dimanche 15 novembre 2015
lundi 9 novembre 2015
vendredi 14 août 2015
mercredi 22 juillet 2015
General continuing education is similar to adult education, at least in being intended for adult learners, especially those beyond traditional undergraduate college or university age. However, it is not normally considered to include basic instruction such as literacy, English language skills, or programs such as vocational training or GED preparation. Instead, as the term suggests, it is assumed that the student already has a college education and is simply continuing it.
In Lebanon, continuing education involves enrollment in Cnam Liban university credit-granting courses, often by students enrolled part-time.
The ISSAE Cnam Liban, in 1973, was the first academic institution in Lebanon to offer what today would be considered an identifiable continuing education program. The first departement at Cnam Liban was the computer science and engineering departement.
mardi 21 juillet 2015
Ingénieurs informatique Liban Technologie et société: Le département informatique du Cnam Liban est OUVE...
lundi 20 juillet 2015
Henri GREGOIRE, fondateur du Cnam -
Extraits du discours à la Convention
Construisez votre avenir informatique Liban
mardi 14 juillet 2015
lundi 13 juillet 2015
Ingénieurs informatique Liban Technologie et société: Ingénieur spécialité informatique option réseaux, ...
jeudi 9 juillet 2015
samedi 30 mai 2015
samedi 16 mai 2015
mercredi 6 mai 2015
lundi 4 mai 2015
samedi 2 mai 2015
Website content integrity has been a key factor in building our cloud hosting platform. That’s why, we employ ZFS–based file storage for your website files. Furthermore, you will be protected against all types of malicious attacks through the award–winning ModSecurity firewall, which is activated by default for all plans. Using the 100% free web accelerators integrated into the Control Panel, it will be easy for you to improve the performance rates of your content–heavy sites considerably. Plus, we’ll assist you transfer your web sites to our system at no cost.
vendredi 1 mai 2015
jeudi 30 avril 2015
The TOS also authorizes Facebook to take videos and pictures using the phone's camera at any time without permission, as well as directly calling numbers, again without permission, that could incur charges. | Source: http://www.whydontyoutrythis.com/2014/08/if-you-use-facebook-messenger-this-is-how-you-are-being-recorded-even-when-not-on-the-phone.html
mercredi 29 avril 2015
dimanche 26 avril 2015
New SuperTuxKart release!
The best racing game on Linux just got even better. With this release, a new engine called Antarctica can be found under the hood. It aims to deliver richer graphical environments with shading and depth of field. This release also includes new tracks, new karts, and online accounts that track badges earned in a new achievement system
vendredi 24 avril 2015
By Chris Preimesberger
Linus's Law, named after Linux creator Linus Torvalds, postulates that open code leads to more effective bug detection because when an entire community is scouring through code, fixes come more quickly. This is often the first thing IT pros consider when installing security inside an open-source model. Through popular code-and tool-sharing sites like GitHub, the open-source community aids other organizations in securing their own code and systems, offering a list of free security tools and frameworks for malware analysis, penetration testing and other tasks. Along these same lines, a recent report from the Ponemon Institute explored how IT professionals view commercial open-source software, data protection, and the security impact of messaging and collaboration solutions on their organizations. This slide show, based on eWEEK reporting and industry insight from Olivier Thierry, chief marketing officer of Zimbra, offers eight takeaways to help your business harness the value of open source and get serious about security
Slide show : http://www.eweek.com/security/slideshows/eight-ways-to-use-open-source-for-more-effective-data-protection.html