首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
3.
随着我国科学技术的飞速发展,计算机网络技术逐渐渗透到生活以及生产的各个领域,计算机网络技术已经成为现代生活中不可或缺的一部分,但同时个人计算机网络安全问题也逐渐凸显出来。本文主要就目前个人计算机网络安全管理中存在的主要问题进行简要分析,并针对性的提出切实可行的参考意见,以提高个人计算机网络的可靠性。  相似文献   

4.
In the past, most business processes were performed in written form on paper and delivered personally, or by means of the post. Such processes are nowadays carried out a lot more effectively by means of a commonly used IT infrastructure; the Internet.  相似文献   

5.
6.
Riding the wave of smart disclosure initiatives and new privacy-protection regulations, the Personal Cloud paradigm is emerging through a myriad of solutions offered to users to let them gather and manage their whole digital life. On the bright side, this opens the way to novel value-added services when crossing multiple sources of data of a given person or crossing the data of multiple people. Yet this paradigm shift towards user empowerment raises fundamental questions with regards to the appropriateness of the functionalities and the data management and protection techniques which are offered by existing solutions to laymen users. These questions must be answered in order to limit the risk of seeing such solutions adopted only by a handful of users and thus leaving the Personal Cloud paradigm to become no more than one of the latest missed attempts to achieve a better regulation of the management of personal data. To this end, we review, compare and analyze personal cloud alternatives in terms of the functionalities they provide and the threat models they target. From this analysis, we derive a general set of functionality and security requirements that any Personal Data Management System (PDMS) should consider. We then identify the challenges of implementing such a PDMS and propose a preliminary design for an extensive and secure PDMS reference architecture satisfying the considered requirements. Finally, we discuss several important research challenges remaining to be addressed to achieve a mature PDMS ecosystem.  相似文献   

7.
Multimedia Tools and Applications - This research examines the use of personal mobile devices at work and what factors affect people’s adoption of enhanced levels of security mechanisms for...  相似文献   

8.
Osborne  T.E. 《Computer》1976,9(12):22-24
When I talk about a subject like this one, I find myself discussing a world in which one hand is filled with ill-defined problems while the other hand overflows with solutions in search of a problem, a world in which the only thing wrong with a solution is the problems it creates. It is this world I want to talk about, not whether we can build electronic note pads, read our newspaper on a video screen, or get mail via a data net. We can build, at a reasonable cost, almost anything we want. Only recently has our problem become one of what to do with a product after it is built.  相似文献   

9.
Fred Cohen 《Network Security》1998,1998(10):10-14
Over the last few years, computing has changed to an almost purely networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management decisions about organizational activities. This series of articles takes a management view of protection and seeks to reconcile the need for security with the limitations of technology.  相似文献   

10.
11.
随着科学技术和网络信息技术的飞速发展,越来越多的网络信息安全问题逐渐出现.本文主要研究了网络信息安全和网络安全之间的关系,并且对如何创造安全的网络环境提出了几点建议.  相似文献   

12.
13.
Personal lift     
  相似文献   

14.
个人存储     
《个人电脑》2005,11(1):124-124
无线FTP服务器;移动硬盘;DVD刻录机;3.5英寸硬盘;  相似文献   

15.
Already there are simple personal agents to help with some of our shopping. There are agents to track stocks in our portfolios, advise us on how to use particular software products, and arrange meetings within corporate workgroups. However, none of these agents takes more than one aspect of our activities into account, nor do they adapt easily to our preferences. Personal assistants, on the other hand, are agents that can represent individuals on the Web. They help users in their day-to-day activities, especially those involving information retrieval, negotiation, or coordination. A personal assistant might schedule a meeting and then, based on the meeting location, find the nearest babysitting service or the ATM with the lowest transaction fee. The paper discusses the interaction framework, negotiation, profiles and standards  相似文献   

16.
Corporations can suffer from too much information, and it is often inaccessible, inconsistent, and incomprehensible. The corporate solution entails knowledge management techniques and data warehouses. The paper discusses the use of the personal ontology. The promising approach is an organization scheme based on a model of an office and its information, an ontology, coupled with the proper tools for using it  相似文献   

17.
Personal Storage     
《个人电脑》2005,11(12)
  相似文献   

18.
本文首先对个人通信的基本概念——终端移动性与个人移动性、通用个人电信与通用个人电信号码、业务轮廓与业务轮廓管理等术语定义作了解释。随之对个人通信提出的背景——有线固定通信与无线移动通信的大发展进行了综述,并对个人通信的主要前提——大容量、宽覆盖、移动性、智能化与低价格等作了分析,指出只有在整个电信领域大发展的基础上,初步具备了五个前提条件下,才可能提出个人通信的基本概念并逐步予以实现。  相似文献   

19.
20.
《ITNOW》2001,43(4):24-25
  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号