GTM-MQNC2Z4
Skip to main content
  1. Home >
  2. About Fujitsu >
  3. Resource Center >
  4. Publications >
  5. FUJITSU SCIENTIFIC & TECHNICAL JOURNAL >
  6. Archives >
  7. FSTJ: Information Technologies in the Internet Era

Information Technologies in the Internet Era


FSTJ 2000-12 Cover Image

2000-12 (Vol.36, No.2)



2000-12 (Vol.36, No.2) Contents

1. Preface (66 KB)
---[Naoyuki Akikusa, President of Fujitsu Limited. ]
2. Light and Shadow in the Internet Era (198 KB)
The progress of computer and telecommunication technologies has opened the "Internet era" - an era in which powerful communication channels diminish geographical, temporal, psychological, and cultural distances around the world. The impact of the Internet on business could even be compared to the impact of a large comet. As the Internet diffuses, its communication channels are enabling us to create the new "cyber community," which is free of many of the restrictions of the real world. In the economy, the cost structure of business processes is changing drastically and a revolution toward the new digital economy is in progress. This paper gives an overview of the favorable and sometimes unfavorable changes that the Internet is causing in society, describes some of the technological and social problems related to the Internet that must be overcome, and finishes with a brief look at the Internet future. ---[Kazuhiro Matsuo]

Information Technologies Supporting the Internet

3. Overview of PRIMEPOWER 2000/1000/800 Hardware (167 KB)
Servers, especially highly available and scalable servers, are becoming increasingly important to the Internet. Fujitsu previously developed the GP7000F Model 2000, which uses the SPARC architecture and the Solaris operating system. This model provides scalability to 64 CPUs. Now, Fujitsu has developed the PRIMEPOWER 2000, which has extended the Model 2000's scalability to 128 CPUs. The new SPARC64 GP processor's performance has also been improved by incorporating the latest technology. To achieve symmetric multi-processing (SMP) with up to 128 CPUs, the PRIMEPOWER 2000 has an enhanced two-layered crossbar feature that provides a maximum snoop performance of 57.6 gigabytes per second. As well as this extended scalability, the PRIMEPOWER 2000 provides high-availability (HA) features such as redundant components, hot-swap functions for various components, and a partitioning function for computing resources. These features give the PRIMEPOWER 2000/1000/800 the availability demanded by users of servers that must operate 24 hours a day throughout the year. This paper describes the hardware of the PRIMEPOWER 2000/1000/800. ---[Naoki Izuta, Toru Watabe, Toshiyuki Shimizu, Tetsuhiko Ichihashi ]
4. Policy-based Management for Enterprise and Carrier IP Networking (254 KB)
Policy-Based Management (PBM) will play a key role as a management technology for end-to-end IP-nized integration of enterprise networks and telecommunication networks. In this paper, we examine PBM and its requirements for managing the new telecommunication network service environment, and propose a scalable new PBM architecture based on relevant research at Fujitsu Laboratories of America. A new development in PBM, called active policy, is illustrated. We expect that the active policy will bring new insights on the integration of PBM and intelligent agent systems, benefiting service management and customer care in the new network service environment. ---[Takeo Hamada, Peter Czezowski, Takafumi Chujo ]
5. Elliptic Curve Cryptosystem (83 KB)
This paper describes elliptic curve cryptosystems (ECCs), which are expected to become the next-generation public key cryptosystems, and also describes Fujitsu Laboratories' study of ECCs. ECCs require a shorter key length than RSA cryptosystems, which are the de facto standards of public key cryptosystems, but provide equivalent security levels. Because of the shorter key length, ECCs are fast and can be implemented with less hardware. First, we outline ECC and describe a typical digital signature algorithm. Then, we describe our technology for parameter generation of a secure ECC and the implementation of a fast ECC by software and by a digital signal processor. ECCs are expected to enter widespread use as a base technology of electronic information services. ---[Naoya Torii, Kazuhiro Yokoyama ]

Information Technologies on the Internet

6. IMPP: A New Instant Messaging Standard and Its Impact on Internet Business (280 KB)
There are already more than 130 million instant messaging users worldwide. This paper describes our research and development to apply the power of instant messaging, especially that of the "buddy list," to electronic commerce. We have been engaged in standardization for instant messaging at the Internet Engineering Task Force (IETF) to make an open and secure standard called IMPP. AOL dominates the current market, but the protocols of AOL lack security. Therefore, they are not suitable for electronic commerce. We have submitted our own version of IMPP to the IETF that enables selective publication of presence. In this paper, we describe an application of the selective publication of presence for electronic commerce. We also describe our PePP prototype under development. ---[Youji Kohda, Hiroyasu Sugano, Satoshi Okuyama]
7. Chocoa Communicator - A New Communication System Based on Awareness and Text Communications (428 KB)
This paper explains the concept, main functions, services, and other aspects of the Chocoa Communicator, which is a new communication system based on text communications and making the user aware of the existence and activities of others connected to the network. By providing "awareness information," a user can confirm at a glance whether the status of another person is, for example, "on-line," "off-line," or "do not disturb" and so can select the most appropriate mode of communication. The text element incorporates machine readability, allowing the system to easily increase the value of communication through tie-ups with existing information processing technologies such as a WWW or database retrieval. ---[Tatsuro Matsumoto, Ryuichi Matsukura, Hidenobu Ito]
8. Integrating Information and Knowledge with Software Agents (383 KB)
This paper describes research and development activities for integrating distributed information and knowledge with software agent technology. First, we give an overview of our software agent architecture. Then, we describe the application of our software agent technology in a system that integrates distributed databases and in a document-oriented information integration system which integrates search engines. Our agent-based approach is suitable for dynamic information sources. ---[Hironobu Kitajima, Ryusuke Masuoka, Fumihiro Maruyama ]
9. XML Projects in Japan and Fujitsu's Approach to XLink/XPointer (298 KB)
The Extensible Markup Language (XML) is a markup language developed in response to a recommendation by the World Wide Web Consortium (W3C). It is a meta language used to make an information structure. XML's original specification is the Standard Generalized Markup Language (SGML). Now, XML is used not only as a format language but also as a framework in various areas beyond the SGML field. This paper describes the XML technology trends, the current state of XML technology, and some case studies in Japan and at Fujitsu. This paper also describes HyBrick, which is an XML/SGML browser that was demonstrated at SGML'97, and the XLink/XPointer technology. ---[Toshimitsu Suzuki, Masatomo Goto ]
10. High-performance XML Storage/Retrieval System (123 KB)
This paper describes a system that integrates full-text searching and database technologies for storing XML (eXtensible Markup Language) documents and retrieving information from them while providing a uniform interface. Our main goal with this system is to achieve high-performance, because there will be a large amount of XML documents in the near future if XML becomes a standard for structured documents and data exchange. We have therefore developed techniques for achieving high-performance storage and retrieval of XML documents. For full-text searches, we improved the Structure Index + Text Index model, which references both indexes alternately at retrieval. In our improved method, a hierarchical structure query is converted into a flat structure query by referencing just the structure index, then the optimized query can be quickly processed using only the text index. For storage, we developed an offset space, which is an address space in secondary memory that can compactly store any structure, for example, a tree. We use the offset space to solve the problem that occurs in other methods which store the analyzed result of XML documents as multiple relations in an RDB. In our method, the analyzed result can be stored in a single page in the best case. This makes it superior to other methods which store the analysis results in multiple relations so that storage of N relations needs at least N pages. As a result, generally, our method greatly reduces I/O costs. ---[Yasuo Yamane, Nobuyuki Igata, Isao Namba ]
11. System for Distributed Project Management over the Internet: PI-CEE (101 KB)
Rapid information sharing using Internet technologies such as the WWW and e-mail is enabling software development to be performed collaboratively at widespread locations. However, this requires efficient project management at these locations. In this paper, we describe a new system which supports distributed project management on the Internet. This new system, the Project Information-Cooperative Enterprise Environment (PI-CEE) is based on the Server-Integrated architecture, which is based on a business model for constructing efficient enterprise systems. We implemented the PI-CEE system beween distributed locations via the Internet using Java. The system enables project information sharing using a business model, a user-customizable notification function, and replication, which ensure efficient information sharing between distributed locations. ---[Takao Okubo, Takahide Matsutsuka, Hirotaka Hara ]
12. High-performance Data Mining System (201 KB)
Extensive research and development into data mining systems has been done to enable businesses to extract valuable information from very large amounts of data and then use that information to develop business strategies. A data mining system should provide multiple analysis technologies (mining engines) so that the user can select a technique that suits the characteristics of the data to be analyzed and the way in which the extracted information will be used. Also, it must have an architecture that is flexible enough for use with a general-purpose system and must be customizable for a specific business purpose. In this paper, we describe the overall architecture and the mining engines of a data mining system that Fujitsu Laboratories has developed and installed in a Fujitsu product called "SymfoWARE Mining Server." Then, we describe the advantages of Memory-Based Reasoning (MBR), which is one of the mining engines supported by SymfoWARE Mining Server; some enhancements made for applications to real business problems; and an example application which shows the efficiency of this system. Finally, we look at two directions in which advanced data mining systems might evolve. ---[Yoshinori Yaginuma]

Internet Businesses

13. Enterprise Portal for Internet Business (206 KB)
The emerging Internet technology has brought about a new business situation in which there are various services and contents distributed inside and outside the company environment. Because of this distribution, companies have difficulty finding target information and using these services. Therefore, many companies need an enterprise portal system that provides them with a better work environment. This paper describes the features of INTERSTAGE Portal Server, which is an enterprise portal system provided by Fujitsu. INTERSTAGE Portal Server realizes our goals for portal server construction and administration. These goals are to make good use of existing systems and to enable the user to construct a portal server smoothly without the need to develop new applications. ---[Masaaki Nishikiori ]
14. Total Security Solution System: @SECUREVISION -Essential Security for Net Businesses- (434 KB)
The numerous cases of cracking into government agency Web pages since the end of January 2000 have brought the necessity for Web site security very close to home. Success in Internet business requires an effective means for preventing unauthorized or illegal accesses. Besides making its access authorization system even stronger, Fujitsu has introduced "@SECUREVISION," a total security solution for supporting corporate security that can be flexibly tailored to specific customer needs. ---[Takashi Ohgo ]
15. Advanced B2B Procurement on the Internet (109 KB)
Electronic Commerce (EC) is one of the biggest trends on the Internet, and many companies have announced that they will focus on EC business. Also, there are now many HUB sites for B2B (business to business) trading. Although companies can get much benefit from installing and using the latest IT, they also need to know the type of EC that suits them best to stay competitive with other companies. This paper describes various types of EC and advanced B2B procurement styles on the Internet. ---[Kazuhiro Hosoi]
16. Information Technology (IT) for E-Government (80 KB)
In Japan, most administrative services are scheduled to go online by the end of 2003. The two main challenges are how to establish network security and how to establish effective management of data and work-flow in the government. Privacy must be absolutely protected in on-line transactions with the government. At the same time, the administrative process of work needs to be more efficient and administrative transactions need to be more convenient. Fujitsu will offer total solutions to these challenges using our know-how of both the elemental infrastructure and the various software applications we have provided to the private sector so far. As for network security, we can provide various applications to protect networks from intrusions and damage. These applications are based on technologies such as electronic authentication. Public Key Infrastructure (PKI) is currently the most appropriate application for this purpose. For effective management, we plan to support our customers with a total package that includes XML and work-flow tools to manage data, documents, and work processes. Fujitsu is enthusiastically dealing with these challenges by drawing on its creativity and extensive experience. ---[Hajime Omura ]
17. Policy and Strategy of Fujitsu Network Service Business: @nifty (320 KB)
---[Daisuke Haji ]
18. Knowledge Management in the Software and Services Group (137 KB)
This paper introduces a practical case of knowledge management in the Software and Services Group of Fujitsu, focusing on real-time management. Systems engineers (SEs) in the organization can perform their work with the most relevant, up-to-the-minute knowledge whenever it is needed and wherever they are. This paper also discusses the organizational issues and the knowledge structure for successful knowledge management. ---[Kunio Kurose ]

Services & Products

Corporate Information

Country Selector

Global

Change

World Map