Explore chapters and articles related to this topic
Project monitoring and control
Published in John M. Nicholas, Herman Steyn, Project Management for Engineering, Business and Technology, 2020
John M. Nicholas, Herman Steyn
An intranet is a private computer network that uses Internet standards and protocols to allow communication among people within an organization. It provides access to a common pool of information from computers within the organization. The intranet is accessible only by organizational members and other authorized parties, though access can be extended to trusted external organizations, partners, or clients through an extended network called an extranet. With an intranet, it is easy for users to access groupware and to store reports, profiles, calendars, and schedules. It is also easy to locate information in these documents using special document-sharing tools such as file hosting services, newsgroups, chat rooms, and electronic white boards. These tools are especially useful for sharing pictorial information about product design requirements and descriptions.
6 Collaboration Technologies
Published in Stephen Emmitt, Kirti Ruikar, Collaborative Design Management, 2013
An intranet is a secure computer network that spans an organisation and connects its people and information systems across functional and geographical boundaries using Internet Protocol (IP) technology. Some intranets can only be accessed from a computer within the local network; however, some organisations provide access to remote employees by either using a virtual private network (VPN), or using access methods that require user authentication and encryption.
Information Technology
Published in Skip Pizzi, Graham A. Jones, A Broadcast Engineering Tutorial for Non-Engineers, 2014
An intranet is a private network, which uses similar software and protocols to those used with the Internet, but which is not accessible to the general public. Intranets may be established for local access only (for example, within a company's corporate premises), or they may be available in multiple locations via secure paths over WANs.
Investigation of scheduling integration of flexible manufacturing systems for mass customisation
Published in International Journal of Production Research, 2023
The figure in Appendix 1 is used to illustrate FMS scheduling integration with information flow in this dynamic system. Customer orders arrive dynamically to the FMS through Internet, Intranet, or Extranet. Arrived orders are placed in the preprocessing area of the FMS. Orders are then selected and inputted into the shop floor for processing by CNC machines. The information processing center consists of computers, servers, and tools to process information. The center can process information that are exchanged through internet, intranet, or extranet. The center can also process information that are obtained from RFID. The center possesses types of information systems required for FMS scheduling integration including the information systems to monitor the FMS shop floor and the information systems to provide scheduling decision-making support.
Dynamic Educational Recommender System Based on Improved Recurrent Neural Networks Using Attention Technique
Published in Applied Artificial Intelligence, 2022
Hadis Ahmadian Yazdi, Seyyed Javad Seyyed Mahdavi Chabok, Maryam Kheirabadi
Educational recommender systems are increasingly utilized as tools to assist students and teachers in implementing the learning process (Muthukumar and Bhalaji 2020; Zhang et al. 2018). Here, e-learning is one of the fields that its use is inevitable to improve the quality of education. E-learning is a form of education provided using various electronic tools (Internet, intranet, extranet, satellite networks, audio and videotapes, CDs). It is controlled in different ways (self-directed/controlled by the educator), and its implementation is without geographical and time restrictions (simultaneous/asynchronous learning). Other terms are used to describe this method of learning and educating, such as online learning, virtual learning, distributed education, and web-based learning (Mubarak, Cao, and Ahmed 2021; Tejeda-Lorente et al. 2015).
An adaptive defense mechanism to prevent advanced persistent threats
Published in Connection Science, 2021
Yi-xi Xie, Li-xin Ji, Ling-shu Li, Zehua Guo, Thar Baker
The attacker attempts to wrest the system control from the network administrator. Hence, various methods are to be employed to intrude upon their target entity’s network. Taking a simplified multi-stage attack as an example, the attacker first draws upon disclosure vulnerability or sends a phishing email to obtain the root authority of a legal tenant’s containers. Subsequently, the attacker executes SQL injection attacks on the compromised containers to acquire other containers’ authentication information. After sufficient instances are controlled, the attacker can launch a Denial of Service (DoS) attack to paralyze the IT infrastructures. In practice, APT attacks are much more complicated. To be more specific, this paper considers primarily attacks with the following two features: Infections or malicious activities give rise to system execution misbehaviour or perturb network performance features (e.g. CPU usage, memory usage, and network bandwidth usage). For instance, Worms are likely to cause slow execution and a huge consumer of bandwidth.Infections or malicious activities that are both continuative and multi-stage. For instance, considering an APT to an intranet-extranet isolation system, the attacker in the extranet is supposed to compromise the gateway before attacking the device in the intranet.