AFORE Solutions Inc.

 AFORE Solutions Inc. contact information is shown below
Owner:AFORE SOLUTIONS INC.
Owner Address:2680 Queensview Drive, Suite 150 Ottawa K2B8J9 Canada
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byAFORE Solutions Inc.

Brand:

ACCELERATED SECURE EDGE

Description:

Computer hardware and computer software programs for networking connectivity which provides secure and optimized connectivity between users and their applications utilizing Ethernet and IP transport optimization capabilities Refers to the key technology themes enabled in the product named ASE3300. The three areas of the technology include: - Network Acceleration: through the use of features like lossless data compression and forward error correction the product can improve the performance (throughput) of protocols like TCP/IP, UDP, Fibre Channel, etc. when traversing wide area networks through data reduction and data loss prevention. - Security: the product supports multi gigabit rate AES256 encryption over links (defined by the logical association of ingress and egress gigabit Ethernet or Fibre Channel ports) on the ASE3300. This enables the ASE3300 to encrypt all traffic for secure transport over wide area networks. - Edge: refers to the location in a wide area network where the ASE3300 will be typically deployed. The edge of the cloud, or located at en enterprise premise location prior to connecting to a wide area network;

Category: COMPUTER HARDWARE COMPUTER SOFTWARE
Brand:

ACCELERATION FOR ETHERNET

Description:

Computer hardware and computer software which improves the performance of applications and protocols using Ethernet technology as a link layer Play on words for the company name AFORE: A=Acceleration, FOR=for, E=Ethernet - Refers to the unique technology solutions offered by the company using the technologies described in other trademarks;ETHERNET;

Category: COMPUTER HARDWARE COMPUTER SOFTWARE
Brand:

AFORE

Description:

Scientific and technological services, namely, research and design in the fields of computer network services, cloud computing technologies and Ethernet software solutions; Industrial analysis and research services; design and development of computer hardware and software;

Category: SCIENTIFIC TECHNOLOGICAL SERVICES
Brand:

BRINGING NETWORK SYSTEMS TO LIFE

Description:

Design of computer hardware, integrated circuits, communications hardware and software and computer networks for others;

Category: DESIGN COMPUTER HARDWARE
Brand:

ETHERCORRECT

Description:

Computer hardware and computer software programs for packet loss recovery and error correction featuring acceleration of TCP/IP based application performance through eliminating re-transmissions and providing a reliable network for loss intolerant applications Key technology pillar used in the ASE product. - Refers to the ability of the ASE to compensate for packet loss which may occur during transmission over wide area networks using a proprietary forward error correction technique. - As part of the processing within the ASE, ingress traffic (either Ethernet or Fibre Channel) is encapsulated using Generic Framing Procedure normalizing to Ethernet. Hence the term Ether. - As an optional operation, all traffic can error corrected, hence the term Correct. - The ASE allows users to specify a consecutive string of packets, N. N can be as low as 2 (i.e. every two consecutive packets) or as high as 10 (i.e. every tenth consecutive packet). - A copy of N is inserted, or stuffed, into the datagram prior to encapsulation into the HyperTUNNEL - Upon delivery at the destination location, the corresponding ASE3300 can detect if any of the received packets/bits were undelivered or delivered out of order. If detected, the ASE can reconstruct the missing packets/bits using the stuffed traffic. Depending on the value of N selected, the ASE can reconstruct as many as every second packet or as few as every tenth packet. - By recovering lost packets/bits occurred during wide area transmission, higher layer protocols (e.g. TCP/IP, UDP, etc.) will experience improved performance as a result of reduced data loss, enabling higher sustained levels of throughput and performance (e.g. less latency as a result of having to re-transmit lost data);ETHER CORRECT;

Category: COMPUTER HARDWARE COMPUTER SOFTWARE
Brand:

ETHERPACK

Description:

Key technology pillar used in the ASE product. - Refers to the ability of the ASE to compress all ingress traffic using a LZ1 based compression algorithm. - As part of the processing within the ASE, ingress traffic (either Ethernet or Fibre Channel) is encapsulated using Generic Framing Procedure normalizing to Ethernet. Hence the term Ether. - As an optional operation, all traffic can compressed, hence the term Pack. Pack also refers to the notion of filling wide area bandwidth as efficiently as possible and getting more effective capacity over existing wide area networks. For example, if the ASE connects to a 10 Mbps wide area IP connectivity service, but can achieve data compression efficiencies of 3x, then the ASE will be able to transmit effectively 30Mbps of traffic over the wide area network;ETHER PACK;

Category: KEY TECHNOLOGY PILLAR USED
Brand:

ETHERSECURE

Description:

ETHER SECURE;AES-256 Encryption Key technology pillar used in the ASE product. - Refers to the ability of the ASE to bulk encrypt all ingress traffic using AES256 bit encryption. - As part of the processing within the ASE, ingress traffic (either Ethernet or Fibre Channel) is encapsulated using Generic Framing Procedure normalizing to Ethernet. Hence the term Ether. - As an optional operation, all traffic can be bulk encrypted, hence the term Secure - This encryption provides scrambling of bits of information preventing it from being deciphered if unintentionally intercepted by an unapproved third party;

Category: ETHER SECURE
Brand:

HYPERTUNNEL

Description:

Computer hardware and computer software programs for high speed WAN encapsulation technology and tunneling aggregated LAN and SAN traffic between remote server groups enabling applications to extend between data centers Key technology pillar used in the ASE product. - Refers to the ability of the ASE to encapsulate a datagram including ingress source and destination (customer) addresses with either a standard IPV4 header or Layer 2 Ethernet header. - These headers allow the datagram to be routed or switched through any standard IP or Layer 2 Ethernet network without terminating protocols. This allows the ASE to tunnel any protocol or traffic transparently through routed or switched networks. - The term Hyper refers to the rate of processing achieved by the ASE, meaning the ASE performs functions at gigabit rates;HYPER TUNNEL;

Category: PROCESSING ACHIEVED
Brand:

INTERPORT

Description:

INTER PORT;Design of computer hardware, integrated circuits, communications hardware and software and computer networks for others;

Category: INTER PORT
Brand:

JUMBOSLICE

Description:

Computer hardware and computer software programs for jumbo frame fragmentation and re-assembly Key technology pillar used in the ASE product. - Refers to the ability of the ASE segment larger size Ethernet frames (up to 9600 bytes) and then reassemble. - This allows the ASE3300 to ingress Ethernet data flows generating jumbo packets (defined as andgt;1518 bytes and andlt;=9600) bytes, segment into smaller maximum transmission units (MTUs) so that they can be routed or switched through standard IP or Ethernet wide area networks. - Through the use of sequence numbers inserted by the ASE3300 prior to encapsulation of a datagram into the HyperTUNNEL, the corresponding ASE33300 at the receiving end can reconstruct the original jumbo packet upon egress;JUMBO SLICE;

Category: COMPUTER HARDWARE COMPUTER SOFTWARE
Brand:

SAN-XTEND

Description:

Computer hardware and computer software for data storage extension, disaster recovery and synchronization backup for both fibre channel over Ethernet deployments Refers to Storage Area Network Extension. - Key technology pillar used in the ASE product. - Refers to the ability of the ASE to provide local flow control acknowledgment messages as defined by the ITU standards committee on ingress interfaces configured for Fibre Channel operation. - This enables connected Fibre Channel interfaces to transmit and process received acknowledgements from the ASE3300 without waiting for the corresponding far-end receive Fibre Channel interface to generate and transmit the acknowledgement message. - This technology allows improved throughput for Fibre Channel as the local acknowledgement messages generated by the ASE33300 are more quickly received (lower latency) than if they were generated by a far-end receiving Fibre Channel interface;SAN-EXTEND;

Category: COMPUTER HARDWARE COMPUTER SOFTWARE
Brand:

SECURE THE CLOUD. TRUST THE CLOUD.

Description:

Secure the Cloud. Trust the Cloud is rooted in the IT (information technology) trend of Cloud Computing whereby computing resources and/or applications are provided by service provider a on a shared, multi-tenant virtualized infrastructure including computing, storage and network. Cloud Computing provides many benefits compared to the traditional approach of customers deploying and managing their own servers and applications within their organization. These include cost savings, more rapid IT deployment, ease of management, improved reliability and capacity elasticity. However, cloud computing creates new security issue. Cloud customers run their applications and have their data on an infrastructure managed and controlled by the CSPs. Cloud cyber-threats are a reality and stem from a variety of sources, including other tenants, cloud administrators and Advanced Persistent Threats putting customer data at risk. These threats can lead to lost profits, brand damage and even breach of regulatory compliance laws. AFORE Solutions empowers cloud customers to secure their cloud data and applications against threats, meet regulatory compliance requirements and instill trust in the Cloud as a viable computing approach;

Category: SECURE CLOUD TRUST
Brand:

THE ON-RAMP TO THE CLOUD

Description:

Computer software for use in allowing users to move various software applications from the computer environment to a cloud computing environment, for use in data storage, for use in providing data encryption, security key management and virtual private networks within a cloud computing environment, for use in providing cloud environment performance reporting and monitoring and for use in optimizing performance;CLOUD;

Category: COMPUTER SOFTWARE USE