Internet Usage

Total Page:16

File Type:pdf, Size:1020Kb

Internet Usage Secure / Optimize / Analyze Internet usage List of protocols ANTIVIRUS Sophos update Sophos antivirus update protocol. ZoneAlarm Updates This protocol plug-in classifies the web traffic to the hosts 'zonealarm.com' and 'zonelabs.com', or associated to the SSL Common Name 'cm1.zonealarm.com'. APPLICATION SERVICE Apple App Store The Apple App Store is a digital application distribution platform for iOS developed and maintained by Apple Inc. Apple Push Notification Service APNS (Apple Push Notification Service) is an Apple service which forwards notifications from the servers of third party applications to iOS devices. Dictionary Server Protocol The DICT protocol is a TCP transaction based query/response protocol that enables a client to access dictionary definitions from a set of natural language dictionary databases. End Point Mapper End Point Mapper is a protocol used by Exchange to determine the ports used by various services. Google Play Google Play (formerly Android Market) is an online software store developed by Google for Android OS devices. iCloud iCloud is a cloud computing service developed by Apple Inc. which allows to store and share data, from an iOS mobile (iPhone, iPad, iPod Touch) or a Macintosh. ios_ota_update iOS OTA Update is the protocol used for iOS updates Over The Air. Lighweight Directory Access LDAP (Lightweight Directory Access Protocol) is a protocol used for accessing directory services. Windows environments use this Protocol protocol to send queries to Active Directory. Name Service Provider Interface Name Service Provider Interface is a protocol used by Exchange. Perforce Protocol Perforce is a commercial, proprietary, centralized revision control system developed by Perforce Software, Inc. Port Mapper Port Mapper protocol maps RPC program and version numbers to port numbers. This program makes dynamic binding of remote programs possible. Samsung Apps Samsung Apps is an application store for Samsung mobile and TV users. Secure LDAP Secure LDAP is the Secure version of the LDAP protocol. Service Location Protocol Service Location Protocol is a decentralized, lightweight, scalable and extensible protocol for service discovery within a local area network. Simple Service Discovery Protocol Simple Service Discovery Protocol (SSDP) provides a mechanism whereby network clients can discover desired network services. Syslog Syslog protocol is used for the transmission of event notification messages across networks between a client and a server. Websphere Message Queue Mq (IBM Websphere MQ) is an inter-application communication protocol. series Page 1 Windows Phone Marketplace Windows Phone Marketplace is a service by Microsoft for its Windows Phone 7 platform that allows users to browse and download applications that have been developed by third-parties. X Font Server protocol X Font Server is a standard communication protocol between an X server and a font renderer. AUDIO/VIDEO 050 plus 050 plus is a Japanese embedded smartphone application dedicated to audio-conferencing. adobe_connect Adobe Connect is a web communication system for the training, the marketing, the conferences and the online collaboration. Apple FaceTime FaceTime is an Apple video calling software which runs on iOS based mobile devices. Babelgum This protocol plug-in classifies the web traffic to the host 'babelgum.com'. BBC Player BBC Player is an in-browser live video streaming service. Blip.tv TV Series This protocol plug-in classifies the web traffic to the host 'blip.tv', and the RTMP audio/video streams originating from the host 'blip.tv'. Blockbuster This protocol plug-in classifies the web traffic to the host '.blockbuster.com'. Cisco MeetingPlace MeetingPlace is a protocol used by the Cisco Unified MeetingPlace suite of voice, web, and video conferencing products. CNET TV This protocol plug-in classifies the web traffic to the host 'cnettv.cnet.com', and the RTMP audio/video streams originating from the host 'cnettv.cnet.com'. Flash Media Playback Adobe Flash Media Playback is a dynamic HTTP streaming protocol used to access video contents from a smart client application. fring - Peer to Peer Mobile VOIP Fring is a peer-to-peer Mobile VoIP based Internet telephony network. gotomeeting - online meeting GoToMeeting is an online meeting service developed by Citrix. service (Citrix) grooveshark Grooveshark is an online unlimited service for music. H225 The H225 Protocol is a VoIP protocol, used for call signaling and RAS (Registration, Admission and Status). H245 H245 is a VoIP protocol, used for call signaling codec negotiation. h248 Protocol (Megaco) in binary h248 Protocol (Megaco) in binary mode. mode h248 Protocol (Megaco) in text h248 Protocol (Megaco) in text mode. mode HBO GO This protocol plug-in classifies the web traffic to the host '.hbogo.com'. Howcast This protocol plug-in classifies the web traffic to the host '.howcast.com'. Hulu This protocol plug-in classifies the web traffic to the host '.hulu.com'. icall icall is proprietary voice/video over IP protocol. Icecast Icecast is a protocol used to stream audio files over HTTP. iHeartRadio This protocol plug-in classifies the web traffic to the hosts 'iheartradio.com' and 'iheart.com', and the RTMP audio/video streams originating from the host 'iheart.com'. Inter Asterisk eXchange Inter Asterisk eXchange (IAX2) is a data exchange protocol between Asterisk servers. ISO Base Media File Format The ISO Base Media File Format, as described in ISO/IEC 14496-12:2008 (MPEG-4 Part 12). iTunes iTunes is an Apple proprietary digital media player application, used for playing and organizing digital music and video files. Jajah Jajah is a VoIP provider owned by Telefonica Europe. Livestream (formerly Mogulus) This protocol plug-in classifies the web traffic to the hosts 'livestream.com' and 'a749.g.akamai.net', or associated to the SSL Common Name 'livestream.com', and the RTMP audio/video streams originating from the host 'livestream.com'. Media Gateway Control Protocol MGCP protocol is used as signaling protocol for voice IP applications. Metacafe This protocol plug-in classifies the web traffic to the hosts '.metacafe.com', 'v.mccont.com' and '.mcstatic.com'. Microsoft Multimedia Streaming MMS protocol is used extensively nowadays by Microsoft video streaming servers. It enables to stream a file in real time to many Page 2 simultaneous viewers. Mpeg 2 Transmission MPEG-Transport Stream is a protocol used for MPEG flows transmission MSN Video This protocol is used by MSN Messenger for video conversations (is not used anymore since MSN version 8.X). Netflix NetFlix is a site using Silverlight protocol to stream videos. Paltalk audio chat Proprietary protocol used by Paltalk in audio chats. Paltalk video Proprietary protocol used by Paltalk in video. PPlive PPLIVE is an application intended to watch TV in peer-to-peer. The PPLIVE application has two main functions : live TV(streaming) and on-demand TV (VOD). These are two different protocols. This protocol plug-in handles both. ppStream - P2P based Streamed The ppstream protocol provides audio and video streaming. It is based on bittorent (peer-to-peer) technology. It is mainly used in Media China. Q931 The Q.931 protocol enables the use of voice and image on networks for video conferencing. It provides no flow control, however, or retransmission, since the underlying layers are assumed to be reliable and the circuit-oriented nature of ISDN allocates bandwidth in fixed increments of 64 kbps. Q.931 does manage connection setup and close. Like TCP, Q.931 documents both the protocol itself and a state machine. QQLive Network Player QQLive is an application intended to watch TV in Peer-to-Peer mode. QVOD Player QVOD is a peer-to-peer based Video-On-Demand player. Real Data Transport This protocol is used to transport audio/video data. Real Time Control Protocol The real-time transport Control protocol RTP allows monitoring of the data delivery in a manner scalable to large multicast networks, and to provide minimal control and identification functionality. Real Time Protocol RTP is the real-time transport protocol used to transmit real-time data, such as audio, video or simulation data, over multicast or unicast network services. Real Time Streaming Protocol The Real Time Streaming Protocol (RTSP) is an application-level protocol for control over the delivery of data with real-time properties. RTSP provides an extensible framework to enable controlled, on-demand delivery of real-time data, such as audio and video. Rhapsody Rhapsody is a subcription based music streaming service. Session Initiation Protocol Session Initiation Protocol (SIP) is the Internet Engineering Task Force's (IETF's) standard for multimedia conferencing over IP. Like other VoIP protocols, SIP is designed to address the functions of signaling and session management within a packet telephony network. ShoutCast Shoutcast is a protocol used to stream audio files over HTTP. Silverlight Silverlight is a Microsoft web browser plugin designed to render programable animations and to stream videos. It quite similar with Adobe Flash: animated vector graphics, H264 video streaming Skinny Client Control Protocol Skinny Client Control Protocol (SCCP) is a Cisco proprietary protocol used between Cisco Call Manager and Cisco VOIP phones. It is also supported by some other vendors. Sky Player This protocol plug-in classifies the web traffic to the host 'skyplayer.sky.com'. Slacker Personal Radio This protocol plug-in classifies the web traffic to the host '.slacker.com', and the RTMP audio/video streams originating from the host 'slacker.com'. Slingbox Slingbox is a streaming protocol over the Internet used to watch and control TV shows received from your home devices. Sopcast Sopcast is a video streaming service based on a peer-to-peer protocol : SOP (Streaming Over Peer-to-peer). SoundCloud This protocol plug-in classifies the web traffic to the hosts 'soundcloud.com' and 'sndcdn.com', or associated to the SSL Common Names 'api.soundcloud.com' and 'sndcdn.com'. Spotify Spotify is an application of musical streaming. Tango Video Calls Tango is an embedded smartphone application dedicated to audio/video-conference.
Recommended publications
  • Security Analytics 8.1.X Reference Guide
    Security Analytics 8.1.x Reference Guide Updated: Friday, November 15, 2019 Security Analytics Reference Guide Security Analytics 8.1 Copyrights, Trademarks, and Intellectual Property Copyright © 2019 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks or registered trademarks of Symantec Corp. or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. SYMANTEC CORPORATION PRODUCTS, TECHNICAL SERVICES, AND ANY OTHER TECHNICAL DATA REFERENCED IN THIS DOCUMENT ARE SUBJECT TO U.S. EXPORT CONTROL AND SANCTIONS LAWS, REGULATIONS AND REQUIREMENTS, AND MAY BE SUBJECT TO EXPORT OR IMPORT REGULATIONS IN OTHER COUNTRIES. YOU AGREE TO COMPLY STRICTLY WITH THESE LAWS, REGULATIONS AND REQUIREMENTS, AND ACKNOWLEDGE THAT YOU HAVE THE RESPONSIBILITY TO OBTAIN ANY LICENSES, PERMITS OR OTHER APPROVALS THAT MAY BE REQUIRED IN ORDER TO EXPORT, RE-EXPORT, TRANSFER IN COUNTRY OR IMPORT AFTER DELIVERY TO YOU.
    [Show full text]
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Cloud Token Wallet
    CLOUD TOKEN WALLET SYMBOL CTO STORE, EXCHANGE, EARN & SPEND VERSION 1.0 TABLE OF TABLE 1. EXECUTIVE SUMMARY 01 2. BACKGROUND 02 2.1 What is a blockchain? 02 2.2 What is a cryptocurrency? 04 2.3 What is a cryptocurrency wallet? 05 2.4 What are mobile payments? 06 2.5 What is a cryptocurrency exchange? 07 2.6 What is AI trading? 09 3. PROBLEMS WITH MOBILE CRYPTO WALLETS 10 3.1 Many mobile crypto wallets are centralised 10 CONTENTS 3.2 Mobile crypto wallets only do two things 10 4. ADVANTAGES OF CLOUD TOKEN WALLET 11 4.1 Fully distributed anonymity & transparency 11 4.2 Integrated services & convenience 11 4.2.1 AI-assisted trading system 12 4.2.2 Decentralised exchange 13 4.2.3 Payments 13 5. HOW? PARALLEL LEDGERS! 14 5.1 Parallel consensus 14 5.1.1 Individual P2P POR consensus 14 5.1.2 Organisational hybrid consensus 15 5.2 Parallel dApps for parallel chains 16 6. CLOUD TOKEN WALLET TECHNOLOGY 17 6.1 File System DLT (FSDLT) 17 6.2 Mainline Distributed Hash Table (mDHT) 18 6.3 SHOUT — Simple Heuristic Object UDP Transfer 19 6.4 SWARM Storage 20 6.5 IFTTT Business Logic Layer 21 7. CLOUD TOKEN WALLET SECURITY 22 7.1 Block gap synchronization 22 7.2 Transaction flooding 22 7.3 Penny-spend 23 7.4 51% attack 23 8. ROADMAP 24 8.1 Whence we came 24 8.2 Under construction 25 8.3 The road ahead 25 9. RISKS & CLAIMS 26 10. DOWNLOAD CLOUD TOKEN WALLET 28 EXECUTIVE01 SUMMARY The “Background” chapter of this concept paper offers foundational knowledge.
    [Show full text]
  • Désengagement De La Communication X25 Au Profit D’Une Solution Web, Pour La Récupération Des Appels Synchrones Par Les Fournisseurs
    Désengagement de la communication X25 au profit d’une solution web, pour la récupération des appels synchrones par les fournisseurs. Migration de l’application de suivi et de pilotage des centres de production de Mulhouse, Palomar et Mangualde Julien Courtout To cite this version: Julien Courtout. Désengagement de la communication X25 au profit d’une solution web, pour la récupération des appels synchrones par les fournisseurs. Migration de l’application de suivi et de pi- lotage des centres de production de Mulhouse, Palomar et Mangualde. Réseaux et télécommunications [cs.NI]. 2010. dumas-00529975 HAL Id: dumas-00529975 https://dumas.ccsd.cnrs.fr/dumas-00529975 Submitted on 27 Oct 2010 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. CENTRE REGIONAL ASSOCIE DU NORD FRANCHE-COMTE à BELFORT _______________ M E M O I R E Présenté en vue d’obtenir Le Diplôme d’Ingénieur C.N.A.M. En Informatique Par Julien COURTOUT _______________ Désengagement de la communication X25 au profit d’une solution web, pour la récupération des appels synchrones par les fournisseurs Migration de l’application de suivi et de pilotage des centres de production de Mulhouse, Palomar et Mangualde Soutenu le _______________ J U R Y Président : Membres : Monsieur Christophe ANDRIES Monsieur Philippe RANVIER Monsieur Alain-Jérôme FOUGERES Julien COURTOUT / Mémoire d’Ingénieur C.N.A.M.
    [Show full text]
  • Special Report Internet Portal Sites in Korea
    www.ica.or.kr March~April 2006 (ISSUE 18) Special Report Internet Portal Sites in Korea Review Korea Mobile Communications in 2005 Marketing & Strategy Focus on LBS Industry Hwiyoung Chae International Cooperation NHN CEO Agency for Korea IT Publisher’s Column IT Korea journal March~April 2006 1 Booming Internet Portals Soon to Go Global That Korea is the world’s broadband leader is organized into sections by media types. The video no longer an arguable fact. The internet wave, search, a feature that has recently been added on, is sweeping across Korea since the 1990s, has made it generating a tremendous buzz, and setting a whole- into the world’s most networked nation. Korea’s new trend in the worldwide search market. reputation is especially peerless in online gaming. Korea’s state-of-the-art mobile infrastructure Needless to say, this amazing internet boom could technology provides its search portals yet another not have been possible without Korea’s advanced platform with a potentially vast market. The wide Sunbae Kim broadband environment. Meanwhile, Korean penetration of mobile phone, PDA and other wire- ICA President internet users, savvier than their counterparts else- less devices in the country has been accelerating where in the world, are also more demanding growth in its wireless portal market in recent years. when it comes to service quality. Korea’s hard-to- Many Korean portals, judging the time now ripe for please consumers were indeed instrumental in overseas expansion, are laying out the game plan. taking the country’s internet industry to its present Heavyweights like Naver and SK Communications heyday, providing sticks as well as carrots to spur have already opened or are in the process of R&D and force innovations in businesses.
    [Show full text]
  • University of South Florida
    Case Study www.ellacoya.com University of South Florida University of South Florida (USF), one of the top research universities in the US, is INTRODUCTION committed to formulating bold ideas and creating innovative solutions for its global community of 45,000 students, staff, and faculty. To provide its community with reliable, quality network service, USF needed an effective, flexible, and scalable way to prevent aggressive peer-to-peer (P2P) applications from using more than their fair share of bandwidth, to enable sophisticated control of individual abusers, and to support significant growth in traffic volumes. University of South Florida turned to Ellacoya’s IP Service Control System for an effective, flexible and scalable way to control bandwidth congestion in its network. As of late 2002, USF was experiencing significant network congestion due to P2P traffic. THE TRAFFIC CONTROL Its network was hit particularly hard by KaZaA 2.0, which USF’s enterprise-class PROBLEM appliance application could not reliably detect, and by a new P2P application its current firmware failed to detect at all. Network administrators also began to realize the limitations of application-based aggregate traffic management in the face of increasingly evasive emerging applications and the desirability of being able to enforce policies on specific individuals. Additionally, USF was in the process of upgrading its Internet connection to Gigabit speeds and needed a platform with the capacity for Gigabit throughput and the flexibility to scale with the university’s growing needs. Like many universities, USF had initially used an enterprise-class appliance to control EARLY ATTEMPTS TO P2P traffic, but the device was unable to consistently classify KaZaA traffic.
    [Show full text]
  • Forescout Counteract® Endpoint Support Compatibility Matrix Updated: October 2018
    ForeScout CounterACT® Endpoint Support Compatibility Matrix Updated: October 2018 ForeScout CounterACT Endpoint Support Compatibility Matrix 2 Table of Contents About Endpoint Support Compatibility ......................................................... 3 Operating Systems ....................................................................................... 3 Microsoft Windows (32 & 64 BIT Versions) ...................................................... 3 MAC OS X / MACOS ...................................................................................... 5 Linux .......................................................................................................... 6 Web Browsers .............................................................................................. 8 Microsoft Windows Applications ...................................................................... 9 Antivirus ................................................................................................. 9 Peer-to-Peer .......................................................................................... 25 Instant Messaging .................................................................................. 31 Anti-Spyware ......................................................................................... 34 Personal Firewall .................................................................................... 36 Hard Drive Encryption ............................................................................. 38 Cloud Sync ...........................................................................................
    [Show full text]
  • Crowdsourcing Indie Movies
    Chicago-Kent College of Law Scholarly Commons @ IIT Chicago-Kent College of Law All Faculty Scholarship Faculty Scholarship 9-1-2012 Crowdsourcing Indie Movies Henry H. Perritt Jr. IIT Chicago-Kent College of Law, [email protected] Follow this and additional works at: https://scholarship.kentlaw.iit.edu/fac_schol Part of the Entertainment, Arts, and Sports Law Commons Recommended Citation Henry H. Perritt Jr., Crowdsourcing Indie Movies, (2012). Available at: https://scholarship.kentlaw.iit.edu/fac_schol/449 This Article is brought to you for free and open access by the Faculty Scholarship at Scholarly Commons @ IIT Chicago-Kent College of Law. It has been accepted for inclusion in All Faculty Scholarship by an authorized administrator of Scholarly Commons @ IIT Chicago-Kent College of Law. For more information, please contact [email protected], [email protected]. Crowd sourcing indie movies Henry H. Perritt, Jr. 1 Table of Contents I. Introduction ........................................................................................................................... 3 II. The project: make a feature-length movie ......................................................................... 4 A. Goals ................................................................................................................................ 6 1. Enlist productive collaborators ................................................................................... 6 2. Minimize capital requirements ..................................................................................
    [Show full text]
  • List of Brands
    Global Consumer 2019 List of Brands Table of Contents 1. Digital music 2 2. Video-on-Demand 4 3. Video game stores 7 4. Digital video games shops 11 5. Video game streaming services 13 6. Book stores 15 7. eBook shops 19 8. Daily newspapers 22 9. Online newspapers 26 10. Magazines & weekly newspapers 30 11. Online magazines 34 12. Smartphones 38 13. Mobile carriers 39 14. Internet providers 42 15. Cable & satellite TV provider 46 16. Refrigerators 49 17. Washing machines 51 18. TVs 53 19. Speakers 55 20. Headphones 57 21. Laptops 59 22. Tablets 61 23. Desktop PC 63 24. Smart home 65 25. Smart speaker 67 26. Wearables 68 27. Fitness and health apps 70 28. Messenger services 73 29. Social networks 75 30. eCommerce 77 31. Search Engines 81 32. Online hotels & accommodation 82 33. Online flight portals 85 34. Airlines 88 35. Online package holiday portals 91 36. Online car rental provider 94 37. Online car sharing 96 38. Online ride sharing 98 39. Grocery stores 100 40. Banks 104 41. Online payment 108 42. Mobile payment 111 43. Liability insurance 114 44. Online dating services 117 45. Online event ticket provider 119 46. Food & restaurant delivery 122 47. Grocery delivery 125 48. Car Makes 129 Statista GmbH Johannes-Brahms-Platz 1 20355 Hamburg Tel. +49 40 2848 41 0 Fax +49 40 2848 41 999 [email protected] www.statista.com Steuernummer: 48/760/00518 Amtsgericht Köln: HRB 87129 Geschäftsführung: Dr. Friedrich Schwandt, Tim Kröger Commerzbank AG IBAN: DE60 2004 0000 0631 5915 00 BIC: COBADEFFXXX Umsatzsteuer-ID: DE 258551386 1.
    [Show full text]
  • The Application Usage and Risk Report an Analysis of End User Application Trends in the Enterprise
    The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise 8th Edition, December 2011 Palo Alto Networks 3300 Olcott Street Santa Clara, CA 94089 www.paloaltonetworks.com Table of Contents Executive Summary ........................................................................................................ 3 Demographics ............................................................................................................................................. 4 Social Networking Use Becomes More Active ................................................................ 5 Facebook Applications Bandwidth Consumption Triples .......................................................................... 5 Twitter Bandwidth Consumption Increases 7-Fold ................................................................................... 6 Some Perspective On Bandwidth Consumption .................................................................................... 7 Managing the Risks .................................................................................................................................... 7 Browser-based Filesharing: Work vs. Entertainment .................................................... 8 Infrastructure- or Productivity-Oriented Browser-based Filesharing ..................................................... 9 Entertainment Oriented Browser-based Filesharing .............................................................................. 10 Comparing Frequency and Volume of Use
    [Show full text]
  • Peer-To-Peer Protocol and Application Detection Support
    Peer-to-Peer Protocol and Application Detection Support This appendix lists all the protocols and applications currently supported by Cisco ASR 5500 ADC. • Supported Protocols and Applications, page 1 Supported Protocols and Applications This section lists all the supported P2P protocols, sub-protocols, and the applications using these protocols. Important Please note that various client versions are supported for the protocols. The client versions listed in the table below are the latest supported version(s). Important Please note that the release version in the Supported from Release column has changed for protocols/applications that are new since the ADC plugin release in August 2015. This will now be the ADC Plugin Build number in the x.xxx.xxx format. The previous releases were versioned as 1.1 (ADC plugin release for December 2012 ), 1.2 (ADC plugin release for April 2013), and so on for consecutive releases. New in this Release This section lists the supported P2P protocols, sub-protocols and applications introduced in the ADC Plugin release for December 1, 2017. ADC Administration Guide, StarOS Release 21.6 1 Peer-to-Peer Protocol and Application Detection Support New in this Release Protocol / Client Client Version Group Classification Supported from Application Release 6play 6play (Android) 4.4.1 Streaming Streaming-video ADC Plugin 2.19.895 Unclassified 6play (iOS) 4.4.1 6play — (Windows) BFM TV BFM TV 3.0.9 Streaming Streaming-video ADC Plugin 2.19.895 (Android) Unclassified BFM TV (iOS) 5.0.7 BFM — TV(Windows) Clash Royale
    [Show full text]
  • 489 INDEX 1 10Kwizard, 194 123People.Com, 126, 135 a AAD, 373
    INDEX 1 A (cont.) 10kWizard, 194 Administrative Office of the U.S. 123People.com, 126, 135 Courts, 421, 432 Admissible Evidence, 31, 32, 119 A Internet Archive, 33 Social Networking Sites, 34 Wikipedia, 33 AAD, 373 Adobe, 69 AAJ, 298 Adobe Acrobat, 10, 71, See also ABA. See American Bar Association Adobe Reader, See also PDF ABI, 464 Adobe Reader, 71 Access Downloading, 10 GPO, 372 Toolbar, 72 Access to Archival Databases (AAD) Ads, 37 System, 373 Advanced Search, 69 ACCESSLAW Advertising California State Courts Ethics, 477 Free Case Law Database, 333 Law, 463, 464 Cases Agencies California Federal, 289, 418, 419 Free, 333 Directories, 408, 420 Accounting Forms, 472 TAXSites.com, 480 Statistics, 441 Accurint, 233, 244, 253 Local, 437 Bankruptcy, 196 State, 437 Canadian Phones, 255 Territorial (U.S.), 437 Contact Card Report, 255 Tribal (U.S.), 437 Deep Skip, 255 AGRICOLA Books, 373 Driver’s License Records, 126 AIPLA, 474 Driver’s Licenses, 255 Briefs, 477 E-mail database, 255 Air Force Personnel Foreclosure database, 257 Locator Services, 180 People Alert, 255 People at Work database, 255 Alerts Phones Plus, 255 Accurint, 255 Relavint, 255 Articles, 310 Vehicle Identification Numbers, 255 Blogs, 80 Voter’s Registration, 255 Cases, 304, 310, 327, 346 Address Bar, 6, 14, 35 Complaints, 462 Dockets, 453, 455, 461 Address Search, 233, 235, 245, 251, Dockets (Federal Courts), 453 253, 256, 262 EDGAR, 194 Past, 235 Federal Register, 409 Addresses Free, 80 E-mail, 144, 172, 215, 235 Google Scholar, 304, 310 Unlock, 144 Groups, 80 URL, 6, 26, 29, 117 Legal News, 284 Web Site, 2 Morningstar Document Research, 194 AdLawbyRequest.com, 464 News, 80 Patents, 310 489 A (cont.) A (cont.) Alerts (cont.) American Psychological Association Podcasts, 85 Citation Rules, 488 Scholar, 304, 310 SEC, 194 American Samoa Government U.S.
    [Show full text]