Pando: Personal Volunteer Computing in Browsers
The large penetration and continued growth in ownership of personal electronic devices represents a freely available and largely untapped source of computing power.
Anderson David P. +14 more
core +1 more source
Dynamic virtual private network provisioning from multiple cloud infrastructure service providers [PDF]
The Cloud infrastructure service providers currently provision basic virtualized computing resources as on demand and dynamic services but there is no common framework in existence that allows the seamless provisioning of even these basic services across
Dimitrakos, T. +4 more
core
CamGrid: Experiences in constructing a university-wide, Condor-based grid at the University of Cambridge [PDF]
Proceedings of the 2004 UK e-Science All Hands Meeting, 31st August - 3rd September, Nottingham UKIn this article we describe recent work done in building a university-wide grid at the University of Cambridge based on the Condor middleware [1].
Beckles, B +5 more
core
Moat: A Virtual Private Network Appliance and Services Platform [PDF]
Vakava onnettomuus, sairaus tai aivoinfarkti voi aiheuttaa tilan, jossa ihminen ei pysty liikkumaan eikä puhumaan. Usein kyky liikuttaa silmiä kuitenkin säilyy, vaikka ihminen olisi muuten täysin halvaantunut.
Denker, John S. +5 more
core +2 more sources
Implementasi Virtual Private Network (Vpn) Dengan Otentikasi Radius Server Pada PT. Anugerah Tunggal Mandiri Jakarta [PDF]
The principle of this research is un availability of secure data exchange lines, as well as the lack of authentication for users who join the PT network. Anugerah Tunggal Mandiri.
Latifah, F. (Fitri) +1 more
core +1 more source
Routing algorithm for provisioning symmetric virtual private networks in the hose model [PDF]
A virtual private network (VPN) is a private data network where remote sites are connected over a shared provider network. In order to provide secure communications between customer sites, predetermined paths are used to forward data packets.
Chim, TW, Lui, KS, Wong, CP, Yeung, KL
core +1 more source
PERBANDINGAN ALGORITMA PADA VIRTUAL PRIVATE NETWORK IPSEC TERHADAP KECEPATAN DATA TRANSFER
VPN dapat memperlambat koneksi internet karena data harus melakukan perjalanan melalui jaringan VPN serta mengenkripsi dan mendekripsi data yang memerlukan lebih banyak waktu.
Alpan Hikmat Muharram Permana +2 more
doaj +1 more source
Membangun Jaringan Virtual Private Network (Vpn) Dengan Metode Tunneling Menggunakan Ubuntu 11.10 Pada Laboratorium Jaringan STMIK PPKIA Pradnya Paramita Malang [PDF]
Local computer network is a computer network that is built on the college STMIK PPKIA Pradnya Paramita Malang and serves as a support learning tool for students. This private network built and designed by an Admin.
Muhsyi, A. (Abdul)
core
Uso di Reti Private 5G per servizi museali
Modern telecommunications networks, from third generation onwards, based on the IP protocol, allow for varying levels of technological flexibility. One level involves the ability to create virtual networks, managed by virtual operators (VNOs), i.e., non-
Michele Luglio +3 more
doaj +1 more source
Protecting management information systems: Virtual Private Network competitive advantage [PDF]
Information security technologists and business scholars are motivated by a desire to understand how and to what extent the application of IT within enterprise systems leads to improved and secured organizational performance.
Sirisukha, Sid
core

