Analysis of cloud computing segment in Russia
Characteristics of the segment of cloud technologies in Russia, an analysis of their advantages and disadvantages. The main types of cloud services models, the problems of their use (confidentiality, security). Preferences of using clouds in Russia.
Подобные документы
Аналоговый и импульсный сигналы (преимущества и недостатки). Позиционная запись чисел. Расчет количества кодов. Технология cloud computing. Структура хранения данных на жестких дисках. Современные поисковые системы. Шифрование и стеганография данных.
шпаргалка, добавлен 06.12.2013- 27. Study of two 3D face representation algorithms using range image and curvature-based representations
The analysis of algorithms for image representation to recognition of 3D face scans with the presence of facial expressions. The input point cloud based on curvature analysis and range image representation to achieve a representation of the face features.
статья, добавлен 23.06.2016 Создание нового слоя и применение к нему фильтра Filter > Render > Clouds. Применение фильтра Filter > Distort > Glass с заданными параметрами. Коррекция цветового баланса, подбор подходящего для воды цвета. Трансформирование и перспектива рисунка.
статья, добавлен 30.08.2012Analysis of the features of teaching communication technologies, directions of application of information and communication technologies in the educational process, the purpose of modern technologies, the main advantages of the introduction of ICT.
статья, добавлен 22.07.2022The advantages and disadvantages of PHP web development using Core PHP and PHP frameworks. Security and performance are investigated. The recommendations on using both approaches. The structure of application and key development things are highlighted.
статья, добавлен 10.10.2023Using Duraton-Overman test to study detailed location patterns of the forestry and agricultural industry in Russia. Data analysis package. The first article on geocoding. Methods for measuring localization. Distance-based localization measurement.
курсовая работа, добавлен 11.02.2017Сущность понятия "облачные технологии" и возможности облачных вычислений. Общая характеристика услуг, предоставляемых облачными системами. Особенности публичных, частных и гибридных облаков. Решения, сервисы и программы на рынке Cloud technologies.
реферат, добавлен 25.05.2015The article deals with problems of a different nature that arise in any type of business activity with insufficient attention to the removal or concealment of the information contained in the metadata of various documents. Various types of documents.
статья, добавлен 16.01.2024A practical guide to using encryption technology to ensure confidentiality, security and integrity of your most valuable assets - its data. The analysis of the basic fundamentals of cryptography and its techniques for dealing with electronic security.
книга, добавлен 08.03.2014A new approach to computer security. Building a unified binary analysis platform and using it to provide novel solutions. Providing an extensible architecture. Combining static and dynamic analysis in program. Properties from binary programs BitBlaze.
статья, добавлен 15.04.2014Development and implementation of new technologies in banking services. The ability to improve the existing anti-fraud model used in real banking practice. Clusters and their impact on the assessment of the existing anti-fraud model. Data Chart Analysis.
дипломная работа, добавлен 10.12.2019Android operating system security. Analysis and processing of personal data. Ways to overcome security protection. Analysis of existing systems determines the level of danger. Encryption with a public-key. Structure, components of Android applications.
диссертация, добавлен 27.01.2015- 38. National cyber security system of Ukraine: perspectives of policy development and capacity building
The main need is to build a national cybersecurity system that will allow Ukraine to counter current cyber threats to its security, stability and prosperity. Characteristics of identifying the main problems that hinder the further development of NCSS.
статья, добавлен 03.12.2020 Public key encryption and digital signature security definitions. Composable symbolic analysis for public key encryption. Ideal functionality formulations. Redefining ideal functionalities. Adding signatures to universally composable symbolic analysis.
учебное пособие, добавлен 15.09.2012The search for patterns that are the basis for making effective managerial and technological decisions. Application of innovative technologies for the preparation, processing, analysis and analytics of extremely large arrays of heterogeneous data.
статья, добавлен 24.06.2024- 41. RSA Labs FAQ 4.0
Some of the more popular techniques in cryptography. The advantages and disadvantages of public-key cryptography compared with secret-key cryptography. Digital signature applications exportable from the United States. Proactive security techniques.
книга, добавлен 08.03.2014 Modelling Rich Interaction: status–event analysis, sensor-based systems, rich environments in task analysis. Screen-button – HIT, MISS, widget. GTA - conceptual framework, tools, elicitation techniques. The main functions placeholders, its types.
презентация, добавлен 28.12.2013Identification of retail market trends, values, and key performance indicators. Technology driven revolutions in retail business models. Existing techniques in technology assessment research. IoT in retail national level approach: the case of Russia.
диссертация, добавлен 30.09.2016Машинне навчання або Machine learning, покликане давати макшмально точні прогнози на пiдcтавi вступних даних, щоб власники бізнесів, маркетологи і співробітники могли приймати правильні рішення в cвоїй роботі. Google Cloud Vertex AI, її можливості.
статья, добавлен 07.09.2024Consideration of new forms of binary representations of Boolean functions. Analysis of single algebraic and non-inverting classic models of the Reed-Muller. Using technology "EDM - Extended Data Mining". Characteristics of main data mining algorithms.
статья, добавлен 14.07.2016The article analyzes the application of information technologies to the analysis of the stock market, namely to the study of the dynamics of the Ukrainian currency exchange rate, which will allow us to draw a conclusion about the market as a whole.
статья, добавлен 25.11.2023Micali-Reyzin computational model. Target circuit and block cipher. Analysis of single point leakages. Towards the analysis of real constructions. Definition of security against side-channel attacks. The initialize a PRNG securely with a public seed.
статья, добавлен 15.09.2012Cryptanalysis of countermeasures proposed for repairing. Security analysis of the gennaro-halevi-rabin signature scheme. Authenticated key exchange secure against dictionary attacks. The modern security aspects of practical quantum cryptography.
курс лекций, добавлен 08.03.2014The main features and functions of the service Google Docs. Characteristics of the use of this service for teaching computer science to future teachers of mathematics in order to solve information problems. Analysis of the use of the student service.
статья, добавлен 05.04.2019Варіанти використання хмарних обчислень. Концепція безпеки Microsoft Cloud. Дослідження можливостей хмарних сервісів для виконання програмного рішення "Ідентифікація обличчя за допомогою сервісів AzureFaceAPI". Розуміння, використання орієнтирів обличчя.
курсовая работа, добавлен 06.07.2018