Results 81 to 90 of about 107,397 (277)

Exploring Complex MPLS VPN Applications: Models and Implementations for Modern Communication Demands [PDF]

open access: green, 2023
Emad S. Hassan   +5 more
openalex   +1 more source

Does Investors’ Information‐acquisition Ability Affect IPO Underpricing? Evidence from a Quasi‐natural Experiment

open access: yesAbacus, EarlyView.
Initial public offering (IPO) underpricing, driven by information asymmetry, is a prevalent and serious global phenomenon. In addition to the influence of information providers such as IPO firms, investors’ ability to acquire information may also significantly affect IPO underpricing.
Haipeng Yu   +3 more
wiley   +1 more source

Investigation on the Applications of Ethernet VPN in Cloud Data Center Interconnection

open access: yesDianxin kexue, 2012
The problems existing in the current VPLS services and new requirements for ethernet VPN are summarized,and the technical characteristics of E-VPN and PBB E-VPN newly presented by IETF are introduced and analyzed.Furthermore,integrated with the actual ...
Xiaoming He   +3 more
doaj   +2 more sources

VPN SITE TO SITE IMPLEMENTATION USING PROTOCOL L2TP AND IPSEC

open access: yes, 2021
Data exchange communication has developed, which leads to centralized communication, and to achieve this communication requires a type of data communication whose data is accommodated on the server and can be accessed by clients, such as at organization.
Budi Santoso   +3 more
semanticscholar   +1 more source

Generative AI Implementation in Enterprises: Lessons From a Case Study of Enhanced IT Service Management

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT The recent rise of Generative Artificial Intelligence (GenAI) is fundamentally changing the way businesses operate, with many now investing heavily in this technology. However, businesses are still exploring ways to extract value from GenAI and develop organisational capabilities.
Ashish Jagdish Sharma   +4 more
wiley   +1 more source

Multi-service management in a multi-provider environment

open access: yes, 1995
As the spread of digital networks makes access to data communications globally available, the interest of communication service providers is switching away from the provision of these bearer networks and towards the provision of the value added services ...
Lewis, David, Tiropanis, Thanassis
core   +1 more source

Tuned Out or Dialed In: How Attributions Shape Observer Reactions to Music Listeners at Work

open access: yesPersonnel Psychology, EarlyView.
ABSTRACT Music listening while working is prevalent in contemporary workplaces, with extensive research demonstrating its psychological and behavioral implications. Shifting focus from intra‐individual outcomes, the present research examines the social implications of music listening at work.
Oguz Gencay   +2 more
wiley   +1 more source

Adoption of Digital Technologies in Public Health Crises: an International Large‐Scale Survey

open access: yesPublic Health Nursing, EarlyView.
ABSTRACT Objectives To examine nurses’ adoption and use of digital technologies across six countries during the COVID‐19 pandemic and identify lessons to strengthen preparedness for future public health crises. Methods Nurses in Australia, Finland, New Zealand, Switzerland, the United Kingdom and the United States completed an international cross ...
Laura‐Maria Peltonen   +9 more
wiley   +1 more source

The dangers, directness, and purposes of online collective actions

open access: yesPolitical Psychology, EarlyView.
Abstract Most research on online collective action investigates low‐effort, social media‐based actions rather than tactics with highly disruptive potential. To better account for the variety of forms of collective actions that use digital technologies, we conducted an open‐source intelligence search (Study 1a) and an expert consultation survey (Study ...
Catherine G. Lowery   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy