Top of Page
In this report, we discuss countermeasures against the alteration of domain name registration information,and examine the openioc_scan plug-in that scans for threats lurking in the memory of a computer.
We also take a look at ID management technology.
Last year we presented the first part of our introduction to the IIJ GIO Cloud Service.
In this second installment, we examine the status of service utilization in fiscal 2014, and discuss our activities with regard to the development, operation, and maintenance of large-scale infrastructure.
This article introduces our research into the UKAI storage system, which enables flexible control over the actual data locations of virtual disk images of virtual machines for which location management is difficult.
End of the page.