Techniques and strategies for handling high traffic
Analysis of various methods and strategies for scaling the fintech API to solve the problems of financial applications. The principles of distributing traffic between multiple servers to improve their performance. Asynchronous data processing methods.
Подобные документы
The classical methods of active identification and adaptation of automatic control systems (ACS) were used. Test of ACS.Transient process which allows to obtain parameters of the object transfer function and calculate the conventional adjustment knob.
??????, добавлен 30.07.2016A practical guide to using encryption technology to ensure confidentiality, security and integrity of your most valuable assets - its data. The analysis of the basic fundamentals of cryptography and its techniques for dealing with electronic security.
?????, добавлен 08.03.2014Development of the program, applying the technique of surface voxelization of 3D-models based on graphic processes. Review of existing methods voxelization 3D-scenes view of the art surface voxelization. Analysis and results of performance tests.
????????? ??????, добавлен 11.07.2016Find and analysis a way for data protection when a person uses e-platforms. Based on the General Data Protection Regulation, the measure for the data protection is assumed to comply when data systems go along with technical and organizational safeguards.
??????, добавлен 13.08.2023?????????? ???-?????? (High Performance Computing). ??????????? ??????? ??????????? ???????????????? ?????? ? ????? ????? ??????, ???????? ???????????????? ?????. ??????????? ????????????? ??????? ?????????? ??????. ???????? ???????? ??????????.
??????, добавлен 14.09.2016Major machine translation methods designed to speed up the process of multilingual text translation by using a computer software. Analysis of the performance of rule-based machine translation, statistical models, hybrid and neural machine translation.
??????, добавлен 16.08.2022A computer based decision support system is proposed the basic tasks of which are adaptive model constructing of financial processes. The system is developed with the use of system analysis principles, forming alternatives for models and forecasts.
??????, добавлен 20.01.2017- 58. Improving the efficiency of the solution of linear programming tasks applying the CUDA-technology
Methods for improving the efficiency of the solution of large dimensional linear programming tasks based on application of parallel data processing technology – CUDA. The specific features and algorithmic peculiarities of implementing of the program.
??????, добавлен 26.09.2016 The role of analysis in enterprise management. An overview of the workflow methods used to solve cloud-based enterprise operations management tasks. Substantiation of the relevance of the introduction of cloud technologies based on serverless computing.
??????, добавлен 22.02.2023The methods of data protection in local and global network. The functions of antivirus programs. The server side of web protection. The aspects of data transfer in big company. Password management. Internet security from different hacking and infection.
??????????? ??????, добавлен 07.08.2017Electroencephalography and Magnetoencephalography provide insight into neuronal processes in the brain in a real-time scale. This renders these modalities particularly interesting for online analysis methods to visualize brain activity in real-time.
??????, добавлен 23.06.2016The history and development of computational technologies from physical switches to the microprocessor. Principles batch processing of computer data. Browse famous innovators in the field of interactive paradigm shifts and their main achievements.
???????????, добавлен 28.12.2013International recommendations on Using error control coding at different network layers. The complexity of decoding in the channel with independent errors. Providing security of data in a network with the help of coding methods. Public-key cryptography.
?????, добавлен 08.03.2014Theoretical and methodological research based on big data. Social consequences caused by inequality in access to data. Ethical issues arising from the collection and analysis of large data sets. Application of big data analytics in various research areas.
??????, добавлен 11.03.2025Introduce the basic principles of digital video compression,focusing on the main techniques used in various video coding standards and applies the rotation and reversion operations to increase the security of the secret images and the utilization.
?????, добавлен 08.03.2014The weather forecast from a scientific point of view as one of the most complex problems of atmospheric physics. General characteristics of the big data forecasting system using the similarity method. Features of using big data for digitization.
????????? ??????, добавлен 13.07.2020????????????? ????????????? ?????? ???'????? ?????????????? ?? ???????????? ?????? ???????. ??????? ?????????? FinTech ? ????? ?????????? ???????. ?????? ??????????? ???????????? ??????? ????????????? ????????????? ?????? ????????? ?????????? FinTech.
??????, добавлен 05.09.2022Reported from a basic introduction to block cipher design and analysis. The tiny encryption algorithm. The study a concepts and design principles of block ciphers. Notation some binary operations of addition. Modern block cipher cryptanalysis methods.
??????, добавлен 08.03.2014- 69. RSA Labs FAQ 4.0
Some of the more popular techniques in cryptography. The advantages and disadvantages of public-key cryptography compared with secret-key cryptography. Digital signature applications exportable from the United States. Proactive security techniques.
?????, добавлен 08.03.2014 The possibilities of the MS Excel spreadsheet processing system for visualization of large data sets in an easy-to-understand form. Development of tools for practical implementation for visualization of large data arrays by selecting the required range.
??????, добавлен 29.09.2023Data flow diagrams as a hierarchy of functional processes related data flows. Familiarity with the main components of a data flow diagram: external entities, systems and subsystems, processes. Analysis of the structure of building hierarchy DFD.
??????, добавлен 25.03.2019The characteristics and features of the method for assessing the changes of health system with multiple levels of efficiency, depending on the state change of its elements. The essence, the specificity of logical differential calculus, multivalue logic.
??????, добавлен 28.02.2016The Iterative Extraction as extended approach extraction techniques in Principal Component Analysis to other additive data models. Additive models for clustering & similarity data and apply Iterative Extraction for deriving feasible clustering solutions.
??????? ???????, добавлен 08.02.2013Peculiarities of implementing methods of cognitive intelligence. Recommendations on the hardware, mathematical and software parts of the approach to the implementation of such systems, indicating the strengths and weaknesses of the chosen methods.
??????, добавлен 16.06.2024Implementation of cloud storage on the Internet. New types of Internet security and ways to prevent hacker attacks. Methods of legal regulation of information security practices. Application of the methods of active defense. Combating cybercrime.
??????, добавлен 18.02.2015