نتایج جستجو برای: byod
تعداد نتایج: 233 فیلتر نتایج به سال:
Virtualization is generally adopted in server and desktop environments to provide for fault tolerance, resource management, and energy efficiency. Virtualization enables parallel execution of multiple operating systems (OSs) while sharing the hardware resources. Virtualization was previously not deemed as feasible technology for mobile and embedded devices due to their limited processing and me...
This conceptual paper explores the implementation of Bring Your Own Device (BYOD) initiatives in schools from perspective Actor-Network Theory (ANT). The article commences by examining significance technological innovation educational realm, specifically highlighting transformative nature BYOD initiatives. Subsequently, it delves into theoretical underpinnings ANT and its suitability for compre...
It is widely agreed that rare disease patient registries should be international and follow the guiding principles of Findable, Accessible, Interoperable, Reusable (FAIR) for humans and computers. Furthermore, the procedures to collect and exchange data should be harmonised. Since 2014, the Bring Your Own Data (BYOD) annual workshop has been organised by and held at the National Centre for Rare...
Bring-your-own-device (BYOD) is getting popular. Diverse personal devices are used to access enterprise resources, and deployment of the solutions with customized operating system (OS) dependency will thus be restricted. Moreover, device utilization for both business and personal purposes creates new threats involving leakage of sensitive data. As for functionalities, a BYOD solution should iso...
The number of devices (phones, tablets, smart TVs, ...) using Android OS is continuously and rapidly growing. Together with the devices, also the amount of applications and on-line application marketplaces is increasing. Unfortunately, security guarantees are not evolving concurrently and security flaws have been reported. Far from discouraging them, more and more users and organisations rely o...
Intel’s “Bring Your Own Device” (BYOD) adoption quickly became popular as an alternative workplace solution strategy. It enables employees to use their personally owned devices perform business activities, leading increased productivity and employee satisfaction. However, BYOD also brought associated risks because of exponential growth in the number cybersecurity incidents due which ecosystem g...
Cloud services are increasingly being used for a variety of purposes, including e-mail, social networking, music streaming, calendar management, file storage etc. In recent times the evolution of cloud services from private applications to corporate usage has been observed. This has led to the question of how private and business cloud services can be dual-accessed through a single device, in p...
Using personal mobile devices for work gave rise to a trend called “bring your own device”, or BYOD. BYOD brings a productivity boost for employees, but also headaches for employers: on the one hand, the business has a legitimate interest in monitoring the device, in order to prevent security breaches by employees; but on the other hand, employees have a reasonable expectation of privacy when t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید