Results 61 to 70 of about 24,263 (216)
Abstract A growing number of clinics have experienced disruptions of clinical services due to cyberattacks. To provide continuity of care, medical physicists should work with Information Technology (IT) staff to develop a business continuity plan.
R. Alfredo Siochi +7 more
wiley +1 more source
Campus Networks are ever evolving. With each evolution comes a need for increased availability, scalability, flexibility and security of the network. This work presents how the aforementioned needs can be met via network virtualization. It also goes further to show how network virtualization can be achieved using Multiprotocol Label Switching-Virtual ...
Ibikunle, F. +2 more
openaire +1 more source
АНАЛИЗ СПЕЦИАЛЬНЫХ ПРОГРАММ ДЛЯ СОЗДАНИЯ ВИРТУАЛЬНОЙ СЕТИ [PDF]
Когда нужно организовать для нескольких компьютеров доступ к ресурсам друг друга, первое, что приходит в голову, — объединить их в локальную сеть. Поэтому для решения поставленной задачи необходимо всего лишь программно реализовать виртуальную сеть ...
Чернов, В.В.
core
From Tweets to Tyranny: Exploring the Symmetry Between State and Social Media Censorship of Speech
Journal of Social Philosophy, EarlyView.
Bhanuraj Kashyap, Paul Formosa
wiley +1 more source
This study reviews the literature comparing speech recognition outcomes between remote versus in‐person CI programming. Speech recognition outcomes tested in quiet were similar between in‐person programmed and remotely programmed CI users for word lists (SMD: −0.06 [95% CI: −0.37–0.35], p = 0.71) and for sentences (SMD: −0.28 [95% CI: −0.79–0.24], p ...
Anuja H. Shah +4 more
wiley +1 more source
The clinical motivation for Virtual Trauma Team is to improve quality of care in trauma care in the vital first "golden hour" where correct intervention can greatly improve likely health outcome.
Bults, R.G.A., Jones, V.M.
core +6 more sources
DESIGN AND EVALUATION OF A VIRTUAL PRIVATE NETWORK ARCHITECTURE FOR COLLABORATING SPECIALIST USERS
The expansion of communication systems is the undeniable advantage of the most contemporary digital technologies. However, when a specialist user such as an inventor or an idea owner communicates through a communication system, their intellects are ...
Akram Kargar Raeespour +1 more
doaj +1 more source
An Analisys of Business VPN Case Studies [PDF]
A VPN (Virtual Private Network) simulates a secure private network through a shared public insecure infrastructure like the Internet. The VPN protocol provides a secure and reliable access from home/office on any networking technology transporting IP ...
Crescenzio Gallo +2 more
core
ABSTRACT The evaluation and assessment of network security is a decision‐making (DM) problem that occurs in an environment with multiple criteria, which have uncertainty, bipolarity, and extra‐related information. The traditional approaches fail to address the need to acquire a wide range of information for the assessment, especially in situations ...
Walid Emam +3 more
wiley +1 more source
Design and Implementation of VPN-MPLS (virrtual Private Network-Multi Protocol Label Switch) Topology Model on IP (Internet Protocol) [PDF]
VPN (Virtual Private Network) and MPLS (Multi Protocol Label Switching) are two different things, VPN handles network security case while MPLS creates new technology that can reduces third layer process for each network ...
Effendy, Machmud +2 more
core

