Techniques and strategies for handling high traffic

Analysis of various methods and strategies for scaling the fintech API to solve the problems of financial applications. The principles of distributing traffic between multiple servers to improve their performance. Asynchronous data processing methods.

Подобные документы

  • Intellectual information systems as hybrid neural networks. Using the topology of neural networks based on a fuzzy perceptron, ANFIS, TSK, Wang & Mendel’s network to solve diagnostic problems in medicine. Influence of the fuzzy rule on output signal.

    ??????, добавлен 22.12.2016

  • Understanding program slicing as a technique for automatically decomposing programs by analyzing its control and data flow. Control flow analysis of binary executables and its problems. Interprocedural slicing using SDG and experimental results.

    ??????, добавлен 11.10.2014

  • Development and implementation of new technologies in banking services. The ability to improve the existing anti-fraud model used in real banking practice. Clusters and their impact on the assessment of the existing anti-fraud model. Data Chart Analysis.

    ????????? ??????, добавлен 10.12.2019

  • The description of the mechanisms of learning and assessment of the quality of the classifier of the developed system of the automated processing of large amounts of information. The classifier based on the LibSVM library and the support vector machine.

    ??????, добавлен 25.12.2016

  • The article is aimed at researching the possibilities and strategies of innovative integration of parametricism in the field of graphic design and analyzing the main problems and solutions of using parametric design in the creation of graphic objects.

    ??????, добавлен 20.07.2024

  • Reveal and compare modern methods of information search in digital environment. Characterization of the features of the rapid development of information technologies, which shapes spheres of human life, as well as the process of information provision.

    ??????, добавлен 22.03.2023

  • The functional elements of reports preparation on working curriculum, its formation and data validation. Identification of problems in these process. The proposals for the improvement of re-engineering stages. Solution validation in the automated system.

    ???????, добавлен 20.03.2016

  • The essence of the national system of electronic information resources as a set of national resources needed to solve the problems of socio-economic development and electronic information resources of the National registry using a single technology.

    ??????, добавлен 20.01.2017

  • ?he main authorization methods for the web used to develop and build the logical structure of sites. Justification of the method of secure integration of users of a local network into web authorization, the ability to log in with personal local data.

    ??????, добавлен 09.10.2018

  • The economic implications and practical applications of Generative Artificial Intelligence various business domains, including marketing, customer support, product design, and data analysis. The recommendations for strategy of implementing GenAI.

    ??????, добавлен 21.07.2024

  • Allocation and Sizing of Distribution Transformers and Feeders. Planning of Distribution Networks under Load Growth. Optimization Methods for Power System Problems. List of Tables, Principle Symbols and Acronyms. Statement of Original Authorship.

    ???????, добавлен 05.01.2014

  • The possibility using systems operational analysis in the organization and management of research and innovation projects in enterprises and Universities. The organizing principle of the multidimensional cube. Data Mining using mathematical apparatus.

    ??????, добавлен 06.05.2018

  • Various aspects of multimedia content encryption. His general performance and the fundamental techniques. The common encryption techniques, including complete, partial and compression-combined encryption, will be investigated, analyzed and evaluated.

    ?????, добавлен 08.03.2014

  • The memory hierarchy, some cache specs. Measuring cache utilization. Codes cache optimization. Data cache optimization. Prefetching and preloading. Structures, field reordering. Hot or cold splitting. Beware compiler padding. Cache performance analysis.

    ???????????, добавлен 03.06.2012

  • Mobile devices as an integral part of a person’s daily life. Familiarize yourself with the basics for getting started developing applications, such as choosing an IDE and installing Java. Analysis of the history of creating the Android operating system.

    ??????, добавлен 12.02.2019

  • The problem of the development of mathematical support to automate the process of diagnostic and recognizing model construction by precedents. The software realizing proposed transformations and indicators characterizing their properties was developed.

    ??????, добавлен 29.07.2016

  • Methods of traversal of high-level multi-threaded models formalized in the Use Case Map computer language. Advantages and disadvantages of this approach compared to existing ones. Generation character lines that are used to test software systems.

    ??????, добавлен 28.02.2016

  • The questions of energy efficiency of information systems. The study of existing methods to reduce energy consumption at the program level. A new approach to the development of energy-efficient software that passes through its entire life cycle.

    ??????, добавлен 30.01.2016

  • ?????? ?????? ????????????? ???????????? ??????, ??????????????? ?? ???????????????? ??????? ????????? ???????, ? ??????????? ?? ?????????? ?? ?????? ?? ?????? ????????? ????????? ?????? (Data Warehouse) ? ?????????? OLAP (Online Analytical Processing).

    ??????, добавлен 19.01.2018

  • A General idea on the basis of information contained in cryptographic systems. Feature encryption standard "Rijndael". The principles of encoding data with a public key algorithm RSA. Safety standards models of information flow in computer programs.

    ?????, добавлен 08.03.2014

  • Comparison of several common approaches to the analysis of system logs and streaming data generated en masse by the company's IT infrastructure. Characteristics of model-based anomaly search algorithms and hierarchical temporary memory algorithms.

    ??????, добавлен 28.05.2021

  • The methods for adaptive, knowledge-based learning, such as online incremental feature selection, spiking neural networks, adaptive data and model integration, and artificial life systems, particle swarm optimisation, ensembles of evolving systems.

    ?????, добавлен 09.04.2013

  • The main features and functions of the service Google Docs. Characteristics of the use of this service for teaching computer science to future teachers of mathematics in order to solve information problems. Analysis of the use of the student service.

    ??????, добавлен 05.04.2019

  • ???????????? ???????????? ??????? ???????? ???????. ?????????????? ???????? ??????? ???????? ???????, ????????? ? ??????? ? ??????? ???????? ???????, ??????????-?????????? ???????? ??? ???????????? ??????? ???? ??????. SolarWinds NetFlow Traffic Analyzer.

    ??????, добавлен 28.08.2022

  • Introduction to cryptography and data security. The study of random numbers and an unbreakable stream cipher. The data encryption standard and alternatives. Practical aspects of public-key cryptography. Principles of message authentication codes.

    ?????, добавлен 08.03.2014

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.