161 Hits in 4.2 sec

Next generation internet protocol -Technical realms

J. Gnana Jayanthi, S. Albert Rabara
2010 2010 3rd International Conference on Computer Science and Information Technology  
The paper will help the companies and enterprises to realize the benefits and move to the immediate deployment of IPv6 enterprise environments globally.  ...  A special attention is paid on this paper to highlight the key issues behind the IPv6 co-existence with IPv4 and to accelerate and promote the research directions.  ...  Many devices in the enterprise already cannot serve information since they are behind NATs.  ... 
doi:10.1109/iccsit.2010.5564916 fatcat:5lzngbzdafbqbgttf7ikefweri

Research on Next Generation Dynamic Host Configuration Protocol and Security of Application

Ziqian Xiao, Jingyou Chen, Chaobo Yang
2009 Modern Applied Science  
In this paper, the author studies on next generation of Dynamic Host Configuration Protocol (DHCPv6), expounds the principle of DHCPv6 and its message exchange process.  ...  And also point out that the security issues may exist, hence several strategies have been put forward to improve the safety of message exchange, as well as the security of network.  ...  Message Name and Descriptions AdvertiseSent by a server in response to a Solicit message with configuration information.  ... 
doi:10.5539/mas.v3n11p44 fatcat:knloiu6tizhilmloo7tflihwm4

'What do you think about...?': Generating views in an interview

1998 Text - Interdisciplinary Journal for the Study of Discourse  
view-soliciting' interview, where the Interviewer is supposed to defer to the interviewee.  ...  We show that these devices do appear, and that they can have the effect of privileging the Interviewers' views over those of the interviewee.  ...  Introduction There is now a substantial literature on Interviews äs sites of the negotiation and construction of beliefs, attitudes, and experiences.  ... 
doi:10.1515/text.1.1998.18.4.587 fatcat:6guc2sicjbhqdedza7gzfxrkii

Mobile networking through Mobile IP

C.E. Perkins
1998 IEEE Internet Computing  
(In Mobile IP this is then termed agent solicitation.)  ...  and include information to allow resynchronization within the reply.  ... 
doi:10.1109/4236.656077 fatcat:4yepiwtyujewbphzv4hjc5lamq

A Critical Analysis of How Enterprise Risk Management Impacts Organisational Performance

Bakhit Derah
Further, in both companies, the ranking of internal environment, objective setting, event identification, risk response, control activities, information and communication, and monitoring was highly implemented  ...  This research aimed to investigate the impact of enterprise risk management (ERM) on the organizational performance of oil companies in Qatar.  ...  process during training and field experience.  ... 
doi:10.25401/cardiffmet.13270964 fatcat:opnqwyrikbdkhgphkwfuitrvqy

Artificial Monitoring and Surveillance of Employees: The Fine Line Dividing the Prudently Managed Enterprise form the Modern Sweatshop Recommended Citation ARTIFICIAL MONITORING AND SURVEILLANCE OF EMPLOYEES: THE FINE LINE DIVIDING THE PRUDENTLY MANAGED ENTERPRISE FROM THE MODERN SWEATSHOP

Robert Boehmer, Robert Boehmer, Robert Boehmer
1992 DePaul Law Review   unpublished
The Video Privacy Protection Act of 1988 enacted 18 U.S.C. § 2710 (1988) and renumbered the former § 2710 as § 2711. Id. § 1140.  ...  As stated in the Conference Board Report, "More than fourfifths of the survey participants in all three regions think that thorough solicitation of information from job applicants is the key to avoiding  ...  This is, arguably, the "storage" and "analysis" of "information concerning an employee's activities by means of computer."  ... 

Capital Offense: The SEC's Continuing Failure to Address Small Business Financing Concerns

Stuart R. Cohn, Gregory C. Yadley
2007 Social Science Research Network  
It was renumbered as § 4(2) in 1964, Act of Aug. 20, 1964, Pub. L. No. 88-467, 78 Stat. 580 (1964).  ...  The Commission could point to its recent experience with Rule 504.  ... 
doi:10.2139/ssrn.1749610 fatcat:s6sgtjwvdnb6tpaedtmws2cueq

The impact of different regulatory models on the labour conditions, safety and welfare of indoor-based sex workers

Jane Pitcher, Marjan Wijers
2014 Criminology & Criminal Justice  
legal and policy changes.  ...  Drawing on research in the UK and Netherlands, this paper considers the respective legislative backgrounds, recent policy changes and their implication for sex workers in off-street environments.  ...  Through drawing out some of the parallels concerning sex workers' experiences under the two different regimes, this article can inform policy debates and also future comparative research studies.  ... 
doi:10.1177/1748895814531967 fatcat:v2q3t4gkvbgaxoah6qrerdfk34

An Analysis of the Securities Acts Amendments of 1964

Richard M. Phillips, Morgan Shipman
1964 Duke law journal  
and a variety of promotional enterprises.  ...  Where there is solicitation, section 14 (a) may again be relevant; that section might be used to prohibit any solicitation unless those not solicited receive section 14 (c) information statements, and  ...  gave to the Amendments Act and by the ingenious (and probably effective) compromises made with regard to required membership in a registered securities association and coverage of banks and insurance  ... 
doi:10.2307/1371168 fatcat:aflvx2ianvezla6j36zdquenmy

IPv6 Rationale and Features [chapter]

2006 Migrating to IPv6  
Some architecture considerations are then discussed and new features needed in current and future networks presented.  ...  Finally, the IPv6 return on investment and drivers is discussed.  ...  In a typical enterprise scenario, the enterprise needs only two IP addresses: the external address of the NAT hiding its internal network and one address for all its Web sites.  ... 
doi:10.1002/9780470028742.ch1 fatcat:laoe4jo54fa4ncw64rfd7phea4

Towards IPV6 Adoption in Developing Arab Countries in Western Asia Region

Baha Khasawneh, Batool AlArmouty
2019 International Journal of Technology and Engineering Studies  
constant support in promoting the continuity and relevance of its Chapters.  ...  Acknowledgements We would like to thank the following people and organizations: The Internet Society ( for having donated the funds that allowed this Project to be carried out and for its  ...  Without going into detail, the ICMPv6 messages that request the parameters are called "NS" (Neighbor Solicitation) and "RS" (Router Solicitation) messages; answers are contained in ICPMv6 messages called  ... 
doi:10.20469/ijtes.5.40004-2 fatcat:iqgvz6bilveplj2yetf7to37l4

Modern Applied Science, Vol. 3, No. 11, November 2009

Editor MAS
2009 Modern Applied Science  
Acknowledgment The authors also would like to thank two anonymous referees very much for their valuable comments and suggestions, which helped to improve the paper.  ...  This work was supported by Natural Science Foundation Project of CQ CSTC (2008BB0346, 2009BB2375), the Foundation Project of ChongQing Educational Committee (KJ080404) and the Science Project Research  ...  Message Name and Descriptions Type Name Description 1 Solicit Sent by a client to find available DHCPv6 servers 2 Advertise Sent by a server in response to a Solicit message with configuration  ... 
doi:10.5539/mas.v3n11p0 fatcat:qvl7f7isavfptdhe66f4nbtjwa

Guide for Authors

2021 Biological Psychiatry Global Open Science  
subsequently renumbered).  ...  In the Methods and Materials section of the manuscript, authors should identify the institutional and/or licensing committee that approved the experiment(s) and confirm that all experiments were performed  ... 
doi:10.1016/s2667-1743(21)00023-9 fatcat:egtmevbt7rc7pjqfkgfrjwnace

Sunshine and Shadows on Charity Governance: Public Disclosure as a Regulatory Tool

Evelyn Brody
2022 Florida Tax Review  
At the same time, increased public disclosure of the IRS's exemption determinations and revocations reveals the need for formal guidance from the tax regulator about acceptable governance structures and  ...  Is information collected by regulators who worry primarily about financial self-dealing useful to a public worried about charity effectiveness?  ...  of solicitation and thereafter.  ... 
doi:10.5744/ftr.2012.1004 fatcat:hd5h5wwil5ahbncim6ejq6ohje


Harold Augenbraum
2000 RBM A Journal of Rare Books Manuscripts and Cultural Heritage  
They continue to provide services and care for historic collections, filling a need in various cultural and social . . .  ...  Now little known outside a small group of library historians and current members of these institutions, many subscription libraries flourished in the 1800s, but by the twentieth century most had disappeared  ...  to the trustees that subscriptions would not support the library for the long term, so they began to solicit permanent funds.  ... 
doi:10.5860/rbm.1.2.188 fatcat:otc6hlxpc5cevax7mmz4nkigje
« Previous Showing results 1 — 15 out of 161 results