A new idea for quantum computing or to solve the problem of computer cooling

Swiss and British researchers have proposed a http://www.aliyun.com/zixun/aggregation/13408.html "> quantum computer vision that can help solve computer cooling problems and help improve computer performance." Renato Renner, a professor at the Swiss Federal Institute of Technology in Zurich (ETHZ) and Vlatko Vedral of the University of Oxford in the UK, reported that, in future quantum computers, if quantum correction can be cleverly applied ...

Global hacker attacks into active IMF as latest victim

Recent hacking seems to have been a "realm" of rampant activity. The International Monetary Fund (IMF) computer system became the latest target for hackers, U.S. media reported 11th. The analysis points out that the attack of the IMF computer system will cause the national regulators to pay more attention to the computer and network security, and more supervision measures will be introduced in succession. The IMF is not the first big company or institution to be hacked in months. In addition to the loss of Sony's heavy web site was hacked, then the hackers raided Google, Nintendo, Lockheed Martin and the Flowers ...

View: Some open platforms are MLM

There is a long-standing contradiction between hosts and parasites on computer platforms. The first contact platform is the microcomputer operating system. At this level, the desktop software business is most afraid of the function of the operating system and its own software intersection. For example, after Microsoft antivirus software, antivirus software provider is very uncomfortable; After XP, few people use ACDSee. After entering the era of smartphone, platform culture will not open a lot? Not exactly what the iphone iOS5 has done recently. As you can see, the third party Twitter client on iOS is now on the wall. Back to the point, say ...

Trend Technology publishes summer social network use Security Guide

Today's social networking sites, by virtue of their popularity, openness and interactivity, have become the main channel for individual users to gain daily information and interpersonal interaction, as well as new tools for business marketing. Facebook, the world's largest social networking site, has broken 500 million subscribers, and Sina Weibo users in China have broken 140 million in a very short time. At the same time, social networking has become the preferred target for cyber hacking attacks, and the privacy of the network has been hidden. According to the December 2010 statistics, phishing attacks use social networks to expand the number of cyber crimes that occupy all networks ...

Developers become PAAs market-goers

The PAAs Cloud platform provides customers with a sophisticated application development and deployment environment that enables them to create, test, and deploy applications without the need to purchase the underlying hardware and platform software. As a result, PAAs will be one of the necessary options for developers to deploy applications, but now the PAAs market is still in its infancy, with developers still a major market activist and contributing to the development of PAAs. The PAAs market is currently valued at $2.8 billion trillion, but according to Stefan tied, a Forrester Analytics analyst, "the next ten ...

The Blue Ocean salon of the Fast Pedestrian network: A probe into the value of social media advertisement

Today, the Chinese Internet Association, hosted by the Network of China Internet Association blue Sea Salon "social media," where the Internet ads to go? The seminar will be held in Beijing on the afternoon of June 23. More than 10 years of internet development, the scale of online advertising is advancing by leaps and bounds, this time, social media is coming! Social media is of great significance, and it radically changes the way media content is produced and disseminated, fundamentally changing the entire marketing industry. Social media integrates participation, openness, dialogue, community, and relevance, and these new media include: SNS social network ...

Broadband capital set up RMB fund

Recently, the Social Security Fund and the broadband capital signed http://www.aliyun.com/zixun/aggregation/35850.html "> Investment Agreement, investment 500 million yuan in broadband capital set up 9001.html" > RMB Fund- Tianjin Cheng Bai Equity Investment Partnership (limited Partnership). The fund is sponsored by the broadband capital, and the national Science and Social Security Fund is the key investor. Broadband capital was founded in 2006, is the largest domestic focus on TMT ...

Xie: The starting point of opening

Guide: Recently as dispatch CEO, Yahoo China General manager of Xie in its blog published a "Open starting point" of the article. Xie mainly based on the current situation and trend of industrial development, the current open situation was evaluated. The full text is as follows at least in the media public relations, the network industry opened into the climax period. Open meetings, open summits, open seminars, open public relations will be surging, dizzying. A wide variety of open platforms have been launched, people can not help but ask: if the number of users ranked the top 100 of the site are suddenly, known as open, do the platform, that and not open and ...

Virtualization Storage Interpretation

Compared with traditional storage, the advantages of virtualization storage are mainly reflected in: high disk utilization, traditional storage technology, disk utilization is generally only 30-70%, and the use of virtualization technology disk utilization up to 70-90%, storage flexibility, can adapt to different vendors, different types of heterogeneous storage platforms, Provides greater flexibility for storage resource management; Easy to manage, provides a centralized management of a large capacity storage system to avoid the management problems caused by the expansion of storage devices; better performance, virtualized storage systems can be well load-balanced, with each time data ...

Tian defines cloud coordinates: from server to operating system

Tian, who has always been very investment-minded, has chosen "cloud computing" to invest in cloud base, creating a cluster of clusters of models, trying to build a complete cloud industry chain for China, while its "cloud" dream to the end. In the office of the Beijing Cloud base, which is located in the North Industrial Software Park, a slogan has been introduced-"cloud computing is the ability for everyone to enjoy a supercomputer as much as a book price." "The slogan came from the founder of the cloud base, Tian, chairman of the broadband capital. Tian in the "Communications Industry newspaper" (network) reporter ...

Domestic social media sharing data ranking report

Introduction: The author through the use of nearly more than 15 million users of various share buttons, a comprehensive analysis of statistics, the following data reports. May is a busy season, the figure of spring has not been far away, the footsteps of the summer has gradually come near, everything between heaven and Earth show vitality. In the best time of the year, the domestic social media share data growth more strongly, some of which are the black horse jumped out. Let's take a look at the May social media sharing data barometer. First, the amount of space to share QQ, back to the flow Sina Weibo first although QQ ...

Design and implementation of cloud operating system

The distinctive feature of the cloud operating system will be "networking". Send "cloud computing" as a task to various geographically located servers for processing, resulting in the return of results. This kind of network is a kind of "cloud network", has the memory topology structure, so that can make the most effective use of the computing performance of the server, provide the user the "cloud computing" task to offer the efficient computation service. "Network" also stores the user's storage resources distributed in the major servers, one is to ensure that the separation from the local machine, can still use their own resources, the second is easy to share with others---such as sharing with their families, and ...

Based on SME innovation to promote SaaS application

Introduction: In order to dialysis the Chinese SaaS market, while providing users with a reference to the choice of SaaS services, IT168 combined a number of cloud computing experts, users and mainstream SaaS vendors to launch the theme of the cloud services experience, we will start from the experience of SaaS cloud services, Step into the PAAs and IaaS areas. In the era of cloud computing, SaaS is not a new thing, as the first commercial cloud service model, SaaS is the most close to the vast number of users. Just entering the Chinese market, the SaaS hot scene is really amazing, ...

Five strategies to help enterprises smooth cloud

Guidance: Organizations that are planning to transfer applications to the cloud have five options to choose from: Re-hosting to the Architecture (IaaS), refactoring the platform as a service (PaaS), fixing IaaS or PAAs, rebuilding on PAAs, or replacing with SaaS. &http://www.aliyun.com/zixun/aggregation/37954.html ">nbsp; is planning to transfer applications to the cloud, there are five kinds of transfer options: Re-managed to the architecture (I ...).

WINDOWS8 will support HTML5 network applications

Steven Sinofsky, President of Microsoft Windows & Windows Live Engineering, presented a new interface to Windows 8 at the D9 meeting, the previously rumored "immersive UI", with the following image interface     Windows 8 Unified Start interface. Broadcast to Tencent Weibo Windows 8 supports two applications ...

The great open security under the age of Wang is the basic guarantee

In the new Internet era, where the application is king, "open" is the key word for the IT industry's manufacturers. Baidu early on through the "box" to open up, Tencent, Qihoo 360, Sina has also announced its own "open platform" program. and http://www.aliyun.com/zixun/aggregation/9970.html "> Jinshan network is very early through the open Jinshan Guardian source code, to build their own security open platform." Why "open" everyone for ...

China Cloud standard enters research stage or launches next year

&http://www.aliyun.com/zixun/aggregation/37954.html ">nbsp; The "Cloud Computing Standards Seminar", led by the SOA standard Working Group of the National Information Technology Standardization Technical Committee, was held at Northeastern University from June 2, 2011 to 3rd. The meeting has conducted extensive research on the relevant standards of cloud computing. The target is a recommended national standard, aimed at promoting the healthy and orderly development of China's cloud computing industry, to be officially launched in 2012. ...

China's first cloud box in Beijing also can be published 4 national map content

&http://www.aliyun.com/zixun/aggregation/37954.html ">nbsp; Only the size of the container, but can accommodate four national libraries, millions of high-definition movies. Recently, the first commercial modular container-type data center in China-yun-bin in Beijing also Chuang Yun Base, which marks the real practical application of cloud computing phase, will enable more users to become rich, convenient, green cloud computing services and applications directly beneficiaries. According to the introduction, this ...

Microsoft Cloud Office Services Office 365 will be officially released this month

Microsoft's cloud Office software Office 365 has been in the public test since last December, and it has been six months now. Yesterday, Microsoft CEO Ballmer said Office 365 will be officially released this month. At a cloud computing summit in India yesterday, Mr. Ballmer pointed out that Microsoft is actively engaged in the cloud market, "we are working to launch this product, Office 365 cloud services will be released in June, to provide you with Lync, SharePoint, Office and other services." "Offic ...

Enterprises use "cloud" to create a new model of disaster-tolerant backup

[Guide] The rapid development of business, enterprise data explosion. At the same time, data security is being subjected to unprecedented threats, natural disasters, system failures, enterprise employee misuse and virus infection can lead to data destruction and loss. Rapid business development, enterprise data explosion. At the same time, data security is being subjected to unprecedented threats, natural disasters, system failures, enterprise employee misuse and virus infection can lead to data destruction and loss. And the enterprise has regarded the key data as the basis of normal operation, once encounter data disaster, operation must be paralyzed, bring ...

Total Pages: 417 1 .... 245 246 247 248 249 .... 417 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.