共查询到20条相似文献,搜索用时 62 毫秒
1.
硬盘和磁带一直占据着存储市场的主流地位,它们的存储容量基本上是同时期的光盘产品容量的10倍。为此,日立万胜(Hitachi Maxwell)开发了一种新型的光存储系统——层叠容积光盘(Stacked Volumetric Optical Disks),简称SVOD系统。如图1所示为2006年日立万胜展出一款每盘盒容量为940GB的SVOD系统。 相似文献
2.
本文的目的是为了引起业内与相关人士讨论我国光盘产业下一步怎么走?一种极端的观点认为:我国不必再发展光盘产业了,用不了几年就会被网络存储、网络下载所取代,这是我国光盘产业发展遇到困难时的一种比较过激的观点,原因是世界上的事不会 相似文献
3.
一、前言HD DVD的缔造者——东芝公司于2008年2月19日宣布,在对其整个HD DVD业务进行全面评估之后,决定不再开发、生产和销售HD DVD播放机及录像机,东芝将会继续为所有东芝HD DVD产品的用户提供支持及售后服务。事件的起因是2008年1月华纳公司倒戈,2月全球最大零售集团沃尔玛宣布只销售BD播放机.而美国租赁商店Netflix和著名零售商Best Buy宣布要扩大BD业务。东芝公司官方发布了上述决定,从而正式宣告索尼赢得这场下一代DVD格式大战。 相似文献
4.
一、引言综观世界光信息存储技术及其产品市场,以下的端倪已经看得比较分明:首先,原来数字光盘CD的两个主要开拓者之一荷兰飞利浦公司和DVD光盘的两个主要盟主之一日本东芝公司几乎已经退出、或者说至少暂时已经开始淡出这个领域。前者已经把相应的光存储研究开发与制造的资源卖给了世界上的其他公司,而只做一些贴牌制造与渠道销售的商业化 相似文献
5.
6.
脉冲直流磁控溅射技术兼有射频溅射和磁控溅射的优点,尤其在制备低溅射率的材料薄膜上,更体现良好的性价比,是一种低成本的工艺方案,目前在DVD DL和BD上都有了可靠的生产工艺方案。本文将对脉冲直流磁控溅射技术在光盘生产工艺上的应用进行介绍。 相似文献
7.
经过数年的蓝光格式大战,BD阵营最终胜出,今后高清电影光盘都将采用BD格式,因此高清玩家不用在BD和HDDVD之间犹豫不决,购买BD光驱已成为不二的选择。不过,现在BD刻录机的价格普遍在3000元以上,普通玩家还难以承受,因此首先考虑BD电影播放才更为实际。 相似文献
8.
光盘注塑机出货量与市场上的光盘生产线数量密切相关,我们都认为这个数量在不断地增长。Singulus公司市场和销售部的副总裁Sylvia Hitzel说。据报道,中国、中东和南美市场对空白CD-R和DVD-R光盘还有需求。我们都知道这个市场有很大的变动性,而且充满了激烈的竞争。这就对我们提高了要求,要生产标准更高、运行时间更长的机器。只读CD和DVD光盘市场相对稳定,Hitzel说他们已经组装 相似文献
9.
随着刻录机的普及,用光盘刻录数据成了不少人的习惯,不过很多人认为数据刻录成功之后就一劳永逸,永久保存了。说明书上说,光盘对数据的保存可以达到100年之久,但事实真的是这样吗?目前,太多用户抱怨光盘数据丢 相似文献
10.
一、前言2009年4月22日,中国高清光盘产业推进联盟在北京正式发布了中国蓝光高清产品,这标志着中国蓝光高清光盘(CBHD:China Blue High-Definition Disc)产业发展进入了新阶段。这次史无前例的产品发布以"中国蓝光,融合创新"为主题,来 相似文献
11.
软件构件复用技术综述 总被引:14,自引:12,他引:14
1968年NATO软件工程会议上,Mcilroy在其论文“大量生产的软件构件”中首次提出了复用这一概念,从此,人们围绕这一问题进行了大量的研究和实践活动。近年来,随着面相对象技术的出现并逐渐成为主流,基于软件构件的复用技术研究又重新成为热点,被视为解决软件危机现实可行的重要方法之一。介绍了构件的概念以及国内外在构件复用技术这一领域比较成功的研究和实践活动。 相似文献
12.
13.
Anonymity technologies enable Internet users to maintain a level of privacy that prevents the collection of identifying information such as the IP address. Understanding the deployment of anonymity technologies on the Internet is important to analyze the current and future trends. In this paper, we provide a tutorial survey and a measurement study to understand the anonymity technology usage on the Internet from multiple perspectives and platforms. First, we review currently utilized anonymity technologies and assess their usage levels. For this, we cover deployed contemporary anonymity technologies including proxy servers, remailers, JAP, I2P, and Tor with the geo-location of deployed servers. Among these systems, proxy servers, Tor and I2P are actively used, while remailers and JAP have minimal usage. Then, we analyze application-level protocol usage and anonymity technology usage with different applications. For this, we preform a measurement study by collecting data from a Tor exit node, a P2P client, a large campus network, a departmental email server, and publicly available data on spam sources to assess the utilization of anonymizer technologies from various perspectives. Our results confirm previous findings regarding application usage and server geo-location distribution where certain countries utilize anonymity networks significantly more than others. Moreover, our application analysis reveals that Tor and proxy servers are used more than other anonymity techniques. 相似文献
14.
15.
《Behaviour & Information Technology》2012,31(3):217-236
Abstract Technological innovations have, until recently, had little impact on the office environment. The advent of the microelectronic revolution has generated devices and mechanisms that support a wide spectrum of administrative functions and increase both the efficiency and effectiveness of office workers. This paper presents a state-of-the-art perspective on the newer technological aids developed specifically for the office environment. The speed and versatility of these aids is a tribute to recent innovations in the field of computers and communications. 相似文献
16.
Amar Gupta 《Behaviour & Information Technology》1982,1(3):217-236
Technological innovations have, until recently, had little impact on the office environment. The advent of the microelectronic revolution has generated devices and mechanisms that support a wide spectrum of administrative functions and increase both the efficiency and effectiveness of office workers. This paper presents a state-of-the-art perspective on the newer technological aids developed specifically for the office environment. The speed and versatility of these aids is a tribute to recent innovations in the field of computers and communications. 相似文献
17.
Database applications often require a sophisticated class of storage structures in order to answer different types of queries efficiently. This often dictates that the file should be organized on multiple keys. Several storage structures have been proposed to satisfy these needs. Most are generalizations of the storage structures used for managing one-dimensional data. Recently, a new storage structure, called the BD tree, was proposed to manage multidimensional data. This structure has good dynamic characteristics. This paper presents algorithms for the BD tree to perform insertion, deletion, and to answer exact match, partial match and range queries. In addition, some experimental evidence is presented that suggests that BD trees have good dynamic characteristics. 相似文献
18.
Reuse-based software production technology 总被引:4,自引:0,他引:4
Software reuse is viewed as a key technology to improve software product quality and productivity. This paper discusses a series of technologies related with software reuse and software component technology: component model, which describes component's essential characteristics; component acquisition technology, of which domain engineering is the main approach; component management technology, of which component library is the kernel; application integration and composition technology, of which application engineering is the main approach; software evolution technology, of which software reengineering is the main approach, etc. This paper introduces the software development environment: JadeBird Software Production Line System, which effectively integrates the above-mentioned technologies. 相似文献
19.
《Information & Management》2006,43(3):263-270
Today's capital market and security industry are rapidly changing. With the rising of trading volume in stock markets and the US security industry moving to compress the settlement time from T + 3 (3 days settlement) to T + 1 (same day settlement), a fully automated global approach, based on straight through processing (STP) technology seems the only choice. STP involves moving electronically through a trading process from initiation through post-execution and final settlement without manual intervention. Despite the benefits that have been materialized by early adopters of STP, there are problems and risks involved in implementing STP, one of which being the confusion about the concept of STP itself. The objective of this short research note is to clarify the concept and characteristics of STP and propose an integrated conceptual and theoretical STP framework. Such a framework can facilitate a widespread understanding of STP and provide useful guidance to STP implementations. 相似文献
20.
《Data Processing》1986,28(9):453-460
The first stage of capturing a speech signal is to change it from an acoustic signal into an electrical signal, using microphone and amplifier. This signal must be digitized before the computer can handle it, using sampling techniques.Speech is produced by capturing human speech patterns and analysing them for later reproduction by mechanical means. Text-to-speech synthesis is used in driving voice synthesizers.Speech recognition is based on the matching of frames of speech. Dynamic programming is a significant step forward in speech recognition.An application is currently being developed using speech recognition on a PABX. 相似文献