Teaching Information Systems Technologies: a New Approach based on Virtualization and Hosting Technologies

نویسندگان

  • Carmelo R. García
  • Alexis Quesada-Arencibia
  • Santiago Candela Solá
  • Eduardo Carrasco
  • Armide González
چکیده

This paper describes how to provide suitable computing systems for information systems technologies learning using virtualization and hosting technologies. The main functionalities and components of an university learning lab based on these technologies are presented. All the software components used in its development are open source. Also, the use of this lab, providing the computing systems required for the learning activities of different matters related to the information systems technologies, is illustrated. The model of computing lab proposed is a more sustainable and scalable alternative than the traditional academic computing lab.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Providing Learning Computing Labs using Hosting and Virtualization Technologies

This paper presents a computing hosting system to provide virtual computing laboratories for learning activities. This system is based on hosting and virtualization technologies. All the components used in its development are free software tools. The computing lab model provided by the system is a more sustainable and scalable alternative than the traditional academic computing lab, and it requ...

متن کامل

New Realities of the Enterprise Management System Information Support: Economic and Mathematical Models and Cloud Technologies

The paper focuses on the urgency of the implementation of cloud technologies, which are a necessary condition for the development of enterprise management systems, give rise to a complex of insufficiently studied phenomena and processes and determine the need to find new tools in making and implementing reasonable management decisions. In the process of research, the sequence of construction an...

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

Requirements Engineering Model in Designing Complex Systems

This research tends to development of the requirements elicitation methodology with regard to operational nature and hierarchical analysis for complex systems and also, regarding available technologies. This methodology applies Analytic Hierarchy Process (AHP) and Analytic Network Process (ANP) to ensure traceability of planned qualitative and quantitative data from requirements to available te...

متن کامل

A Game Theoretic Approach for Sustainable Power Systems Planning in Transition

Intensified industrialization in developing countries has recently resulted in huge electric power demand growth; however, electricity generation in these countries is still heavily reliant on inefficient and traditional non-renewable technologies. In this paper, we develop an integrated game-theoretic model for effective power systems planning thorough balancing between supply and demand for e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • iJOE

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2012