FA
Today, Friday، 22 Nov 2024 - 18:56
Mokhafaf

Acronym Finder

CBIR
What is CBIR ?
Content-based Image Retrieval
Retrieve content driven images...
DMP
What is DMP ?
Data Management Platform
Marketer, try to use new approaches in marketing include platforms, data management, etc. data that available have the better of the past to serve the fall and of the profit creation.
one of these practices, the use of DMP or Data management platform (platform, data management).

quoted from the web site, Marketing Tech News, results of a new survey show that 68% of brands, etc., agencies and publishers, now at least from a DMP to obtain new revenue from the data they use.

It is likely this figure in the year 2018 to 92%.

in a study by ExchangeWire and Weborama. it was found that five years after the introduction of the DMP, now the platform, to a the main part of the process of digital marketing companies have become....
UFS
What is UFS ?
Unix File System
File system Unix (UFS) is a file system that by most operating systems, Unix and Unix-like can be used. This system file also, file system fast Berkeley file system, quick, SMS, or FFS, is called....
IIOT
What is IIOT ?
Industrial Internet of Things
The Internet of things Industrial Internet of Things), or for stands for the IIOT is one of the most important and widely used field, the proliferation of the Internet of things. IIOT means the application of this technology in the industrial field and use it as a network industrial smart. With the use of the IIOT in industrial units can be all the objects in the IT unit are connected to each other ... and an integrated network to conduct all the affairs of the exchange of information, the conduct of control and monitoring.

This technology is among the 4 Big Tech in the main, which placed the future of industrial automation in the future heavily under the influence of the will. The progress of this technology, since that would be according to the predictions made by the year 2020, and with the arrival of the company, and enable automation to this field, the market value of this technology to over 319 billion dollars, that figure is significant, and worth the investment....
IOT
What is IOT ?
Internet of Things
The Internet of things, or (IoT), which are sometimes in English, the Internet of things, both for this word can be used. generally refers to many things, included things in the environment that we connected to the internet, and can by applications available in the smart phone and tablet control and management. The Internet of things in simple language, communication, sensors and devices with a network through which can communicate with each other and with interaction. This concept can be simply the Association of a smartphone with the TV is, or the complexity of the monitoring infrastructure and urban traffic. Washing machine and fridge taken up ; can this network a lot of devices around us).

in the design of its architecture Auto-ID Center, Massachusetts Institute of Technology (MIT) also participated.

The Internet of things conceptually new in the world of technology and communications to come, but the phrase the Internet of things, etc., for the first time in 1999 by Kevin Ashton, was used, and a world described in which anything, including objects, said John, to his identity, Digital, have, and computers allow it to organize and manage. The internet, now all people are connected, but with the internet things, all things are connected. Of course, earlier Kevin Kelly, in the book of rules of the new economic era of networks (1998) the topic nodes little smart (such as sensors, opening and closing of the door) that the global network internet can be raised.

one of the easiest understood and the most an example that can be ran thermostat Nast. You use this thermostat can Mobile YOUR the temperature of your home control and one of the most interesting points is that this thermostat can time sleep and ... you learn and when you are asleep the temperature according to the temperature that you set. so no need to worry about that half the night, your home warm or cool. This thermostat all the night is awake!
the smart that by Samsung bought also sensors different to create a smart home at your disposal puts. With the use of these sensors can notice what personal enter your home or outside of it can be done even in case of drip water is also a report related to the leakage system, water get.
with the development and promotion of the tools available in the ecosystem, e.g. smart bracelet for physical activity you can as soon as sleep you., the TV and the lights off, or even ahead of most of them on the car at the specified time, the best route to get you to the destination by the vehicle of choice for put into place, etc. SMS to the person in front of the post. In scale, the macro of the system can be used to improve the activities of the urban, such as counting the number of empty spaces available in the parking lot or check the quality of water, cities, and the situation of traffic also benefited.

The Internet of things Industrial Internet of Things), or for stands for the IIOT is one of the most important and widely used field, the proliferation of the Internet of things. IIOT means the application of this technology in the industrial field and use it as a network industrial smart. With the use of the IIOT in industrial units can be all the objects in the IT unit are connected to each other ... and an integrated network to conduct all the affairs of the exchange of information, the conduct of control and monitoring.

This technology is among the 4 Big Tech in the main, which placed the future of industrial automation in the future heavily under the influence of the will. The progress of this technology, since that would be according to the predictions made by the year 2020, and with the arrival of the company, and enable automation to this field, the market value of this technology to over 319 billion dollars, that figure is significant, and worth the investment....
FRAM
What is FRAM ?
Ferroelectric Random-Access Memory
F-RAM FRAM a certain type of memory, permanent are the ability to delete and re-planning. In memory FRAM of the structure of the memory DRAM is used, with the difference that instead of a dielectric capacitor, a matter of extreme electric. This change makes permanent memory, FRAM, and very high speed it is so that in some cases of this memory as memory, temporary RAM is used. Material like the material is ferromagnetic has a ring of hysteresis is the same, the material is ferromagnetic in which a polarity of the magnetic store. to be able to save a polarity of the electric in the absence of electric field....
TLB
What is TLB ?
Translation Lookaside Buffer
T El, (symbol, abbreviation TLB) a memory mediator in the CPU is that the parts of the table on the page in order to translate a virtual address to physical, but in their maintenance. The virtual memory amount of the fixed entries, and to improve the speed of translation of a virtual address are used. This virtual memory is typically a (CAM) the content of the memory address is, the search key of the address is virtual and search results address real or physical is usually not the same thing). If you search for CAM to result result. translation known and the data match is used. If no data is found, the translation within the table on the page continue find that several cycles of the more lasts up to complete – particularly if the translation tables to memory secondary submitted.

TLB in to address memory physical notes. TLB may be between the CPU and memory, I CACHE, or between memory I and memory the initial place. This depends on that the memory of his absence from the address of this virtual uses or addressing physical. A solution for optimized, cached physical address, this is to search the TLB with access to a cachet to the parallel do. Bits, the value of any virtual address (for example, in a system virtual memory with pages 4 ., the 12-bit lower address of the virtual ) in the conversion of virtual to physical change not find. In each access to the cached two operations can be done : an index within the data cached is stored, then a compare tags for line of cached that have been found. If cached, so structured was that it was only using the bits that translations don't change. index, this. cached can Operation indicator this your in when the TLB bit, rewarding the address translation does not do. Then the address is translated, the TLB to cached sent. Cached a comparison of label is done to determine the access to the target hit or an error occurred.

When a error the lack of entries in the TLB Miss to be happening, in architecture, modern two procedures done. With the management of the hardware TLB, the CPU in the tables, the search page does to see to address virtual memory specified entry exists or not. If an entry in. entries to the TLB be brought and access to TLB re-done. If an entry in the table on the page, there is not a error, defect pixel occurs, and the operating system, you must the data needed to memory bring. With TLB software management. a error, TLB, an exception \"error TLB\" produces and the operating system must be tables page over, and translate the software to do. Then, operating system, translation in TLB load and makes the app from the command that caused the error, TLB is resumed....
VMM
What is VMM ?
Virtual Machine Manager
VMM is a tool focused and integrated with other solutions for Microsoft infrastructure management virtual storage to round off, the possibility of the management host, network, and storage space for distribution and manufacturing machine, the virtual provides.

the most important application service VMM following:

- create and manage machine default the virtual(template)
- service users
- create a service by default, and align Service created
- backup of the Virtual machine Manager

for, by default, VMM, some information on the VMM Database by using Data Protection Application Programming Interface (DPAPI). Encryption does. DPAPI is a mechanism password-based data protection based on cryptography. For example, VMM information Run as Account on the operating system, the guest encryption. Also the product key in the settings, virtual hard disk encryption. This cryptography to the computer that the VMM launch is tied. so, if the service VMM from one computer to another. VMM makes it possible to preserve this information. With the use of the management of the distributed key. service VMM more flexible. At the time of design, it is necessary given that do not require Distributed key management in the environment given there. In this case, instead of storing the keys on the computer that the VMM management server, on it is launched on the data store corresponding to the Active Directory Domain Services kept. In this case, it is container related to it in the AD DS data store before the start of the launch of the service to be created.

service VMM has the flexibility, strong in network settings in virtual environments. Logical Networks, which are often for the performance of a certain virtual environment designed..., vlan, distinct, each of which has a IP address pool unique your are and for service, separate to the VM, are connected. On the architecture of the Logical Networks, the possibility to work of Virtual Networks provides. Network Virtualization the concept of virtualization with the possibility of making the VM network, different network, different logical stronger.

one of the essentials of virtualization, infrastructure, storage and invoice, capacity and performance fit with the needs of the environment. VMM two general types of Storage for local and remote case support, puts. Local storage the data storage space that is directly connected to the server, is said to be, and to the public, for the scenario low cost option is suitable. With the use of Remote storage, the possibility to offload the work on the file, there is another that increases the scalability and ... flexibility and capacity....