Modern cloud infrastructure: serverless computing
The role of analysis in enterprise management. An overview of the workflow methods used to solve cloud-based enterprise operations management tasks. Substantiation of the relevance of the introduction of cloud technologies based on serverless computing.
Подобные документы
- 26. ???????? ???????????? ???????? ??????????. ?????? ??????? ?????? ??????? ?? Cloud Security Alliance
?????? ????????? ????? ???????????? ????? ???????? ??????????. ????? ?? ???????? ?????? ? ??????? ?? ?? ??????????. ????????? ??????? ?? ?????? ?? ????? ???????????? ??????? ?? ???????? Cloud Security Alliance ? ?????? ?? ???????????? ?????????????.
??????, добавлен 01.11.2018 The study of accidents and disasters involving a variety of critical infrastructures, assessment of the level of fault tolerance software management systems. The calculation method based optimization of software testing management system infrastructure.
??????, добавлен 28.02.2016?????? ?????? ??????? ???????? ?? ?????? ?????? ????????? ???????? ????????? cloud-??????? ??? ???????? ??????????? ?????. ?????? ????????? ????????? ? ??????? ??????? ??????? ? ??????????? ???????? ?? ????????? ???????? ???????. ???????? ??????? ???????.
??????, добавлен 28.02.2017The terms of the security of critical infrastructure. Construction and characterization of a model of security management of critical infrastructure, allowing you to easily determine how the criticality of certain infrastructure, General infrastructure.
??????, добавлен 28.02.2016Ubiquitous computing - filling the real world with computers. Challenging HCI Assumptions. Implications for device size as well as relationship to people. Defining the Interaction Experience. Multi-scale and distributed output. Merging Digital Worlds.
???????????, добавлен 28.12.2013Defining the content of the national context for the study of digital marketing management issues. Bibliometric analysis of scientometric databases. Quantitative analysis, relevance of scientific resources, relevance of authors, relevance of affiliation.
??????, добавлен 12.05.2024To develop an extension to a traditional RDF model of describing knowledge graph in accordance with the standards of the Semantic Web. The concept of Executable Knowledge for Protege based on traditional types of properties within the RDF model.
??????, добавлен 29.01.2016The security challenges of ubiquitous computing. The study side channel attack methodology. Hardware to solve sparse systems of linear equations over. Symmetric ciphers: side channel attacks and countermeasures. Attacks on asymmetric cryptosystems.
???? ??????, добавлен 08.03.2014Analysis of the features of teaching communication technologies, directions of application of information and communication technologies in the educational process, the purpose of modern technologies, the main advantages of the introduction of ICT.
??????, добавлен 22.07.2022Implementation of cloud storage on the Internet. New types of Internet security and ways to prevent hacker attacks. Methods of legal regulation of information security practices. Application of the methods of active defense. Combating cybercrime.
??????, добавлен 18.02.2015Text description of the main processes running in the dealer. Overview of Incadea enterprise software solutions at the global automotive retail market. Analysis of the information system correspondence to existed business-processes in the company.
???????, добавлен 20.03.2016Human Insulin, PDB entry 1AIO. Image produced with PDB Structure Explorer, which is based on MolScript. Virus structure, superimposed over its PDB summary information. Image produced with PDB Structure Explorer, which is based on MolScript and Raster3D.
??????? ???????, добавлен 25.11.2013?????? ????????? ???????????? ??????????? ?? ???? ?????????? ???????? ????????? ??????? ??????? ?????? ??? ?????? ?????????? in-memory computing. ???? ????????????? ?????????? ? ???????? ????????????? ???????????? ??? ????? ? ?????? ? ???????????.
??????, добавлен 18.03.2018This history on key moments of evolution electronic digital computer: the transformation of the computer from a specialized scientific instrument to a commercial product; the beginning of personal computing and the spread of networking after 1980s.
?????, добавлен 25.11.2013Information technologies for working with knowledge bases are considered, and a description of the concepts of Knowledge Management and "Business Intelligence" is given. The classification of knowledge is given. according to different categories of signs.
??????, добавлен 04.09.2022The application of NBIC technologies, combining ideas of nano-, bio-, information and communication technologies and robotics. Prospects of using these technologies in the management of production processes, interaction between the state and society.
??????, добавлен 31.05.2021???????? ??????? "???????? ??????????" ? ??????????? ???????? ??????????. ????? ?????????????? ?????, ??????????????? ????????? ?????????. ??????????? ?????????, ??????? ? ????????? ???????. ???????, ??????? ? ????????? ?? ????? Cloud technologies.
???????, добавлен 25.05.2015Development of a new algorithm for registration of remote sensing images based on landmarks. Mathematical model of elementary and flat objects of the image based on contour analysis. An solution that allows you to analyze a specific image object.
??????, добавлен 27.05.2021The problem of constructing a system of operational dispatch management for agricultural enterprises. The choice of the functionality of the control plane, allowing to minimize the losses due to delays and poor implementation of the Executive plan.
??????, добавлен 25.12.2016Factoring and discrete logarithm. One-way trapdoor permutations are sufficient for non-trivial single-server private information retrieval. Authenticate key exchange secure against dictionary attacks. Computing inverses over a shared secret modulus.
???? ??????, добавлен 08.03.2014The article reviews the contemporary land information systems of land management. The current problems of information support for land management are identified. Suggestions how to improve the information systems using technologies are presented.
??????, добавлен 28.09.2016?????????? ? enterprise-???????????: ??????????, ?????????????????? ? ????????????????, ???????????????? ? ?????????????, ?????????? ? ???????? ?????, ????????? ????????????? ???????????, ?????????????. ????????????? ??????????? "??????-??????".
??????, добавлен 11.05.2014Interaction in agent-oriented systems. Separation of sets of agents into families in accordance with the tasks of the stages of situational management. Development of the model for the integration of behavioral and coordination aspects in agents.
??????, добавлен 28.09.2016The methods of image segmentation, a process of division of an image into different segments which contain pixels of similar color, are considered. Graph-based segmentation algorithm, which is based on Kruskal’s algorithm is implemented in C++ language.
??????, добавлен 23.02.2016Comparison of several common approaches to the analysis of system logs and streaming data generated en masse by the company's IT infrastructure. Characteristics of model-based anomaly search algorithms and hierarchical temporary memory algorithms.
??????, добавлен 28.05.2021