Research Department

Modified:2016-04-22

Network Research and Development Department

Network R&D Department mainly performs the following activities and R&D related to activities in addition to operations and management of the backbone of the on-campus network.

  • Operation and management of on-campus backbone network
    Ensuring network security
  • Research and development regarding the latest network and
    security technology

Information System Research and Development Department

The Information System Research and Development Department supports both general and advanced information processing education and provides services to in-campus users through various computer systems. In terms of R&D, it provides the technologies for increasing the convenience and safety of computing environments.


Service

  • Zengaku computer system
  • Software licenses
  • Rental servers
  • Webhosting
  • Mailing-list
  • Server housing

Information Security Research and Development Department

The Information Security Research and Development Department implements technical countermeasures that respond to the various incidents occurring in the campus network. This is implemented by collaboration with the other three departments of this center and the committees related to information security such as the Incident Response Office of the Organization for Information Infrastructure. The department also performs education planning and awareness education related to information security and information ethics for students and staff for the purpose of deterring the occurrence of incidents and to improve the morals such as in using network and handling of information.

Unified Authentication System Research and Development

Unified Authentication System Research and Development Department operates a unified authentication system, which enables a common password to be used for authentication in various on-campus computer systems. Changes to common passwords for the unified authentication system and views of registered information can be made from the unified authentication system website. Every year there are more and more computer systems which use the unified authentication system. The latest list can also be found on the website.

Service

Unified Authentication System