The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The universal diagram of creation of the virtual practical works for a row of disciplines of ICT is offered. Use the VirtualBox virtualization system for different variants of the practical works organization is considered. The diagram of the organization of a workshop on installation of the selected UNIXserver is provided. The conclusion about need of a combination of operation for a display class...
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving...
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving...
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. As the study for solving this problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. As one scheme...
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving...
Every cloud data center has a geographical location, which is known to, at least, its owner. Still, it is a challenge for a cloud customer to discover indisputably the location of the data center, which hosts an active cloud based service and its data. Knowing the location is necessary to assess that pertinent geographical obligations of service level agreements and legal requirements are fulfilled...
In the current Internet-based systems, there are many problems using anonymity of the network communication such as personal information leak and crimes using the Internet systems. As a solution for solving the above problem, there is the approach of Policy-based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control of every user...
In this paper an energy consumption model for enterprise applications is proposed. Based on the model, a commercially available application is chosen as a case study. The results show that the proposed model can correctly reflect the application¡¦s energy consumption. The study also shows when an organization¡¦s daily operations are highly depending on an application, the energy consumed by the application...
Peer-to-peer (P2P) has become an important computing model because of its adaptation, selforganization and autonomy. But how to organize dynamic nodes in P2P networks efficiently for gaming message passing services is still a challenge. This paper present an approach, named D-overlay, a delay-aware overlay for gaming services, to implement node clustering based on link delay of nodes communications...
This paper presents a modeling methodology for the design of file system organizations in a local area network environment. We first propose a characterization for the workload of typical business transaction systems, and then use this measurable characterization to derive input parameters for the file distribution graph models and the queuing network models that represent two completely different...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.