首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 651 毫秒
1.
本文介绍了VPN技术,并分析了IPSec VPN和SSL VPN两种主流VPN技术特点。以邢台职业技术学院为例,详细阐述了如何利用VPN技术构建远程访问系统,让读者可以不受时空和地域的限制访问学院电子资源。  相似文献   

2.
随着VPN技术的不断发展,VPN产品已广泛地应用于旅游、保险、连锁经营、政府机构等各行各业中。本文通过对VPN技术的具体分析和研究,提出了一种采用VPN技术解决高校校园网建设的方案。  相似文献   

3.
VPN技术在数字图书馆中的应用   总被引:2,自引:0,他引:2  
刘渝 《现代情报》2009,29(9):88-90
越来越多的读者希望通过网络访问电子资源,利用VPN(虚拟专用网络)技术实现读者在信息资源的远程访问,就是一种安全可靠、切实可行的解决方案。本文介绍了VPN技术的基本原理、实现方式和VPN的几种关键技术,并对数字图书馆建设中常用的几种VPN技术作了一些探讨。  相似文献   

4.
本文分析了VPN技术的原理及VPN技术涉及的网络协议和实现方法,结合高校校园网面临的实际问题给出了一种基于校园网的VPN应用解决方案.  相似文献   

5.
本文分析了VPN技术的原理及VPN技术涉及的网络协议和实现方法,结合高校校园网面临的实际问题给出了一种基于校园网的VPN应用解决方案。  相似文献   

6.
本文根据VPN技术特点,对VPN的2种主流技术IPSec VPN与SSL VPN进行了比较,介绍了我校图书馆采用IP通实现图书馆数字信息资源的远程访问的解决方案.  相似文献   

7.
随着Internet的发展,VPN技术应运而生。它为我们提供了一种通过公用网络安全地对企业内部专用网进行远程访问的连接方式。阐述了VPN的概念、优势,剖析了VPN的实现技术,最后介绍了VPN技术在高校图书馆中的应用。  相似文献   

8.
本文简要描述了几种VPN技术特点,并详细介绍了IPSec VPN技术的基本原理以及实现方式,并结合工作实际介绍了IPSec VPN应用案例。  相似文献   

9.
虚拟专用网(VPN)技术综述   总被引:2,自引:0,他引:2  
刘婷 《科技广场》2010,(1):64-66
VPN(Virtual Private Network)也就是虚拟专用网络技术。所谓虚拟是指用户不需要拥有实际的长途数据线路,而是使用Internet公众数据网络的长途数据线路。所谓专用网络指用户可以为自己制定一个最符合自己需求的网络。本文介绍了什么是VPN技术,VPN安全技术分类,VPN隧道技术,以及VPN接入设备,最后简单介绍了一种基于MPLS的VPN技术。  相似文献   

10.
VPN技术在电子资源远程访问中的应用探讨   总被引:1,自引:0,他引:1  
王婷  汪琴 《现代情报》2007,27(4):141-143
VPN是远程网络访问的一种安全、经济的技术手段。如何依托VPN技术,解决使用非校园网IP的合法用户远程访问图书馆电子资源问题,值得关注和探讨。本文针对目前较多采用的2种VPN技术———基于SSL和IPSec协议的VPN,从安全性、使用方便性、网络支持性,可扩展性等几个方面进行了比较分析,并提出SSL/IPSec一体化解决VPN远程访问的方案。  相似文献   

11.
Aresearch group led by Prof. ZHAI Qiwei from the Institute for Nutritional Sciences under the CAS Shanghai Institutes for Biological Sciences has discovered that even relatively low doses of resveratrol--a chemical found in the skins of red grapes and in red wine--can improve the sensitivity of mice to the hormone insulin, according to a report in the October,2007 issue of Cell Metabolism. As insulin resistance is often characterized as the most critical factor contributing to the development of Type 2 diabetes, the findings“provide a potential new therapeutic approach for preventing or treating” both conditions, the researchers said.  相似文献   

12.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

13.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

14.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

15.
Active biological molecules and functional structures can be fabricated into a bio-mimetic system by using molecular assembly method. Such materials can be used for the drug delivery, disease diagnosis and therapy, and new nanodevice construction.  相似文献   

16.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

17.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

18.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

19.
This essay focuses on universal service and the Internet as means to support social and political participation. The emphasis on access to telecommunications systems in conventional approaches to universal service is contrasted with access to content. A model of the information environment is described that accounts for the roles of content and conduit, both of which are necessary conditions to achieve true access. A method is outlined for employing information indicators to observe or measure the information environment.  相似文献   

20.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号