Monday, October 27, 2008

The Challenges of Virtual Identity Management

At ISS World Europe a couple of weeks ago, Qosmos presented at a seminar focused on lawful interception and network intelligence gathering.

What comes out clear from the ISS conference is the need for efficient Virtual Identity Management. Put simply: in the context of legal intercept, how do you track a user who can be anywhere, use anything, connect by any means, and who uses multiple virtual IDs ?

Successful and effective Virtual Identity Management, means being able to recognize and extract a target identifier over a wide variety of applications. And this is by no means easy. To take the case of http: the same protocol is used by different applications, which means you must understand the logic of the applications above http. In such cases, the successful recognition and extraction of target identifiers requires the implementation of complex mechanisms specifically developed for these applications, and a maintenance and upgrade policy that enables you both to keep tabs on frequent changes in protocol structures and take on board new applications. And from a global perspective, this means keeping abreast of regional apps like QQ (China), Mail.ru (Russia) and India Times webmail!

These are some of the interesting challenges we work on at Qosmos.

P.S.: On my next post, I'll speak of my upcoming TeleStrategies webinar, where the focus will be on information extraction in the field of Business Intelligence.

Jerome

Friday, October 10, 2008

DPI or Information Extraction? - Making the difference

I just got back from the Broadband World Forum where I met a number of people to whom I had to describe the core competency of Qosmos. I realized that many people are not aware of the difference between DPI and Information eXtraction (IX for short).

Put simply, Deep Packet Inspection could be described in the following terms: it recognizes network traffic, it has the ability to act on the traffic, and vendors typically sell complete solutions for specific markets such as lawful intercept, traffic optimization, etc.

Information eXtractionIX, on the other hand, is different: it actually extracts network information and makes complete sense out of it; ix doesn’t act on traffic flows. In the case of Qosmos and IX, the focus is on best-in-class network intelligence, for use in other people’s complete solutions. As a matter of fact, DPI specialists can even build their solutions based on an Information eXtraction engine like Qosmos.

This is Qosmos’s real differentiator, and if those we met at the BBWF were to take away one thing it should be this. Once potential users of information extraction understand this, the horizon is suddenly different. And a wealth of possibilities opens up – I’ll describe this in an upcoming post.

Jerome

 
© 2009 Network Intelligence Technology. All Rights Reserved | Powered by Blogger
Design by psdvibe | Bloggerized By LawnyDesignz