摘要:
A novel web server farm architecture is provided that combines various cloud components and innovatively maximizes their strengths to achieve a scalable, adaptable, load balanced computing architecture. In one embodiment, this architecture includes a storage host for static content hosting, a cluster of virtual machines (operating as web servers) for dynamic content hosting, and a dedicated application engine for monitoring the load of the virtual machines. A browser or end-application user of a web application is first routed to a static anchor page hosted on the storage host. The browser is subsequently presented with a list of virtual machines and data corresponding to their respective current loads. To access dynamic content, the browser is able to select from the virtual machines based in large part on the reported current loads of the virtual machines. Once a virtual machine is selected, the browser may communicate directly with the selected web server.
摘要:
A novel web server farm architecture is provided that combines various cloud components and innovatively maximizes their strengths to achieve a scalable, adaptable, load balanced computing architecture. In one embodiment, this architecture includes a storage host for static content hosting, a cluster of virtual machines (operating as web servers) for dynamic content hosting, and a dedicated application engine for monitoring the load of the virtual machines. A browser or end-application user of a web application is first routed to a static anchor page hosted on the storage host. The browser is subsequently presented with a list of virtual machines and data corresponding to their respective current loads. To access dynamic content, the browser is able to select from the virtual machines based in large part on the reported current loads of the virtual machines. Once a virtual machine is selected, the browser may communicate directly with the selected web server.
摘要:
A novel solution is provided that utilizes the two-credential characteristics of accessing cloud-hosted data in a portal-oriented enterprise-specific solution. Cloud computing resources may be accessed through a separate, enterprise-specific portal clients used to manage a set of cloud service accounts. Individuals (e.g., employees of the enterprise or company) may access cloud computing resources via an instance of the portal client, and any communication between individuals in an enterprise and cloud services may be facilitated through the portal. Each portal client may also be configured to be compatible with any cloud service vendor.
摘要:
Novel techniques are provided to determine concurrent hardware resource usage as expressed in activity performed by hardware processors. A cloud computing consumer can verify the level of the quality of service provided by the physical infrastructure of a cloud, thereby allowing the consumer the ability to request a transfer of the hosting physical infrastructure to a less burdened physical machine.
摘要:
The present disclosure discloses a capacitor discharge circuit and a power converter. The capacitor discharge circuit includes a detection circuit and a discharge loop; the detection circuit has input ends electrically connected with input ends of an AC power supply, and an output end outputting a discharge detection signal to an input end of the discharge loop; the discharge loop is electrically connected with both ends of the capacitor that needs to be discharged and includes a switch unit and an energy consumption unit. When the AC power supply is disconnected, the discharge detection signal switches on the switch unit to conduct the discharge loop, such that the energy consumption unit discharges the capacitor that needs to be discharged. The present disclosure also provides a power converter including the capacitor discharge circuit. The present disclosure can reduce the power consumption caused by discharging the capacitor that needs to be discharged.
摘要:
Various embodiments of a system and associated method for anonymization of text without losing semantic utility of text by extracting a latent embedding representation of content with respect to a given task and by learning an optimal strategy for text embedding manipulation to satisfy both privacy and utility requirements are disclosed herein. In particular, the system balances private attribute obfuscation with retained semantic utility.
摘要:
Users may be identified across websites, such as social media websites. Prior user information data and candidate user information data may be received. An algorithm may identify a first plurality of behavioral patterns in the prior user information data and a second plurality of behavioral patterns in the candidate user information datum. The algorithm may determine whether the candidate user information datum and the prior user information data correspond to the same user based, at least in part, on the first and second pluralities of behavioral patterns.
摘要:
Users may be identified across websites, such as social media websites. Prior user information data and candidate user information data may be received. An algorithm may identify a first plurality of behavioral patterns in the prior user information data and a second plurality of behavioral patterns in the candidate user information datum. The algorithm may determine whether the candidate user information datum and the prior user information data correspond to the same user based, at least in part, on the first and second pluralities of behavioral patterns.
摘要:
A computing device configures virtual machines using configuration commands. Each of the virtual machines may boot from a corresponding virtual machine image file. As a virtual machine boots or executes, the virtual machine may read from or write to application and operating system files included in the corresponding virtual machine image file. Prior to the virtual machine booting, the computing device may get or set configuration properties of the operating system and applications to be booted in a respective virtual machine by reading from or writing to the application and operating system files included in the corresponding virtual machine image file. The computing device may execute configuration commands to get or set the configuration properties of the operating system and the applications.
摘要:
A computing device configures virtual machines using configuration commands. Each of the virtual machines may boot from a corresponding virtual machine image file. As a virtual machine boots or executes, the virtual machine may read from or write to application and operating system files included in the corresponding virtual machine image file. Prior to the virtual machine booting, the computing device may get or set configuration properties of the operating system and applications to be booted in a respective virtual machine by reading from or writing to the application and operating system files included in the corresponding virtual machine image file. The computing device may execute configuration commands to get or set the configuration properties of the operating system and the applications.