Analysis of cloud computing segment in Russia
Characteristics of the segment of cloud technologies in Russia, an analysis of their advantages and disadvantages. The main types of cloud services models, the problems of their use (confidentiality, security). Preferences of using clouds in Russia.
Подобные документы
Structure and functions of the computer. General characteristics and capabilities of the operating system Windows XP, its member programs and functional features. Structure and principles of programming in C ++ Builder IDE, evaluation of results.
курс лекций, добавлен 11.10.2014The security challenges of ubiquitous computing. The study side channel attack methodology. Hardware to solve sparse systems of linear equations over. Symmetric ciphers: side channel attacks and countermeasures. Attacks on asymmetric cryptosystems.
курс лекций, добавлен 08.03.2014The choice of technologies for application development as an stage. The importance of the correct selection of a combination of technologies in ensuring comfortable work in the future at all stages of the program's existence. Scalable technology stack.
статья, добавлен 11.07.2022Analysis of the model of forced exhalation and Fourier transform. Determination of the frequency spectrum of its air volume velocity. Calculation of the error in measuring the process parameters with a spirometer with characteristics in the range 0-15 Hz.
статья, добавлен 30.01.2017The main features of non-traditional social engineering. Characteristics of the main non-traditional design, which involves the formation of a number of new types of activities (involvement of users in design, complex management and project expertise).
статья, добавлен 26.04.2023- 81. Modern trends of cybercrime in the context of economic security, social and humanitarian aspects
The of information technologies were identified, the results of the poll of the respondents on the subject of cybercrime were demonstrated, the ways of combating cybercrime in the of strengthening information and security at the macro-level were proposed.
статья, добавлен 24.10.2018 The detailed description of the existing HRM system in the retail company. The advantages and disadvantages of its components and business intelligence applications. System drawbacks and the main directions for necessary additions and improvements.
реферат, добавлен 20.03.2016Theoretical information on personal computers, the structure of Windows XP as the operating system. Examples of projects in C ++ Builder to calculate complex mathematical formulas and solving problems with the branch. Programming in C ++ Builder.
методичка, добавлен 11.10.2014The value of cluster analysis to explain a number of phenomena. Consideration clustering algorithms computational intelligence, particularly based on neural networks and kernel-based learning. Review their application to five's real world problems.
статья, добавлен 08.02.2013The analises widespread adoption of data-driven business intelligence techniques at the operational, tactical, and strategic levels in the mobile industry, coupled with the integration of user-centric metrics, has brought about a paradigm shift.
статья, добавлен 25.06.2024Computing the Cassels pairing classes in Tate group. The calculation of the pairing on twisted Edwards in the form of elliptic curves. Control malicious proxy re-encryption. Security and anonymity-based encryption with trusted certification authorities.
материалы конференции, добавлен 08.03.2014Machine learning is a set of algorithms and tools that help machines understand hidden patterns in data and exploit the structure and substance of those hidden patterns. The history of the emergence of architectures of increased computing power.
статья, добавлен 24.02.2024Basic Notions of Systems and Signals. State-space Models. Process Modeling for Control Purposes. Input–output Models and Realization Theory. Controllability and Observability of LTI Systems. Stability and The Lyapunov Method. State Feedback Controllers.
учебное пособие, добавлен 25.11.2013Comparison of several common approaches to the analysis of system logs and streaming data generated en masse by the company's IT infrastructure. Characteristics of model-based anomaly search algorithms and hierarchical temporary memory algorithms.
статья, добавлен 28.05.2021Characteristics of information and communication technologies. History of the creation of a computer system. Classification operating system: DOS, Windows, Unix, Linux, Mac OS. Databases management systems: the concept, characteristics, architecture.
курс лекций, добавлен 20.10.2016Description of martial law, compliance conditions. Analysis of regulatory legal acts and judicial practice in the field of information protection under martial law. Features of ensuring information security in Ukraine as a direction of state policy.
статья, добавлен 08.08.2021A wireless sensor network of distributed autonomous sensors to monitor physical or environmental conditions and to cooperatively pass their data through the network. The analysis of models of wireless sensor network with random access is presented.
статья, добавлен 26.08.2016Ubiquitous computing - filling the real world with computers. Challenging HCI Assumptions. Implications for device size as well as relationship to people. Defining the Interaction Experience. Multi-scale and distributed output. Merging Digital Worlds.
презентация, добавлен 28.12.2013Analysis of information technology monitoring and correction of the functional state of students in the process learning created based on developed models, complex criteria classification of constituent states models, algorithms normalized estimates.
статья, добавлен 23.06.2016The Iterative Extraction as extended approach extraction techniques in Principal Component Analysis to other additive data models. Additive models for clustering & similarity data and apply Iterative Extraction for deriving feasible clustering solutions.
учебное пособие, добавлен 08.02.2013Review of Basic Statistics With SPSS. Data Coding and Exploratory Analysis. Selecting and Interpreting Inferential Statistics. Several Measures of Reliability. Exploratory Factor Analysis and Principal Components Analysis. Multiple Linear Regression.
книга, добавлен 09.04.2013Analysis of the prospects for using artificial intelligence technologies in the field of photo processing. Research of modern technologies and AI methods that are used in processing photo materials. Review of areas of AI use in image processing.
статья, добавлен 08.06.2024Application software, the main types of software and operating systems. Ethics and intellectual property rights: when it is possible to copy. Guidelines for creating documents. Characteristics of communication software. Computer terms and their use.
учебное пособие, добавлен 11.10.2014A negligibility-based framework to model network-centric security problems in mobile ad hoc networks. Modeling network-centric security in a negligibility-based framework with network scale as the input parameter and anti-disruption secure routing.
статья, добавлен 15.09.2012An integrated approach to the study of different kinds of virus attacks that are launched against wireless networks and computer systems. Characteristics of certificate programs provide protective mechanisms and practical tools for information security.
книга, добавлен 08.03.2014