Analysis of cloud computing segment in Russia
Characteristics of the segment of cloud technologies in Russia, an analysis of their advantages and disadvantages. The main types of cloud services models, the problems of their use (confidentiality, security). Preferences of using clouds in Russia.
Подобные документы
?????? ?????? ??????? ???????? ?? ?????? ?????? ????????? ???????? ????????? cloud-??????? ??? ???????? ??????????? ?????. ?????? ????????? ????????? ? ??????? ??????? ??????? ? ??????????? ???????? ?? ????????? ???????? ???????. ???????? ??????? ???????.
??????, добавлен 28.02.2017Information system research in historic perspective. Research scope on digital transformation. Depicting countries for software trade comparison analysis. Digital transformation conditions in Russia. Japanese school in information system research field.
???????????, добавлен 01.09.2018?????????? ? ?????????? ??????? (???????????? ? ??????????). ??????????? ?????? ?????. ?????? ?????????? ?????. ?????????? cloud computing. ????????? ???????? ?????? ?? ??????? ??????. ??????????? ????????? ???????. ?????????? ? ????????????? ??????.
?????????, добавлен 06.12.2013- 29. Study of two 3D face representation algorithms using range image and curvature-based representations
The analysis of algorithms for image representation to recognition of 3D face scans with the presence of facial expressions. The input point cloud based on curvature analysis and range image representation to achieve a representation of the face features.
??????, добавлен 23.06.2016 ???????? ?????? ???? ? ?????????? ? ???? ??????? Filter > Render > Clouds. ?????????? ??????? Filter > Distort > Glass ? ????????? ???????????. ????????? ????????? ???????, ?????? ??????????? ??? ???? ?????. ????????????????? ? ??????????? ???????.
??????, добавлен 30.08.2012Analysis of the features of teaching communication technologies, directions of application of information and communication technologies in the educational process, the purpose of modern technologies, the main advantages of the introduction of ICT.
??????, добавлен 22.07.2022The advantages and disadvantages of PHP web development using Core PHP and PHP frameworks. Security and performance are investigated. The recommendations on using both approaches. The structure of application and key development things are highlighted.
??????, добавлен 10.10.2023Using Duraton-Overman test to study detailed location patterns of the forestry and agricultural industry in Russia. Data analysis package. The first article on geocoding. Methods for measuring localization. Distance-based localization measurement.
???????? ??????, добавлен 11.02.2017???????? ??????? "???????? ??????????" ? ??????????? ???????? ??????????. ????? ?????????????? ?????, ??????????????? ????????? ?????????. ??????????? ?????????, ??????? ? ????????? ???????. ???????, ??????? ? ????????? ?? ????? Cloud technologies.
???????, добавлен 25.05.2015The article deals with problems of a different nature that arise in any type of business activity with insufficient attention to the removal or concealment of the information contained in the metadata of various documents. Various types of documents.
??????, добавлен 16.01.2024A practical guide to using encryption technology to ensure confidentiality, security and integrity of your most valuable assets - its data. The analysis of the basic fundamentals of cryptography and its techniques for dealing with electronic security.
?????, добавлен 08.03.2014A new approach to computer security. Building a unified binary analysis platform and using it to provide novel solutions. Providing an extensible architecture. Combining static and dynamic analysis in program. Properties from binary programs BitBlaze.
??????, добавлен 15.04.2014Development and implementation of new technologies in banking services. The ability to improve the existing anti-fraud model used in real banking practice. Clusters and their impact on the assessment of the existing anti-fraud model. Data Chart Analysis.
????????? ??????, добавлен 10.12.2019Android operating system security. Analysis and processing of personal data. Ways to overcome security protection. Analysis of existing systems determines the level of danger. Encryption with a public-key. Structure, components of Android applications.
???????????, добавлен 27.01.2015- 40. National cyber security system of Ukraine: perspectives of policy development and capacity building
The main need is to build a national cybersecurity system that will allow Ukraine to counter current cyber threats to its security, stability and prosperity. Characteristics of identifying the main problems that hinder the further development of NCSS.
??????, добавлен 03.12.2020 Development of digital technologies in the protection of applications and information. A comparative analysis of the influence of the choice of the direction of the development of cybersecurity. Recommendations for implementing technology development.
??????, добавлен 09.12.2024Public key encryption and digital signature security definitions. Composable symbolic analysis for public key encryption. Ideal functionality formulations. Redefining ideal functionalities. Adding signatures to universally composable symbolic analysis.
??????? ???????, добавлен 15.09.2012The search for patterns that are the basis for making effective managerial and technological decisions. Application of innovative technologies for the preparation, processing, analysis and analytics of extremely large arrays of heterogeneous data.
??????, добавлен 24.06.2024- 44. RSA Labs FAQ 4.0
Some of the more popular techniques in cryptography. The advantages and disadvantages of public-key cryptography compared with secret-key cryptography. Digital signature applications exportable from the United States. Proactive security techniques.
?????, добавлен 08.03.2014 Modelling Rich Interaction: status–event analysis, sensor-based systems, rich environments in task analysis. Screen-button – HIT, MISS, widget. GTA - conceptual framework, tools, elicitation techniques. The main functions placeholders, its types.
???????????, добавлен 28.12.2013Identification of retail market trends, values, and key performance indicators. Technology driven revolutions in retail business models. Existing techniques in technology assessment research. IoT in retail national level approach: the case of Russia.
???????????, добавлен 30.09.2016??????? ???????? ??? Machine learning, ????????? ?????? ?????????? ????? ???????? ?? ?i?c???i ???????? ?????, ??? ???????? ????????, ??????????? ? ????????????? ????? ???????? ????????? ??????? ? c???? ??????. Google Cloud Vertex AI, ?? ??????????.
??????, добавлен 07.09.2024Consideration of new forms of binary representations of Boolean functions. Analysis of single algebraic and non-inverting classic models of the Reed-Muller. Using technology "EDM - Extended Data Mining". Characteristics of main data mining algorithms.
??????, добавлен 14.07.2016The article analyzes the application of information technologies to the analysis of the stock market, namely to the study of the dynamics of the Ukrainian currency exchange rate, which will allow us to draw a conclusion about the market as a whole.
??????, добавлен 25.11.2023Micali-Reyzin computational model. Target circuit and block cipher. Analysis of single point leakages. Towards the analysis of real constructions. Definition of security against side-channel attacks. The initialize a PRNG securely with a public seed.
??????, добавлен 15.09.2012
