Alternative Approaches to Configuring Computing Labs
نویسندگان
چکیده
Budgetary constraints are almost a constant challenge confronted by academia. In the case of small colleges and universities, these constraints become even more pronounced when these institutions enhance their programs to meet the needs of their constituents. While in some cases program enhancement might simply be accomplished by hiring new faculty members; in others, it might require additional resources. This is especially true for computer science or management information systems programs; the changes or enhancements in these programs also mean additional computing lab support. However, budgetary constraints, lack of physical space to house the labs, conflicting needs of different courses, and rapid obsolescence of technology only exacerbate this dilemma. Needless to say, overcoming these challenges requires some pragmatic thinking and approaches. Based on their own experiences in dealing with these same challenges, the authors suggest the following guidelines for configuring computing labs that are cost-effective, flexible and versatile:
منابع مشابه
Three New Systematic Approaches for Computing Heffron-Phillips Multi-Machine Model Coefficients (RESEARCH NOTE)
This paper presents three new systematic approaches for computing coefficient matrices of the Heffron-Phillips multi-machine model (K1, …, K6). The amount of computations needed for conventional and three new approaches are compared by counting number of multiplications and divisions. The advantages of new approaches are: (1) their computation burdens are less than 73 percent of that of convent...
متن کاملDesign an Equivalent Left Ventricular Assist Device for Medical Equipment Labs
LVAD is a mechanical pump supporting a weak heart function and blood flow. Sometimes, the heart may not recover fast enough to take over the pumping action immediately after surgery, in such patients a temporary support device has been employed to maintain the pumping action until the patient’s own heart recovers. This device can be considered as a temporary alternative before the process of ar...
متن کاملEvaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks
Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...
متن کاملA Tcl-based Self-configuring Embedded System Debugger
The Tcl Environment for Extensible Modeling is a software system from Bell Labs for the simulation, hardware emulation and debugging of heterogeneous multiprocessor embedded systems. These embedded systems contain one or more digital signal processors or microcontrollers that execute real-time software written in assembly language and C. Tcl provides an environment in which embedded system desi...
متن کاملSoft Computing Based on a Modified MCDM Approach under Intuitionistic Fuzzy Sets
The current study set to extend a new VIKOR method as a compromise ranking approach to solve multiple criteria decision-making (MCDM) problems through intuitionistic fuzzy analysis. Using compromise method in MCDM problems contributes to the selection of an alternative as close as possible to the positive ideal solution and far away from the negative ideal solution, concurrently. Using Atanasso...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JITE
دوره 4 شماره
صفحات -
تاریخ انتشار 2005