The Library
Permanent URI for this communityhttp://repository.kln.ac.lk/handle/123456789/21927
Browse
2 results
Search Results
Item Virtualization Appliances for Library and Information Management Studies(Department of Library and Information Science, Faculty of Social Sciences, University of Kelaniya, Sri Lanka, 2016) Munasinghe, M.A.K.S.; Sumangala Thero, P.Virtualization provides means to create several virtual computers on one physical computer, therefore number of physical computers can be reduced radically .Students can connect to virtual computers using remote connection .With virtualization teachers can utilize new technologies such as the newest operating systems in teaching, even if those are not used in physical computers .One of the advantages of this method is to provide totally isolated and unrestricted learning environment for students, who will gain the administrative rights for the virtualized operating system. That use to learning those library and information science methods .Therefore, installation and configuration library management system like KOHA or GREENSTONE etc.A hypothesis of this study is to explore if the use of virtualization in learning environment is more effective than traditional teaching method .The base of library and information science education environment is individual learning styles and experiential learning. Rapid advances in information technology have provided new learning methods and environments .This has been the case for the teaching of librarianship and Information centers .Library and information Students pointed out deficiencies and inadequacies in ICT resources and facilities, and suggested upgrading software and hardware .They appeared to be satisfied with the ICT skills being targeted by visualization environment .They also appeared to be satisfied with the ICT instructors. Librarians and information management officers need special knowledge and skills including techniques of using software and hardware, selection and assessment of resources, use of information systems, ability to search networks and databases, as well as problem-solving and research skills and the ability to teach users . The study pointed out a need for collaboration with professional forums for continuing education programs and the need for revisions in curricula to introduce more focused courses that meet the needs of the ever-changing market requirements and give the students access to professional.Item Virtualization Security for information Centers(Research Centre for Social Sciences, Faculty of Social Sciences, University of Kelaniya, Sri Lanka, 2016) Munasinghe, M.A.K.S.; Pathirana, T.The use of virtualization technologies comes with many benefits such as agility, flexibility and cost efficiency. Virtualization and its unique architecture have many characteristics and advantages over traditional non-virtualized machines. The virtualization security system excels the traditional normal security. Each users of information centers cannot be provided each physical computers due to some unavoidable reasons and causes. Therefore, a number of individuals have been facing considerable problems and difficulties such as inability of using physical computers, attaching of wrong and unrecognized information to information gateways. The technology is in the process of developing for applications while VMs and checkpoint firewall is in the for front all server loads run and security respectively. This paper attempts to identify the differences, issues, challenges, risks, etc. caused by traditional non-virtualized machines and to illustrate the other side of this. Virtualization security for information Centers have already utilized many of the solution concepts into their products to combat the vulnerabilities that are present. Security in a virtualized information center can also be more fully automated. As a Result of this Administrator is helped to protect the information security policies of the information centers. The purpose of this abstract is to provide a good starting point for spreading better information security behaviors. Hear, I intent to mention the utility of the information adding day by day for the interaction between distribution and management of security architecture. Therefore, users can have a direct access for reliable information they want. Therefore, this research can be considered as a practical solution for the problem of physical technology from the virtualization security options.