Modern cloud infrastructure: serverless computing
The role of analysis in enterprise management. An overview of the workflow methods used to solve cloud-based enterprise operations management tasks. Substantiation of the relevance of the introduction of cloud technologies based on serverless computing.
Подобные документы
In primary order to satisfy the users' requirements for the productivity and efficiency of tasks implementation the grid-system should implement the effective algorithm of tasks distribution between the computing resources accessible at the moment.
статья, добавлен 07.12.2016Computing the Cassels pairing classes in Tate group. The calculation of the pairing on twisted Edwards in the form of elliptic curves. Control malicious proxy re-encryption. Security and anonymity-based encryption with trusted certification authorities.
материалы конференции, добавлен 08.03.2014The terminology and requirements for safe, reliable operation of critical IT infrastructure were defined. The generalized structure of critical information technology infrastructure, by its basic level, sub levels and functionality were described.
статья, добавлен 07.12.2016A computer based decision support system is proposed the basic tasks of which are adaptive model constructing of financial processes. The system is developed with the use of system analysis principles, forming alternatives for models and forecasts.
статья, добавлен 20.01.2017Назначение НРС-систем (High Performance Computing). Возможность полного упразднения межпроцессорного обмена в сетях между узлами, имеющими непосредственную связь. Оптимизация использования сетевых технологий обмена. Маршруты передачи информации.
статья, добавлен 14.09.2016Joint fingerprinting and decryption of broadcast messages. An estimation attack on content-based video fingerprinting. Statistics- and spatiality-based feature distance measure for error resilient image authentication. Analysis based on quartic equation.
курс лекций, добавлен 08.03.2014Machine learning is a set of algorithms and tools that help machines understand hidden patterns in data and exploit the structure and substance of those hidden patterns. The history of the emergence of architectures of increased computing power.
статья, добавлен 24.02.2024Analysis of developing classification task based on structural connectomes. Custom metrics based on random walk logarithms. Performance metric and hyperparameters grid search. Results obtained for this functional connectivity based parcellation scheme.
дипломная работа, добавлен 27.08.2016Возможности программного обеспечения Staffcop Enterprise: обнаружение утечек информации, учет рабочего времени, администрирование рабочих мест. Установка программного продукта. Выявление нарушений политики безопасности при помощи Staffcop Enterprise.
отчет по практике, добавлен 09.07.2019Reported from a basic introduction to block cipher design and analysis. The tiny encryption algorithm. The study a concepts and design principles of block ciphers. Notation some binary operations of addition. Modern block cipher cryptanalysis methods.
статья, добавлен 08.03.2014Philosophy of Agile-management 3.0 as a factor in the development of technological progress in the context of a digital society. The concept of Agile management 3.0, its role in the preparation of a coach. The evolution of platforms in the service sector.
статья, добавлен 08.04.2022Using Duraton-Overman test to study detailed location patterns of the forestry and agricultural industry in Russia. Data analysis package. The first article on geocoding. Methods for measuring localization. Distance-based localization measurement.
курсовая работа, добавлен 11.02.2017Ролевая система как набор правил в играх (настольных, компьютерных), отвечающий за способности персонажей и исход того или иного действия. Спецификации классов и их назначение, диаграммы классов. Прототип кода, сгенерированный в Enterprise architect.
контрольная работа, добавлен 16.10.2017In the article efficiency of DCT-based filters for a wide-class of images is investigated. The study is carried out for additive white Gaussian noise (AWGN) case with several intensity levels. Local DCT-based filter is used as basic denoising technique.
статья, добавлен 07.12.2016Major machine translation methods designed to speed up the process of multilingual text translation by using a computer software. Analysis of the performance of rule-based machine translation, statistical models, hybrid and neural machine translation.
статья, добавлен 16.08.2022- 66. Methods of traffic regulation and user reputation handling in the bittorrent peer-to-peer Networks
Methods for regulating traffic and handling user reputation in the context of BitTorrent networks. An overview of various methods for calculating user reputation in networks and methods for differentiating the quality of service based on them.
статья, добавлен 03.12.2020 Research and analysis of ways to solve the problem of reducing the expressions obtained in solving the naval system. Structure of Stokes equations. Development and analysis of an equivalent reduction algorithm based on the theory of chain fractions.
статья, добавлен 22.12.2016Development and implementation of new technologies in banking services. The ability to improve the existing anti-fraud model used in real banking practice. Clusters and their impact on the assessment of the existing anti-fraud model. Data Chart Analysis.
дипломная работа, добавлен 10.12.2019Review digital communication and traditional computer-based technologies. The European Telecommunications Standards Institute. Computer and network hardware and software. Features of use of information and communication technologies in modern society.
презентация, добавлен 06.02.2017Обеспечение функционального покрытия бизнес-требований на сервисно-ориентированной архитектуре. Изучение парадигмы построения корпоративных информационных систем по технологии in-memory data management. Продвижение продуктов по программе импортозамещения.
доклад, добавлен 13.07.2017- 71. Methods of traffic regulation and user reputation handling in the bittorrent peer-to-peer networks
Examining various methods of traffic throttling and user reputation handling in the context of Bittorrent networks. An overview of the main methods for calculating user reputation and ways to differentiate the quality of services based on them.
статья, добавлен 27.05.2021 Управление продолжительностью ИТ-проекта как один из методов, благодаря которому вероятность успешного завершения проекта возрастает. Типы программного обеспечения для управления проектами. Microsoft Enterprise Project Management и его обеспечение.
реферат, добавлен 09.11.2016The value of cluster analysis to explain a number of phenomena. Consideration clustering algorithms computational intelligence, particularly based on neural networks and kernel-based learning. Review their application to five's real world problems.
статья, добавлен 08.02.2013- 74. Improving the efficiency of the solution of linear programming tasks applying the CUDA-technology
Methods for improving the efficiency of the solution of large dimensional linear programming tasks based on application of parallel data processing technology – CUDA. The specific features and algorithmic peculiarities of implementing of the program.
статья, добавлен 26.09.2016 Robots as mechanical assistants of a person who are able to perform operations based on the program, embedded in them, and respond to the environment. Acquaintance with the transhumanist significance of robotics. Analysis of the scope of robots.
презентация, добавлен 03.04.2018