You need Adobe Reader 7.0 or later in order to read PDF files on this site.
If Adobe Reader is not installed on your computer, click the button below and go to the download site.
|
October 2012 Vol. 10 No. 10 |
|
View from the Top
-
Masayuki Yamamura, President of NTT EAST
Overview The information and communications technology market is undergoing dramatic changes as smartphones and tablet computers become increasingly popular throughout society. The seamless convergence of wired and wireless communications is accelerating and even the management environment is changing by necessity. How is NTT EAST set up to face this changing world? We asked Masayuki Yamamura, who took up his new position as President of NTT EAST in June 2012, about his tactics, including his management philosophy and his approach to inspiring employees.
Front-line Researchers
-
Koji Muraki, Senior Research Scientist, (Distinguished Researcher), NTT Basic Research Laboratories
Abstract The research of Senior Research Scientist Koji Muraki is revolutionary to the point of requiring physics textbooks to be rewritten. The paper written by Dr. Muraki and his colleagues on the 5/2 state supporting the existence of non-Abelian quasi-particles, which are different from the fundamental particles in the natural world, was published in the magazine Science in 2012 to much acclaim. We asked Dr. Muraki to explain to us in layman's terms the results of this research and to tell us how he approaches the research process.
Feature Articles: Evolving Threats and Cyber Security in Future
-
Emergence of New Cyber Attacks and Future Directions in Security R&D
Abstract From the viewpoint of a telecommunications operator, NTT is researching and developing new technologies for dealing with cyber attacks that are immune to existing ones. Cyber attacks have been evolving into large-scale, multifaceted attacks and their targets have grown to include clouds, smartphones, and industrial systems, raising concerns about their impact on society as a whole.
-
Detection, Analysis, and Countermeasure Technologies for Cyber Attacks from Evolving Malware
Abstract After outlining trends in cyber attacks mounted mainly through the use of malicious software (malware), we describe technology for detecting malware infections and isolating infection sources and technology for analyzing malware and extracting the features of its functions; describe how information obtained from detection and analysis can be used by countermeasure technology to generate blacklists and defend against attacks on the network; and describe analysis techniques for tracing attacks by using logs kept by network devices.
-
Cryptographic Techniques that Combine Data Protection and Ease of Utilization in the Cloud Computing Era
Abstract In this article, we introduce cryptographic techniques that protect data in the cloud computing era while being easy to use. Specifically, we describe secure computing technology¡½which can keep private information confidential while enabling anonymous statistical analysis¡½and intelligent encryption, a cloud-managed-key cryptographic scheme, and an authenticated key exchange technique that together can protect data in cloud storage and prevent the leakage of keys.
-
Tighter Security Operations to Help Provide Brands that are Safer and More Secure
Abstract In this article, we review early work by NTT-CERT (NTT Computer Security Incident Response and Readiness Coordination Team) and introduce the security research functions on which work has started with the aim of strengthening NTT's security response.
Regular Article
-
Unraveling an Exotic Electronic State for Error-free Quantum Computation
Abstract A recently proposed approach could lead to a totally new architecture for quantum computation with an exceedingly low error rate by exploiting quasiparticles that behave differently from fundamental particles in nature. Our highly sensitive nuclear magnetic resonance measurements have unraveled an electronic state in a semiconductor device that is expected to host such exotic quasiparticles. The experimental results support the theory predicting that this state will have properties suitable for error-free quantum computation.
Global Standardization Activities
-
Digital Signage Standardization
Abstract In this article, we discuss a vision for digital signage in the future and standardization activities toward this vision, which incorporates insights and know-how gained through the experience of last year's Great East Japan Earthquake. Digital signage utilizing broadband networks has already begun to spread in industrialized regions, mainly in Europe, America, and Japan, and more installations are expected in a variety of locations. For digital signage to develop further as a next-generation infrastructure for distributing information, there is a need to ensure compatibility among products from different manufacturers and interconnectivity for communications, so international standardization is becoming more important.
Practical Field Information about Telecommunication Technologies
-
Case Studies of Using the Gigabit-compatible Protocol Checker as a Troubleshooting Tool for Home IP Systems
Abstract This article introduces case studies of using the gigabit-compatible protocol checker as a troubleshooting tool for home Internet protocol (IP) systems. It is the thirteenth in a bimonthly series on the theme of practical field information about telecommunication technologies. This month's contribution is from the Network Interface Engineering Group, Technical Assistance and Support Center, Maintenance and Service Operations Department, Network Business Headquarters, NTT EAST.
Papers Published in Technical Journals and Conference Proceedings
|