-
43261.告诉我我不知道的——充分利用社会健康论坛
[信息传输、软件和信息技术服务业] [2013-12-05]
We describe a novel approach to helping patients learn about their condition using social health forums. We infer a patient's condition based on her clinical data, and assign her to a clinical state pertaining to that condition. Our system presents the patient with forum posts that are most relevant to her current state. By adjusting a LikeMe dial, the patient can modify the results from those that are most popular with patients in the same condition to the most general that apply to patients that map to other states for the condition. The posts are ranked in order of importance to the patient condition and the dial settings and the Top-N results are shown to the patient. The initial rankings of posts for different states are obtained by weights assigned by a medical expert. The patients can also give feedback with a LIKE or a DISLIKE button on whether the post is useful to them. This is incorporated into our method to dynamically change the initial weights. As the system is used in practice the initial rankings are subsumed by the feedback provided by users of the system. Our approach is general but we give results in the context of a diabetes social health forum. The algorithms are given along with preliminary results and an illustration of the user interface. We view this effort as a component of a larger patient navigation and engagement system that can help patients gain a better understanding of their condition.
关键词:态势感知;医疗保健应用程序;反馈归入制度
-
43262.一种基于云的工艺设备环境的安全策略
[信息传输、软件和信息技术服务业] [2013-12-05]
Back in the day, you could bring your personal Blackberry to work in order to access aSoftware as a Service (SaaS) application (if you were in a large building with good cellularreception). Now, you have many device choices for accessing the cloud, from iOs-basedphones and tablets, Android handhelds, to Research In Motion's (RIM) PlayBook. All comewith opportunities for jailbreaking, or gaining root access, by breaking down security to installbanned third-party applications. An infected bring your own device (BYOD) connected to thecorporate network is another security concern. A war walker could steal corporate data byuploading from your BYOD to a personal device. Learn to protect corporate assets with asecurity policy for a cloud-based BYOD environment.
关键词:战争散步;系留设备的安全;圈养的政策决定;信息安全;云计算
-
43263.SQL到Hadoop和回来,第3部分:直接传输和实时数据交换
[信息传输、软件和信息技术服务业] [2013-12-05]
Big data is a term that has been used regularly now for almost a decade, and it — alongwith technologies like NoSQL — are seen as the replacements for the long-successfulRDBMS solutions that use SQL. Today, DB2?, Oracle, Microsoft? SQL Server MySQL, andPostgreSQL dominate the SQL space and still make up a considerable proportion of the overallmarket. In this final article of the series, we will look at more automated solutions for migratingdata to and from Hadoop. In the previous articles, we concentrated on methods that takeexports or otherwise formatted and extracted data from your SQL source, load that into Hadoopin some way, then process or parse it. But if you want to analyze big data, you probably don'twant to wait while exporting the data. Here, we're going to look at some methods and tools thatenable a live transfer of data between your SQL and Hadoop environments.
关键词:直接传输;数据交换;实时;大数据
-
43264.在压缩虚拟机检查点中的权衡
[信息传输、软件和信息技术服务业] [2013-12-05]
Checkpoint replication is a prevalent way of maintaining virtual machine availability in the presence of host failures. Since checkpoint replication can impose heavy load on network resources, checkpoint compression has been suggested to reduce network usage. This paper presents the first detailed evaluation and characterization of the effectiveness and overheads of checkpoint compression methods for various workloads frequently seen in high-availability systems. We propose a lightweight compression method that exploits similarities in checkpoints to eliminate redundant network traffic, and compare it with two well-known methods, gzip and delta compression. Our results show that gzip and delta compression reduce network traffic significantly for various workloads, but incur high CPU and memory overheads, respectively. The proposed similarity compression is most effective for VM clusters running homogeneous workloads, while using both CPU and memory efficiently. Based on our extensive evaluation, we suggest guidelines for selecting and using these compression methods.
关键词:检查点;云服务;故障恢复;效率;可伸缩性
-
43265.捕捉住Windows在IBM云智能企业实例
[信息传输、软件和信息技术服务业] [2013-12-05]
Learn how to successfully capture a running Windows instance to a private catalog in theIBM? SmartCloud? Enterprise environment. Additionally, the authors describe common issuesthat arise during the process and how to troubleshoot them.You have a base IBM SmartCloud Enterprise Windows 2008 instance up and configured exactlythe way you want it and then you decide you need to provision a new instance from this state.Perhaps you want to run multiple instances of your solution, update software to a reference level,or simply want a new golden image to start from. This article guides you through the standardcapture process for a typical SmartCloud Enterprise Windows 2008 instance and points out somepossible stumbling blocks that you might encounter along the way.
关键词:互联网同步时间;捕捉脚本;故障排除
-
43266.SQL到Hadoop和回来,第2部分:LeveragingHBase和Hive
[信息传输、软件和信息技术服务业] [2013-12-05]
"Big data" is a term that has been used regularly now for almost a decade, and it — alongwith technologies like NoSQL — are seen as the replacements for the long-successfulRDBMS solutions that use SQL. Today, DB2?, Oracle, Microsoft? SQL Server MySQL, andPostgreSQL dominate the SQL space and still make up a considerable proportion of the overallmarket. Here in Part 2, we will concentrate on how to use HBase and Hive for exchanging datawith your SQL data stores. From the outside, the two systems seem to be largely similar, butthe systems have very different goals and aims. Let's start by looking at how the two systemsdiffer and how we can take advantage of that in our big data requirements.
关键词:数据存储;交换;空间;大数据
-
43267.关于Hadoop的Oozie工作流调度程序
[信息传输、软件和信息技术服务业] [2013-12-05]
Big data in its raw form rarely satisfies the Hadoop developer's data requirements forperforming data processing tasks. Different extract/transform/load (ETL) and pre-processingoperations are usually needed before starting any actual processing jobs. Oozie is a frameworkthat helps automate this process and codify this work into repeatable units or workflows thatcan be reused over time without the need to write any new code or steps. Learn how Oozie canbe used to create different types of workflows.
关键词:数据处理;自动化;一致性
-
43268.在三维空间区域的快速探路响应功率计算
[信息传输、软件和信息技术服务业] [2013-12-05]
We consider the set of continuous-time1 audio signals {s1(t), s2(t), . . . , sM(t)} corresponding to M different microphones, and the problem of finding the location of a sound source in a three-dimensional space, identified by a coordinate vector x = (x, y, z). In the general case we can consider that signals si(t) had been prefiltered to improve performance.
关键词:体积积分;分支定界;三维空间
-
43269.多功能环境监测的光纤纳米传感器
[水利、环境和公共设施管理业,信息传输、软件和信息技术服务业] [2013-12-04]
In conclusion, in this chapter, we have reviewed the development of high-performance fiber nanosensors for environmental monitoring applications, realized by the combination of advanced nanostructured coatings based on SWCNTs with the optical fiber technology.In particular, the chapter starts with a wide review of the state of the art of carbon nanotube-based sensors for environmental monitoring, followed by a description of the operating principle of the fiberoptic nanosensors in the FP-type reflectometric configuration.
关键词:环境监测;传感器;应用程序
-
43270.避免云滥用的风险
[信息传输、软件和信息技术服务业] [2013-12-04]
Cloud abuse is among the top threats experts expect to see in 2013; one avenue that abusecan take is when cybercriminals use social media vehicles to abuse cloud environments —such as SaaS-oriented user access through accepted BYOD channels or PaaS-orientedaccess via Twitter interchanges used by a development team to communicate cloudadministration updates. As this author has discussed before, many organizations employ areactive response when the breach occurs instead of taking more prudent proactive steps.Join the author as she provides a roadmap for abuse mitigation and illustrates what proactiveactions can be taken when abuse occurs.
关键词:孤岛模式;云攻击;云滥用