Modern cloud infrastructure: serverless computing

The role of analysis in enterprise management. An overview of the workflow methods used to solve cloud-based enterprise operations management tasks. Substantiation of the relevance of the introduction of cloud technologies based on serverless computing.

Подобные документы

  • Types of knowledge-based systems. Logic, rules and representation. The use of registered names, trademarks in engineering. Expert systems, neural networks, genetic algorithms, case-based reasoning systems and methodologies of intelligent agents.

    книга, добавлен 04.10.2014

  • Features of testing on the usability, functionality and acceptability of an interactive system. Some approaches, based on expert evaluation: review, query techniques, analytic and model-based methods. Principles of choosing ways of measurements.

    презентация, добавлен 28.12.2013

  • Создание нового слоя и применение к нему фильтра Filter > Render > Clouds. Применение фильтра Filter > Distort > Glass с заданными параметрами. Коррекция цветового баланса, подбор подходящего для воды цвета. Трансформирование и перспектива рисунка.

    статья, добавлен 30.08.2012

  • Theoretical foundations of the relativistic paradigm in physics and interactive technologies. An example of a community of interactive computing. Programming tool and tools for computer create physical and electronic worlds in everyday activities.

    презентация, добавлен 28.12.2013

  • Cryptology from the romans to world war II. Word perfect encryption as a modern example. Exchanging keys with and without a public key. Key management and authentication in GSM networks. The end of the crypto-monopoly and the role of politics today.

    книга, добавлен 08.03.2014

  • The technique of drawing up algorithms on elliptic curves, scalar multiplication on Koblitz curves and their effective implementation in reconfigurable devices. The basic architecture and methods for computing scalar multipfication in Hessian form.

    монография, добавлен 08.03.2014

  • Show that computing e-th roots modulo n is easier than factoring n with currently known methods, given subexponential access to an oracle outputting the roots of numbers of the form xi + c. The strategy – a general outline. Polynomial construction.

    курс лекций, добавлен 08.03.2014

  • Exploring the state of foreign experience in the use of modern web technologies at medical libraries and the current state of the information service in Ukrainian medical libraries using Internet technologies. Role of mobile technologies in libraries.

    статья, добавлен 03.02.2018

  • Analysis of affine coordinates for pairing computation. Construction of designated connfirmer signature and its application to optimistic fair exchange. Designing a code generator for pairing based cryptographic functions and efficient constructions.

    книга, добавлен 08.03.2014

  • Варіанти використання хмарних обчислень. Концепція безпеки Microsoft Cloud. Дослідження можливостей хмарних сервісів для виконання програмного рішення "Ідентифікація обличчя за допомогою сервісів AzureFaceAPI". Розуміння, використання орієнтирів обличчя.

    курсовая работа, добавлен 06.07.2018

  • Factors influencing the use of Internet. Question about adoption of the learning management system in schools. The possibility for using computers and Internet for educational purposes. Software application for delivery of learning content to students.

    статья, добавлен 25.10.2016

  • An overview of the most popular approaches to the modeling of automated systems for intelligent monitoring and management of environmental safety in the water sector. Principles of construction of adaptive systems of this class and requirements to them.

    статья, добавлен 30.04.2018

  • Choice relationship database system, a cloud platform and a software platform for implementing and deploying the relational database system, resource and service agents; software module market risk. User interface for outputting the received information.

    курсовая работа, добавлен 12.08.2018

  • Analysis of the extended euclidean algorithm. Analysis of operations in the residue class ring. Structure of the multiplicative group of residues mod a prime number. Symmetric and asymmetric cryptosystems. Compression functions from encryption functions.

    книга, добавлен 08.03.2014

  • Workflow-система для автоматизації бізнес-процесів. Концепції реалізації системи. Максимальна гнучкість workflow, реєстрація відомостей. Скорочення часу прийняття управлінських рішень. Прив'язка до організаційної структури. Контроль виконання доручень.

    практическая работа, добавлен 13.07.2017

  • In the world of sports, modern information technologies are increasingly used to improve the results and training of athletes. Swimming is no exception, and new technologies are revolutionizing this sport. Virtual reality (VR) and virtual simulators.

    статья, добавлен 21.03.2024

  • Comprehensive consideration of the relevance of password use. Analysis of current password statistics, detailed study of methods for hacking accounts. Description of alternative authentication methods and additional steps of multi-factor authentication.

    статья, добавлен 20.03.2024

  • The development and use of new, progressive information technologies based on the widespread use of superproductive and reliable dual-use computer systems and components. Consideration of the problem of the Fourier transform and its application.

    статья, добавлен 01.11.2021

  • The main tasks of artificial intelligence: creation and work in systems of symbolic calculations, systems with fuzzy logic, cognitive psychology, understanding of natural language, creation of expert systems. Its importance in business processes.

    статья, добавлен 17.12.2022

  • Dictionary data structures. Tolerant retrieval: Wildcards, Spell correction, Soundex. Sort-based index construction. Blocked sort-based Indexing (Sorting with fewer disk seeks). Remaining problem with sort-based algorithm. Single-pass in-memory indexing.

    презентация, добавлен 19.02.2014

  • UNIX Memory Management. Sharing of memory segments or regions. Allocating memory in pages. Address space management. Initial Access to Pages. Hardware Translation Tables. Hardware Requirements. Mappings between backing store and address regions.

    презентация, добавлен 03.06.2012

  • In this article the author describes the all functions and features of SCRUM method, its roles (master, owner and team). It is observed the advantages of this methodology before others. The detailed description of SCRUM work is presented in this article.

    статья, добавлен 18.08.2018

  • Общие принципы работы с библиотекой. Создание подклассов класса entity. Создание и анимация заявок. Активные объекты: передача и обработка заявок, работа с содержимым заявки, работа с ресурсами, транспортировка, анимация объектов, транспортные сети.

    учебное пособие, добавлен 09.09.2012

  • The problem of parametric identification of mathematical models of reservoir systems for the porosity and permeability functions of ground rock. A solve the problem based on the gradient projection method with minimization of a squared quality criterion.

    статья, добавлен 28.08.2016

  • Примеры систем для автоматизации управления человеческими ресурсами и управления персоналом: система ETWeb™ Enterprise, системы Босс-Кадровик и "МОТИВ", контур полноценной ERP-системы "Галактика", Персонал Система, HRM система "АиТ/Управление персоналом".

    реферат, добавлен 17.06.2009

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.