Cloud Computing
-
Cloud Computing Research Centre on the following:
-
a. Client–server model – client–server computing refers broadly to any distributed application that distinguishes between service providers (servers) and service requesters (clients).
-
B. Utility computing — the packaging of computing resources, such as computation and storage, as a metered service similar to a traditional public utility, such as electricity.
-
C. Autonomic computing— computer systems capable of deploying self-management Grid computing — "a form of distributed computing and parallel computing, whereby a 'super and virtual computer' is composed of a cluster of networked, loosely coupled computers acting in concert to perform very large tasks."
-
D. Peer-to-peer – distributed architecture without the need for central coordination, with participants being at the same time both suppliers and consumers of resources (in contrast to the traditional client–server model).
-
E. Service-oriented computing – Cloud computing provides services related to computing, service-oriented computing consists of the computing techniques that operate on software- as-a-service.
IT Security & Architecture
-
-
ISO 27001 - ISO27002, IT Governance, ITIL V3&4
-
IT Service Management
-
Anti Malware (Anti Spam, Anti Virus)
-
Application Support
-
Business Continuity/Disaster Recovery Investigation
-
Encryption (Digital Signature, Digital Certificate, Storage Security)
-
Governance
-
Risk & Compliance(Audit, Social Engineering, Legislation & Standard, PCI-DSS, Security policy)
-
Identity access management (authentication, biometrics, digital right management, identity & access management, sign on / security tokens)
-
Mobile (End Point, Mobile Security & Remote Access, VPN)
-
Managed Services (Cloud Security, Security Web Services)
-
Security As A Service(SaaS)
-
Perimeter Infrastructure (Content monitoring/filtering)
-
Converged Security
-
Data Leakage prevention
-
Email / IM Security
-
Firewalls, Internet/Network Security
-
Intrusion Prevention/Detection
-
Penetration Testing/Risk & Vulnerability assessment
-
Secure Disposal
-
Security EM
-
Unified Threat Management
-
Virtualization Security
-
VOIP Security, Wireless
-
Wireless Technology
-
Cellular networks: 0-3G, Beyond 3G (4G), Future wireless
-
Short-range point-to-point communication: Wireless microphones, Remote controls, IrDA, RFID (Radio Frequency Identification), TransferJet, Wireless USB, DSRC (Dedicated Short Range Communications), EnOcean, Near Field Communication Wireless sensor networks: ZigBee, EnOcean; Personal area networks, Bluetooth, TransferJet, Ultra-wideband (UWB from WiMedia Alliance).
-
*Wireless networks: Wireless LAN (WLAN), (IEEE 802.11 branded as Wi-Fi and HiperLAN), Wireless Metropolitan Area Networks (WMAN) and Broadband Fixed Access (BWA) (LMDS, WiMAX, AIDAAS and HiperMAN).
-
Radio communication system
-
Broadcasting
-
Land Mobile Radio or Professional Mobile Radio: TETRA, P25, OpenSky, EDACS, DMR, dPMR
-
Communication radio
-
Cordless telephony: DECT (Digital Enhanced Cordless Telecommunications)
-
Global research Interest
-
Design IT infrastructure Architecture components
-
Voice & Data networks
-
End user computing
-
Data Center
-
Server Virtualization
-
Storage
-
Infrastructure technologies: s.a platforms, mainframes, servers, storage, Networks & end user computing