大數據時代的雲端運算敏捷紅利

大數據時代的雲端運算敏捷紅利
ISBN-10
7302341931
ISBN-13
9787302341932
Category
Computers / Networking / General
Pages
230
Language
Chinese
Published
2013-01-01
Publisher
清華大學出版社
Author
張禮立編著

Description

闡述了筆者對雲端運算,敏捷紅利的理解,以及敏捷紅利在企業運作過程中被雲端運算所觸發的機制,在介紹雲端運算近期在國內外的使用情況與相關問題的同時也介紹了雲端運算供應商的選擇和維護,為讀者在雲端運算商業用途方面開啟了一扇門戶。


本書主要闡述了雲端運算的關鍵技術,核心架構在資訊科技方面所產生的變革,對現代企業策略利益的產生以及所起到的空前的影響,系統和重點地介紹了雲在企業營運和管理中,所觸發敏捷紅利的機制。


除了介紹雲端運算近期在國內外的使用情況,本書還為你提供了如何選擇和維護雲端運算供應商的建議。正所謂授之以魚不如授之以漁,雲為何,何為利,這兩者之間的聯系和互相作用是怎樣的?又如何為己所用?此書將給與您獨特的見解與合理的答案。相信在同樣的概念下,本書能向你展示更多與眾不同的內容。


註:本書內容為簡體中文

Similar books

  • Voice Over IP
    By Uyless D. Black

    Voice Over IP is the #1 guide for professionals planning or running VoIP applications. Uyless Black covers every current technical standard, protocol, and interoperability solution.

  • Electronic Communications Systems
    By William C. House

    The men responsible for turning such possibilities into realities are Phillip Whittaker , the president of S.B.s. , and John E. Fox , director of marketing and business planning . Whittaker , fifty - eight , is a silver - haired veteran ...

  • Computer Networking Illuminated
    By Todd King, Diane Barrett

    Included are numerous Challenge Exercises, which allow students to gain hands-on experience with networking related tools and utilities, and Challenge Scenarios.

  • Cisco IOS Configuration Fundamentals
    By Cisco Systems, Inc

    Cisco Systems, Inc. Modify the current configuration register setting to reflect the way in which you want to load a system image . To do so , change the least significant hexadecimal digit to one of the following : • 0 to load the ...

  • From Millwrights to Shipwrights to the Twenty-first Century: Explorations in a History of Technical Communication in the United States
    By R. John Brockmann

    The millwrights ' and millers ' resistance to Evans's message was so great that their first recorded reaction was : “ It will not do ! it cannot do !! it is impossible that it should do !!! " 9 Nevertheless , Evans persisted in his ...

  • Principles, Protocols, and Architecture
    By Douglas Comer, David L. Stevens

    Principles, Protocols, and Architecture

  • Network Security Illustrated
    By Jason Albanese, Wes Sonnenreich

    The device has a chin rest , a keypad , and a card - swiping receptacle that resembles those used in retail stores . Steve places his chin on the rest , at which time his retina is scanned .

  • XML: Designing XML internet applications
    By David Megginson

    XML: Designing XML internet applications

  • Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions
    By Bill Pennington, David Pollino, Tony Bradley

    The stories about phishing attacks against banks are so true-to-life, it’s chilling.” --Joel Dubin, CISSP, Microsoft MVP in Security Every day, hackers are devising new ways to break into your network.

  • 软件定义网络核心原理与应用实践
    By 刘江, 魏亮, 黄韬

    本书分为核心原理和应用实践两大部分, 对软件定义网络(SDN)技术进行了剖析和解读. 第一部分首先阐述了SDN的设计思想与体系架构, ...