Enabling the User: The VPN in Context
β Scribed by William Box; Keith Sterling
- Book ID
- 104404613
- Publisher
- Elsevier Science
- Year
- 2001
- Tongue
- English
- Weight
- 151 KB
- Volume
- 6
- Category
- Article
- ISSN
- 1363-4127
No coin nor oath required. For personal study only.
β¦ Synopsis
Despite the growth of IP-VPN capabilities too little attention has been paid to date to other key enterprise trends such as the increasing use of other virtual services and the growing use of enterprise directories.
As the nature and number of relationships between the enterprise and the service provider becomes more complex, and the content of IP-VPN services becomes more feature-rich, new approaches are required. Organizations face a choice of either maintaining application/service-specific mechanisms or adopting a centralized approach exploiting technology such as directories more widely. These trends are discussed and a potential way forward outlined which puts the end-user at the heart of the issue.
The Growing Use of IP-VPNs
Over recent years there has been a great deal of activity in the area of IP-based VPNs. There have been two base approaches taken to provide virtual IP networking capabilities over a common backbone. Although there is no commonly accepted terminology for these two approaches, this paper will refer to them as 'closed-platform'-and 'Internet'-based VPNs.
Closed platform VPNs follow in the long tradition of virtual networking over the last 20 years. There is an historic wave of VPN deployment that has covered voice services,
π SIMILAR VOLUMES
A user interface can be viewed as a means of mapping user tasks to system tools. Context and adaptation are important features of a user/system interaction that can be used to simplify the task to tool mapping and thereby improve the interface. A system based on these features would be able to adapt
Proteomics has the capability to generate overwhelming quantities of data in relatively short timescales, and it is not uncommon to see experimenters investing substantially more time in data analysis than in data gathering. Although several sophisticated tools for data reduction and analysis are av