deeply changes our daily life, digital reshaping will penetrate into all industries. The communication industry has undergone several leaps and reforms during the past decades. From dial-up Internet access to FTTH and from GSM/TD-SCDMA/Wimax to LTE, information pipes have undergone radical changes, and the IT cloudification technology is reshaping CT and OT industries. The architecture of both the wireless network and wired network has been evolving into C/U separation and Fixed Mobile Convergence (FMC) to cope with all challenges brought by industrial digital transformation and industrial structure upgrade. In the predictable future, the integration at the infrastructure layer is imperative.

Spotlight

Pure Storage

Pure Storage (NYSE:PSTG) helps customers build a better world with data. The Pure Storage Data Platform, powered by all-flash storage, offers a simpler, more effective, and more flexible solution for cloud infrastructure and data-rich applications like artificial intelligence, machine learning and big data analytics.

OTHER WHITEPAPERS
news image

Zero Trust Maturity Model

whitePaper | June 13, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Read More
news image

EyeSpy - Iranian Spyware Delivered in VPN Installers

whitePaper | October 12, 2022

During routine analysis of detection performance, we noticed a batch of processes that respected the same pattern in the process names. These names begin with sys, win or lib followed by a word that describes the functionality, such as bus, crt, temp, cache, init, and end in 32.exe. We later noticed that the .bat files and the downloaded payloads respect the same naming convention. Further investigation revealed the components are part of a monitoring application called SecondEye, developed in Iran and distributed legitimately via the developer’s website. We also found that some spyware components were already described in an article published by Blackpoint [1]. In the article, researchers drew attention to the dangers of legally distributed monitoring software with malicious behavior

Read More
news image

VMware TCO Comparison Calculator

whitePaper | March 11, 2020

Definitions and Objectives In evaluating the cost of a virtualization and private cloud solution, it is essential to use a metric that not only accounts for the cost to acquire the software and the physical infrastructure it requires, but also includes the time and effort needed to operate the solution. Because centralized management is a fundamental component of any virtualization and private cloud deployment, hardware and software costs associated with related management products.

Read More
news image

VMware workspace one is a better choice than Citrix

whitePaper | November 14, 2019

The intended audience for this paper is IT decision makers and line-of-business owners that are tasked with transitioning their workforce into a modern place of work—the Digital Workspace. According to Gartner, “The digital workplace enables new, more effective ways of working; raises employee engagement and agility; and exploits consumeroriented styles and technologies.” The insights presented here will be helpful for executing a digital workspace transformation strategy.

Read More
news image

Dell EMC Unity: Dynamic Pools

whitePaper | November 6, 2019

The Dell EMC™ Unity product line is a simple, easy-to-use, and intelligent storage system which helps meet the needs of IT professionals in large or small companies. The systems are designed with flash in mind and leverage the latest cloud-based data management, efficiency, rich data services, and mobility technologies. The Dell EMC Unity product line comes in a variety of deployment models from purpose-built all-flash or hybrid configurations to converged infrastructure and even virtual storage appliances.

Read More
news image

SD-WAN for Manufacturing

whitePaper | June 20, 2022

As demand for goods peaks, supply chain instability and labor shortage are forcing manufacturers to become more efficient and find new ways to maximize productivity. Manufacturers are accelerating their path to digitalization or Industry 4.0, to improve automation and be more competitive. Additionally, with the digitalization of their operations, manufacturing companies are increasingly moving their applications to the cloud for more agility and to enable their employees to work-from-anywhere. The number of IIoT (Industrial Internet of Things) devices is skyrocketing, while IT and OT (operational technology) networks are converging, raising concerns about cybersecurity risks.

Read More

Spotlight

Pure Storage

Pure Storage (NYSE:PSTG) helps customers build a better world with data. The Pure Storage Data Platform, powered by all-flash storage, offers a simpler, more effective, and more flexible solution for cloud infrastructure and data-rich applications like artificial intelligence, machine learning and big data analytics.

Events