Results 41 to 50 of about 10,664 (209)

IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) DI PERPUSTAKAAN UNIVERSITAS ISLAM MALANG

open access: yesBaca: Jurnal Dokumentasi dan Informasi, 2020
This study aims to explain to use a VPN in the UNISMA Library. The research method used is descriptive-qualitative and data was obtained through interviews with five informants, observation, and documentation. Data analysis techniques by collecting data,
Lia Umaroh, Machsun Rifauddin
doaj   +1 more source

Web-traffic filtering system

open access: yesЛитьë и металлургия, 2022
The article provides an overview of the web traffic filtering system using the Linux-based Squid software package. The system allows you to limit users on the Internet and collect statistics without interfering with the user’s computer, including the web
P. V. Pevnev
doaj   +1 more source

Vpn Firefox

open access: yes, 2020
PPTP At the present time the most common protocol vpn firefox is the protocol the two-point tunnel connection or a Point-to-Point Tunnelling Protocol - the PPTP. Developed it companies 3Com and Microsoft with the aim before the representation secure remote access to corporate networks via the Internet .
openaire   +1 more source

Experiences of Diagnostic Radiography Students With Workplace‐Based and Online Learning During the COVID‐19 Pandemic: A Study Across Four Higher Education Institutions in South Africa

open access: yesJournal of Medical Radiation Sciences, EarlyView.
This study explored diagnostic radiography students' learning experiences during COVID‐19 across four South African Higher Education Institutions. Themes included challenges with clinical placements, PPE and online learning, as well as inclusive learning enablers. Findings inform strategies to support students during future crises.
Siyabonga Goodwill Hadebe   +2 more
wiley   +1 more source

Investigation on the Applications of Ethernet VPN in Cloud Data Center Interconnection

open access: yesDianxin kexue, 2012
The problems existing in the current VPLS services and new requirements for ethernet VPN are summarized,and the technical characteristics of E-VPN and PBB E-VPN newly presented by IETF are introduced and analyzed.Furthermore,integrated with the actual ...
Xiaoming He   +3 more
doaj   +2 more sources

Performance of a Deep Learning Algorithm for Melanoma Classification Across Diverse Dermoscopic and Tele‐Dermatology Datasets

open access: yesJEADV Clinical Practice, EarlyView.
ABSTRACT Background Early detection of melanoma significantly boosts patient survival rates. Deep learning has demonstrated dermatologist‐level accuracy in assessing pigmented skin lesions by analysing images at the pixel level. However, these neural networks may face challenges with ‘real‐life’ images due to limited training data and image artefacts ...
Marianne Zanchetta   +15 more
wiley   +1 more source

Exploring Complex MPLS VPN Applications: Models and Implementations for Modern Communication Demands [PDF]

open access: green, 2023
Emad S. Hassan   +5 more
openalex   +1 more source

Does Investors’ Information‐acquisition Ability Affect IPO Underpricing? Evidence from a Quasi‐natural Experiment

open access: yesAbacus, EarlyView.
Initial public offering (IPO) underpricing, driven by information asymmetry, is a prevalent and serious global phenomenon. In addition to the influence of information providers such as IPO firms, investors’ ability to acquire information may also significantly affect IPO underpricing.
Haipeng Yu   +3 more
wiley   +1 more source

Exploring Young Autistic Children's Family and Independent Digital Experiences at Home

open access: yesChildren &Society, EarlyView.
ABSTRACT This study investigated how young autistic children engaged with digital technologies within the home context. Studying the everyday lives of three families in Queensland, Australia provided opportunities to identify the digital technologies they used and the purpose and potential of the children's digital interactions.
Irina Silva, Susan Danby, Beth Saggers
wiley   +1 more source

Generative AI Implementation in Enterprises: Lessons From a Case Study of Enhanced IT Service Management

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT The recent rise of Generative Artificial Intelligence (GenAI) is fundamentally changing the way businesses operate, with many now investing heavily in this technology. However, businesses are still exploring ways to extract value from GenAI and develop organisational capabilities.
Ashish Jagdish Sharma   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy