A Proposed Virtualization Technique to Enhance IT Services
نویسندگان
چکیده
منابع مشابه
Network Virtualization Technology to Support Cloud Services
Recently, server virtualization technology, which is one of the key technologies to support cloud computing, has been making progress and gaining in maturity, resulting in an increase in the provision of cloudbased services and the integration of servers in enterprise networks. However, the progress in network virtualization technology, which is needed for the efficient and effective constructi...
متن کاملA Proposed Model for Dental Services Management in Iran
Background: Oral health is an integral part of general health and one of the necessities of a good life. Having a healthy mouth and teeth requires individual care, the development and implementation of community-based intervention programs, and professional care. The purpose of this study was to design a model for the management of dental services in Iran. Methods: This was an applied researc...
متن کاملProposed Model of Encryption Technique using Block Cipher Concept to Enhance Avalanche Effect
The world It know today would be impossible without cryptography. This Paper are presenting study of cryptography and problem associating with existing encryption model is also presented. Furthermore this is proposing encryption model. This encryption model is based on the block cipher concept where it will be encrypt and decrypt any type of data file. The primary goal of this paper is to impro...
متن کاملA New Proposed Technique to Improve Software Regression Testing Cost
In this article, we describe the regression test process to test and verify the changes made on software. A developed technique use the automation test based on decision tree and test selection process in order to reduce the testing cost is given. The developed technique is applied to a practical case and the result show its improvement.
متن کاملProposed methodology to enhance C4I systems security on architectural level
Command control, communication, computer and intelligence (C4I) systems are the back bone complex information and communication systems for modern information warfare (IW). Managing security in C4I systems is a challenge due to complexity and criticality of these systems. This paper elaborates design methodology to incorporate security in the C4I systems in systematic and consistent way instead...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Information Technology and Computer Science
سال: 2012
ISSN: 2074-9007,2074-9015
DOI: 10.5815/ijitcs.2012.12.02