Results 51 to 60 of about 486,360 (195)

Pando: Personal Volunteer Computing in Browsers

open access: yes, 2019
The large penetration and continued growth in ownership of personal electronic devices represents a freely available and largely untapped source of computing power.
Anderson David P.   +14 more
core   +1 more source

Dynamic virtual private network provisioning from multiple cloud infrastructure service providers [PDF]

open access: yes, 2011
The Cloud infrastructure service providers currently provision basic virtualized computing resources as on demand and dynamic services but there is no common framework in existence that allows the seamless provisioning of even these basic services across
Dimitrakos, T.   +4 more
core  

CamGrid: Experiences in constructing a university-wide, Condor-based grid at the University of Cambridge [PDF]

open access: yes, 2008
Proceedings of the 2004 UK e-Science All Hands Meeting, 31st August - 3rd September, Nottingham UKIn this article we describe recent work done in building a university-wide grid at the University of Cambridge based on the Condor middleware [1].
Beckles, B   +5 more
core  

Moat: A Virtual Private Network Appliance and Services Platform [PDF]

open access: yes, 1999
Vakava onnettomuus, sairaus tai aivoinfarkti voi aiheuttaa tilan, jossa ihminen ei pysty liikkumaan eikä puhumaan. Usein kyky liikuttaa silmiä kuitenkin säilyy, vaikka ihminen olisi muuten täysin halvaantunut.
Denker, John S.   +5 more
core   +2 more sources

Implementasi Virtual Private Network (Vpn) Dengan Otentikasi Radius Server Pada PT. Anugerah Tunggal Mandiri Jakarta [PDF]

open access: yes, 2015
The principle of this research is un availability of secure data exchange lines, as well as the lack of authentication for users who join the PT network. Anugerah Tunggal Mandiri.
Latifah, F. (Fitri)   +1 more
core   +1 more source

Routing algorithm for provisioning symmetric virtual private networks in the hose model [PDF]

open access: yes, 2005
A virtual private network (VPN) is a private data network where remote sites are connected over a shared provider network. In order to provide secure communications between customer sites, predetermined paths are used to forward data packets.
Chim, TW, Lui, KS, Wong, CP, Yeung, KL
core   +1 more source

PERBANDINGAN ALGORITMA PADA VIRTUAL PRIVATE NETWORK IPSEC TERHADAP KECEPATAN DATA TRANSFER

open access: yesSistemasi: Jurnal Sistem Informasi, 2020
VPN dapat memperlambat koneksi internet karena data harus melakukan perjalanan melalui jaringan VPN serta mengenkripsi dan mendekripsi data yang memerlukan lebih banyak waktu.
Alpan Hikmat Muharram Permana   +2 more
doaj   +1 more source

Membangun Jaringan Virtual Private Network (Vpn) Dengan Metode Tunneling Menggunakan Ubuntu 11.10 Pada Laboratorium Jaringan STMIK PPKIA Pradnya Paramita Malang [PDF]

open access: yes, 2016
Local computer network is a computer network that is built on the college STMIK PPKIA Pradnya Paramita Malang and serves as a support learning tool for students. This private network built and designed by an Admin.
Muhsyi, A. (Abdul)
core  

Uso di Reti Private 5G per servizi museali

open access: yesArcheomatica
Modern telecommunications networks, from third generation onwards, based on the IP protocol, allow for varying levels of technological flexibility. One level involves the ability to create virtual networks, managed by virtual operators (VNOs), i.e., non-
Michele Luglio   +3 more
doaj   +1 more source

Protecting management information systems: Virtual Private Network competitive advantage [PDF]

open access: yes, 2008
Information security technologists and business scholars are motivated by a desire to understand how and to what extent the application of IT within enterprise systems leads to improved and secured organizational performance.
Sirisukha, Sid
core  

Home - About - Disclaimer - Privacy