Cloud Computing
  • Cloud Computing Research Centre on the following:   
  • a. Client–server model – client–server computing refers broadly to any distributed application that distinguishes between service providers (servers) and service requesters (clients).
  • B. Utility computing — the packaging of computing resources, such as computation and storage, as a metered service similar to a traditional public utility, such as electricity.

  • C. Autonomic computing— computer systems capable of deploying self-management Grid computing — "a form of distributed computing and parallel computing, whereby a 'super and virtual computer' is composed of a cluster of networked, loosely coupled computers acting in concert to perform very large tasks."
  • D. Peer-to-peer – distributed architecture without the need for central coordination, with participants being at the same time both suppliers and consumers of resources (in contrast to the traditional client–server model).
  • E. Service-oriented computing – Cloud computing provides services related to computing, service-oriented computing consists of the computing techniques that operate on software- as-a-service.
IT Security & Architecture
      • ISO 27001 - ISO27002, IT Governance, ITIL V3&4
      • IT Service Management
      • Anti Malware (Anti Spam, Anti Virus)
      • Application Support
      • Business Continuity/Disaster Recovery Investigation
      • Encryption (Digital Signature, Digital Certificate, Storage Security)
      • Governance
      • Risk & Compliance(Audit, Social Engineering, Legislation & Standard, PCI-DSS, Security policy)
      • Identity access management (authentication, biometrics, digital right management, identity & access management, sign on / security tokens)
      • Mobile (End Point, Mobile Security & Remote Access, VPN)
      • Managed Services (Cloud Security, Security Web Services)
      • Security As A Service(SaaS)
      • Perimeter Infrastructure (Content monitoring/filtering)
      • Converged Security
      • Data Leakage prevention
      • Email / IM Security
      • Firewalls, Internet/Network Security
      • Intrusion Prevention/Detection
      • Penetration Testing/Risk & Vulnerability assessment
      • Secure Disposal
      • Security EM
      • Unified Threat Management
      • Virtualization Security
      • VOIP Security, Wireless
    • Wireless Technology 
      • Cellular networks: 0-3G, Beyond 3G (4G), Future wireless
      • Short-range point-to-point communication: Wireless microphones, Remote controls, IrDA, RFID (Radio Frequency Identification), TransferJet, Wireless USB, DSRC (Dedicated Short Range Communications), EnOcean, Near Field Communication Wireless sensor networks: ZigBee, EnOcean; Personal area networks, Bluetooth, TransferJet, Ultra-wideband (UWB from WiMedia Alliance).
      • *Wireless networks: Wireless LAN (WLAN), (IEEE 802.11 branded as Wi-Fi and HiperLAN), Wireless Metropolitan Area Networks (WMAN) and Broadband Fixed Access (BWA) (LMDS, WiMAX, AIDAAS and HiperMAN).
      • Radio communication system
      • Broadcasting
      • Land Mobile Radio or Professional Mobile Radio: TETRA, P25, OpenSky, EDACS, DMR, dPMR
      • Communication radio
      • Cordless telephony: DECT (Digital Enhanced Cordless Telecommunications)
    • Global research Interest
      • Design IT infrastructure Architecture components
      • Voice & Data networks
      • End user computing
      • Data Center
      • Server Virtualization
      • Storage
      • Infrastructure technologies: s.a platforms, mainframes, servers, storage, Networks & end user computing