The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Virtual Desktop Infrastructure (VDI) is a new generation of cloud service in which users operating systems execute in a cloud data center. Users can access their desktops and applications by using thin client devices. This thin client is consisting of only a screen attached with low power CPU. This new paradigm of delivering remote desktop provides benefits in terms of flexibility, cost reduction,...
The paper considers Machine to Machine (M2M) different access methods are analyses to determine their security aspects. Financial billing system structure consists of architecture, protocol stacks, and communication mechanism. M2M/IoT is widely used in vary industrials energy, transport, industrial communication control, public/private services management, e-health, water, oil and other industries...
Topics include ongoing problems caused by the Heartbleed Internet-security flaw, the end of another epic Apple-Samsung patent-related trial, an Internet Explorer bug threatening users of the world's most popular browser, new laser technology that could quadruple Internet-access speeds, Facebook working on drones and satellites to bring the Internet to remote areas, a US government report that says...
Modern IT allows new markets and business process for many enterprises. One aspect is that new networks tolerate intranet access from almost any location. Some examples include completing health insurance contracts online at the customer or supporting a maintenance team with company expertise while working at customers. However, the increasing mobility of employees brings also high risk from a security...
Since the computer was invented, it has being developed for about tens of years. As it is developing, there are lots of technologies which belong to computer technology emerged such as network technology, database technology, embedded technology, and so on. What the aim of these technology invented is for people communicating more convenient and sharing information more easy. Until now, there are...
Network Maneuver Commander (NMC) is a research project to develop a prototype cyber command and control (C2) system that maneuvers network-based elements preemptively, and to develop performance metrics to be used for the evaluation of cyber dynamic defense solutions. The Network Maneuver Commander addresses the gap area between active information operations & reactive information assurance defenses,...
[Summary form only given]. Cloud computing has draw tremendous attentions from all levels of business and IT industries. Companies like Salesforce and Amazon are on the center of the stage and seem to have demonstrated a successful story on cloud computing. All hardware vendors, including HP and Dell are force to jump on the cloud computing bandwagon as well as enterprise software players, like Microsoft,...
The digital information revolution and increasing of outsourced data in many organizations caused significant changes in the global society where digital data are available everywhere with free of cost. Proving ownership rights of outsourced relational databases is a crucial issue in today internet-based application environments and in many content distribution applications. In the past few years,...
NAVIGA is an European project whose main goal is to design and develop a technological platform allowing elderly people and persons with disability to access the Internet and the Information Society through an innovative and adaptable navigator. NAVIGA also allows the creation of services targeted to social networks, mind training and personalized health care.
MID (mobile Internet device) is a new type of interesting internet device, which can provide full internet experience at anytime and anywhere. The definition and functions of MID were presented. And the difference among MID and smart mobile phone and UMPC (ultra mobile PC) and netbook and notebook was simply described. Then the two possible CPU platform-ARM infrastructure and X86 infrastructure, which...
Open source appropriate technology (OSAT) refers to technologies that provide for sustainable development while being designed in the same fashion as free and open-source software. Facilitated by advances in information technology software and hardware, new ways to disseminate information such as wikis and Internet-enabled mobile phones, the global development of OSAT has emerged as a reality. This...
We are in the midst of a computing revolution. As the cost of provisioning hardware and software stacks grows, and the cost of securing and administering these complex systems grows even faster, we're seeing a shift towards computing clouds. Clouds are essentially services accessed over a network, and offer developers scalable, robust computing infrastructure on a "pay as you go" basis,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.