首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
近年来,随着计算机互联网信息技术的蓬勃发展,我国已经进入大数据时代。在此背景之下,计算机软件技术已被广泛应用于各大领域和产业中。文章首先介绍了大数据时代计算机软件技术的发展现状,重点解析了现代计算机技术中几种常见的计算机软件技术类型,剖析了大数据时代计算机软件技术的实际应用价值,并探讨了大数据时代计算机软件关键技术的应用,旨在促进当代计算机软件技术更好地为人类社会和企业服务。  相似文献   

2.
The proliferation of textual data in society currently is overwhelming, in particular, unstructured textual data is being constantly generated via call centre logs, emails, documents on the web, blogs, tweets, customer comments, customer reviews, etc. While the amount of textual data is increasing rapidly, users’ ability to summarise, understand, and make sense of such data for making better business/living decisions remains challenging. This paper studies how to analyse textual data, based on layered software patterns, for extracting insightful user intelligence from a large collection of documents and for using such information to improve user operations and performance.  相似文献   

3.
近年来,随着计算机互联网信息技术的蓬勃发展,我国已经进入大数据时代。在此背景之下,计算机软件技术已被广泛应用于各大领域和产业中。文章首先介绍了大数据时代计算机软件技术的发展现状,重点解析了现代计算机技术中几种常见的计算机软件技术类型,剖析了大数据时代计算机软件技术的实际应用价值,并探讨了大数据时代计算机软件关键技术的应用,旨在促进当代计算机软件技术更好地为人类社会和企业服务。  相似文献   

4.
A big hole in a big wall. The most interesting vulnerability is certainly the vulnerability in the world's most widely deployed commercial firewall, Check Point Firewall-1, which can be exploited to gain control of the firewall.  相似文献   

5.
6.
7.
More and more vulnerabilities appear to be exploited at a more rapid speed than they used to. During the last two months, we have seen exploitation of the ICQ hole in certain ISS products and the LSASS and PCT vulnerabilities in Microsoft Windows. All were exploited within very short time after information about the vulnerabilities was published.  相似文献   

8.
Two serious flaws in popular client firewall software have been uncovered in February  相似文献   

9.
10.
随着大数据时代的来临,大数据技术深入贯穿社会生产、生活的方方面面,尤其是随着5G通信技术的广泛应用,软件工程技术的应用迎来了前所未有的发展机遇和挑战。文章将大数据视域下软件工程技术应用的实现路径作为研究对象,从大数据及软件工程技术概述入手,充分分析了软件工程的核心技术,进而提出大数据视域下软件工程技术应用的实现路径,希望以此来不断提高软件工程技术的应用水平。  相似文献   

11.

Zero-day attacks and unpatched flaws

A vulnerability discovered in Internet Explorer at the beginning of December 2003 was an early Xmas present to scammers, who could exploit it to lure unsuspecting users into disclosing credit card information via an attack known as “phishing”. It didn't take long for the Web bandits to try out their present and it has yet to be taken away from them…  相似文献   

12.
13.
The big question     
我们向九位创意者提出了这样一个问题:“哪件印刷设计对你的工作启发最大?”  相似文献   

14.
Supporters of the international Cybercrime Treaty claim it will help prevent viruses and worms such as Code Red and the SQL Slammer worm. Detractors worry that it will not only suppress freedom of speech, but will also discourage research into the control of such malicious computer programs.  相似文献   

15.
16.
Nicolle  Lindsay 《ITNOW》1998,40(6):24-26
  相似文献   

17.
18.
19.
Olsen  N.C. 《Software, IEEE》1993,10(5):29-37
The author states that, in his experience, software engineering most resembles a dynamically overloaded queue or rush-hour traffic jam. A change measurement model that is unique because it puts the development process in the context of the larger business enterprise and partitions work into dynamic tangible activities, separating work demand from work services, is proposed. Because the change-management model is based on the concept of a dynamically overloaded queue, existing mathematical approximations can be used to estimate gross process behavior. Specifically, the author proposes to use fluid-approximation models to mathematically simulate the software process as a dynamically overloaded queue, applying estimation techniques that are normally used to analyze rush-hour traffic delays  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号