Top of Page
In this report, we discuss points to note regarding memory forensics for devices equipped with large amounts of memory, examine the forward secrecy technology that improves the security of encrypted communications, and look at website defacement surveys carried out using Web crawlers.
We began providing the IIJ GIO cloud service in 2009, and it is now in its fifth year.
We are continuing to expand our lineup of services to meet a variety of needs.
In this report we will once again give an overview of the service from a technological perspective, and in future reports we will continue to discuss the underlying technology that supports the service.
The Web is widely used as the front-end for a range of services. Currently the Web is shifting from static Web pages to dynamic interactive Web applications that use JavaScript, and the impact of this is showing up in Web traffic. Here we examine Web traffic behavior at the HTTP request level, and discuss the complexity of bottlenecks arising from JavaScript processing. In closing, we summarize the future outlook for the Web.
End of the page.