欢迎访问行业研究报告数据库

报告分类

重点报告推荐

当前位置:首页 > 行业导航

找到报告 44191 篇 当前为第 4313 页 共 4420

所属行业:信息传输、软件和信息技术服务业

  • 43121.一种基于云的工艺设备环境的安全策略

    [信息传输、软件和信息技术服务业] [2013-12-05]

    Back in the day, you could bring your personal Blackberry to work in order to access aSoftware as a Service (SaaS) application (if you were in a large building with good cellularreception). Now, you have many device choices for accessing the cloud, from iOs-basedphones and tablets, Android handhelds, to Research In Motion's (RIM) PlayBook. All comewith opportunities for jailbreaking, or gaining root access, by breaking down security to installbanned third-party applications. An infected bring your own device (BYOD) connected to thecorporate network is another security concern. A war walker could steal corporate data byuploading from your BYOD to a personal device. Learn to protect corporate assets with asecurity policy for a cloud-based BYOD environment.
    关键词:战争散步;系留设备的安全;圈养的政策决定;信息安全;云计算
  • 43122.SQL到Hadoop和回来,第3部分:直接传输和实时数据交换

    [信息传输、软件和信息技术服务业] [2013-12-05]

    Big data is a term that has been used regularly now for almost a decade, and it — alongwith technologies like NoSQL — are seen as the replacements for the long-successfulRDBMS solutions that use SQL. Today, DB2?, Oracle, Microsoft? SQL Server MySQL, andPostgreSQL dominate the SQL space and still make up a considerable proportion of the overallmarket. In this final article of the series, we will look at more automated solutions for migratingdata to and from Hadoop. In the previous articles, we concentrated on methods that takeexports or otherwise formatted and extracted data from your SQL source, load that into Hadoopin some way, then process or parse it. But if you want to analyze big data, you probably don'twant to wait while exporting the data. Here, we're going to look at some methods and tools thatenable a live transfer of data between your SQL and Hadoop environments.
    关键词:直接传输;数据交换;实时;大数据
  • 43123.在压缩虚拟机检查点中的权衡

    [信息传输、软件和信息技术服务业] [2013-12-05]

    Checkpoint replication is a prevalent way of maintaining virtual machine availability in the presence of host failures. Since checkpoint replication can impose heavy load on network resources, checkpoint compression has been suggested to reduce network usage. This paper presents the first detailed evaluation and characterization of the effectiveness and overheads of checkpoint compression methods for various workloads frequently seen in high-availability systems. We propose a lightweight compression method that exploits similarities in checkpoints to eliminate redundant network traffic, and compare it with two well-known methods, gzip and delta compression. Our results show that gzip and delta compression reduce network traffic significantly for various workloads, but incur high CPU and memory overheads, respectively. The proposed similarity compression is most effective for VM clusters running homogeneous workloads, while using both CPU and memory efficiently. Based on our extensive evaluation, we suggest guidelines for selecting and using these compression methods.
    关键词:检查点;云服务;故障恢复;效率;可伸缩性
  • 43124.捕捉住Windows在IBM云智能企业实例

    [信息传输、软件和信息技术服务业] [2013-12-05]

    Learn how to successfully capture a running Windows instance to a private catalog in theIBM? SmartCloud? Enterprise environment. Additionally, the authors describe common issuesthat arise during the process and how to troubleshoot them.You have a base IBM SmartCloud Enterprise Windows 2008 instance up and configured exactlythe way you want it and then you decide you need to provision a new instance from this state.Perhaps you want to run multiple instances of your solution, update software to a reference level,or simply want a new golden image to start from. This article guides you through the standardcapture process for a typical SmartCloud Enterprise Windows 2008 instance and points out somepossible stumbling blocks that you might encounter along the way.
    关键词:互联网同步时间;捕捉脚本;故障排除
  • 43125.在三维空间区域的快速探路响应功率计算

    [信息传输、软件和信息技术服务业] [2013-12-05]

    We consider the set of continuous-time1 audio signals {s1(t), s2(t), . . . , sM(t)} corresponding to M different microphones, and the problem of finding the location of a sound source in a three-dimensional space, identified by a coordinate vector x = (x, y, z). In the general case we can consider that signals si(t) had been prefiltered to improve performance.
    关键词:体积积分;分支定界;三维空间
  • 43126.关于Hadoop的Oozie工作流调度程序

    [信息传输、软件和信息技术服务业] [2013-12-05]

    Big data in its raw form rarely satisfies the Hadoop developer's data requirements forperforming data processing tasks. Different extract/transform/load (ETL) and pre-processingoperations are usually needed before starting any actual processing jobs. Oozie is a frameworkthat helps automate this process and codify this work into repeatable units or workflows thatcan be reused over time without the need to write any new code or steps. Learn how Oozie canbe used to create different types of workflows.
    关键词:数据处理;自动化;一致性
  • 43127.多功能环境监测的光纤纳米传感器

    [水利、环境和公共设施管理业,信息传输、软件和信息技术服务业] [2013-12-04]

    In conclusion, in this chapter, we have reviewed the development of high-performance fiber nanosensors for environmental monitoring applications, realized by the combination of advanced nanostructured coatings based on SWCNTs with the optical fiber technology.In particular, the chapter starts with a wide review of the state of the art of carbon nanotube-based sensors for environmental monitoring, followed by a description of the operating principle of the fiberoptic nanosensors in the FP-type reflectometric configuration.
    关键词:环境监测;传感器;应用程序
  • 43128.避免云滥用的风险

    [信息传输、软件和信息技术服务业] [2013-12-04]

    Cloud abuse is among the top threats experts expect to see in 2013; one avenue that abusecan take is when cybercriminals use social media vehicles to abuse cloud environments —such as SaaS-oriented user access through accepted BYOD channels or PaaS-orientedaccess via Twitter interchanges used by a development team to communicate cloudadministration updates. As this author has discussed before, many organizations employ areactive response when the breach occurs instead of taking more prudent proactive steps.Join the author as she provides a roadmap for abuse mitigation and illustrates what proactiveactions can be taken when abuse occurs.
    关键词:孤岛模式;云攻击;云滥用
  • 43129.数据融合在生态环境监测系统中的应用

    [信息传输、软件和信息技术服务业,水利、环境和公共设施管理业] [2013-12-04]

    In this dissertation, the principle and value of data fusion are studied, and the existent typical touting protocol for Wireless Sensor Network (WSN). A kind of wireless sensor network data fusion algorithm based on the routing protocol LEACH is proposed, which is combines LEACH agreement with the hierarchical structure of the adaptive weighting combination. The hierarchy structure of each cluster design for an adaptive weighted model, through the adaptive weighted method from the sensor node of raw data acquisition to extract characteristic data, then will feature the data sent to converge node. We show by simulation that the algorithm has good data fusion efficiency, especially suitable for periodic report types of wireless sensor network.
    关键词:环境监测;多传感器;数据融合
  • 43130.减轻云资源枯竭的中断风险

    [信息传输、软件和信息技术服务业] [2013-12-04]

    Many enterprises are unprepared for cloud outages as a result of complete resourceexhaustion. In this article, the author starts with a cloud outage scenario, provides examples offailures resulting from resource exhaustion, discusses user expectations about risk mitigationefforts, and looks at the role of service level agreements (SLA) in mitigating risks.
    关键词:云资源;资源优化;数值不稳定算法
首页  上一页  ...  4308  4309  4310  4311  4312  4313  4314  4315  4316  4317  ...  下一页  尾页  
© 2016 武汉世讯达文化传播有限责任公司 版权所有
客服中心

QQ咨询


点击这里给我发消息 客服员


电话咨询


027-87841330


微信公众号




展开客服