Визуальный анализ виртуальной коммуникации: общение в Живых Журналах
The volume contains papers on development and application of information technologies in education and teaching practices, managing and organizing E-learning systems.
The use of hardware virtualization for ensuring information security is discussed. A review of various approaches to improving the security of software systems based on virtualization is given. A review of possible scenarios of using virtualization by intruders is also presented. The application domains and limitations of the available solutions and perspectives of future development in the field are discussed.
The present article contains amendments to the defi nitions of such notions as e-company, traditional company, virtual company and network company. A classifi cation of modern business models based on two criteria is proposed. A classifi cation of companies (based on the criterion of combination of traditional and electronic business tools) is outlined.