mercredi 22 juillet 2015

Continuing training Lebanon

Continuing education is an all-encompassing term within a broad spectrum of post-secondary learning activities and programs.. Recognized forms of post-secondary learning activities within the domain include: degree credit courses by non-traditional students, non-degree career training, workforce training, formal personal enrichment courses self-directed learning and experiential learning as applied to problem solving.

General continuing education is similar to adult education, at least in being intended for adult learners, especially those beyond traditional undergraduate college or university age. However, it is not normally considered to include basic instruction such as literacy, English language skills, or programs such as vocational training or GED preparation. Instead, as the term suggests, it is assumed that the student already has a college education and is simply continuing it.
In Lebanon, continuing education involves enrollment in Cnam Liban university credit-granting courses, often by students enrolled part-time.
The ISSAE Cnam Liban, in 1973, was the first academic institution in Lebanon to offer what today would be considered an identifiable continuing education program. The first departement at Cnam Liban was the computer science and engineering departement.

lundi 20 juillet 2015

Plus de 220 ans d'histoire... 45 ans au Liban

"Je viens vous présenter les moyens de perfectionner l'industrie nationale. La création d'un conservatoire pour les arts et métiers où se réuniront tous les outils et machines nouvellement inventés ou perfectionnés... Il faut éclairer l'ignorance qui ne connaît pas et la pauvreté qui n'a pas les moyens de connaître..." "Tous les départements devront participer aux bienfaits de cet établissement. Le conservatoire sera le réservoir dont les canaux fertiliseront toute l'étendue de la France".
Henri GREGOIRE, fondateur du Cnam -
Extraits du discours à la Convention


Construisez votre avenir informatique Liban

samedi 2 mai 2015

Can a country have too many public holidays? - BBC News

http://www.bbc.com/news/world-middle-east-32479435?SThisFB?SThisFB

Cloud Hosting from Eurabiahosting

Website content integrity has been a key factor in building our cloud hosting platform. That’s why, we employ ZFS–based file storage for your website files. Furthermore, you will be protected against all types of malicious attacks through the award–winning ModSecurity firewall, which is activated by default for all plans. Using the 100% free web accelerators integrated into the Control Panel, it will be easy for you to improve the performance rates of your content–heavy sites considerably. Plus, we’ll assist you transfer your web sites to our system at no cost.

vendredi 24 avril 2015

Top 5 articles of the week: April 20 - 24, 2015 | Opensource.com

https://opensource.com/life/15/4/top-5-articles-week-april-24

Pascal Fares
http://www.cofares.net

Eight Ways to Use Open Source for More Effective Data Protection


By Chris Preimesberger

Linus's Law, named after Linux creator Linus Torvalds, postulates that open code leads to more effective bug detection because when an entire community is scouring through code, fixes come more quickly. This is often the first thing IT pros consider when installing security inside an open-source model. Through popular code-and tool-sharing sites like GitHub, the open-source community aids other organizations in securing their own code and systems, offering a list of free security tools and frameworks for malware analysis, penetration testing and other tasks. Along these same lines, a recent report from the Ponemon Institute explored how IT professionals view commercial open-source software, data protection, and the security impact of messaging and collaboration solutions on their organizations. This slide show, based on eWEEK reporting and industry insight from Olivier Thierry, chief marketing officer of Zimbra, offers eight takeaways to help your business harness the value of open source and get serious about security

Slide show : http://www.eweek.com/security/slideshows/eight-ways-to-use-open-source-for-more-effective-data-protection.html