Modern cloud infrastructure: serverless computing

The role of analysis in enterprise management. An overview of the workflow methods used to solve cloud-based enterprise operations management tasks. Substantiation of the relevance of the introduction of cloud technologies based on serverless computing.

Подобные документы

  • The study of accidents and disasters involving a variety of critical infrastructures, assessment of the level of fault tolerance software management systems. The calculation method based optimization of software testing management system infrastructure.

    статья, добавлен 28.02.2016

  • Аналіз моделі надання сервісів на основі методу адаптації логічної структури cloud-системи при міграції віртуальних машин. Оцінка стійкості структури у площині надання сервісу з врахуванням фізичних та апаратних ресурсів сервера. Затримка надання сервісу.

    статья, добавлен 28.02.2017

  • The terms of the security of critical infrastructure. Construction and characterization of a model of security management of critical infrastructure, allowing you to easily determine how the criticality of certain infrastructure, General infrastructure.

    статья, добавлен 28.02.2016

  • Defining the content of the national context for the study of digital marketing management issues. Bibliometric analysis of scientometric databases. Quantitative analysis, relevance of scientific resources, relevance of authors, relevance of affiliation.

    статья, добавлен 12.05.2024

  • Ubiquitous computing - filling the real world with computers. Challenging HCI Assumptions. Implications for device size as well as relationship to people. Defining the Interaction Experience. Multi-scale and distributed output. Merging Digital Worlds.

    презентация, добавлен 28.12.2013

  • To develop an extension to a traditional RDF model of describing knowledge graph in accordance with the standards of the Semantic Web. The concept of Executable Knowledge for Protege based on traditional types of properties within the RDF model.

    статья, добавлен 29.01.2016

  • The security challenges of ubiquitous computing. The study side channel attack methodology. Hardware to solve sparse systems of linear equations over. Symmetric ciphers: side channel attacks and countermeasures. Attacks on asymmetric cryptosystems.

    курс лекций, добавлен 08.03.2014

  • Analysis of the features of teaching communication technologies, directions of application of information and communication technologies in the educational process, the purpose of modern technologies, the main advantages of the introduction of ICT.

    статья, добавлен 22.07.2022

  • Implementation of cloud storage on the Internet. New types of Internet security and ways to prevent hacker attacks. Methods of legal regulation of information security practices. Application of the methods of active defense. Combating cybercrime.

    статья, добавлен 18.02.2015

  • Text description of the main processes running in the dealer. Overview of Incadea enterprise software solutions at the global automotive retail market. Analysis of the information system correspondence to existed business-processes in the company.

    реферат, добавлен 20.03.2016

  • Human Insulin, PDB entry 1AIO. Image produced with PDB Structure Explorer, which is based on MolScript. Virus structure, superimposed over its PDB summary information. Image produced with PDB Structure Explorer, which is based on MolScript and Raster3D.

    учебное пособие, добавлен 25.11.2013

  • Способ получения конкурентных преимуществ за счет увеличения скорости обработки больших объемов данных при помощи технологии in-memory computing. Роль инновационной технологии в создании конкурентного преимущества для фирмы в борьбе с оппонентами.

    статья, добавлен 18.03.2018

  • This history on key moments of evolution electronic digital computer: the transformation of the computer from a specialized scientific instrument to a commercial product; the beginning of personal computing and the spread of networking after 1980s.

    книга, добавлен 25.11.2013

  • Information technologies for working with knowledge bases are considered, and a description of the concepts of Knowledge Management and "Business Intelligence" is given. The classification of knowledge is given. according to different categories of signs.

    статья, добавлен 04.09.2022

  • The application of NBIC technologies, combining ideas of nano-, bio-, information and communication technologies and robotics. Prospects of using these technologies in the management of production processes, interaction between the state and society.

    статья, добавлен 31.05.2021

  • Сущность понятия "облачные технологии" и возможности облачных вычислений. Общая характеристика услуг, предоставляемых облачными системами. Особенности публичных, частных и гибридных облаков. Решения, сервисы и программы на рынке Cloud technologies.

    реферат, добавлен 25.05.2015

  • Development of a new algorithm for registration of remote sensing images based on landmarks. Mathematical model of elementary and flat objects of the image based on contour analysis. An solution that allows you to analyze a specific image object.

    статья, добавлен 27.05.2021

  • The problem of constructing a system of operational dispatch management for agricultural enterprises. The choice of the functionality of the control plane, allowing to minimize the losses due to delays and poor implementation of the Executive plan.

    статья, добавлен 25.12.2016

  • Factoring and discrete logarithm. One-way trapdoor permutations are sufficient for non-trivial single-server private information retrieval. Authenticate key exchange secure against dictionary attacks. Computing inverses over a shared secret modulus.

    курс лекций, добавлен 08.03.2014

  • The article reviews the contemporary land information systems of land management. The current problems of information support for land management are identified. Suggestions how to improve the information systems using technologies are presented.

    статья, добавлен 28.09.2016

  • Требования к enterprise-приложениям: надежность, производительность и масштабируемость, поддерживаемость и расширяемость, разработка в заданные сроки, повторное использование компонентов, переносимость. Двухуровневая архитектура "клиент-сервер".

    лекция, добавлен 11.05.2014

  • The methods of image segmentation, a process of division of an image into different segments which contain pixels of similar color, are considered. Graph-based segmentation algorithm, which is based on Kruskal’s algorithm is implemented in C++ language.

    статья, добавлен 23.02.2016

  • Interaction in agent-oriented systems. Separation of sets of agents into families in accordance with the tasks of the stages of situational management. Development of the model for the integration of behavioral and coordination aspects in agents.

    статья, добавлен 28.09.2016

  • Comparison of several common approaches to the analysis of system logs and streaming data generated en masse by the company's IT infrastructure. Characteristics of model-based anomaly search algorithms and hierarchical temporary memory algorithms.

    статья, добавлен 28.05.2021

  • New cross-layer scheduling algorithm to quality of service. The modern methods for improving bit error and throughput program for the management of resources. The assessment of service quality, modulation and coding scheme in the resource block.

    статья, добавлен 26.06.2016

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.