Results 31 to 40 of about 486,360 (195)

Implementation of a Virtual Private Network by Linux Operation System [PDF]

open access: yesEngineering and Technology Journal, 2005
This paper deals with the implementation of a VPN in the Linux Operation System . Linux was found to be a very appealing candidate for such applications for a number of reasons .
Asmaa Al - Sammara
doaj   +1 more source

Remote reporting during a pandemic using digital pathology solution: Experience from a tertiary care cancer center

open access: yesJournal of Pathology Informatics, 2021
Background: Remote reporting in anatomic pathology is an important advantage of digital pathology that has not been much explored. The COVID-19 pandemic has provided an opportunity to explore this important application of digital pathology system in a ...
Veena Ramaswamy   +2 more
doaj   +1 more source

IMPLEMENTASI VIRTUAL PRIVATE NETWORK - WAN DALAM DUNIA BISNIS

open access: yesJUTI: Jurnal Ilmiah Teknologi Informasi, 2007
Dalam dunia bisnis, biasanya sebuah organisasi ingin membangun Wide Area Network (WAN) untuk menghubungkan beberapa kantor cabangnya. Sebelum munculnya Virtual Private Network (VPN), mereka umumnya menggunakan ” leased line” yang mahal sehingga hanya ...
Erma Suryani, Syamsu Nur Row Honey
doaj   +1 more source

ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL [PDF]

open access: yesICTACT Journal on Communication Technology, 2011
As Internet usage grows exponentially, network security issues become increasingly important. Network security measures are needed to protect data during transmission. Various security controls are used to prevent the access of hackers in networks.
R. Ravi
doaj  

Creation of a virtual antidotes network between pharmacy departments of catalan hospitals [PDF]

open access: yesFarmacia Hospitalaria, 2017
Objetive: To design a virtual antidote network between hospitals that could help to locate on-line those hospitals that stocked those antidotes with the highest difficulty in terms of availability, and ensured that the medication was loaned in case of
Raquel Aguilar-Salmerón   +5 more
doaj   +1 more source

Wireless VPN network structure and safety protection in the north and south call center of SGCC

open access: yesDianxin kexue, 2016
The wireless virtual private network structure suitable for the north and south call center of SGCC was explored. In the structure,the wireless applications and communication of the north and south call center of SGCC were considered. The existing access
Ying ZOU   +3 more
doaj   +2 more sources

Intra and Inter-PON ONU to ONU Virtual Private Networking using OFDMA in a Ring Topology [PDF]

open access: yes, 2011
—In this paper, we propose a novel WDM-PON architecture to support efficient and bandwidth-scalable virtual private network (VPN) emulation over both inter-PON and intra- PON.
Deng, Lei   +5 more
core   +2 more sources

IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) DI PERPUSTAKAAN UNIVERSITAS ISLAM MALANG

open access: yesBaca: Jurnal Dokumentasi dan Informasi, 2020
This study aims to explain to use a VPN in the UNISMA Library. The research method used is descriptive-qualitative and data was obtained through interviews with five informants, observation, and documentation. Data analysis techniques by collecting data,
Lia Umaroh, Machsun Rifauddin
doaj   +1 more source

Virtual closed networks: A secure approach to autonomous mobile ad hoc networks [PDF]

open access: yes, 2015
The increasing autonomy of Mobile Ad Hoc Networks (MANETs) has enabled a great many large-scale unguided missions, such as agricultural planning, conservation and similar surveying tasks. Commercial and military institutions have expressed great interest
Adekunle, Andrew   +2 more
core   +1 more source

Perbandingan Virtual Private Network Protokol Menggunakan Point To Point Tunnel Protocol dan OpenVPN [PDF]

open access: yes, 2015
Dengan semakin ketergantungannya user kepada teknologi internet tentu harus diimbangi dengan ketersediaan internet yang memadai dan handal, berbagai masalah justru muncul ketika internet tidak menjamin keamanan yang maksimal tanpa adanya metode-metode ...
Ridwan, M. (Muhammad)   +2 more
core  

Home - About - Disclaimer - Privacy