英文文献翻译《Enterprise Mobile Applications》译文
物联网中英文对照外文翻译文献
中英文资料外文翻译Internet of Things1.the definition of connotationThe English name of the Internet of Things The Internet of Things, referred to as: the IOT.Internet of Things through the pass, radio frequency identification technology, global positioning system technology, real-time acquisition of any monitoring, connectivity, interactive objects or processes, collecting their sound, light, heat, electricity, mechanics, chemistry, biology, the location of a variety of the information you need network access through a variety of possible things and things, objects and people in the Pan-link intelligent perception of items and processes, identification and management. The Internet of Things IntelliSense recognition technology and pervasive computing, ubiquitous network integration application, known as the third wave of the world's information industry development following the computer, the Internet. Not so much the Internet of Things is a network, as Internet of Things services and applications, Internet of Things is also seen as Internet application development. Therefore, the application of innovation is the core of the development of Internet of Things, and 2.0 of the user experience as the core innovation is the soul of Things.2.The meaning of "material"Where the "objects" to meet the following conditions can be included in the scope of the "Internet of Things":1. Receiver have the appropriate information;2. Have a data transmission path;3. Have a certain storage capabilities;4. T o have the CPU;5.T o have the operating system;6. Have specialized applications;7. Have a data transmitter;8. Follow the communication protocol of Things;9. World Network, a unique number that can be identified.3. "Chinese style" as defined inInternet of Things (Internet of Things) refers to is the ubiquitous (Ubiquitous) terminal equipment (Devices) and facilities (Facilities), including with the "inner intelligence" sensors, mobile terminals, industrial systems, floor control system, the family of Intelligentfacilities, video surveillance systems, and external can "(Enabled), such as RFID, a variety of assets (the Assets), personal and vehicle carrying the wireless terminal" intelligent objects or animals "or" smart dust "(the Mote), through a variety of wireless and / or cable over long distances and / or short-range communication networks to achieve interoperability (M2M), application integration (the Grand Integration), and based on cloud computing, SaaS operation mode, in internal network (intranet), private network (e xtranet), and / or the Internet (Internet) environment, the use of appropriate information security mechanisms to provide a safe, controlled and even personalized real-time online monitoring, retrospective positioning, alarm linkage, command and control plan management, remote control, security, remote repair and maintenance, online upgrades, statistical reporting, decision support, the leadership of the desktop (showcase of the Cockpit Dashboard) management and service functions, "Everything," "efficient, energy saving, security environmental protection, "" possession, control, Camp integration [1].4.EU definitionIn September 2009, the Internet of Things and enterprise environments held in Beijing, China-EU Seminar on the European Commission and Social Media Division RFID Division is responsible for Dr. Lorent Ferderix, given the EU's definition of things: the Internet of Things is a dynamic global network infrastructure, it has a standards-based and interoperable communication protocols, self-organizing capabilities, including physical and virtual "objects" of identity, physical attributes, virtual features and smart interface and seamless integration of information networks . Internet of Things Internet and media, the Internet and business Internet one, constitute the future of the Internet.5.changeThe Internet of Things (Internet of Things) the word universally recognized at home and abroad Ashton, Professor of the MIT Auto-ID Center in 1999 first proposed to study RFID. The report of the same name released in 2005, the International T elecommunication Union (ITU), the definition and scope of the Internet of Things has been a change in the coverage of a larger expansion, no longer refers only to the Internet of Things based on RFID technology.Since August 2009, Premier Wen Jiabao put forward the "Experience China" Internet of Things was officially listed as a national one of the five emerging strategic industries, to write the "Government Work Report" Internet of Things in China has been the great concern of the society as a whole degree of concern is unparalleled in the United States, European Union, as well as other countries.The concept of Internet of Things is not so much a foreign concept, as it has been the concept of a "Made in China", his coverage of the times, has gone beyond the scope of the 1999 Ashton professor and the 2005 ITU report referred to, Internet of Things has been labeled a "Chinese style" label.6.BackgroundThe concept of Internet of Things in 1999. Internet-based, RFID technology and EPC standards, on the basis of the computer Internet, the use of radio frequency identification technology, wireless data communication technology, a global items of information to real-time sharing of the physical Internet "Internet of things" (referred to as the Internet of Things) , which is also the basis of the first round of the China Internet of Things boom set off in 2003.The sensor network is built up based on sensing technology network. Chinese Academy of Sciences in 1999 on the start sensor network research and has made some achievements in scientific research, the establishment of applicable sensor network.1999, held in the United States, mobile computing and networking International Conference, "The sensor network is a development opportunity facing humanity in the next century. In 2003, the United States, "T echnology Review" proposed sensor network technology will be future changes ten people's lives first.November 17, 2005, the WSIS held in Tunis (WSIS), the International T elecommunication Union released ITU Internet Report 2005: Internet of Things ", citing the concept of the" Internet of things ". The report pointed out that the ubiquitous "Internet o f Things" communication era is approaching, all the objects in the world, from tires to toothbrushes, from housing to the tissue via the Internet, take the initiative to be exchanged. Radio Frequency Identification (RFID), sensor technology, nanotechnology, intelligent embedded technology will be more widely used.According to the description of the ITU, the era of things, a short-range mobile transceivers embedded in a variety of daily necessities, human beings in the world of information and communication will receive a new communication dimension, from any time communication between people of the place of connection extended to the communication connection between persons and things and things and things. The Internet of Things concept of the rise, largely due to the International T elecommunication Union (ITU), the title of Internet of Things 2005 annual Internet Report. However, the ITU report the lack of a clear definition of Things.Domestic Internet of Things is also there is no single standard definition, but the Internet of Things In essence, the Internet of Things is a polymer application of modern information technology to a certain stage of development and technological upgrading of various sensing technology modern network technology and artificial intelligence and automation technology aggregation and integration of applications, so that the human and material wisdom of dialogue to create a world of wisdom. Because the development of the Internet of Things technology, involving almost all aspects of IT, innovative application and development of a polymer, systematic, and therefore be called revolutionary innovation of information industry. Summed up the nature of the Internet of Things is mainly reflected in three aspects: First, the Internet features that need to be networked objects must be able to achieve the interoperability of the Internet; identification and communication features, that is included in the Internet of Things "objects" must to have the functions of automatic identification and physical objects communication (M2M); intelligent features, the network system should have automated, self-feedback and intelligent control features January 28, 2009, Obama became the President of the United States, held with U.S.business leaders a "round table", as one of the only two representatives, IBM CEO Sam Palmisano for the first time that "the wisdom of the Earth" this concept, it is recommended that the new government to invest in a new generation of intelligent infrastructure.February 24, 2009 news, IBM Greater China CEO money crowd called "Smarter Planet" strategy announced in the forum 2009IBM.This concept was put forth, that is the great concern of the United States from all walks of life, and even analysts believe that IBM's vision is very likely to rise to U.S. national strategy, and caused a sensation in the world. IBM believes that the industry, the next phase of the mission is to make full use of the new generation of IT technology in all walks of life among specifically, is the embedded sensors and equipment to the power grid, railways, bridges, tunnels, highways, buildings, water supply systems dams, oil and gas pipelines and other objects, and is generally connected to the formation of Things.Strategy conference, IBM, and implant the concept of "wisdom" in the implementation of the infrastructure, strong, not only in the short term to stimulate the economy, promote employment, and in a short period of time for China to build a mature wisdom infrastructure platform.IBM "Smarter Planet" strategy will set off again after the wave of Internet technology industrial revolution. Former IBM CEO Lou Gerstner has raised an important point of view, every 15 years, a revolution in computing model. This judgment is the same as Moore's Law accurately call it a "15-year cycle Law". Before and after 1965, changes to the mainframe as a symbol, 1980 marked by the popularization of personal computers, 1995, the Internet revolution. Each such technological change are caused by the enterprise, industry and even the national competitive landscape of major upheaval and change. T o a certain extent in the Internet revolution is ripening by the "information superhighway" strategy. 1990s, the Clinton administration plan for 20 years, $ 200 billion to -4000 billion, construction of the U.S. National Information Infrastructure, to create a huge economic and social benefits.T oday, the "Smarter Planet" strategy by many Americans that there are many similarities with the "information superhighway", the same they revive the economy, a key strategy for competitive advantage. The strategy can be set off, not only for the UnitedStates, such as the Internet revolution was the wave of technological and economic concern, more attention from the world."Internet of Things prospects are very bright, it will dramatically change our current way of life." Demonstration director of the Center of Nanjing University of Aeronautics and Astronautics, National Electrical and Electronic Zhao Guoan said. Industry experts said that the Internet of things to our life personification of the things became a kind of human.Goods (goods) in the world of physical objects associated with each other "exchange", without the need for human intervention. The Internet of Things using radio frequency identification (RFID) technology, to achieve the interconnection and sharing of the automatic identification of goods (products) and information through the computer Internet. It can be said that the Internet of Things depict the world is full of intelligent. In the world of Internet of Things, material objects connected to the dragnet.The second session, held at Peking University in November 2008, China Mobile Government Seminar "Knowledge Society and Innovation 2.0", the experts made the mobile technology, the Internet of Things technology led to the development of economic and social form, innovative forms of change, and promote the The next generation of innovation for the knowledge society as the core of user experience (innovative 2.0) the formation of innovation and development of the form to pay more attention to the user to focus on people-oriented. Research institutions is expected to 10 years, the Internet of Things may be mass adoption of this technology will develop into one of thousands of yuan-scale high-tech market, the industry than the Internet 30 times.It is learned that the things industry chain can be broken down into the identity, perception, processing and information transfer, four links, each link of the key technologies for the wireless transmission network of RFID, sensors, smart chip and telecom operators. EPOSS in the "Internet of Things in 2020" report, an analysis predicted that the future development of the Internet of Things will go through four stages, 2010, RFID is widely used in the field of logistics, retail and pharmaceutical objects interconnect 2010 to 2015, 2015 ~ In 2020, the object into the semi-intelligent, intelligent objects into 2020.As the vanguard of the Internet of Things, RFID has become the most concerned about the technology market. The data show that the global RFID market size in 2008 from$ 4.93 billion in 2007 rose to $ 5.29 billion, this figure covers all aspects of the RFID market, including tags, readers and other infrastructure, software and services. RFID card and card-related infrastructure will account for 57.3 percent of the market, reaching $ 3.03 billion. Application from financial and security industries will drive the market growth of RFID cards. Analysys International forecasts, the Chinese RFID market size in 2009 will reach 5.0 billion, a CAGR of 33%, in which the electronic tag is more than 3.8 billion yuan, the reader close to 700 million yuan, software and services market to reach 500 million yuan pattern.MEMS is the abbreviation of the micro-electromechanical systems, MEMS technology is built on the basis of micro / nano, the market prospect is broad. The main advantage of the MEMS sensor is the small size, large-scale mass production cost reduction, mainly used in two major areas of automoti ve and consumer electronics. Under ICInsight the latest report is expected in 2007-2012, global sales of semiconductor sensors and actuators based on MEMS will reach 19 percent compound annual growth rate (CAGR), compared with $ 4.1 billion in 2007 to five years will achieve $ 9.7 billion in annual sales. 7.PrincipleInternet of Things is on the basis of the computer Internet, RFID, wireless data communications technology, to construct a cover everything in the world's "Internet of Things". In this network, the goods (products) to each other "exchange", without the need for human intervention. Its essence is the use of radio frequency identification (RFID) technology to achieve the interconnection and sharing of the automatic identification of goods (products) and information through the computer Internet.The Internet of Things is a very important technology is radio frequency identification (RFID) technology. RFID is radio frequency identification (Radio Frequency Identification) technology abbreviation, is an automatic identification technology in the 1990s began to rise, the more advanced a non-contact identification technology. The development of RFID technology based on a simple RFID system, combined with existing network technology, database technology, middleware technology, to build a one composed by a large number of networked readers and numerous mobile label, much larger than the Internet of Things trend.RFID, It is able to let items "speak" a technique. In the "Internet of Things" concept, RFID tags are stored in the specification and interoperability information collected automatically by wireless data communications network to a central information system, to achieve the identification of goods (products), and then through the open computer network for information exchange and sharing, items "transparent" management.The information technology revolution in the Internet of Things is referred to as IT mobile Pan of a specific application. Internet of Things through IntelliSense, identification technology and pervasive computing, ubiquitous network convergence applications, breaking the conventional thinking before, human beings can achieve ubiquitous computing and network connectivity [3]. The traditional thinking has been the separation of physical infrastructure and IT infrastructure: on the one hand, airports, roads, buildings, while on the other hand, the data center, PC, broadband. In the era of the "Internet of Things", reinforced concrete, cable with the chip, broadband integration into a unified infrastructure, in this sense, the infrastructure is more like a new site of the Earth, the world really works it, which including economic management, production operation, social and even personal life. "Internet of Things" makes it much more refined and dynamic management of production and life, to manage the future of the city to achieve the status of "wisdom" to improve resource utilization and productivity levels, and improve the relationship between man and nature.8.Agency1, institution-buildingAs the first national Internet of Things industry community organizations - the application of professional Committee of China Electronic Chamber of Things technology products (referred to as: "objects of the IPCC"), the Ministry of Civil Affairs in June 2010, preliminary approved by the Ministry of August being reported that the Ministry of Civil Affairs for final approval.2, the main taskServe as a bridge between business and government to assist the Government of the industry guidance, coordination, consultation and services to help members to reflect the business requirements to the Government; coordinate the relationship between enterprisesto strengthen technical cooperation, product distribution, the elimination of vicious competition ; supervision of members the correct implementation of national laws and regulations, to regulate the industry; member of information communication technology products, cooperation, resource sharing, capital operation, and promote the app lication of Internet of Things technologies and products, and promote the Internet of Things industrial scale , co-development.9.ConstructionInternet of Things in the practical application to carry out requires the involvement of all walks of life, and need the guidance of the national government as well as related regulations and policies to assist the launching of the Internet of Things has the scale, broad participation, management, technical, and material properties, etc. other features, the technical problem is the most crucial issues of Things billion Bo logistics consulting, Internet of Things technology is an integrated technology, a system not yet which company has overall responsibility for network planning and construction of the entire system, theoretical studies have commenced in all walks of life and the practical application is limited to within the industry. The key is on the planning and design and research and development of the Internet of Things research in the field of RFID, sensors, embedded software, and transmission of data calculation. In general, to carry out the steps of the Internet of things mainly as follows:(1) identified the object attributes, properties, including static and dynamic properties of the static property can be stored directly in the label, the dynamic properties need to start with sensors to detect real-time;(2) the need to identify the equipment to complete the reading of object attributes, and information into a data format suitable for network transmission;(3) the object of information transmitted over the network to the information processing center (processing center may be distributed, such as home computers or mobile phones, may also be centralized, such as China Mobile IDC) by the processing center to complete the object communication calculation.10.key areasInternet of Things 4 key areas:(1) RFID;(2) sensor network;(3) The M2M;(4) integration of the two.11.TrendIndustry experts believe that the Internet of things on the one hand can improve economic efficiency and significant cost savings; the other hand, can provide technical impetus to global economic recovery. Currently, the United States, the European Union are all invested heavily in-depth study to explore the Internet of Things. The country is also highly concerned about the emphasis of Things, Industry and Information T echnology Ministry in conjunction with the relevant departments are conducting research in a new generation of IT to the formation of policies and measures to support the development of a new generation of IT.China Mobile CEO Wang Jianzhou has repeatedly mentioned the Internet of Things will become the focus of future development of China Mobile. He will be invited to T aiwan to produce RFID, sensors and bar code manufacturers and China Mobile. According to him, the use of the Internet of Things technology, Shanghai Mobile has a number of industrial customers tailor the data collection, transmission, processing and business management in one set of wireless application solutions. The latest data show that Shanghai Mobile has more than 100,000 chips mounted on a taxi, bus, various forms of matter networking applications in all walks of prowess, to ensure the orderly operation of the city. During the Shanghai World Expo, "the bus services through" will be fully applied to the Shanghai public transport system, the smooth flow traffic to the most advanced technology to protect Expo area; for logistics transportation management, e-logistics ", will provide users with real-time accurate information of Cargo, vehicle tracking and positioning, the transport path selection, logistics network design and optimization services greatly enhance the comprehensive competitiveness of logistics enterprises.In addition, the popularization of the "Internet of Things" for the number of animals, plants and machinery, sensors and RFID tags of items and related interface devices will greatly exceed the number of mobile phones. The promotion of the Internet of Things willbecome a drive to promote economic development for the industry to open up a potential development opportunities. According to the current demand on the Internet of Things, in recent years, billions of sensors and electronic tags, which will greatly promote the production of IT components, while increasing the number of job opportunities.According to reports, it is necessary to truly build an effective Internet of things, there are two important factors. First, the scale, only with the scale to make the items of intelligence play a role. For example, a city of one million vehicles, if we only 10000 vehicles installed on the smart system, it is impossible to form an intelligent transportation system; two mobility items are usually not static, but in the state of the movement , we must maintain the items in the state of motion, and even high-speed motion state can at any time for dialogue.FORRESTER of the authority of the U.S. advisory body predicted that 2020, the world of business of the Internet of Things, compared with the business of interpersonal communication, will reach 30 to 1, so the "Internet of Things" is known to be the next one trillion communications services.Internet of Things heat wave Why is rapidly growing in China? Internet of Things in China rapid rise thanks to the several advantages of our country in terms of things.In the early 1999 launched the Internet of Things core sensor network technology research, R & D level in the world; the second, sensor network field in the world, China is the standard one of the dominant country, the patent owner; third China is one of the countries to achieve a complete industrial chain of Things; Fourth, China's wireless communications network and broadband coverage provides a solid infrastructure to support the development of the Internet of Things; Fifth, China has become the world's first the three major economies, with strong economic strength to support the development of the Internet of Things.12.MythThe current understanding of the Internet of things there are a lot of misunderstanding, which is also a direct impact on our understanding of Things on the development of the logistics industry, it is necessary first to distinguish errors, clarify our thinking.One sensor networks or RFID network equivalent of Things. The fact that sensortechnology, or RFID technology, or are simply one of the information collection technology. In addition to the sensor technology and RFID technology, GPS, video recognition, infrared, laser, scanning can be achieved automatically identify physical objects to communicate technical information collection technology can become the Internet of Things. Sensor networks or RFID network is just an application of Things, but not all of Things.Second, the Internet of Things as a myriad of unlimited extension of the Internet of Things as a completely open for all things, all of the interconnections, all shared Internet platform.In fact, the Internet of Things is not simple infinite extension of the global sharing of the Internet. Even if the Internet is also not only refers to we typically think of the international sharing computer network, Internet, WAN and LAN. Internet of Things can be both an extension of our usual sense of the Internet to the matter; LAN, professional can also be based on real needs and industrial applications. The reality is not necessary and can not make all the items networking; no need to make professional, LAN must be connected to the global Internet sharing platform. Of things in the future the Internet will be very different from the professional network of similar smart logistics, smart transportation, smart grid; the intelligence community and other local area network is the largest use of space.T er, that the ubiquitous network of the Internet of Things Internet of Things, and therefore the Internet of Things is a castle in the air, is difficult to achieve the technology. In fact the Internet of things are real, many of the primary Internet of Things applications already for our services. The Internet of Things concept is introduced in many real-world applications based on polymeric integrated innovation, pre-existing network with the Internet of Things, intelligent, automated system, summarized and upgrading it upgraded from a higher perspective our knowledge.Four of Things as a basket, and everything installed inside; based on self-awareness, and only be able to interact, communication products as the Internet of Things applications. For example, just embedded some of the sensors, to become the so-called Internet of Things appliances; products labeled with RFID tags, became the Internet of Things applications.es。
英文文献与翻译:产品生命周期理论
外文翻译:产品生命周期理论原文来源:Raymond V ernon..《International investment and international trade in the product cycle》译文正文:产品生命周期(product life cycle),简称PLC,是产品的市场寿命,即一种新产品从开始进入市场到被市场淘汰的整个过程。
费农认为:产品生命是指市上的的营销生命,产中和人的生命一样,要经历形成、成长、成熟、衰退这样的周期。
就产品而言,也就是要经历一个开发、引进、成长、成熟、衰退的阶段。
而这个周期在不同的技术水平的国家里,发生的时间和过程是不一样的,期间存在一个较大的差距和时差,正是这一时差,表现为不同国家在技术上的差距,它反映了同一产品在不同国家市场上的竞争地位的差异,从而决定了国际贸易和国际投资的变化。
为了便于区分,费农把这些国家依次分成创新国(一般为最发达国家)、一般发达国家、发展中国家。
典型的产品生命周期一般可以分成四个阶段,即介绍期(或引入期)、成长期、成熟期和衰退期。
就像是人类,产品也有它自己的生命周期,从出生到死亡经过各种阶段。
新产品投入市场,便进入了介绍期。
此时产品品种少,顾客对产品还不了解,除少数追求新奇的顾客外,几乎无人实际购买该产品。
生产者为了扩大销路,不得不投入大量的促销费用,对产品进行宣传推广。
该阶段由于生产技术方面的限制,产品生产批量小,制造成本高,广告费用大,产品销售价格偏高,销售量极为有限,企业通常不能获利,反而可能亏损。
当产品进入引入期,销售取得成功之后,便进入了成长期。
成长期是指产品通过试销效果良好,购买者逐渐接受该产品,产品在市场上站住脚并且打开了销路。
这是需求增长阶段,需求量和销售额迅速上升。
生产成本大幅度下降,利润迅速增长。
与此同时,竞争者看到有利可图,将纷纷进入市场参与竞争,使同类产品供给量增加,价格随之下属,企业利润增长速度逐步减慢,最后达到生命周期利润的最高点。
旅行社管理系统中英文对照外文翻译文献
中英文对照外文翻译(文档含英文原文和中文翻译) Overview is a unified Web development model that includes the services necessary for you to build enterprise-class Web applications with a minimum of coding. is part of the .NET Framework, and when coding applications you have access to classes in the .NET Framework. You can code your applications in any language compatible with the common language runtime (CLR), including Microsoft Visual Basic, C#, JScript .NET, and J#. These languages enable you to develop applications that benefit from the common language runtime, type safety, inheritance, and so on. includes:• A page and controls framework•The compiler•Security infrastructure•State-management facilities•Application configuration•Health monitoring and performance features•Debugging support•An XML Web services framework•Extensible hosting environment and application life cycle management•An extensible designer environmentThe page and controls framework is a programming framework that runs on a Web server to dynamically produce and render Web pages. Web pages can be requested from any browser or client device, and renders markup (such as HTML) to the requesting browser. As a rule, you can use the same page for multiple browsers, because renders the appropriate markup for the browser making the request. However, you can design your Web page to target a specific browser, such as Microsoft Internet Explorer 6, and take advantage of the features of that browser. supports mobile controls for Web-enabled devices such as cellular phones, handheld computers, and personal digital assistants (PDAs). Web pages are completely object-oriented. Within Web pages you can work with HTML elements using properties, methods, and events. The page framework removes the implementation details of the separation of client and server inherent in Web-based applications by presenting a unified model for responding to client events in code that runs at the server. The framework also automatically maintains the state of a page and the controls on that page during the page processing life cycle.The page and controls framework also enables you to encapsulate common UI functionality in easy-to-use, reusable controls. Controls are written once, can be used in many pages, and are integrated into the Web page that they are placed in during rendering.The page and controls framework also provides features to control the overall look and feel of your Web site via themes and skins. You can define themes and skins and then apply them at a page level or at a control level.In addition to themes, you can define master pages that you use to create a consistent layout for the pages in your application. A single master page defines the layout and standard behavior that you want for all the pages (or a group of pages) in your application. You can then create individual content pages that contain the page-specific content you want to display. When users request the content pages, they merge with the master pageto produce output that combines the layout of the master page with the content from the content page.All code is compiled, which enables strong typing, performance optimizations, and early binding, among other benefits. Once the code has been compiled, the common language runtime further compiles code to native code, providing improved performance. includes a compiler that will compile all your application components including pages and controls into an assembly that the hosting environment can then use to service user requests.In addition to the security features of .NET, provides an advanced security infrastructure for authenticating and authorizing user access as well as performing other security-related tasks. You can authenticate users using Windows authentication supplied by IIS, or you can manage authentication using your own user database using forms authentication and membership. Additionally, you can manage the authorization to the capabilities and information of your Web application using Windows groups or your own custom role database using roles. You can easily remove, add to, or replace these schemes depending upon the needs of your application. always runs with a particular Windows identity so you can secure your application using Windows capabilities such as NTFS Access Control Lists (ACLs), database permissions, and so on. For more information on the identity of , provides intrinsic state management functionality that enables you to store information between page requests, such as customer information or the contents of a shopping cart. You can save and manage application-specific, session-specific,page-specific, user-specific, and developer-defined information. This information can be independent of any controls on the page. offers distributed state facilities, which enable you to manage state information across multiple instances of the same application on one computer or on several computers. applications use a configuration system that enables you to define configuration settings for your Web server, for a Web site, or for individual applications. You can make configuration settings at the time your applications are deployed and can add or revise configuration settings at any time with minimal impact on operational Web applications and servers. configuration settings are stored in XML-based files. Because these XML files are ASCII text files, it is simple to make configuration changes to your Web applications. You can extend the configuration scheme to suit your requirements. includes features that enable you to monitor health and performance of your application. health monitoring enables reporting of key events that provide information about the health of an application and about error conditions. These events show a combination of diagnostics and monitoring characteristics and offer a high degree of flexibility in terms of what is logged and how it is logged. supports two groups of performance counters accessible to your applications: •The system performance counter group•The application performance counter group takes advantage of the run-time debugging infrastructure to provide cross-language and cross-computer debugging support. You can debug both managed and unmanaged objects, as well as all languages supported by the common language runtime and script languages.In addition, the page framework provides a trace mode that enables you to insert instrumentation messages into your Web pages. supports XML Web services. An XML Web service is a component containing business functionality that enables applications to exchange information across firewalls using standards like HTTP and XML messaging. XML Web services are not tied to a particular component technology or object-calling convention. As a result, programs written in any language, using any component model, and running on any operating system can access XML Web services. includes an extensible hosting environment that controls the life cycle of an application from when a user first accesses a resource (such as a page) in the application to the point at which the application is shut down. While relies on a Web server (IIS) as an application host, provides much of the hosting functionality itself. The architecture of enables you to respond to application events and create custom HTTP handlers and HTTP modules. includes enhanced support for creating designers for Web server controls for use with a visual design tool such as Visual Studio. Designers enable you to build a design-time user interface for a control, so that developers can configure your control's properties and content in the visual design tool.Introduction to the C# Language and the .NET Framework C# is an elegant and type-safe object-oriented language that enables developers to build a wide range of secure and robust applications that run on the .NET Framework. You can use C# to create traditional Windows client applications, XML Web services, distributed components,client-server applications, database applications, and much, much more. Microsoft Visual C# 2005 provides an advanced code editor, convenient user interface designers, integrated debugger, and many other tools to facilitate rapid application development based on version 2.0 of the C# language and the .NET Framework.NoteThe Visual C# documentation assumes that you have an understanding of basic programming concepts. If you are a complete beginner, you might want to explore Visual C# Express Edition, which is available on the Web. You can also take advantage of any of several excellent books and Web resources on C# to learnpractical programming skills.C# syntax is highly expressive, yet with less than 90 keywords, it is also simple and easy to learn. The curly-brace syntax of C# will be instantly recognizable to anyone familiar with C, C++ or Java. Developers who know any of these languages are typically able to begin working productively in C# within a very short time. C# syntax simplifies many of the complexities of C++ while providing powerful features such as nullable value types, enumerations, delegates, anonymous methods and direct memory access, which are not found in Java. C# also supports generic methods and types, which provide increased type safety and performance, and iterators, which enable implementers of collection classes to define custom iteration behaviors that are simple to use by client code.As an object-oriented language, C# supports the concepts of encapsulation, inheritance and polymorphism. All variables and methods, including the Main method, the application's entry point, are encapsulated within class definitions. A class may inherit directly from one parent class, but it may implement any number of interfaces. Methodsthat override virtual methods in a parent class require the override keyword as a way to avoid accidental redefinition. In C#, a struct is like a lightweight class; it is astack-allocated type that can implement interfaces but does not support inheritance.In addition to these basic object-oriented principles, C# facilitates the development of software components through several innovative language constructs, including: •Encapsulated method signatures called delegates, which enable type-safe event notifications.•Properties, which serve as accessors for private member variables. •Attributes, which provide declarative metadata about types at run time.•Inline XML documentation comments.If you need to interact with other Windows software such as COM objects or native Win32 DLLs, you can do this in C# through a process called "Interop." Interop enables C# programs to do just about anything that a native C++ application can do. C# even supports pointers and the concept of "unsafe" code for those cases in which direct memory access is absolutely critical.The C# build process is simple compared to C and C++ and more flexible than in Java. There are no separate header files, and no requirement that methods and types be declared in a particular order. A C# source file may define any number of classes, structs, interfaces, and events.C# programs run on the .NET Framework, an integral component of Windows that includes a virtual execution system called the common language runtime (CLR) and a unified set of class libraries. The CLR is Microsoft's commercial implementation of the common language infrastructure (CLI), an international standard that is the basis for creating execution and development environments in which languages and libraries work together seamlessly.Source code written in C# is compiled into an intermediate language (IL) that conforms to the CLI specification. The IL code, along with resources such as bitmaps and strings, is stored on disk in an executable file called an assembly, typically with an extension of .exe or .dll. An assembly contains a manifest that provides information on the assembly's types, version, culture, and security requirements.When the C# program is executed, the assembly is loaded into the CLR, which might take various actions based on the information in the manifest. Then, if the security requirements are met, the CLR performs just in time (JIT) compilation to convert the IL code into native machine instructions. The CLR also provides other services related to automatic garbage collection, exception handling, and resource management. Code that is executed by the CLR is sometimes referred to as "managed code," in contrast to "unmanaged code" which is compiled into native machine language that targets a specific system. The following diagram illustrates the compile-time and run time relationships of C# source code files, the base class libraries, assemblies, and the CLR.Language interoperability is a key feature of the .NET Framework. Because the IL code produced by the C# compiler conforms to the Common Type Specification (CTS), IL code generated from C# can interact with code that was generated from the .NET versions of Visual Basic, Visual C++, Visual J#, or any of more than 20 otherCTS-compliant languages. A single assembly may contain multiple modules written in different .NET languages, and the types can reference each other just as if they were written in the same language.In addition to the run time services, the .NET Framework also includes an extensive library of over 4000 classes organized into namespaces that provide a wide variety of useful functionality for everything from file input and output to string manipulation to XML parsing, to Windows Forms controls. The typical C# application uses the .NET Framework class library extensively to handle common "plumbing" chores. 概述 是一个统一的 Web 开发模型,它包括您使用尽可能少的代码生成企业级 Web 应用程序所必需的各种服务。
商务翻译Unit11商务报告
SEC 6
SEC 7
SEC 8
返回
SECTION 1
SEC 2
商务报告具有自己独特的结构,绝大多数商务报告都可以分为三大部分:
引言(introduction)、正文(body)、结尾(final section)。同时,这大三部 SEC 3 分里面又包括了四个小的要素:引言里的职权范围(terms of reference)和执行程
SEC 7
SEC 8
返回
SECTION 2
SEC 1 Ⅰ.请尝试把下列商务报告的摘录翻译成汉语,注意其语言特点和所用到的翻译 技巧。
SEC 3
In line with recent efforts to increase staff satisfaction and company
efficiency, a feasibility study was carried out between January and March to
SEC 6 SEC 7
译文: 译文:
全自动 发生重大事故时能派上用场的
计算机java外文翻译外文文献英文文献
英文原文:Title: Business Applications of Java. Author: Erbschloe, Michael, Business Applications of Java -- Research Starters Business, 2008DataBase: Research Starters - BusinessBusiness Applications of JavaThis article examines the growing use of Java technology in business applications. The history of Java is briefly reviewed along with the impact of open standards on the growth of the World Wide Web. Key components and concepts of the Java programming language are explained including the Java Virtual Machine. Examples of how Java is being used bye-commerce leaders is provided along with an explanation of how Java is used to develop data warehousing, data mining, and industrial automation applications. The concept of metadata modeling and the use of Extendable Markup Language (XML) are also explained.Keywords Application Programming Interfaces (API's); Enterprise JavaBeans (EJB); Extendable Markup Language (XML); HyperText Markup Language (HTML); HyperText Transfer Protocol (HTTP); Java Authentication and Authorization Service (JAAS); Java Cryptography Architecture (JCA); Java Cryptography Extension (JCE); Java Programming Language; Java Virtual Machine (JVM); Java2 Platform, Enterprise Edition (J2EE); Metadata Business Information Systems > Business Applications of JavaOverviewOpen standards have driven the e-business revolution. Networking protocol standards, such as Transmission Control Protocol/Internet Protocol (TCP/IP), HyperText Transfer Protocol (HTTP), and the HyperText Markup Language (HTML) Web standards have enabled universal communication via the Internet and the World Wide Web. As e-business continues to develop, various computing technologies help to drive its evolution.The Java programming language and platform have emerged as major technologies for performing e-business functions. Java programming standards have enabled portability of applications and the reuse of application components across computing platforms. Sun Microsystems' Java Community Process continues to be a strong base for the growth of the Java infrastructure and language standards. This growth of open standards creates new opportunities for designers and developers of applications and services (Smith, 2001).Creation of Java TechnologyJava technology was created as a computer programming tool in a small, secret effort called "the Green Project" at Sun Microsystems in 1991. The Green Team, fully staffed at 13 people and led by James Gosling, locked themselves away in an anonymous office on Sand Hill Road in Menlo Park, cut off from all regular communications with Sun, and worked around the clock for18 months. Their initial conclusion was that at least one significant trend would be the convergence of digitally controlled consumer devices and computers. A device-independent programming language code-named "Oak" was the result.To demonstrate how this new language could power the future of digital devices, the Green Team developed an interactive, handheld home-entertainment device controller targeted at the digital cable television industry. But the idea was too far ahead of its time, and the digital cable television industry wasn't ready for the leap forward that Java technology offered them. As it turns out, the Internet was ready for Java technology, and just in time for its initial public introduction in 1995, the team was able to announce that the Netscape Navigator Internet browser would incorporate Java technology ("Learn about Java," 2007).Applications of JavaJava uses many familiar programming concepts and constructs and allows portability by providing a common interface through an external Java Virtual Machine (JVM). A virtual machine is a self-contained operating environment, created by a software layer that behaves as if it were a separate computer. Benefits of creating virtual machines include better exploitation of powerful computing resources and isolation of applications to prevent cross-corruption and improve security (Matlis, 2006).The JVM allows computing devices with limited processors or memory to handle more advanced applications by calling up software instructions inside the JVM to perform most of the work. This also reduces the size and complexity of Java applications because many of the core functions and processing instructions were built into the JVM. As a result, software developersno longer need to re-create the same application for every operating system. Java also provides security by instructing the application to interact with the virtual machine, which served as a barrier between applications and the core system, effectively protecting systems from malicious code.Among other things, Java is tailor-made for the growing Internet because it makes it easy to develop new, dynamic applications that could make the most of the Internet's power and capabilities. Java is now an open standard, meaning that no single entity controls its development and the tools for writing programs in the language are available to everyone. The power of open standards like Java is the ability to break down barriers and speed up progress.Today, you can find Java technology in networks and devices that range from the Internet and scientific supercomputers to laptops and cell phones, from Wall Street market simulators to home game players and credit cards. There are over 3 million Java developers and now there are several versions of the code. Most large corporations have in-house Java developers. In addition, the majority of key software vendors use Java in their commercial applications (Lazaridis, 2003).ApplicationsJava on the World Wide WebJava has found a place on some of the most popular websites in the world and the uses of Java continues to grow. Java applications not only provide unique user interfaces, they also help to power the backend of websites. Two e-commerce giants that everybody is probably familiar with (eBay and Amazon) have been Java pioneers on the World Wide Web.eBayFounded in 1995, eBay enables e-commerce on a local, national and international basis with an array of Web sites-including the eBay marketplaces, PayPal, Skype, and -that bring together millions of buyers and sellers every day. You can find it on eBay, even if you didn't know it existed. On a typical day, more than 100 million items are listed on eBay in tens of thousands of categories. Recent listings have included a tunnel boring machine from the Chunnel project, a cup of water that once belonged to Elvis, and the Volkswagen that Pope Benedict XVI owned before he moved up to the Popemobile. More than one hundred million items are available at any given time, from the massive to the miniature, the magical to the mundane, on eBay; the world's largest online marketplace.eBay uses Java almost everywhere. To address some security issues, eBay chose Sun Microsystems' Java System Identity Manager as the platform for revamping its identity management system. The task at hand was to provide identity management for more than 12,000 eBay employees and contractors.Now more than a thousand eBay software developers work daily with Java applications. Java's inherent portability allows eBay to move to new hardware to take advantage of new technology, packaging, or pricing, without having to rewrite Java code ("eBay drives explosive growth," 2007).Amazon (a large seller of books, CDs, and other products) has created a Web Service application that enables users to browse their product catalog and place orders. uses a Java application that searches the Amazon catalog for books whose subject matches a user-selected topic. The application displays ten books that match the chosen topic, and shows the author name, book title, list price, Amazon discount price, and the cover icon. The user may optionally view one review per displayed title and make a buying decision (Stearns & Garishakurthi, 2003).Java in Data Warehousing & MiningAlthough many companies currently benefit from data warehousing to support corporate decision making, new business intelligence approaches continue to emerge that can be powered by Java technology. Applications such as data warehousing, data mining, Enterprise Information Portals (EIP's), and Knowledge Management Systems (which can all comprise a businessintelligence application) are able to provide insight into customer retention, purchasing patterns, and even future buying behavior.These applications can not only tell what has happened but why and what may happen given certain business conditions; allowing for "what if" scenarios to be explored. As a result of this information growth, people at all levels inside the enterprise, as well as suppliers, customers, and others in the value chain, are clamoring for subsets of the vast stores of information such as billing, shipping, and inventory information, to help them make business decisions. While collecting and storing vast amounts of data is one thing, utilizing and deploying that data throughout the organization is another.The technical challenges inherent in integrating disparate data formats, platforms, and applications are significant. However, emerging standards such as the Application Programming Interfaces (API's) that comprise the Java platform, as well as Extendable Markup Language (XML) technologies can facilitate the interchange of data and the development of next generation data warehousing and business intelligence applications. While Java technology has been used extensively for client side access and to presentation layer challenges, it is rapidly emerging as a significant tool for developing scaleable server side programs. The Java2 Platform, Enterprise Edition (J2EE) provides the object, transaction, and security support for building such systems.Metadata IssuesOne of the key issues that business intelligence developers must solve is that of incompatible metadata formats. Metadata can be defined as information about data or simply "data about data." In practice, metadata is what most tools, databases, applications, and other information processes use to define, relate, and manipulate data objects within their own environments. It defines the structure and meaning of data objects managed by an application so that the application knows how to process requests or jobs involving those data objects. Developers can use this schema to create views for users. Also, users can browse the schema to better understand the structure and function of the database tables before launching a query.To address the metadata issue, a group of companies (including Unisys, Oracle, IBM, SAS Institute, Hyperion, Inline Software and Sun) have joined to develop the Java Metadata Interface (JMI) API. The JMI API permits the access and manipulation of metadata in Java with standard metadata services. JMI is based on the Meta Object Facility (MOF) specification from the Object Management Group (OMG). The MOF provides a model and a set of interfaces for the creation, storage, access, and interchange of metadata and metamodels (higher-level abstractions of metadata). Metamodel and metadata interchange is done via XML and uses the XML Metadata Interchange (XMI) specification, also from the OMG. JMI leverages Java technology to create an end-to-end data warehousing and business intelligence solutions framework.Enterprise JavaBeansA key tool provided by J2EE is Enterprise JavaBeans (EJB), an architecture for the development of component-based distributed business applications. Applications written using the EJB architecture are scalable, transactional, secure, and multi-user aware. These applications may be written once and then deployed on any server platform that supports J2EE. The EJB architecture makes it easy for developers to write components, since they do not need to understand or deal with complex, system-level details such as thread management, resource pooling, and transaction and security management. This allows for role-based development where component assemblers, platform providers and application assemblers can focus on their area of responsibility further simplifying application development.EJB's in the Travel IndustryA case study from the travel industry helps to illustrate how such applications could function. A travel company amasses a great deal of information about its operations in various applications distributed throughout multiple departments. Flight, hotel, and automobile reservation information is located in a database being accessed by travel agents worldwide. Another application contains information that must be updated with credit and billing historyfrom a financial services company. Data is periodically extracted from the travel reservation system databases to spreadsheets for use in future sales and marketing analysis.Utilizing J2EE, the company could consolidate application development within an EJB container, which can run on a variety of hardware and software platforms allowing existing databases and applications to coexist with newly developed ones. EJBs can be developed to model various data sets important to the travel reservation business including information about customer, hotel, car rental agency, and other attributes.Data Storage & AccessData stored in existing applications can be accessed with specialized connectors. Integration and interoperability of these data sources is further enabled by the metadata repository that contains metamodels of the data contained in the sources, which then can be accessed and interchanged uniformly via the JMI API. These metamodels capture the essential structure and semantics of business components, allowing them to be accessed and queried via the JMI API or to be interchanged via XML. Through all of these processes, the J2EE infrastructure ensures the security and integrity of the data through transaction management and propagation and the underlying security architecture.To consolidate historical information for analysis of sales and marketing trends, a data warehouse is often the best solution. In this example, data can be extracted from the operational systems with a variety of Extract, Transform and Load tools (ETL). The metamodels allow EJBsdesigned for filtering, transformation, and consolidation of data to operate uniformly on datafrom diverse data sources as the bean is able to query the metamodel to identify and extract the pertinent fields. Queries and reports can be run against the data warehouse that contains information from numerous sources in a consistent, enterprise-wide fashion through the use of the JMI API (Mosher & Oh, 2007).Java in Industrial SettingsMany people know Java only as a tool on the World Wide Web that enables sites to perform some of their fancier functions such as interactivity and animation. However, the actual uses for Java are much more widespread. Since Java is an object-oriented language like C++, the time needed for application development is minimal. Java also encourages good software engineering practices with clear separation of interfaces and implementations as well as easy exception handling.In addition, Java's automatic memory management and lack of pointers remove some leading causes of programming errors. Most importantly, application developers do not need to create different versions of the software for different platforms. The advantages available through Java have even found their way into hardware. The emerging new Java devices are streamlined systems that exploit network servers for much of their processing power, storage, content, and administration.Benefits of JavaThe benefits of Java translate across many industries, and some are specific to the control and automation environment. For example, many plant-floor applications use relatively simple equipment; upgrading to PCs would be expensive and undesirable. Java's ability to run on any platform enables the organization to make use of the existing equipment while enhancing the application.IntegrationWith few exceptions, applications running on the factory floor were never intended to exchange information with systems in the executive office, but managers have recently discovered the need for that type of information. Before Java, that often meant bringing together data from systems written on different platforms in different languages at different times. Integration was usually done on a piecemeal basis, resulting in a system that, once it worked, was unique to the two applications it was tying together. Additional integration required developing a brand new system from scratch, raising the cost of integration.Java makes system integration relatively easy. Foxboro Controls Inc., for example, used Java to make its dynamic-performance-monitor software package Internet-ready. This software provides senior executives with strategic information about a plant's operation. The dynamic performance monitor takes data from instruments throughout the plant and performs variousmathematical and statistical calculations on them, resulting in information (usually financial) that a manager can more readily absorb and use.ScalabilityAnother benefit of Java in the industrial environment is its scalability. In a plant, embedded applications such as automated data collection and machine diagnostics provide critical data regarding production-line readiness or operation efficiency. These data form a critical ingredient for applications that examine the health of a production line or run. Users of these devices can take advantage of the benefits of Java without changing or upgrading hardware. For example, operations and maintenance personnel could carry a handheld, wireless, embedded-Java device anywhere in the plant to monitor production status or problems.Even when internal compatibility is not an issue, companies often face difficulties when suppliers with whom they share information have incompatible systems. This becomes more of a problem as supply-chain management takes on a more critical role which requires manufacturers to interact more with offshore suppliers and clients. The greatest efficiency comes when all systems can communicate with each other and share information seamlessly. Since Java is so ubiquitous, it often solves these problems (Paula, 1997).Dynamic Web Page DevelopmentJava has been used by both large and small organizations for a wide variety of applications beyond consumer oriented websites. Sandia, a multiprogram laboratory of the U.S. Department of Energy's National Nuclear Security Administration, has developed a unique Java application. The lab was tasked with developing an enterprise-wide inventory tracking and equipment maintenance system that provides dynamic Web pages. The developers selected Java Studio Enterprise 7 for the project because of its Application Framework technology and Web Graphical User Interface (GUI) components, which allow the system to be indexed by an expandable catalog. The flexibility, scalability, and portability of Java helped to reduce development timeand costs (Garcia, 2004)IssueJava Security for E-Business ApplicationsTo support the expansion of their computing boundaries, businesses have deployed Web application servers (WAS). A WAS differs from a traditional Web server because it provides a more flexible foundation for dynamic transactions and objects, partly through the exploitation of Java technology. Traditional Web servers remain constrained to servicing standard HTTP requests, returning the contents of static HTML pages and images or the output from executed Common Gateway Interface (CGI ) scripts.An administrator can configure a WAS with policies based on security specifications for Java servlets and manage authentication and authorization with Java Authentication andAuthorization Service (JAAS) modules. An authentication and authorization service can bewritten in Java code or interface to an existing authentication or authorization infrastructure. Fora cryptography-based security infrastructure, the security server may exploit the Java Cryptography Architecture (JCA) and Java Cryptography Extension (JCE). To present the user with a usable interaction with the WAS environment, the Web server can readily employ a formof "single sign-on" to avoid redundant authentication requests. A single sign-on preserves user authentication across multiple HTTP requests so that the user is not prompted many times for authentication data (i.e., user ID and password).Based on the security policies, JAAS can be employed to handle the authentication process with the identity of the Java client. After successful authentication, the WAS securitycollaborator consults with the security server. The WAS environment authentication requirements can be fairly complex. In a given deployment environment, all applications or solutions may not originate from the same vendor. In addition, these applications may be running on different operating systems. Although Java is often the language of choice for portability between platforms, it needs to marry its security features with those of the containing environment.Authentication & AuthorizationAuthentication and authorization are key elements in any secure information handling system. Since the inception of Java technology, much of the authentication and authorization issues have been with respect to downloadable code running in Web browsers. In many ways, this had been the correct set of issues to address, since the client's system needs to be protected from mobile code obtained from arbitrary sites on the Internet. As Java technology moved from a client-centric Web technology to a server-side scripting and integration technology, it required additional authentication and authorization technologies.The kind of proof required for authentication may depend on the security requirements of a particular computing resource or specific enterprise security policies. To provide such flexibility, the JAAS authentication framework is based on the concept of configurable authenticators. This architecture allows system administrators to configure, or plug in, the appropriate authenticatorsto meet the security requirements of the deployed application. The JAAS architecture also allows applications to remain independent from underlying authentication mechanisms. So, as new authenticators become available or as current authentication services are updated, system administrators can easily replace authenticators without having to modify or recompile existing applications.At the end of a successful authentication, a request is associated with a user in the WAS user registry. After a successful authentication, the WAS consults security policies to determine if the user has the required permissions to complete the requested action on the servlet. This policy canbe enforced using the WAS configuration (declarative security) or by the servlet itself (programmatic security), or a combination of both.The WAS environment pulls together many different technologies to service the enterprise. Because of the heterogeneous nature of the client and server entities, Java technology is a good choice for both administrators and developers. However, to service the diverse security needs of these entities and their tasks, many Java security technologies must be used, not only at a primary level between client and server entities, but also at a secondary level, from served objects. By using a synergistic mix of the various Java security technologies, administrators and developers can make not only their Web application servers secure, but their WAS environments secure as well (Koved, 2001).ConclusionOpen standards have driven the e-business revolution. As e-business continues to develop, various computing technologies help to drive its evolution. The Java programming language and platform have emerged as major technologies for performing e-business functions. Java programming standards have enabled portability of applications and the reuse of application components. Java uses many familiar concepts and constructs and allows portability by providing a common interface through an external Java Virtual Machine (JVM). Today, you can find Java technology in networks and devices that range from the Internet and scientific supercomputers to laptops and cell phones, from Wall Street market simulators to home game players and credit cards.Java has found a place on some of the most popular websites in the world. Java applications not only provide unique user interfaces, they also help to power the backend of websites. While Java technology has been used extensively for client side access and in the presentation layer, it is also emerging as a significant tool for developing scaleable server side programs.Since Java is an object-oriented language like C++, the time needed for application development is minimal. Java also encourages good software engineering practices with clear separation of interfaces and implementations as well as easy exception handling. Java's automatic memory management and lack of pointers remove some leading causes of programming errors. The advantages available through Java have also found their way into hardware. The emerging new Java devices are streamlined systems that exploit network servers for much of their processing power, storage, content, and administration.中文翻译:标题:Java的商业应用。
云计算Cloud Computing-外文翻译
毕业设计说明书英文文献及中文翻译学生姓名:学号:计算机与控制工程学院:专指导教师:2017 年 6 月英文文献Cloud Computing1. Cloud Computing at a Higher LevelIn many ways, cloud computing is simply a metaphor for the Internet, the increasing movement of compute and data resources onto the Web. But there’s a difference: cloud computing represents a new tipping point for the value of network computing. It delivers higher efficiency, massive scalability, and faster, easier software development. It’s about new programming models, new IT infrastructure, and the enabling of new business models.For those developers and enterprises who want to embrace cloud computing, Sun is developing critical technologies to deliver enterprise scale and systemic qualities to this new paradigm:(1) Interoperability — while most current clouds offer closed platforms and vendor lock-in, developers clamor for interoperability. Sun’s open-source product strategy and Java™ principles are focused on providing interoperability for large-scale computing resources. Think of the existing cloud “islands” merging into a new, interoperable “Intercloud” where applications can be moved to and operate across multiple platforms.(2) High-density horizontal computing —Sun is pioneering high-power-density compute-node architectures and extreme-scale Infiniband fabrics as part of our top-tier HPC deployments. This high-density technology is being incorporated into our large-scale cloud designs.(3)Data in the cloud —More than just compute utilities, cloud computing is increasingly about petascale data. Sun’s Open Storage products offer hybrid data servers with unprecedented efficiency and performance for the emerging data-intensive computing applications that will become a key part of the cloud.These technology bets are focused on driving more efficient large-scale cloud deployments that can provide the infrastructure for next-generation business opportunities: social networks, algorithmic trading, continuous risk analysis, and so on.2. Why Cloud Computing?(1)Clouds: Much More Than Cheap ComputingCloud computing brings a new level of efficiency and economy to delivering IT resources on demand — and in the process it opens up new business models and market opportunities.While many people think of current cloud computing offerings as purely “pay by the drink” compute platforms, they’re really a convergence of two major interdependent IT trends:IT Efficiency —Minimize costs where companies are converting their IT costs from capital expenses to operating expenses through technologies such as virtualization. Cloud computing begins as a way to improve infrastructure resource deployment and utilization, but fully exploiting this infrastructure eventually leads to a new application development model.Business Agility —Maximize return using IT as a competitive weapon through rapid time to market, integrated application stacks, instant machine image deployment, and petascale parallel programming. Cloud computing is embraced as a critical way to revolutionize time to service. But inevitably these services must be built on equally innovative rapid-deployment-infrastructure models.To be sure, these trends have existed in the IT industry for years. However, the recent emergence of massive network bandwidth and virtualization technologies has enabled this transformation to a new services-oriented infrastructure.Cloud computing enables IT organizations to increase hardware utilization rates dramatically, and to scale up to massive capacities in an instant — without constantly having to invest in new infrastructure, train new personnel, or license new software. It also creates new opportunities to build a better breed of network services, in less time, for less money.IT Efficiency on a Whole New ScaleCloud computing is all about efficiency. It provides a way to deploy and access everything from single systems to huge amounts of IT resources — on demand, in realtime, at an affordable cost. It makes high-performance compute and high-capacity storage available to anyone with a credit card. And since the best cloud strategies build on concepts and tools that developers already know, clouds also have the potential to redefine the relationship between information technology and the developers and business units that depend on it.Reduce capital expenditures — Cloud computing makes it possible for companies to convert IT costs from capital expense to operating expense through technologies such as virtualization.Cut the cost of running a datacenter — Cloud computing improves infrastructure utilization rates and streamlines resource management. For example, clouds allow for self-service provisioning through APIs, bringing a higher level of automation to the datacenter and reducing management costs.Eliminate over provisioning —Cloud computing provides scaling on demand, which, when combined with utility pricing, removes the need to overprovision to meet demand. With cloud computing, companies can scale up to massive capacities in an instant.For those who think cloud computing is just fluff, take a closer look at the cloud offerings that are already available. Major Internet providers , Google, and others are leveraging their infrastructure investments and “sharing” their large-scale economics. Already the bandwidth used by Amazon Web Services (AWS) exceeds that associated with their core e-tailing services. Forward-looking enterprises of all types —from Web 2.0 startups to global enterprises — are embracing cloud computing to reduce infrastructure costs.Faster, More Flexible ProgrammingCloud computing isn’t only about hardware —it’s also a programming revolution. Agile, easy-to-access, lightweight Web protocols — coupled with pervasive horizontally scaled architecture — can accelerate development cycles and time to market with new applications and services. New business functions are now just a script away.Accelerated cycles — The cloud computing model provides a faster, more efficientway to develop the new generation of applications and services. Faster development and testing cycles means businesses can accomplish in hours what used to take days, weeks, or months.Increase agility —Cloud computing accommodates change like no other model. For example, Animoto Productions, makers of a mashup tool that creates video from images and music, used cloud computing to scale up from 50 servers to 3,500 in just three days. Cloud computing can also provide a wider selection of more lightweight and agile development tools, simplifying and speeding up the development process.The immediate impact will be unprecedented flexibility in service creation and accelerated development cycles. But at the same time, development flexibility could become constrained by APIs if they’re not truly open. Cloud computing can usher in a new era of productivity for developers if they build on platforms that are designed to be federated rather than centralized. But there’s a major shift underway in p rogramming culture and the languages that will be used in clouds.Today, the integrated, optimized, open-source Apache, MySQL, PHP/Perl/Python (AMP) stack is the preferred platform for building and deploying new Web applications and services. Cloud computing will be the catalyst for the adoption of an even newer stack of more lightweight, agile tools such as lighttpd, an open-source Web server; Hadoop, the free Java software framework that supports data-intensive distributed applications; and MogileFS, a file system that enables horizontal scaling of storage across any number of machines.(2)Compelling New Opportunities: The Cloud EcosystemBut cloud computing isn’t just about a proliferation of Xen image stacks on a restricted handful of infrastructure prov iders. It’s also about an emerging ecosystem of complementary services that provide computing resources such as on-ramps for cloud abstraction, professional services to help in deployment, specialized application components such as distributed databases, and virtual private datacenters for the entire range of IT providers and consumers.These services span the range of customer requirements, from individualdevelopers and small startups to large enterprises. And they continue to expand the levels of virtualization, a key architectural component of the cloud that offers ever-higher abstractions of underlying services.(3) How Did Cloud Computing Start?At a basic level, cloud computing is simply a means of delivering IT resources as services. Almost all IT resources can be delivered as a cloud service: applications, compute power, storage capacity, networking, programming tools, even communications services and collaboration tools.Cloud computing began as large-scale Internet service providers such as Google, Amazon, and others built out their infrastructure. An architecture emerged: massively scaled, horizontally distributed system resources, abstracted as virtual IT services and managed as continuously configured, pooled resources. This architectural model was immortalized by George Gilder in his October 2006 Wired magazine article titled “The Information Factories.” The server farms Gilder wrote about were architecturally similar to grid computing, but where grids are used for loosely coupled, technical computing applications, this new cloud model was being applied to Internet services.Both clouds and grids are built to scale horizontally very efficiently. Both are built to withstand failures of individual elements or nodes. Both are charged on a per-use basis. But while grids typically process batch jobs, with a defined start and end point, cloud services can be continuous. What’s more, clouds expand the types of resources available — file storage, databases, and Web services — and extend the applicability to Web and enterprise applications.At the same time, the concept of utility computing became a focus of IT design and operations. As Nick Carr observed in his book The Big Switch, computing services infrastructure was beginning to parallel the development of electricity as a utility. Wouldn’t it be great if you could purchase compute resources, on demand, only paying for what you need, when you need it?For end users, cloud computing means there are no hardware acquisition costs, no software licenses or upgrades to manage, no new employees or consultants to hire, nofacilities to lease, no capital costs of any kind — and no hidden costs. Just a metered, per-use rate or a fixed subscription fee. Use only what you want, pay only for what you use.Cloud computi ng actually takes the utility model to the next level. It’s a new and evolved form of utility computing in which many different types of resources (hardware, software, storage, communications, and so on) can be combined and recombined on the fly into the specific capabilities or services customers require. From CPU cycles for HPC projects to storage capacity for enterprise-grade backups to complete IDEs for software development, cloud computing can deliver virtually any IT capability, in real time. Under the circumstances it is easy to see that a broad range of organizations and individuals would like to purchase “computing” as a service, and those firms already building hyperscale distributed data centers would inevitably choose to begin offering this infrastructure as a service.(4)Harnessing Cloud ComputingSo how does an individual or a business take advantage of the cloud computing trend? It’s not just about loading machine images consisting of your entire software stack onto a public cloud like AWS — there are several different ways to exploit this infrastructure and explore the ecosystem of new business models.Use the CloudThe number and quality of public, commercially available cloud-based service offerings is growing fast. Using the cloud is often the best option for startups, research projects, Web 2.0 developers, or niche players who want a simple, low-cost way to “load and go.”If you’re an Internet startup today, you will be mandated by your investors to keep you IT spend to a minimum. This is certainly what the cloud is for.Leverage the CloudTypically, enterprises are using public clouds for specific functions or workloads. The cloud is an attractive alternative for:Development and testing — this is perhaps the easiest cloud use case for enterprises (not just startup developers). Why wait to order servers when you don’t even know if theproject will pass the proof of concept?Functional offloading — you can use the cloud for specific workloads. For example, SmugMug does its image thumbnailing as a batch job in the cloud.Augmentation —Clouds give you a new option for handling peak load or anticipated spikes in demand for services. This is a very attractive option for enterprises, but also potentially one of the most difficult use cases. Success is dependent on the statefulness of the application and the interdependence with other datasets that may need to be replicated and load-balanced across the two sites.Experimenting — Why download demos of new software, and then install, license, and test it? In the future, software evaluation can be performed in the cloud, before licenses or support need to be purchased.Build the CloudMany large enterprises understand the economic benefits of cloud computing but want to ensure strict enforcement of secur ity policies. So they’re experimenting first with “private” clouds, with a longer-term option of migrating mature enterprise applications to a cloud that’s able to deliver the right service levels.Other companies may simply want to build private clouds to take advantage of the economics of resource pools and standardize their development and deployment processes.Be the CloudThis category includes both cloud computing service providers and cloud aggregators — companies that offer multiple types of cloud services.As enterprises and service providers gain experience with the cloud architecture model and confidence in the security and access-control technologies that are available, many will decide to deploy externally facing cloud services. The phenomenal growth rates of some of the public cloud offerings available today will no doubt accelerate the momentum. Amazon’s EC2 was introduced only two years ago and officially graduated from beta to general availability in October 2008.Cloud service providers can:Provide new routes to market for startups and Web 2.0 application developersOffer new value-added capabilities such as analyticsDerive a competitive edge through enterprise-level SLAsHelp enterprise customers develop their own cloudsIf you’re building large datacenters today, you should probably be thinking about whether you’re going to offer cloud services.(5)Public, Private, and Hybrid CloudsA company may choose to use a service provider’s cloud or build its own — but is it always all or nothing? Sun sees an opportunity to blend the advantages of the two primary options:Public clouds are run by third parties, and jobs from many different customers may be mixed together on the servers, storage systems, and other infrastructure within the cloud. End users don’t know who else’s job may be me running on the same server, network, or disk as their own jobs.Private clouds are a good option for companies dealing with data protection and service-level issues. Private clouds are on-demand infrastructure owned by a single customer who controls which applications run, and where. They own the server, network, and disk and can decide which users are allowed to use the infrastructure.But even those who feel compelled in the short term to build a private cloud will likely want to run applications both in privately owned infrastructure and in the public cloud space. This gives rise to the concept of a hybrid cloud.Hybrid clouds combine the public and private cloud models. You own parts and share other parts, though in a controlled way. Hybrid clouds offer the promise of on-demand, externally provisioned scale, but add the complexity of determining how to distribute applications across these different environments. While enterprises may be attracted to the promise of a hybrid cloud, this option, at least initially, will likely be reserved for simple stateless applications that require no complex databases or synchronization.3. Cloud Computing Defined(1)Cornerstone TechnologyWhile the basic technologies of cloud computing such as horizontally scaled, distributed compute nodes have been available for some time, virtualization —the abstraction of computer resources —is the cornerstone technology for all cloud architectures. With the ability to virtualize servers (behind a hypervisor-abstracted operating system), storage devices, desktops, and applications, a wide array of IT resources can now be allocated on demand.The dramatic growth in the ubiquitous availability of affordable high-bandwidth networking over the past several years is equally critical. What was available to only a small percentage of Internet users a decade ago is now offered to the majority of Internet users in North America, Europe, and Asia: high bandwidth, which allows massive compute and data resources to be accessed from the browser. Virtualized resources can truly be anywhere in the cloud — not just across gigabit datacenter LANs and WANs but also via broadband to remote programmers and end users.Additional enabling technologies for cloud computing can deliver IT capabilities on an absolutely unprecedented scale. Just a few examples:Sophisticated file systems such as ZFS can support virtually unlimited storage capacities, integration of the file system and volume management, snapshots and copy-on-write clones, on-line integrity checking, and repair.Patterns in architecture allow for accelerated development of superscale cloud architectures by providing repeatable solutions to common problems.New techniques for managing structured, unstructured, and semistructured data can provide radical improvements in data-intensive computing.Machine images can be instantly deployed, dramatically simplifying and accelerating resource allocation while increasing IT agility and responsiveness.(2)The Architectural Services Layers of Cloud ComputingWhile the first revolution of the Internet saw the three-tier (or n-tier) model emerge as a general architecture, the use of virtualization in clouds has created a new set of layers: applications, services, and infra structure. These layers don’t just encapsulateon-demand resources; they also define a new application development model. And within each layer of abstraction there are myriad business opportunities for defining services that can be offered on a pay-per-use basis.Software as a Service (SaaS)SaaS is at the highest layer and features a complete application offered as a service, on demand, via multitenancy — meaning a single instance of the software runs on the provider’s infrastructure and serves multiple client organizations.The most widely known example of SaaS is , but there are now many others, including the Google Apps offering of basic business services such as e-mail. Of course, ’s multitenant application has preceded the definition of cloud computing by a few years. On the other hand, like many other players in cloud computing, now operates at more than one cloud layer with its release of , a companion application development environment, or platform as a service. Platform as a Service (PaaS)The middle layer, or PaaS, is the encapsulation of a development environment abstraction and the packaging of a payload of services. The archetypal payload is a Xen image (part of Amazon Web Services) containing a basic Web stack (for example, a Linux distro, a Web server, and a programming environment such as Pearl or Ruby).PaaS offerings can provide for every phase of software development and testing, or they can be specialized around a particular area, such as content management.Commercial examples include Google App Engine, which serves applications on Google’s infrastructure. PaaS services such as these can provide a great deal of flexibility but may be constrained by the capabilities that are available through the provider.Infrastructure as a Service (IaaS)IaaS is at the lowest layer and is a means of delivering basic storage and compute capabilities as standardized services over the network. Servers, storage systems, switches, routers, and other systems are pooled (through virtualization technology, for example) to handle specific types of workloads —from batch processing toserver/storage augmentation during peak loads.The best-known commercial example is Amazon Web Services, whose EC2 and S3 services offer bare-bones compute and storage services (respectively). Another example is Joyent whose main product is a line of virtualized servers which provide a highly scalable on-demand infrastructure for running Web sites, including rich Web applications written in Ruby on Rails, PHP, Python, and Java.中文翻译云计算1.更高层次的云计算在很多情况下,云计算仅仅是互联网的一个隐喻,也就是网络上运算和数据资源日益增加的一个隐喻。
企业信息化建设外文翻译文献
企业信息化建设外文翻译文献(文档含中英文对照即英文原文和中文翻译)原文:Analysis on the informatization construction of small and medium-sized enterprisesWorsley Susan【Abstract】:with the rapid development of information technology, the domestic,small and medium-sized enterprise informatization construction has entered a new stage ofdeve1opment, small and medium-sized enterprise informatization has become the small and medium enterprises out of its own advantage, improve competitive,advantage to enhance competition ability and development ability is an important choice. This paper analyzes the important role of informatization in small and medium-sized enterprises, summarizes the main problems in information system construction, and puts forwardthe countermeasures to solve the problem.IntroductionA l ong w ith the information technique change rapid l y deve l opme n t, eco n omic g lo ba l iz a ti o n a nd th e knowle dg e e co n o m y r ap id de vel opmen t,mar ket c o m pe titi o n b e co m ing i nc r easi n gly fi e rc e, man y s m all a nd m e d i um en t e rp ri se s q u i cke n th e informatiza t io n co n s tr uc t ion, ente rp rise i nformat i zation leve l direc tl y affects the com p e t itiveness o f ente rp rises. Enter p rise info r mat i zation i s t o show the en t erpr i se i s in p r o d uct i on, ci r c u lation and service and o th er busi n ess ac ti vities,th e use o f mo d ern information techno1ogy, t hrough adva n ced com p uter n etwork t echno l ogy to i n teg r ate the ex i sting p ro du ctio n, management, design,man uf ac tu ri n g a nd other secto r s, ente rp r i ses r eal i ze the automa t io n o f the p roduct i on p rocess, management o f the network, intell i ge n ce of d ecision-making a nd bu siness ope r at i o n o f the elec tr onic, so as t o improve th e econo m ic ef f ic i ency of e n ter p rises and th e co m pet i t i veness ofente rp r i ses i n the p r ocess.1.Strengthening the informatization construction of small and medium-sizedenterprises the important role1.1contribute to the technical progress of the enterpriseInformation tech n o l ogy promotes the sma ll and medium-sized enterprise technology innovation. Be helpful for technical innovation in enterprises of interstitial diffusio n.1.2contributes to improve the adaptability of enterprisesWith the h elp of info r mation t ech n ology and network, the en t erpr i se can time l y access to ma rk e t i n forma t ion, t o ex p and th e sco p e of the ma rk e t, be he lp ful for fac t o r o f p r oduct i on opt i mize con fi gu r at i on, ma k e th e ente rp rise adap t t o vary fr om m i n u te to min u te market e n vironme nt, enhance th e e n ter pri se ag ilit y.1.3to help improve the management efficiency of enterprisesIn f orma t ion management autom a tion, i nte ll igent ca n redu c e the cos t of po li cy, imp r ove th e ef fi ciency o f d e ci sio n ma ki ng.2.the current small and medium-sized enterprise informatization to build theproblem of existence2.1misunderstandingsAlthough many medium and small enterprises have different levels to carry out the informatization construction,but most are not on what is enterprise informatization, how to carry out informatization to have a thorough understanding.Many managers think that informatization construction is the enterprise business process" original copy", use the computer instead of manual operation, the traditiona1 habits and standard on the system and using the process of evaluation, and accordingly put forward to modify an opinion.2.2insufficient capital investmentEnterprise informatization is a n eed fo r lo n g-te r m deve l opme nt of investme nt p r ojec t, n o t on l y in the i ni t i a l stage w i1l cos t a lo t o f money t o buy ha rd ware and m a t chi n g software reso ur ce, in the la tt er par t of t he t ra i n i ng of person n el t ec hni cal f o ll ow-up sys t em up g r a d e a n d mai nt e n ance aspec t is t o i n ves t e n or m ous ca pi tal.2.3composite talent shortageSmall and medium-sized enterprises have already know IT technology and understand the business processes and complex business management backbone little talent which to a large extent restricts the small and medium-sized enterprise informatization construction quality and speed.2.4Management supporting backwardEnterprise information to promote information technology plays its role in management must with the advanced management means and methods to combine, melting into the modern management idea and method.2.5Problems in the external environment1)Government support is not enough, the lack of scientific guidance. Governmentsupport for small and medium sized enterprise informatization construction is not enough, insufficient guidance, mainly reflected in the following two aspects: first, large enterprises is present at all levels of Government Informatization Transformation of special funds focus on the funding, and the informatization construction of small and medium sized enterprises lack of attention; the, government departments themselves in the process of information did not take the lead, such as lack of the information-based degree of the industrial and commercial bureau, tax bureau, making every month the company but also to the Inland Revenue Department ranked team for a long time to make statements and so on, which in a certain extent, affected the enthusiasm of the informatization construction of small and medium sized enterprises.2)The relevant laws and regulations are not perfect. At present our country in theinformation construction of enterprises is still not unified planning and standards, the corresponding laws and regulations are not perfect, the informatization construction of the regional industry basically in a state of fragmentation. For the network economic crimes, China is also lack of effective technical means and legal sanctions basis, so the first use of information technology companies to pay the price is relatively large. So many small and medium enterprises in the face of dazzling computer hardware and software market and numerous information systems development failures phenomenon, many confused, indecisive.3)Services Limited, the environment is poor. Compared with foreign countries, thedevelopment of China's software industry is lagging behind. On the market a lot of enterprise information solutions are provided by foreign large software companies, such as SAP, the United States, the United States, and so on.However, these programs are very expensive, small and medium enterprises can not afford to buy. Although there are a lot of Domestic Company for small and medium enterprises to provide the so-called tailored management software products, the price is not expensive, but the software can not meet the actual needs of small and medium enterprises, service has not kept up with. In addition, the small and medium enterprises in the construction of information technology has expertise in consulting company, the construction of information technology is not enough, leading to the project quality can not be guaranteed. Electronic payment, information security, social credit system and other aspects of the existing problems that the enterprise believes that now is not the best time to carry out information.3.Accelerating the information construction of small and medium-sizedenterprises measures3.1Enterprise1)Correct understanding of informationThe rapid development in information technology today economic globalization pace accelerate, make enterprise information construction becomes the trend of the times to be a trend which cannot be rmation process, which is to integratethe various resources within the enterprise through the computer network technology, optimize the management process, and then improve the process of economic efficiency and competitiveness of enterprises. Enterprise information is not equal to the simple computer, it is a complex process. Only business process reengineering, so that information technology into the enterprise's financial, sales, planning, production, procurement and other business processes, or else simply do not talk about what the enterprise information.2)Accelerate composite information talentsEnterprises should establish corresponding mechanism cultivate and maintain a technology to improve the team all staff and managers in the management of information technology knowledge and theory level.Talents are the most valuable resources for enterprises. In order to promote the development of information technology, small and medium enterprises must do a good job in both hands. On the one hand, enterprises must formulate human resource strategy, adopt various methods and means to recruit and introduce talents for enterprises, especially the advanced technology. On the other hand, enterprises should carry out more training activities within the enterprise, through technical exchanges and cooperation and other ways to cultivate a large number of professional knowledge, with practical ability of information technology personnel, improve the comprehensive ability of the enterprise to improve the normal operation of enterprise information.3)Take the key breakthrough of phased implementationEnterprise information is a step is not possible nor practical, should take steps to implement, key breakthrough system construction mode, can be divided into several different stages to implement it step by step. As small and medium-sized enterprises, by their own limitations, can input information construction funds will not too much.4)Plays by society and government supportOur country small and medium-sized enterprise information is still in its infancy, is inseparable from the government’s guidance and social support.Small and medium enterprise informationization is a revolution ,is a complex and arduous systemproject ,involving all aspects of the business small and medium-sized enterprise informatization level is directly related to the level of the whole national informatization level. Small and medium-sized enterprises want to survive and develop, infromatization construction to be imperative informatization construction of small and medium-sized enterprises to obtain the competitive advantage will become the inevitable choice.5)To make the overall planning of enterprise informationEnterprise information planning, also known as enterprise IT planning, it is the guidance of enterprise development strategy, diagnosis and analysis of enterprise management status, optimize the business process, and put forward the enterprise information system architecture, determine the logic relationship between each part of the information system. In the preparation of enterprise information construction, the research on the status quo and future development of enterprises should be made, including a series of complete planning including enterprise information network, technical route, the choice of software, implementation and consulting team, information realization steps and so on.3.2government and social aspects1)To strengthen the policy support to the informatization construction of small andmedium sized enterprises.To give full play to the role of the national enterprise information work leading group and local business information work leading group, all levels of government information technology to reform the special funds also have a certain tilt, adhere to the policy of the government to promote, market guidance, business entities, industry breakthrough, regional expansion, and strengthen enterprise information engineering support, and provide more effective macro guidance, organization and policy support.2)To create a good legal environment. Governments at all levels should developinformation management regulations as soon as possible,Strengthen the management of information resources. In order to solve theproblem of security and electronic contract authentication of online transactions and settlement, online contract law should be introduced as soon as possible to enhance the security of online transactions. To strengthen the laws and regulations on the fight against Internet crimes and to strengthen the protection of intellectual property rights. At the same time, we should further improve the information security monitoring system, establish an effective mechanism for information security and emergency handling mechanism, in the focus on the protection of basic network and important system security based on comprehensive information security protection.3)To strengthen the information guidance, play the role of the third party resourcesand platform.Small and medium enterprise information is still in the enlightenment, need to actively cooperate with the full range of positive guidance. Government to play the role of policy guidance to play the role of enterprise information, the media should play an active role in promoting and promoting the role of. At the same time, we should give full play to the role of the third party resources and platform. If the enterprise from the construction of network platform, run the server group, support a team to start, really need a high input. But in fact, they can outsource these operations, the business can only focus on the core business process. The use of third party platform to establish supply management system, often can achieve the goal of low cost, high efficiency, dynamic, very worthy of small and medium enterprises for reference.4.ConclusionIn recent years, the Chinese government has strengthened the guidance andpromotion of the small and medium-sized enterprise information, and hasachieved some results. But from the level of development of informationtechnology and Chinese enterprises to participate in the global competition point of view, is still a long way to go. The government should continue to increasesupport for small and medium-sized enterprises, accelerate the construction of information infrastructure and public information resources, accelerate theconstruction of small and medium enterprise information service team, andactively carry out e-government, so as to mobilize and encourage theimplementation of information technology in small and medium enterprises.译文:中小企业信息化建设分析沃斯利-苏珊【摘要】:随着信息技术的飞速发展,国内、中小企业信息化建设进入了新的发展阶段,中小企业信息化已成为中小企业自身优势,提高竞争优势,增强竞争力和发展能力是一个重要的选择。
MOBILE APPLICATIONS
专利名称:MOBILE APPLICATIONS发明人:Adam Bosworth,Richard Burdon,AlexanderKhesin,Alexander Lloyd,Farokh H. Eskafi,KenOng,Terry Leonard Lucas,AlexanderBosworth申请号:US11857352申请日:20070918公开号:US20090300656A1公开日:20091203专利内容由知识产权出版社提供专利附图:摘要:Providing a framework for developing, deploying and managing sophisticatedmobile solutions, with a simple Web-like programming model that integrates with existing enterprise components. Mobile applications may consist of a data model definition, user interface templates, a client side controller, which includes scripts that define actions, and, on the server side, a collection of conduits, which describe how to mediate between the data model and the enterprise. In one embodiment, the occasionally-connected application server assumes that data used by mobile applications is persistently stored and managed by external systems. The occasionally-connected data model can be a METAdata description of the mobile application's anticipated usage of this data, and be optimized to enable the efficient traversal and synchronization of this data between occasionally connected devices and external systems.申请人:Adam Bosworth,Richard Burdon,Alexander Khesin,Alexander Lloyd,Farokh H. Eskafi,Ken Ong,Terry Leonard Lucas,Alexander Bosworth地址:Mercer Island WA US,Brooklyn NY US,New York NY US,New York City NY US,Brooklyn NY US,Rancho Santa Fe CA US,Snohomish WA US,Mercer Island WA US 国籍:US,US,US,US,US,US,US,US更多信息请下载全文后查看。
校园网英文文献翻译
原文题目:Campus Network planning and ConstructionAt present, China's rapid development of the cause of the campus network, to early 2003, almost all colleges have set up their own campus network, and carry out a variety of its services and applications. Campus Network build a rich learning resources to enhance the efficiency of education. But as the number of users increased dramatically increased and the pattern of operations, campus network security is increasingly conspicuous, and the ever threat to the healthy development of the campus network, as an education development of the information in-dustry should not be neglected problem. This paper focuses on the campus network design and the process of building the campus network established the goal of building, campus network technology pro-gramme design, information resources construction, application soft-ware development, network management and security, the five key is-sues." The safe management of the campus net and the maintenance sum-mary:The campus network is the infrastructure of importance of school, taking the school teaching, research, managing and outward communi-cate many roles of etc..The safe condition of the campus net affects the teaching activity of the school directly.Set up in the network of initial stage, the safe problem may still be not outstanding, but along with applied thorough, various data of the campus net would nasty play in-crement, the safe problem beginning of various each kind perplexs us.The Internet flies to develop soon, to the campus network the teach-ers and the students' life and studies have already produced the pro-found influence, the network have already not have no place in our life at. But at enjoy the convenience that high technology bring at the same time, we need to be awake of know, the safe problem of network also become the network application more and more increasingly and seri-ously huge bar, the situation that the campus network safety hazes al-ready arrived and must unify the management and resolve thoroughly, only good resolve the safe problem of network, the application of the campus network then can be healthy, high speed of development. We should consider the comprehensive usage fire wall and encrypt several measures, such as technique and the anti-virus software...etc. completely, work in coordination, strengthening the management, looking for the balance point of insure the network safety and the network efficiency from it, the safety of the comprehensive exaltation campus network, thus build up rise a set of real in keeping with safe system of the calculatornetwork of the school.Keyword:The fire wall, IDS, loophole scan,VLAN( VPN), interview row form, area etc.."The time today's knowledge-based economy and information tech-nology have the development and popularization of Internet in the world have decided the time the network will become the main tool for information. With the development of computer network technology, network has become an important platform for the exchange of infor-mation.21st century the size of the campus network and application level are reflected in schools and science teaching and learning environment an important component of the force, so we should make use of existing campus conditions, design a secure, unified campus network.Internet-based e-learning with time-sensitive, shared, interactive and many of the characteristics of the individual, so it has a traditional teaching model of unmatched advantages. It created a new teaching model, breaking the traditional teaching model at the time and space limitations, the use of advanced teaching methods and teaching meth-ods, greatly improve the teaching efficiency and teaching effectiveness, teaching and learning activities to enable a new level . Do a good job inthe design of the campus network, are among the schools, both internal and external communication between the key and convenient.This thesis focuses on the campus network design and construction process to establish the goal of building the campus network, campus network, network design principles and requirements of network tech-nology selection, selection of network equipment, as well as the for-mation of the campus network for the most important integrated wiring and other key issues, to network security issues are discussed, and give a specific network topology diagram.Large Campus Network DesignBusinesses operating large campus networks are increasingly looking for infrastructure upgrades to:(1) Handle high bandwidth applications such as voice, video, and IP multicast Improve backbone capacity for shared Ethernet or FDDI cam-pus backbones(2) Support applications based on Novell IPX, DECnet, AppleTalk, and SNA(3) Offer high availability, performance, & manageability for your com-pany's intranetDesign suggestionsUse Layer 2, Layer 3, or ATM backbone solutions to expand your large campus network. In typical designs, the buildings or different parts of the campus connect together across a high performance, switched back-bone. Network redundancy and high availability is provided at each layer.A high capacity, centralized server farm provides resources to the cam-pus, and when combined with Cisco IOS, network management strate-gies support QoS, security, troubleshooting, and other common man-agement features from end to end.Medium Campus Network DesignA medium campus consists of one large building or several buildings. Networking for a medium campus is designed for high availability, per-formance, and manageability. This is also called a 'collapsed backbone' design for medium campus networks. Additional requirements of these designs typically include:(1) High performance and availability for bandwidth applications such as voice, video, and IP multicast(2) Shared Ethernet or FDDI building backbone which is running out of capacity(3) Support for applications based on Novell IPX, DECnet, AppleTalk, and SNA Based on the Cisco AVVID architecture, these intelligent networkplatforms and products provide the basis for a complete network solu-tion.Small campus networks DesignIn most cases, network redundancy is not the top priority, but cost ef-fectiveness is. Additional requirements of these designs typically include: (1) High performance and availability for bandwidth applications such as voice, video, and IP multicast(2) Shared Ethernet or FDDI building backbone which is running out of capacity(3) Support for applications based on Novell IPX, DECnet, AppleTalk, and SNAA campus network is a building or group of buildings all connected into one enterprise network that consists of many local-area networks (LANs).A campus is generally a portion of a company (or the whole company) that is constrained to a fixed geographic area.The distinct characteristic of a campus environment is that the company that owns the campus network usually owns the physical wires deployed in the campus. The campus network topology is primarily LAN technol-ogy connecting all the end systems within the building. Campus net-works generally use LAN technologies, such as Ethernet, Token Ring, Fiber Distributed Data Interface (FDDI), Fast Ethernet, Gigabit Ethernet, and Asynchronous Transfer Mode (ATM). The Enterprise Composite Network Model. As shown in the follow figure.译文题目:校园网的规划与构建目前,我国校园网事业飞速发展,至2003年初,几乎所有的大中专院校都建立了自己的校园网,并在其上开展了多种服务和应用。
工商管理外文翻译外文文献英文文献企业文化的变革
The Evolution of the Culture of EnterpriseAbstractAt the top echelons of contemporary business, managers are becoming concerned with the unsustainability of the way companies now operate. A transformation of basic business strategies appears more and more indicated. For such transformation to be effective, the culture of the enterprise--the goals it pursues and the vision of these goals entertained by managers and collaborators--needs to change. Consequently there is a growing questioning of the viability of the typical culture of today's enterprise, and a search for more functional and timely concepts for creating anew and more timely cultural pattern.The leading edge of the globally operating world of business is becoming keenly concerned with changes in today's social, economic, and ecologic environment. At the top echelons of management an intense search is under way for up-to-date modes of thinking and acting. It comes to the fore in the emphasis managers place on corporate strategy, corporate identity, corporate philosophy, even corporate ethics. An organizational revolution is underway, as managers seek to communicate their vision with their collaborators. The importance of communication among all branches and levels of the enterprise is becoming recognized. It is also recognized that the company can only function when people under-stand what goals management pursues, and what their own role is in the achievement of the goals.Enterprise cultureThe ongoing transformation of the enterprise culture is a positive factor in our changing and unpredictable world. It means that companies are becoming moresensitive to the changes that obtain in their environment, and more ready to respond to them. The new emphasis on management and company ethics also suggests that businesses are willing to assume the responsibility that goes with their larger role in society. Global enterprises wield unprecedented power and influence, and the transformation of their culture will be a critical factor in deciding the evolution of our interdependent socio-economic and ecologic systems–and therewith our individual and collect future.The transformation of the enterprise culture is timely: the company culture dominant for most of this century became obsolete. It focused on the workings of the enterprise without much regard for its social and ecologic environment; it operated on the premise that the business of business is business--if it comes up with good products or services, it fulfills all its obligations vis-a-vis society and nature. The self-centered methods of the traditional management philosophy no longer produce acceptable results--they are like concentrating all one's skills on flying an airplane and paying scant attention to the airspace in which one is flying. The captains of contemporary business cannot be solely concerned with the internal functioning of their aircraft: they must also set a course in reference to climatic conditions, current position and projected destination, and the traffic on the network of routes criss-crossing the globe. That traffic is diversified and complex. It includes, in addition to customers, suppliers, distributors, R&D partners, technology subcontractors, and governmental departments and ministries, and numerous other cooperative and competitive aircraft, together with the social, ecologic, and even cultural milieu of the various bases of operation.Global companies no longer resemble a giant mechanism, controlled by those on top. This is new in the history of modern business. For most of the 20th century, top management could command the company structures without being influenced by, or even much concerned with, its lower echelons. Motivation for task-fulfillment wascreated by material incentives bolstered by threats; individual creativity and initiative were dismissed as unnecessary nuisance. Power was concentrated, together with responsibility and overview; middle management had access only to the information that was immediately relevant to its tasks. Following the recipes prescribed in Frederick Taylor's "scientific management", the distribution of tasks was established at headquarters and the company's functions were divided into individual work components. Planning was based on a belief in control and predictability, effects were traced to causes, and causes were quantitatively analyzed. Company operations based on cause-effect chains were given value independent of time and place: as in a machine, it was held that the same input would always produce the same output. This was the philosophy of the leading companies of the 20th century; the model for success at General Motors and Standard Oil, and the rest of the Fortune 500 group.The economic growth-environment of the post-war period did not provide grounds to modify, or even question, this philosophy. Almost anything an enterprising manager would try had a knack of succeeding; he could even engage in personal bravado. Technological progress seemed assured, and expanding markets seemed to distribute the benefits of growth. The post-war economy welcomed all entrepreneurs; they could grow as the economy did. Long-term costs, if any, were hidden in the long term. In that regard businessmen were fond of quoting Keynes: in the long term we shall all be dead. If things get better and better, why bother to look further than one's nose? There was no need to worry whether or not there would be progress, it was enough to guess what shape it would take, and how the company could benefit from it.In the 1970s and '80s the situation had changed. The economic growth curve flattened out and optimistic extrapolations failed to come true. Social alienation and anomie rose, and technology produced unexpected side-effects: scares and catastrophes at Three Mile Island, Bhopal, and Chernobyl, the ozone hole over theAntarctic, recurrent instances of acid rain and oil spill, and worsening environmental pollution in cities and on land. Belief in progress was shaken. Intellectuals and youth groups found it necessary, and some segments of society fashionable, to espouse the view that technological advance is dangerous and should be halted. Environmental effects and social value-change began to enter as factors in the equations of corporate success, and leading managers, together with consultants and management theorists, began to reexamine their operative assumptions.By the late 1980s further changes occurred in the operating environment. Environmental concerns moved from the fringes of society into the marketplace; people proved amenable to paying higher prices for products they deemed environmentally friendly; and they were known to boycott companies that remained environmentally polluting or unresponsive. New information and communication technologies came on line, markets became integrated and internationalized, product cycles became shorter and product lines diversified, and clients and consumers demanded shorter delivery times and higher quality. Competition moved into the global arena. Under these circumstances classically run hierarchical enterprises proved unable to cope. The centralization of information and its slow one-way penetration to lower echelons produced fatal mistakes-and then terminal rigidity. The companies that survived did so by transforming themselves into team-oriented multi-level decision-making and implementation structures, often in the nick of time.In the late 1990s the diffusion of information and the growth in the intensity and number of interfaces between people, departments, and divisions have radically changed the company's operative structures. Not only information, also people emerged as the key resource of the enterprise; teamwork proved to be the best way this resource could be tapped. The boundary between the company and its economic, social, and ecologic environment turned fuzzy. Within the business sphere fusions, alliances, and partnerships became commonplace. In many cases the core activities ofthe enterprise came to be sub-contracted, and work relations with other firms became as operative as company-based organizational structures. Reliance on distributors and suppliers, and linkage to local communities and ecologies turned into standard parameters of corporate functioning.Under these circumstances, there is a dire need for new and adapted management concepts. There is no dearth of advice. Theorists speak of activity bundling and the company' capacity to sustainably capture the highest portion of the total industry value-added chain's profit margin; strategy specialists emphasize the need for management to focus on dynamic competitive positioning and customer-driven processes; technology consultants stress the importance of anticipatory R&D in both products and processes; and organizational experts insist on the need for learning within net-worked teams operating beyond established company structures. Leading managers realize that their vision of the company's functioning within its global environment, and its adaptability to changes and trends in that environment, is at least equal in importance to their ability to formulate strategy and carry out operations.Management guru Tom Peters called intellectual capital a company's greatest resource, and consultants Gary Hamel and named future vision its greatest competitive advantage, more valuable than a large bank account or a lean organization. Managers who possess intellectual capital and future vision have a sense of purpose, avoid wasting time on useless experiments and dead-ends, and elicit deep commitment from their collaborators. In today's world effective leadership calls for a sound knowledge not only of current company operations and resources, but of its ability to reach strategic, financial, and organizational objectives in the years ahead. This requires considerable acumen. Because the future, as Charles Handy pointed out, could be most anything, but is not likely to be a continuation of the past.Though the enterprise needs a new and different culture, that culture must be efficient: it must enable executives to cope with ever less predictable economic conditions; offer sufficient flexibility to use new technologies as they come on line; develop adaptability for the company to enter new fields of activity and leave old ones as the opportunities present themselves; and keep track of the growing interdependence of the company with its partners and competitors and its economic and financial environment. But the new culture must also be ethical. It must recognize the impacts of the enterprise on society and on nature, and even on the conditions that we bequeath on future generations. And it must be ready to accept responsibility for these impacts.Accepting responsibility in the sphere of society and nature is not only good common sense, it is also good business sense. There are no longer definite boundaries where where a company ends and society and nature begins. The basic enduring interests of the enterprise and its social and ecological environment coincide. What is good for society and for nature is also good for the company--hence what is ultimately good for the company must also be good for society and for nature. This coincidence of interests will not change in the future; on the contrary, it will become more pronounced. The successful managers of the future will be those that recognize this fact and act on it. They will be effective as well as ethical: leaders of responsible corporate citizens in the global socio-economic-ecological system that is already emerging worldwide.Corporate cultureCorporate culture is the glue, if you will, that holds an organization together. It incorporates an organization’s values, its norms of behavior, its policies and its procedures. The most important influence on corporate culture is the national culture of the country in which the corporation is based. That may seem obvious, but thereare other factors that also help to shape a corporation’s culture—its views of and its interactions with the “outside world.” The ownership structure of the company will go a long way in defining a corporate culture. For example, the culture of a family-owned firm is likely to be quite different from that of a publicly held company. Also, the industry that the corporation is part of will help shape its cultural values. For example, a high-tech computer software firm (a relatively young industry) is likely to have a much more informal and entrepreneurial culture than say that of an investment bank (a mature industry). And, likewise, an organization in a service industry will have a different culture than that of a manufacturing or mining company. Differences in the corporate culture of organizations in the same home culture and industry may still be profound—sometimes as profound as the differences between national cultures themselves.Corporate-culture componentsLike national culture, corporate culture has some basic components that make up the whole. While national cultural components include such things as language, religion, and humor, the components of corporate culture tend to be more utilitarian. No one single component can reveal the true internal make-up of a corporation but when they are taken as a whole, they present a clear picture of a company’s values and goals. The key corporate cultural components are:●The system of rewardsWhat type of employee behavior is appreciated and rewarded? Do risk takers move up in management ranks or does the corporation reward loyalty and long-term service instead?●Hiring decisionsThe type of individual a company hires says much about its culture. Is a company ready to grow and accept new ideas by hiring a diverse workforce or is it content tokeep hiring the same type of individual to build a homogeneous workforce?●Management structureDoes the corporation have a rigid hierarchical structure? Is it managed by an executive committee or a dominating chairman?●Risk-taking strategyWhat is the corporation’s view of risk? Does it encourage taking chances, trying new products and markets? Or is it content with well-established markets and products?●Physical settingIs the office an open plan that encourages communication and a sense of egalitarianism? Or are management offices segregated from the staff workplace? Is headquarter a monument to ownership or a functional working environment?National cultural influencesAs explained previously, Asians place a high value on concept associated with social harmony, while Westerners put greater emphasis on individuals’ rights and responsibilities. It is no surprise to find that Japanese corporations almost always place great emphasis on group harmony in their corporate cultures. They design a system that rewards conformity, hire staff that is relatively homogeneous and tend to shy away from risk-taking and the entrepreneurial spirit. By the same token, it should be no surprise that many American corporations are likely to hire an entrepreneurial type and reward risk. There is no escaping the fact that a national culture shapes corporate responsibilities, practices and traditions.A pair of studies, one regarding six Asian nations completed in 1996 by Wirthlin Worldwide, and one regarding North America conducted in 1994 by David I. Hitchcock of the center for strategic and International Studies, revealed striking differences between the most cherished values of Asian and North American businessexecutives. These studies underscore the point that national cultures do have paramount influence on the formation of corporate cultures.In Asia the top seven values listed by executives were:1.hard work2.respect for learning3.honesty4.openness to new ideas5.accountability6.self-discipline7.self-relianceThe top seven north American (United States and Canada)values were:1.freedom of expression2.personal freedom3.self-reliance4.individual rights5.hard work6.personal achievement7.thinking for one’s selfCause and effectIf you look at the traits emphasized by the business executives, you can begin to build a corporate culture—albeit a stereotype—of an Asian firm and a North American firm and to understand the differences in management technique and skills between Asian corporations and North American ones. In Asia, there is no mention of individual rights or any hint of reward for “thinking for one’s self.” Hence, the type of organizational structure that5 has emerged across Asia is one of a very hierarchical, bureaucratic corporation that values such int angibles as “respect for learning” and“honesty.” By the same token, taking the values stressed by North American executives, you would expect to find corporations that are less structured and more entrepreneurial than Japanese ones—and, in general, that is very much the case. Remember, though, that within the same home culture, you still get vast differences in corporate culture. While IBM and Compaq may be in the same country and in the same industry, their corporate cultures in many ways are different.One interesting footnote from these studies was that female Asian executives had a value profile that more closely resembled that of North American. Asian women focus more on independence and self-reliance while Asian men focus more on harmony and order. This difference may be due to the fact that women have been shut out of the “old boys’ network” and have been forced to rely more on entrepreneurial skills than Asian males to succeed.Profitable corporate cultureThe concept of corporate culture is all well and good but does the concept have any measurable impact on a corporation’s bottom line or on staff behavior? It certainly does, though the impact is difficult to quantify. Having a strong corporate culture provides a clear sense of identity for staff, clarifies behavior and expectations and usually makes decision making fairly easy because so much is already defined. People know where they stand and what is expected of them. However, a strong corporate culture also has a downside. Any corporation that has an entrenched culture will find change difficult. The inabilities to be flexible, to act quickly and to change rapidly are all competitive disadvantages in the global market economy. A weak corporate culture will simply have little influence on employee behavior.Then it comes to the bottom line, it is important for a corporation to have a culture of accountability. With a strong accountability culture, a corporation can avoid imposing a costly monitoring system which often hurts employee morale anddiminishes productivity.Finally, if you have a weak or mistrusting corporate culture, employees will vote “with their feet.” In a tight labor market the bad workers will drive out the good and the situation gets even worse. A corporation will always need some type of controls but the goal is to have as few controls as possible—just enough to ensure that people don’t violate the rules.Employee reactionsIn truth, measuring the positive or negative impact of a corporate culture on a company’s bottom line re mains an elusive goal. Most companies do not quantify the effects of corporate culture. According to a 1996 global survey of business executives in Australia, Canada, France, Germany, Holland, the United Kingdom and the United states done by the consultants Proudfoot PLC, only38 percent of companies indicated that they measured the effects of their efforts to change corporate culture. Yet 86 percent claimed their culture change programs are successful. Methods of measurement included employee surveys the most common practice overall), meetings, independent surveys and informal feedback. Despite the inability to measure impact, more than half of all executives surveyed (52percent) felt that corporate culture contributes a great deal to the success of their companies. They just couldn’t say how much with any great amount of certainty.Views of successThe main goal of any corporation is to be successful. But how you define success will, of course, have an impact on how you organize our business and its culture. Again, the influence of national culture and local expectations play a paramount role in determining the corporate view. Wirthlin Consulting’s Worldwide Monitor finds what consumers in 13 countries view as for a corporation. Most consumers saidproducing the very best products and services defined success (indicating their individualistic cultures). However, in Japan, the most notable attribute was caring about the country’s social and environmental needs—a throwback to the culture’s emphasis on the importance of the group over the individual. In Italy, if a company was well run and well managed, then it was thought to be successful--an indication of concern about that culture’s history of chaotic politics and business management. In Mexico, a stable and profitable corporation was the benchmark of success. From these responses you can see the difficulties of attempting to set up a corporate culture that can effectively move across borders and meet the diverse needs of consumers in different countries.The ideal corporate cultureIt would be impossible to give precise detail on what the perfect type of corporate culture should be for a global company. It depends so much on the cultures you are operating in, the subject industry and the basic cultural components. However, there are some basic traits:Any culture needs to develop a sense of accountability among staff and employees.It needs to be coherently transmitted across cultures. If it is too akin to the headquarters’ culture, employees simply won’t accept it.Think locally, act consistently. While flexibility is important, there must be a consistent application of principles across cultures.It must be attuned to the competitive requirements of the world market and be able to change to adapt to new market conditions.Ervin Laszlo, The Journal of General Evolution. 1998, Vol. 52. pp. 181-186.企业文化的变革艾尔文.拉兹洛在当代商业的高层阶级中,经理们开始考虑不能保持公司现在的运行模式。
英文文献翻译《Enterprise Mobile Applications》译文
企业移动应用开发框架Bhuvan Unhelkar, MethodScience广受尊敬的咨询家、培训老师、作家和演讲者San Murugesan, BRITE Professional Services企业面临一些挑战派遣移动应用, 出自功能,如位置独立, contextualization 、个性化。
这six-layer 企业 移动应用开发提供了一个系统框架 和综合的解决方案,以移动应用程序开发和软件 维护。
最近几年移动技术和应用变得特别普遍,在各行各业都是。
企业都在通过采取移动技术上的应用来提高自己的运营效率(给员工提供更强的实时信息接口访问),提高产品的竞争力,利用移动革命,满足新的顾客需求。
这种移动应用为用户访问信息、应用提供了存储独立个性化,提高了用户满意度。
移动应用还能够为用户提供环境感知响应,如用户位置、使用时间或者其他属性。
例如,可以提供银行、旅游、紧急服务等和用户位置、使用时间相关的业务。
尽管移动技术和移动应用给企业带来很多新的机会,但是同样带来开发和实施的挑战。
这些挑战还不包括定位、有线网络桌面应用的挑战。
例如,企业移动应用的开发和部署必须和计算通信模式整合。
一些移动应用必须要确定用户的位置来提供服务,然后不断地追踪用户位置,来提供相应的服务和信息。
然后还包括一些安全性、可靠性、服务质量的等级等等都是新的挑战。
图1 一种新的企业移动用用分类标准。
高层应用比底层的更丰富也跟更复杂(改编自早期的M 提出的一个模型) MethodScience,一个澳大利亚咨询公司,提供卓越国际美誉在各个过程、建模和管理造成实质性的和可测量的质量在公司和软件的开发。
科学的方法成功应用,作为一个实用的学科,为广泛的客户环境。
在此,我们提出一种新的企业移动应用分类模型,建立在科学方法所提出的基础之上,同时还研究了移动应用的挑战。
为了成功的用系统的综合的方式来应对这些挑战,我们提出了六层移动应用开发框架(MADF)。
英文文献002:差异化营销策略
外文翻译差异化营销策略原文来源:.[U.S.] • Philip Kotler was, Mei Qinghao translation. Marketing Management [M]. Century Publishing Group, Shanghai People's Publishing House, 2003 p256—p259更多原创经管论文及英文文献与翻译请访问:http://经管论文.com/ ,并提供定制服务译文正文:实施差异化营销策略,首先把科学、缜密的市场调查、市场细分和市场定位作为基础。
这是因为,市场调查、市场细分和市场定位能够为企业决策者提供顾客在物质需要和精神需要的差异,准确地把握“顾客需要什么?”在此基础上,分析满足顾客差异需要的条件,要根据企业现实和未来的内外状况,研究是否具有相应的实力,目的是明确“本企业能为顾客提供什么?”这一主题材。
如果是耐用消费品,应以产品差异和服务差异为主攻方向;如果是目用消费品、食品饮料则应以建立形象差异为重点。
差异化策略是一个动态的过程。
任何差异都有不是一成不变的。
随着社会经济和科学技术的发展,顾客的需要也会随之发生变化,昨天的差异化会变成今天的一般化。
例如人们以前对手表的选择,走时准确被视为第一标准,而如今在石英技术应用之后,“准”已有成为问题,于是人们又把目光集中在款式上;手机一度被视为高收入阶层的独享之物,今天早已进入寻常百姓的手中。
如果手表生产企业再把走时准确作为追求的战略目标,显然是不宜的。
手机厂家再把目光瞄准款哥、款姐也断不能取胜。
其次,竞争对手也是在变化的,尤其是一些价格、广告、售后服务、包装等方面,是很容易被那些实施跟进策略的企业模仿。
任何差异都不会永久保持,要想使用权本企业的差异化战略成为长效药,出路只有不断创新,用创新去适应顾客需要的变化,用创新去战胜对手的“跟进”。
差异化策略是一个系统。
以上谈到的各种差异化策略只是在形容问题中的人为分类。
仓库管理系统外文翻译英文文献
仓库管理系统外文翻译英文文献核准通过,归档资料。
未经允许,请勿外传~Warehouse Management Systems (WMS).The evolution of warehouse management systems (WMS) is very similar to that of many other software solutions. Initially a system to control movement and storage of materials within a warehouse, the role of WMS is expanding to including light manufacturing, transportation management, order management, and complete accounting systems. To use the grandfather of operations-related software, MRP, as a comparison, material requirements planning (MRP) started as a system for planning raw material requirements in a manufacturing environment. Soon MRP evolved into manufacturing resource planning (MRPII), which took the basic MRP system and added scheduling and capacity planning logic. Eventually MRPII evolved into enterprise resource planning (ERP), incorporating all the MRPII functionality with full financials and customer and vendor management functionality. Now, whether WMS evolving into a warehouse-focused ERP system is a good thing or not is up to debate. What is clear is that the expansion of the overlap in functionality between Warehouse Management Systems, Enterprise Resource Planning, Distribution Requirements Planning, Transportation Management Systems, Supply Chain Planning, Advanced Planning and Scheduling, and Manufacturing Execution Systems will only increase the level ofconfusion among companies looking for software solutions for their operations.Even though WMS continues to gain added functionality, the initialcore functionality of a WMS has not really changed. The primary purposeof a WMS is to control the movement and storage of materials within an operation and process the associated transactions. Directed picking, directed replenishment, and directed put away are the key to WMS. The detailed setup and processing within a WMS can vary significantly fromone software vendor to another, however the basic logic will use a combination of item, location, quantity, unit of measure, and1order information to determine where to stock, where to pick, and in what sequence to perform these operations.At a bare minimum, a WMS should:Have a flexible location system.Utilize user-defined parameters to direct warehouse tasks and uselivedocuments to execute these tasks.Have some built-in level of integration with data collection devices.Do You Really Need WMS?Not every warehouse needs a WMS. Certainly any warehouse couldbenefit from some of the functionality but is the benefit great enoughto justify the initial and ongoing costs associated with WMS? Warehouse Management Systems are big, complex, data intensive, applications. They tend to require a lot of initial setup, a lot of system resources to run, and a lot of ongoing data management to continue to run. That’s ri ght, you need to "manage" your warehouse "management" system. Often times, large operations will end up creating a new IS department with the sole responsibility of managing the WMS.The Claims:WMS will reduce inventory!WMS will reduce labor costs!WMS will increase storage capacity!WMS will increase customer service!WMS will increase inventory accuracy!The Reality:The implementation of a WMS along with automated data collectionwill likely give you increases in accuracy, reduction in labor costs (provided the labor required to maintain the system is less than the labor saved on the warehouse floor), and a greater ability to servicethe customer by reducing cycle times. Expectations of inventoryreduction and increased storage capacity are less likely. Whileincreased accuracy and efficiencies in the receiving process may reduce the level of safety stock required, the impact of this reduction will likely be negligible in comparison to overall inventory levels. The predominant factors that control inventory levels are2lot sizing, lead times, and demand variability. It is unlikely that a WMS will have a significant impact on any of these factors. And while a WMS certainly provides the tools for more organized storage which may result in increased storage capacity, this improvement will be relative to just how sloppy your pre-WMS processes were.Beyond labor efficiencies, the determining factors in deciding to implement a WMS tend to be more often associated with the need to do something to service your customers that your current system does not support (or does not support well) such as first-in-first-out, cross-docking, automated pick replenishment, wave picking, lot tracking, yard management, automated data collection, automated material handling equipment, etc.SetupThe setup requirements of WMS can be extensive. The characteristics of each item and location must be maintained either at the detail level or by grouping similar items and locations into categories. An example of item characteristics at the detail level would include exact dimensions and weight of each item in each unit of measure the item is stocked (each, cases, pallets, etc) as well as information such as whether it can be mixed with other items in a location, whether it is rack able, max stack height, max quantity per location, hazard classifications, finished goods or raw material, fast versus slow mover, etc. Although some operations will need to set up each item this way,most operations will benefit by creating groups of similar products. For example, if you are a distributor of music CDs you would create groups for single CDs, and double CDs, maintaining the detailed dimension and weight information at the group level and only needing to attach the group code to each item. You would likely need to maintain detailed information on special items such as boxed sets or CDs in special packaging. You would also create groups for the different types of locations within your warehouse. An example would be to create three different groups (P1, P2, P3) for the three different sized forward picking locations you use for your CD picking. You then set up the quantity of single CDs that will fit in a P1, P2, and P3 location, quantity of double CDs that fit in a P1, P2, P3 location etc. You would likely also be setting up case quantities, and pallet quantities of each CD group and quantities of cases and pallets per each reserve storage location group.If this sounds simple, it is…well… sort of. In reality most operations have a much morediverse product mix and will require much more system setup. And setting up the physical characteristics of the product and locations is only part of the picture. You have set up enough so that the system knows where a product can fit and how many will fit in that location. You now need to set up the information needed to let the system decide exactly which location to pick3from, replenish from/to, and put away to, and in what sequence these events should occur (remember WMS is all about “directed” m ovement). You do this by assigning specific logic to the various combinations of item/order/quantity/location information that will occur.Below I have listed some of the logic used in determining actual locations and sequences.Location Sequence. This is the simplest logic; you simply define a flow through your warehouse and assign a sequence number to each location. In order picking this is used to sequence your picks to flow through the warehouse, in put away the logic would look for the first location in the sequence in which the product would fit.Zone Logic. By breaking down your storage locations into zones you can direct picking, put away, or replenishment to or from specific areas of your warehouse. Since zone logic only designates an area, you will need to combine this with some other type of logic to determine exact location within the zone.Fixed Location. Logic uses predetermined fixed locations per item in picking, put away, and replenishment. Fixed locations are most often used as the primary picking location in piece pick and case-pick operations, however, they can also be used for secondary storage.Random Location. Since computers cannot be truly random (nor would you want them to be) the term random location is a little misleading. Random locations generally refer to areas where products are not storedin designated fixed locations. Like zone logic, you will need some additional logic to determine exact locations.First-in-first-out (FIFO). Directs picking from the oldest inventory first.Last-in-first-out (LIFO). Opposite of FIFO. I didn't think there were any realapplications for this logic until a visitor to my site sent an email describing their operation that distributes perishable goods domestically and overseas. They use LIFO for their overseas customers (because of longer in-transit times) and FIFO for their domestic customers.Pick-to-clear. Logic directs picking to the locations with the smallest quantities on hand. This logic is great for space utilization.Reserved Locations. This is used when you want to predetermine specific locations to put away to or pick from. An application for reserved locations would be cross-docking, where you may specify certain quantities of an inbound shipment be moved to specific outbound staging locations or directly to an awaiting outbound trailer.Maximize Cube. Cube logic is found in most WMS systems however it is seldom used. Cube logic basically uses unit dimensions to calculate cube (cubic inches per unit) and then compares this to the cube capacity of the location to determine how much will fit. Now if the units are capable of being stacked into the location in a manner that fills every cubic inch of4space in the location, cube logic will work. Since this rarely happens in the real world, cube logic tends to be impractical.Consolidate. Looks to see if there is already a location with the same product stored in it with available capacity. May also create additional moves to consolidate like product stored in multiple locations.Lot Sequence. Used for picking or replenishment, this will use the lot number or lot date to determine locations to pick from or replenish from.It’s very common to combine multiple logic methods to determine the best location. Forexample you may chose to use pick-to-clear logic within first-in-first-out logic when there are multiple locations with the same receipt date. You also may change the logic based upon current workload. During busy periods you may chose logic that optimizes productivity while during slower periods you switch to logic that optimizes space utilization.Other Functionality/ConsiderationsWave Picking/Batch Picking/Zone Picking. Support for various picking methods variesfrom one system to another. In high-volume fulfillment operations, picking logic can be a critical factor in WMS selection. See my article on Order Picking for more info on these methods.Task Interleaving. Task interleaving describes functionality that mixes dissimilar tasks such as picking and put away to obtain maximum productivity. Used primarily in full-pallet-load operations, task interleaving will direct a lift truck operator to put away a pallet on his/her way to the next pick. In large warehouses this can greatly reduce travel time, not only increasing productivity, but also reducing wear on the lift trucks and saving on energy costs by reducing lift truck fuel consumption. Task interleaving is also used with cycle counting programs to coordinate a cycle count with a picking or put away task.Integration with Automated Material Handling Equipment. If you are planning onusing automated material handling equipment such as carousels, ASRS units, AGNS, pick-to-light systems, or separation systems, you’ll want to consider this during the software selection process. Since these types of automation are very expensive and are usually a core component of your warehouse, you may find that the equipment will drive the selection of the WMS. As with automated data collection, you should be working closely with the equipment manufacturers during the software selection process.5Advanced Shipment Notifications (ASN). If your vendors are capableof sendingadvanced shipment notifications (preferably electronically) and attaching compliance labels to the shipments you will want to make sure that the WMS can use this to automate your receiving process. In addition, if you have requirements to provide ASNs for customers, you will also want to verify this functionality.Yard Management. Yard management describes the function of managing the contents (inventory) of trailers parked outside the warehouse, or the empty trailers themselves. Yard management is generally associated with cross docking operations and may include the management of both inbound and outbound trailers.Labor Tracking/Capacity Planning. Some WMS systems provide functionality relatedto labor reporting and capacity planning. Anyone that has worked in manufacturing should be familiar with this type of logic. Basically, you set up standard labor hours and machine (usually lift trucks) hours per task and set the available labor and machine hours per shift. The WMS system will use this info to determine capacity and load. Manufacturing has been using capacity planning for decades with mixed results. The need to factor in efficiency and utilization to determine rated capacity is an example of the shortcomings of this process. Not that I’m necessarily against capacity planning in warehousing, I just think most operations don’t really need it and can avoid the disap pointment of trying to make it work. I am, however, a big advocate of labor tracking for individual productivity measurement. Most WMS maintain enough datato create productivity reporting. Since productivity is measured differently from one operation to another you can assume you will have to do some minor modifications here (usually in the form of custom reporting).Integration with existing accounting/ERP systems. Unless the WMS vendor hasalready created a specific interface with your accounting/ERP system (such as those provided by an approved business partner) you can expect to spend some significant programming dollars here. While we are all hoping that integration issues will be magically resolved someday by a standardized interface, we isn’t there yet. Ideally you’ll want an integrator that has already integrated the WMS you chose with the business software you are using. Since this is not always possible you at least want an integrator that is very familiar with one of the systems.WMS + everything else = ? As I mentioned at the beginning of this article, a lot ofother modules are being added to WMS packages. These would include full financials, light manufacturing, transportation management, purchasing, and sales order management. I don’t see t his as aunilateral move of WMS from an add-on module to a core system, but rather an optional approach that has applications in specific industries such as 3PLs. Using ERP systems6as a point of reference, it is unlikely that this add-onfunctionality will match the functionality of best-of-breed applications available separately. If warehousing/distribution is your core business function and you don’t want to have to deal with the integration issues of incorporating separate financials, order processing, etc. you mayfind these WMS based business systems are a good fit.Implementation TipsOutside of the standard “don’t underestimate”, “thoroughlytest”, “train, train, train” implementation tips that apply to any business software installation ,it’s i mportant to emphasize that WMSare very data dependent and restrictive by design. That is, you need to have all of the various data elements in place for the system tofunction properly. And, when they are in place, you must operate within the set parameters.When implementing a WMS, you are adding an additional layer of technology onto your system. And with each layer of technology there is additional overhead and additional sources of potential problems. Now don’t take this as a condemnation of Warehouse Management Systems. Coming from a warehousing background I definitely appreciate the functionality WMS have to offer, and, in many warehouses, this functionality is essential to their ability to serve their customers and remain competitive. It’s just impo rtant to note that every solution hasits downsides and having a good understanding of the potential implications will allow managers to make better decisions related to the levels of technology that best suits their unique environment.仓库管理系统( WMS )仓库管理系统( WMS )的演变与许多其他软件解决方案是非常相似的。
【计算机专业文献翻译】性能测试方法
届毕业设计(论文)英文参考文献英文文献1:Database Security文献出处,年,Vol.卷(期) Network Security Volume: 2003, Issue: 6, June, 2003, pp. 11-12作者: Paul Morrison英文文献2:APPROACHES TO PERFORMANCE TESTING文献出处,年,Vol.卷(期)Approaches to Performance Testing Vol.18, No.3, pp.312-319,2000作者: Matt Maccaux学生院系专业名称学生班级学生学号学生姓名学生层次APPROACHES TO PERFORMANCE TESTINGby Matt Maccaux09/12/2005AbstractThere are many different ways to go about performance testing enterprise applications, some of them more difficult than others. The type of performance testing you will do depends on what type of results you want to achieve. For example, for repeatability, benchmark testing is the best methodology. However, to test the upper limits of the system from the perspective of concurrent user load, capacity planning tests should be used. This article discusses the differences and examines various ways to go about setting up and running these performance tests.IntroductionPerformance testing a J2EE application can be a daunting and seemingly confusing task if you don't approach it with the proper plan in place. As with any software development process, you must gather requirements, understand the business needs, and lay out a formal schedule well in advance of the actual testing. The requirements for the performance testing should be driven by the needs of the business and should be explained with a set of use cases. These can be based on historical data (say, what the load pattern was on the server for a week) or on approximations based on anticipated usage. Once you have an understanding of what you need to test, you need to look at how you want to test your application.Early on in the development cycle, benchmark tests should be used to determine if any performance regressions are in the application. Benchmark tests are great for gathering repeatable results in a relatively short period of time. The best way to benchmark is to change one and only one parameter between tests. For example, if you want to see if increasing the JVM memory has any impact on the performance of your application, increment the JVM memory in stages (for example, going from 1024 MB to 1224 MB, then to 1524 MB, and finally to 2024 MB) and stop at each stage to gather the results and environment data, record this information, and then move on to the next test. This way you'll have a clear trail to follow when you are analyzing the results of the tests. In the next section, I discuss what a benchmark test looks like and the best parameters for running these tests.Later on in the development cycle, after the bugs have been worked out of the application and it has reached a stable point, you can run more complex types of tests to determine how the system will perform under different load patterns. These types of tests are called capacity planning, soak tests, and peak-rest tests, and are designed to test "real-world"-type scenarios by testing the reliability, robustness, and scalability of the application. The descriptions I use below should be taken in the abstract sense because every application's usage pattern will be different. For example, capacity-planning tests are generally used with slow ramp-ups (defined below), but if your application sees quick bursts of trafficduring a period of the day, then certainly modify your test to reflect this. Keep in mind, though, that as you change variables in the test (such as the period of ramp-up that I talk about here or the "think-time" of the users) the outcome of the test will vary. It is always a good idea to run a series of baseline tests first to establish a known, controlled environment to compare your changes with later.BenchmarkingThe key to benchmark testing is to have consistently reproducible results. Results that are reproducible allow you to do two things: reduce the number of times you have to rerun those tests; and gain confidence in the product you are testing and the numbers you produce. The performance-testing tool you use can have a great impact on your test results. Assuming two of the metrics you are benchmarking are the response time of the server and the throughput of the server, these are affected by how much load is put onto the server. The amount of load that is put onto the server can come from two different areas: the number of connections (or virtual users) that are hitting the server simultaneously; and the amount of think-time each virtual user has between requests to the server. Obviously, the more users hitting the server, the more load will be generated. Also, the shorter the think-time between requests from each user, the greater the load will be on the server. Combine those two attributes in various ways to come up with different levels of server load. Keep in mind that as you put more load on the server, the throughput will climb, to a point.Figure 1. The throughput of the system in pages per second as load increases over timeNote that the throughput increases at a constant rate and then at some point levels off.At some point, the execute queue starts growing because all the threads on the server will be in use. The incoming requests, instead of being processed immediately, will be put into a queue and processed when threads become available.Figure 2. The execute queue length of the system as load increases over timeNote that the queue length is zero for a period of time, but then starts to grow at a constant rate. This is because there is a steady increase in load on the system, and although initially the system had enough free threads to cope with the additional load, eventually it became overwhelmed and had to start queuing them up.When the system reaches the point of saturation, the throughput of the server plateaus, and you have reached the maximum for the system given those conditions. However, as server load continues to grow, the response time of the system also grows even as the throughput plateaus.Figure 3. The response times of two transactions on the system as load increases over timeNote that at the same time as the execute queue (above) starts to grow, the response time also starts to grow at an increased rate. This is because the requests cannot be served immediately.To have truly reproducible results, the system should be put under a high load with no variability. To accomplish this, the virtual users hitting the server should have 0 seconds of think-time between requests. This is because the server is immediately put under load and will start building an execute queue. If the number of requests (and virtual users) is kept consistent, the results of the benchmarking should be highly accurate and very reproducible.One question you should raise is, "How do you measure the results?" An average should be taken of the response time and throughput for a given test. The only way to accurately get these numbers though is to load all the users at once, and then run them for a predetermined amount of time. This is called a "flat" run.Figure 4. This is what a flat run looks like. All the users are loaded simultaneously.The opposite is known as a "ramp-up" run.Figure 5. This is what a ramp-up run looks like. The users are added at a constant rate (x number per second) throughout the duration of the test.The users in a ramp-up run are staggered (adding a few new users every x seconds). The ramp-up run does not allow for accurate and reproducible averages because the load on the system is constantly changing as the users are being added a few at a time. Therefore, the flat run is ideal for getting benchmark numbers.This is not to discount the value in running ramp-up-style tests. In fact, ramp-up tests are valuable for finding the ballpark in which you think you later want to run flat runs. The beauty of a ramp-up test is that you can see how the measurements change as the load on the system changes. Then you can pick the range you later want to run with flat tests.The problem with flat runs is that the system will experience "wave" effects.Figure 6. The throughput of the system in pages per second as measured during a flat runNote the appearance of waves over time. The throughput is not smooth but rather resembles a wave pattern.This is visible from all aspects of the system including the CPU utilization.Figure 7. The CPU utilization of the system over time, as measured during a flat runNote the appearance of waves over a period of time. The CPU utilization is not smooth but rather has very sharp peaks that resemble the throughput graph's waves.Additionally, the execute queue experiences this unstable load, and therefore you see the queue growing and shrinking as the load on the system increases and decreases over time.Figure 8. The execute queue of the system over time as measured during a flat runNote the appearance of waves over time. The execute queue exactly mimics the CPU utilization graph above.Finally, the response time of the transactions on the system will also resemble this wave pattern.Figure 9. The response time of a transaction on the system over time as measured during a flat runNote the appearance of waves over time. The transaction response time lines up with the above graphs, but the effect is diminished over time.This occurs when all the users are doing approximately the same thing at the same time during the test. This will produce very unreliable and inaccurate results, so something must be done to counteract this. There are two ways to gain accurate measurements from these types of results. If the test is allowed to run for a very long duration (sometimes several hours, depending on how long one user iteration takes) eventually a natural sort of randomness will set in and the throughput of the server will "flatten out." Alternatively, measurements can be taken only between two of the breaks in the waves. The drawback of this method is that the duration you are capturing data from is going to be short.Capacity PlanningFor capacity-planning-type tests, your goal is to show how far a given application can scale under a specific set of circumstances. Reproducibility is not as important here as in benchmark testing because there will often be a randomness factor in the testing. This is introduced to try to simulate a more customer-like or real-world application with a real user load. Often the specific goal is to find out how many concurrent users the system can support below a certain server response time. As an example, the question you may ask is, "How many servers do I need to support 8,000 concurrent users with aresponse time of 5 seconds or less?" To answer this question, you'll need more information about the system.To attempt to determine the capacity of the system, several factors must be taken into consideration. Often the total number of users on the system is thrown around (in the hundreds of thousands), but in reality, this number doesn't mean a whole lot. What you really need to know is how many of those users will be hitting the server concurrently. The next thing you need to know is what the think-time or time between requests for each user will be. This is critical because the lower the think-time, the fewer concurrent users the system will be able to support. For example, a system that has users with a1-second think-time will probably be able to support only a few hundred concurrently. However, a system with a think-time of 30 seconds will be able to support tens of thousands (given that the hardware and application are the same). In the real world, it is often difficult to determine exactly what the think-time of the users is. It is also important to note that in the real world users won't be clicking at exactly that interval every time they send a request.This is where randomization comes into play. If you know your average user has a think-time of 5 seconds give or take 20 percent, then when you design your load test, ensure that there is 5 seconds +/- 20 percent between every click. Additionally, the notion of "pacing" can be used to introduce more randomness into your load scenario. It works like this: After a virtual user has completed one full set of requests, that user pauses for either a set period of time or a small, randomized period of time (say, 2 seconds +/- 25 percent), and then continues on with the next full set of requests. Combining these two methods of randomization into the test run should provide more of a real-world-like scenario.Now comes the part where you actually run your capacity planning test. The next question is, "How do I load the users to simulate the load?" The best way to do this is to try to emulate how users hit the server during peak hours. Does that user load happen gradually over a period of time? If so, a ramp-up-style load should be used, where x number of users are added ever y seconds. Or, do all the users hit the system in a very short period of time all at once? If that is the case, a flat run should be used, where all the users are simultaneously loaded onto the server. These different styles will produce different results that are not comparable. For instance, if a ramp-up run is done and you find out that the system can support 5,000 users with a response time of 4 seconds or less, and then you follow that test with a flat run with 5,000 users, you'll probably find that the average response time of the system with 5,000 users is higher than 4 seconds. This is an inherent inaccuracy in ramp-up runs that prevents them from pinpointing the exact number of concurrent users a system can support. For a portal application, for example, this inaccuracy is amplified as the size of the portal grows and as the size of the cluster is increased.This is not to say that ramp-up tests should not be used. Ramp-up runs are great if the load on the system is slowly increased over a long period of time. This is because the system will be able to continually adjust over time. If a fast ramp-up is used, the system will lag and artificially report a lower response time than what would be seen if a similar number of users were being loaded during a flat run.So, what is the best way to determine capacity? Taking the best of both load types and running a series of tests will yield the best results. For example, using a ramp-up run to determine the range of users that the system can support should be used first. Then, once that range has been determined, doing a series of flat runs at various concurrent user loads within that range can be used to more accurately determine the capacity of the system.Soak TestsA soak test is a straightforward type of performance test. Soak tests are long-duration tests with a static number of concurrent users that test the overall robustness of the system. These tests will show any performance degradations over time via memory leaks, increased garbage collection (GC), or other problems in the system. The longer the test, the more confidence in the system you will have. It is a good idea to run this test twice—once with a fairly moderate user load (but below capacity so that there is no execute queue) and once with a high user load (so that there is a positive execute queue).These tests should be run for several days to really get a good idea of the long-term health of the application. Make sure that the application being tested is as close to real world as possible with a realistic user scenario (how the virtual users navigate through the application) testing all the features of the application. Ensure that all the necessary monitoring tools are running so problems will be accurately detected and tracked down later.Peak-Rest TestsPeak-rest tests are a hybrid of the capacity-planning ramp-up-style tests and soak tests. The goal here is to determine how well the system recovers from a high load (such as one during peak hours of the system), goes back to near idle, and then goes back up to peak load and back down again.The best way to implement this test is to do a series of quick ramp-up tests followed by a plateau (determined by the business requirements), and then a dropping off of the load. A pause in the system should then be used, followed by another quick ramp-up; then you repeat the process. A couple things can be determined from this: Does the system recover on the second "peak" and each subsequent peak to the same level (or greater) than the first peak? And does the system show any signs of memory or GC degradation over the course of the test? The longer this test is run (repeating the peak/idle cycle over and over), the better idea you'll have of what the long-term health of the system looks like.ConclusionThis article has described several approaches to performance testing. Depending on the business requirements, development cycle, and lifecycle of the application, some tests will be better suited than others for a given organization. In all cases though, you should ask some fundamental questions before going down one path or another. The answers to these questions will then determine how to best test the application.These questions are:∙How repeatable do the results need to be?∙How many times do you want to run and rerun these tests?∙What stage of the development cycle are you in?∙What are your business requirements?∙What are your user requirements?∙How long do you expect the live production system to stay up between maintenance downtimes?∙What is the expected user load during an average business day?By answering these questions and then seeing how the answers fit into the above performance test types, you should be able to come up with a solid plan for testing the overall performance of your application. Additional Reading∙WebLogic Server Performance and Tuning - WebLogic Server product documentation∙WebLogic Server performance tools and information - WebLogic Server product documentation ∙The Grinder: Load Testing for Everyone by Philip Aston (dev2dev, November 2002)∙Performance Tuning Guide - WebLogic Portal product documentation∙dev2dev WebLogic Server Product Center性能测试方法对于企业应用程序,有许多进行性能测试的方法,其中一些方法实行起来要比其他方法困难。
计算机英文文献加翻译
Management Information System OverviewManagement Information System is that we often say that the MIS, is a human, computers and other information can be composed of the collection, transmission, storage, maintenance and use of the system, emphasizing the management, stressed that the modern information society In the increasingly popular. MIS is a new subject, it across a number of areas, such as scientific management and system science, operations research, statistics and computer science. In these subjects on the basis of formation of information-gathering and processing methods, thereby forming a vertical and horizontal weaving, and systems.The 20th century, along with the vigorous development of the global economy, many economists have proposed a new management theory. In the 1950s, Simon made dependent on information management and decision-making ideas. Wiener published the same period of the control theory, that he is a management control process. 1958, Gail wrote: "The management will lower the cost of timely and accurate information to better control." During this period, accounting for the beginning of the computer, data processing in the term.1970, Walter T. Kenova just to the management information system under a definition of the term: "verbal or written form, at the right time to managers, staff and outside staff for the past, present, the projection of future Enterprise and its environment-related information 原文请找腾讯3249114六,维^论~文.网 no application model, no mention of computer applications.1985, management information systems, the founder of the University of Minnesota professor of management at the Gordon B. Davis to a management information system a more complete definition of "management information system is a computer hardware and software resources, manual operations, analysis, planning , Control and decision-making model and the database - System. It provides information to support enterprises or organizations of the operation, management and decision-making function. "Comprehensive definition of thisExplained that the goal of management information system, functions and composition, but also reflects the management information system at the time of level.With the continuous improvement of science and technology, computer science increasingly mature, the computer has to be our study and work on the run along. Today, computers are already very low price, performance, but great progress, and it was used in many areas, the computer was so popular mainly because of the following aspects: First, the computer can substitute for many of the complex Labor. Second, the computer can greatly enhance people's work efficiency. Third, the computer can save a lot of resources. Fourth, the computer can make sensitive documents more secure.Computer application and popularization of economic and social life in various fields. So that the original old management methods are not suited now more and social development. Many people still remain in the previous manual. This greatly hindered the economic development of mankind. In recent years, with the University of sponsoring scale is growing, the number of students in the school also have increased, resulting in educational administration is the growing complexity of the heavy work, to spend a lot of manpower, material resources, and the existing management of student achievement levels are not high, People have been usin g the traditional method of document management student achievement, the management there are many shortcomings, such as: low efficiency, confidentiality of the poor, and Shijianyichang, will have a large number of documents and data, which is useful for finding, updating andmaintaining Have brought a lot of difficulties. Such a mechanism has been unable to meet the development of the times, schools have become more and more day-to-day management of a bottleneck. In the information age this traditional management methods will inevitably be computer-based information management replaced.As part of the computer application, the use of computers to students student performance information for management, with a manual management of the incomparable advantages for example: rapid retrieval, to find convenient, high reliability and large capacity storage, the confidentiality of good, long life, cost Low. These advantages can greatly improve student performance management students the efficiency of enterprises is also a scientific, standardized management, and an important condition for connecting the world. Therefore, the development of such a set of management software as it is very necessary thing.Design ideas are all for the sake of users, the interface nice, clear and simple operation as far as possible, but also as a practical operating system a good fault-tolerant, the user can misuse a timely manner as possible are given a warning, so that users timely correction . T o take full advantage of the functions of visual FoxPro, design powerful software at the same time, as much as possible to reduce the occupiers system resources.Visual FoxPro the command structure and working methods:Visual FoxPro was originally called FoxBASE, the U.S. Fox Software has introduced a database products, in the run on DOS, compatible with the abase family. Fox Software Microsoft acquisition, to be developed so that it can run on Windows, and changed its name to Visual FoxPro. Visual FoxPro is a powerful relational database rapid application development tool, the use of Visual FoxPro can create a desktop database applications, client / server applications and Web services component-based procedures, while also can use ActiveX controls or API function, and so on Ways to expand the functions of Visual FoxPro.1651First, work methods1. Interactive mode of operation(1) order operationVF in the order window, through an order from the keyboard input of all kinds of ways to complete the operation order.(2) menu operationVF use menus, windows, dialog to achieve the graphical interface features an interactive operation. (3) aid operationVF in the system provides a wide range of user-friendly operation of tools, such as the wizard, design, production, etc..2. Procedure means of implementationVF in the implementation of the procedures is to form a group of orders and programming language, an extension to save. PRG procedures in the document, and then run through the automatic implementation of this order documents and award results are displayed.Second, the structure of command1. Command structure2. VF orders are usually composed of two parts: The first part is the verb order, also known as keywords, for the operation of the designated order functions; second part of the order clause, for an order that the operation targets, operating conditions and other information . VF order form are as follows:3. <Order verb> "<order clause>"4. Order in the format agreed symbols5. VF in the order form and function of the use of the symbol of the unity agreement, the meaning of these symbols are as follows:6. Than that option, angle brackets within the parameters must be based on their format input parameters.7. That may be options, put in brackets the parameters under specific requ ests from users choose to enter its parameters.8. Third, the project manager9. Create a method10. command window: CREA T PROJECT <file name>11. Project Manager12. tab13. All - can display and project management applications of all types of docume nts, "All" tab contains five of its right of the tab in its entirety.14. Data - management application projects in various types of data files, databases, free form, view, query documents.15. Documentation - display 原文请找腾讯3249114六,维^论~文.网 , statements, documents, labels and other documents.16. Category - the tab display and project management applications used in the class library documents, including VF's class library system and the user's own design of the library.17. Code - used in the project management procedures code documents, such as: program files (. PRG), API library and the use of project management for generation of applications (. APP).18. (2) the work area19. The project management work area is displayed and management of all types of document window.20. (3) order button21. Project Manager button to the right of the order of the work area of the document window to provide command.22. 4, project management for the use of23. 1. Order button function24. New - in the work area window selected certain documents, with new orders button on the new document added to the project management window.25. Add - can be used VF "file" menu under the "new" order and the "T ools" menu under the "Wizard" order to create the various independent paper added to the project manager, unified organization with management.26. Laws - may amend the project has been in existence in the various documents, is still to use such documents to modify the design interface.27. Sports - in the work area window to highlight a specific document, will run the paper.28. Mobile - to check the documents removed from the project.29. Even the series - put the item in the relevant documents and even into the application executable file.Database System Design :Database design is the logical database design, according to a forthcoming data classification system and the logic of division-level organizations, is user-oriented. Database design needsof various departments of the integrated enterprise archive data and data needs analysis of the relationship between the various data, in accordance with the DBMS.管理信息系统概要管理信息系统就是我们常说的MIS(Management Information System),是一个由人、计算机等组成的能进行信息的收集、传送、储存、维护和使用的系统,在强调管理,强调信息的现代社会中它越来越得到普及。
英文文献及翻译
The applicatห้องสมุดไป่ตู้on of e-commerce for SMEs
A great advantage of e-commerce is not only suitable for use in large enterprises, but also very beneficial to many small and medium enterprises. Relative to large enterprises, small and medium enterprises of human, financial, information technology, weak and small and medium enterprises to apply e-commerce is a new topic to be studied. Typically, the use of e-commerce has four types: information access, personal communication, shopping services, virtual enterprises.As e-commerce is a complex system engineering, it will use many new technologies, but the most important thing is the following: Electronic Data Interchange (EDI), bar codes, e-mail, Internet, WorldWideWeb, product data exchange and electronicform.The benefits of e-commerce use by SMEsFor small and medium sized e-commerce can give them to bring many new opportunities and challenges facing SMEs it can solve many difficulties and problems. The arrival of Internet for SMEs to open up a broader market space. As the information in the enterprise's competitive edge competitive play an increasingly important role, with e-commerce, information on SMEs and big business competition. Overall, the impact of electronic commerce for small and medium enterprises can be divided into the following areas: 1. Global markets, the competitiveness of SMEs traditional market can be strengthened; SMEs have more opportunities to sell the products to various countries and regions worldwide. 2. Market supply chain suppliers to provide design and engineering services required will increase; manufacturers will outsource more non-core businesses; customers will need more electronic communication for use in orders, billing and other business, when large customers that request, which will have a big impact the supply chain; customers will require their suppliers to provide more inventory management services, such as data warehouse and order management; manufacturers will continue to reduce the total number of suppliers;supply chain links between the companies will more closely. 3. Internal operations and process control with greater use of networked information technology and system integration technology, the company will improve communications and collaboration; will use more automated manufacturing technology for integrating external data and internal operations to provide greateropportunities, such as EDI and MRP systems integration; enterprises will reduce the number of employees, but will increase the workload of each employee; business operations and management costs will be reduced.4. Customer service providers will try to shorten the manufacturing of new products and services of their available time; manufacturers will try to minimize the price; product quality will be greater attention; suppliers will find a need for faster and better to provide order status information (such as the production date); businesses will pay more attention to the product after-sales service; information and telecommunications services, competition will intensify between; available to manufacturers of information and the types of telecommunications services will increase; The new e-commerce products and services will appear; human resources and work structure; computer's role in the enterprise will become more important; small company in training employees to use computers, the more difficult than those of large companies. 5. Information as business assets, the information itself will become an important marketable commodities (such as databases); company data in decision-making will play an important role; through networking, manufacturers will have more and better opportunities to access more widely useful in commercial
物联网安全问题的研究外文文献翻译
物联网安全问题的研究外文文献翻译毕业设计(论文)外文文献翻译院系:年级专业:姓名:学号:附件:指导老师评语:指导教师签名:年月日备注:1.从所引用的与毕业设计(论文)内容相近的外文文献中选择一篇或一部分进行翻译(不少于3000实词);2.外文文献翻译的装订分两部分,第一部分为外文文献;第二部分为该外文文献的中文翻译;3.外文文献正文按毕业设计(论文)格式排版,两部分内容不能联排,用分页符分页。
The Internet of thingsThe Internet of things the Internet of things the Internet of things more and more modules and sensors embedded system to enhance theirability of communication. The resulting information networks will create new business models, improve business processes, risk and reduce costs Michael cui, marcus method, and Roger RobertsIn most organizations, the information spread along the familiar path. Proprietary information is placed in the database and make a analysis in the report and then start the management chain. Information collected from public sources, Internet information collection and information from suppliers to buy.But the forecast information is changing the way: the physical world itself is becoming a kind of information system. In so-called iot, sensors, and micro devices (actuators) is embedded in the physical module from highway to heart pacemakers is through wired or wireless network connections, is often connected to the Internet using the same Internet protocol. The network transmission of data is used for computer analysis. If some modules can sense the environment and can be used for information exchange, so they can become and rapid response to solve the problem of complicated tools. The information revolution in the field of the physical information system is developing continuously, and even some will also be able to work under a single intervention.Pill shape photomicrographic device has successfully through the human digestive tract, and back to the thousands of images to pinpoint the source of the disease. Composed of satellite and ground sensor data acquisition system through the wireless device can detect crop status and connected to the precision agriculture can adjust method for everypart of the farming land. For example, by spreading more chemical fertilizers to increase poor soil fertile. Billboards in Japan, waiting for pedestrians pass by, and can assess the consumption of passers-by, and then according to the evaluation results show that the different advertising information.Yes, in many companies, or even earlier today has been warned many predict the future. With the emergence of new value creation method, the current business model is largely based on static information structure is faced with challenges. If in a specific location to a specific time you will be able to experience the mind of the buyer, then the dynamic pricing may increase the possibility of buying. Know how often, and a deep understanding of the usage of the product might get more harvest, choose addfee instead of direct selling. There are a lot of people responsible for the control of manufacturing process to get a more accurate, and can improve the production efficiency. There are such as the operating system are constantly monitored to prevent the emergence of dangerous or people can take corrective measures to avoid the occurrence of damage, risk, and to reduce the cost. Make the fullest use of these functions of the company will gain more profit than the competitor.The wide application of Internet of things is need time, but thanks to its development technology, got advance time line. Wireless technology and the further standardization of communication protocol makes it possible to collect information from the sensor at any time.Based on this, a small silicon chip is endowed with new functions, and at the same time, based on the pattern of Moore's law, its cost is falling. These largely increase the storage capacity of computer and computing power, some of the digital operation scope has expanded through the cloud computing, and reduces the cost.The Internet of things in the workIot for those technologies and not walk in the forefront of company is the news. But as these technologies mature, the enterprise deployment scope will increase. Now is the manager ofall industries to build ideas, consider the contact from theInternet of things or get potential of the development of The Times. We now know that there are six different types of emerging applications, most of which belong to the following two categories: the first, second, information and analysis, automation and control.Information and analysisDue to network increased with the product, the company's assets or data management environment of the link, they will produce better information and analysis, it is important to improve decision making. Some organizations have begun to use these application deployment in the target region, and more advanced and thirst for application is still in concept or test phase. 1, tracking, behaviorSensors embedded in the product, the enterprise can track the movements of these products, even interaction and monitoring them. Business models can be slightly adjusted to take advantage of thisscience. For example, some insurance companies to provide the carposition sensor installation. That how the insurance company may, according to the car was driven to determine the amount and where is the travel situation. Insurance can be customized to operating the vehicle's actual risk, not based on if the driver's age, gender,or places to live in such a situation.Or consider install the sensor and the network connection to thetaxi will happen: it can be used for a short period of time for the car rental service member, so you no longer need to rental service center, and each car's use can also be optimized for higher revenues. Zipcar company pioneered the use of this model, and a growing number of car rental companies are also beginning to follow suit. In retail, used to display shopping data of sensors can provide more detailed informationor provide discount information, make shopping easier. Leaders such as tesco supermarket in the forefront of the use of this technology.The English name for The Internet of Things The Internet of Things, hereinafter referred to as: The IOT. The Internet of things through the transmission device, radio frequency identification technology, such as global positioning system (GPS) technology, no need to monitor real-time acquisition, connected, interactive object or process, collect the sound, light, heat, electricity, mechanics, chemistry, biology, location and other needed information, through all kinds of possible Internet access, content and the content, the objects and people in the link, to realizeintelligent perception of objects and processes, identification and management. Internet of things is through theintellisense recognition technology and pervasive computing, ubiquitous network integration application, known as the computer andthe Internet after the third wave of world information industry development. Rather than the Internet of things is a network, theInternet of things is the business and application of Internet of things is seen as the Internet application development. The innovation is the core of the development of the Internet of things application, the user experience as the core of innovation is the soul of the development of the Internet of things. 2.0The meaning of "thing" here "objects" to satisfy the following conditions can be incorporated into the scope of the "Internet of things" : 1. The receiver should have corresponding information; 2. Must have the data transmission channel; 3. To have a storage function; 4. Have the CPU; 5. Must have the operating system; 6. There should be special applications; 7. Must have the data sender; 8. To follow the communication protocol of the Internet of things; 9. In the network have the only number can be identified. 3. Definition of "Chinese" Internetof Things (Internet of Things) refers to the Ubiquitous (Ubiquitous) at the end of the equipment (Devices) and facility (Facilities), including "inherent intelligence" of sensors, mobile terminals, industrial system, building control systems, home intelligent Facilities and video monitoring system, etc, and "external Enabled" (Enabled), such as thevarious Assets (Assets), RFID wireless terminal to carry personal and vehicle and so on "intelligent objects or animals" or "smart dust" (Mote), through a variety of wireless and/or cable over long distances and/or short distance communication network connectivity (M2M), application Integration (Grand Integration), and cloud-based SaaS operation mode, in the internal network (Intranet), private network (Extranet), and/or the Internet (Internet) environment, adoptappropriate information security guarantee mechanism, to provide safeand controllable and personalized real-time online monitoring,positioning traces, alarm linkage, dispatch control, program management, remote control, security, remote maintenance, online upgrade, statistics, decision support, leading desktop (Cockpit display Dashboard), etc. Management and service functions,implementation of "all Things" "high efficiency, energy saving, safety, environmental protection" "tube, control, camp" Integration of the. 4. The definition of the eu in September 2009, held in Beijing the china-eu seminar on Internet of things and the enterprise environment, and social media department of RFID, head of the European commission information Lorent Ferderix DrGives the definition of the Internet of things: the Internet ofthings is a dynamic global network infrastructure, it has a standard and interoperable communications protocol based self-organizing ability, including physical and virtual "things" have identification, physical properties, the characteristics of virtual and intelligent interface,and seamless integration and information network. Iot will work with the media, Internet service of the Internet and the Internet, constitute the future Internet.Changes in theIot (Internet of Things), the word widely recognized at home and abroad is a professor at MIT Auto - Ashton ID center in RFID research in 1999 at the earliest. In 2005, the international telecommunication union (ITU) release of the same report, the definition and scope of the Internet of things have changed, coverage has a larger development, is no longer just a iot based on RFID technology.Since August 2009, when prime minister wen jiabao put forward since the "experience China" Internet of things was officially listed as one of five major emerging strategic industries, write "government work report," the Internet of things in China is heavily influenced by the whole society's attention, is the degreeof concern in the United States, European Union, and the rest of the world incomparable.The concept of Internet of things is not so much a foreign concept, as it is already a "made in China" concept, and his coverage of advancing with The Times, professor Ashton has exceeded 1999 and 2005, the scope of the ITU report referred to in the Internet of things has been labeled "Chinese".物联网物联网物联网物联网越来越多的模块与传感器构成嵌入式系统从而增强其通讯能力。
Generation of hybrid enterprise mobile application
专利名称:Generation of hybrid enterprise mobileapplications in cloud environment发明人:Qiu Shi Wang,Yi Quan Zhou,Lin Cao申请号:US15050509申请日:20160223公开号:US09952835B2公开日:20180424专利内容由知识产权出版社提供专利附图:摘要:Generate hybrid enterprise mobile applications in cloud environment, according to one embodiment. A web application is selected in a web integrated development environment (IDE) executing in a browser. The web application may depend on variouscomponents and the dependent build components may reside on different repositories. Dependency analysis engine determines the dependent build components corresponding to the web application. The component retrieval engine retrieves the dependent build components from corresponding repositories to memory or cache of the browser where the web IDE is executing. Component build engine builds the dependent build components to a build result. Packaging engine packages the build result to a single package as an application asset package. The application asset package is received in a platform dependent build service. The application asset package is built as a hybrid mobile application in the platform dependent build service. The hybrid mobile application is published in an application store.申请人:SAP SE地址:Walldorf DE国籍:DE更多信息请下载全文后查看。
Enrolling a mobile device with an enterprise mobil
专利名称:Enrolling a mobile device with an enterprise mobile device management environment
发明人:Tom Chang,Mansu Kim 申请号:US14 6334 93 申请日:20150227 公开号:US09860187B2 公开日:20180102 专利附图:
摘要:Embodiments of the present application relate to a method, apparatus, and system for enrolling a mobile device with an enterprise network. The method includes receiving, from a mobile device, a request to access an enrollment address. In response
to receiving the request to access the enrollment address, determining whether the mobile device is pre-enrolled with the enterprise network, and in the event that the mobile device from which the request to access the enrollment address is received corresponds to the mobile device that is pre-enrolled with the enterprise network, pushing user-specific settings to the mobile device.
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
企业移动应用开发框架Bhuvan Unhelkar, MethodScience广受尊敬的咨询家、培训老师、作家和演讲者San Murugesan, BRITE Professional Services企业面临一些挑战派遣移动应用, 出自功能,如位置独立, contextualization 、个性化。
这six-layer 企业 移动应用开发提供了一个系统框架 和综合的解决方案,以移动应用程序开发和软件 维护。
最近几年移动技术和应用变得特别普遍,在各行各业都是。
企业都在通过采取移动技术上的应用来提高自己的运营效率(给员工提供更强的实时信息接口访问),提高产品的竞争力,利用移动革命,满足新的顾客需求。
这种移动应用为用户访问信息、应用提供了存储独立个性化,提高了用户满意度。
移动应用还能够为用户提供环境感知响应,如用户位置、使用时间或者其他属性。
例如,可以提供银行、旅游、紧急服务等和用户位置、使用时间相关的业务。
尽管移动技术和移动应用给企业带来很多新的机会,但是同样带来开发和实施的挑战。
这些挑战还不包括定位、有线网络桌面应用的挑战。
例如,企业移动应用的开发和部署必须和计算通信模式整合。
一些移动应用必须要确定用户的位置来提供服务,然后不断地追踪用户位置,来提供相应的服务和信息。
然后还包括一些安全性、可靠性、服务质量的等级等等都是新的挑战。
图1 一种新的企业移动用用分类标准。
高层应用比底层的更丰富也跟更复杂(改编自早期的M 提出的一个模型) MethodScience,一个澳大利亚咨询公司,提供卓越国际美誉在各个过程、建模和管理造成实质性的和可测量的质量在公司和软件的开发。
科学的方法成功应用,作为一个实用的学科,为广泛的客户环境。
在此,我们提出一种新的企业移动应用分类模型,建立在科学方法所提出的基础之上,同时还研究了移动应用的挑战。
为了成功的用系统的综合的方式来应对这些挑战,我们提出了六层移动应用开发框架(MADF)。
A New Taxonomy for Enterprise Mobile Applications新的分类标准既然企业已经广泛的应用移动技术来做移动应用,我们需要更好地了解应用程序以及应用程序带来的需求。
我们提出了如图1中的企业移动应用的新的划分标准。
我们概括的将移动应用分为5类:移动推广、信息、交易、经营、合作。
后三个类别的应用内容丰富复杂,比前两个需要更多地需求和挑战。
我们的分类方法能够帮助应用程序开发者关注开发实现应用程序的主要部分。
Mobile Broadcast-移动推广推广一些内容给移动用户,例如紧急情况下的方向指引,在商场的打折促销信息,用户未注册、普通Mobile Information-移动信息用户需要的信息,信息流通常是单向的,例如大事件、产品、服务、促销、时刻表、价格等。
对安全要求不高,但是仍要保证可用性和隐私保护。
Mobile Transaction-移动交易除了推广和提供信息,这种应用程序还需要促进和构成交易。
让用户买卖商品和服务,定位、跟踪订单,电子支付。
这种应用程序需要提供比前两类更好地安全性、更快的响应能力、更高的交易可靠性、更高的性能以及更可信的服务。
包括三个部分:用户(客户)、业务相关者(服务提供商、网上商店、航空线等)、财务中间人(在线付款网关、贝宝-类似支付宝)Mobile Operation-移动经营这些应用主要支持商务运营方面的,但不是直接和顾客或者客户直接交互的。
通常都是提供一些便利的实时信息,当前股票信息,生产时间表,工资信息,leave balances 整合企业的不同后端系统和不同的数据库也是一个关键的挑战。
Mobile Collaboration-移动合作促进不同员工、部门之间的合作,促进商业伙伴和同僚见得合作。
帮助建立和管理人群(员工、客户、企业)的社交网络应用也是这类的。
利益相关者之间的动态互动和支持这些互动的软件模块提高了应用的复杂性,这同时也给编程和数据管理带来挑战。
Mobile Application Development Challenges移动应用开发的挑战移动应用开发强化和延伸了传统企业应用程序的开发的挑战。
比如在定位程序的开发中要把用户的定位信息加到程序里分析、架构、设计、编码、测试。
另外,在移动应用程序开发中还有客户定制化的开发需求,要根据用户的需求、访问、可用性,来达到最好的用户体验在移动设备上有贷款的限制、无线通信的差的可靠性条件下。
处理好这些挑战是企业成功开发和部署移动程序的关键。
分为三类挑战:Devices and Platforms-设备和平台一般用来播放和接收数据的设备屏幕和键盘都很小,所以开发者要格外的注重可用性,比如单键导航,去除一些特性来尽量用易感知的方式来表现数据内容。
界面设计还要考虑到一些选项:语音激活,灵敏触摸的屏,新颖的菜单写字笔,手写、手势识别。
你开发出来的应用程序还需要适用于不同的手持设备,在不同的平台、不同的接口。
同样的程序还需要再不同格式的移动设备上运行,所以还得考虑设备的配置和操作平台。
巧妙的使用小型电池让其充一次电保证能够延长设备运行时间也是很大的挑战。
User Location, Usage, and Content-用户位置、用途、内容移动设备比台式电脑更加的私人化,越来越多人依赖他们的移动设备。
那就更需要个性化的应用程序,不同的用户可能喜欢通过不同的方式来获取信息通知,根据个人的喜好、不同类型的设备的不同用法。
有一些应用程序要需要适应用户的位置不断变化,包括对应信息的环境-变化。
例如经常要考虑到在提供相关信息和服务时的位置、使用时间、当前任务、使用历史等这些参数。
一种多功能的应用程序还需要能够处理多元化的、甚至是不断变化的对象目标。
例如,一个提供某一个常经过的车站的电车时刻表的程序还应该提供交通信息。
当然,根据不同的用途、意义移动应用程序也会大相径庭。
可以提供警务人员就剩服务、医务护理、促进社交网络、休闲运动、音乐下载、个性化彩铃、营销等次不同的应用程序根据不同的可用性、有效性有不同的需求。
网页内容—文本、连接、图像、视频—提供的功能、范围都要适用于移动设备。
移动应用程序应该能够提供混合格式的多媒体内容(视频、音频、数据)。
移动应用程序还需要其他模式的报告格式。
除了文本、图像,还应有其他的发送模式,例如语音提示。
例如,声音相应更适合于司机的及时注意。
Dynamic Communication and Networks 动态通信网络移动应用开发必须考虑到移动通信网络的带宽、以及潜在的通信障碍。
同样,无线通信的安全性和通信交易中出现故障都必须圆满解决。
图2 六层企业移动应用程序开发框架。
安全层包含了其他几层。
企业移动应用程序开发框架Enterprise MADF我们的移动应用程序开发框架(MADF)六层分别是:通信、信息、中间软件和绑定、应用程序、描述、安全层(见图2)。
安全层是覆盖了其他层、并与其它层正交。
这种分层的框架把软件建设元素、设计、所需的支持通信的基本设施(网络、协议)、来自不同信息源的不同类型的信息存储集中到一起。
同样它还把用户接口设计、编码设计模式复用和应用程序设计联系到一起,可以设计出更好的移动应用程序架构。
建立起例如扎克曼框架的企业级架构框架(()),技术层((/ togaf ))的开放集团脚骨框架为理解MADF提供了相关背景。
Communication-通信移动网络为移动应用程序提供了基础通信设施。
开发者要懂基本的TCP、互联网协议(IP),无线应用协议(WAP),人局域网(PAN),城域网(MANs)。
下一个要考虑的就是标准,例如IEEE 802.1x群网络协议,移动蜂窝通信标准(2G, 2.5G, 3G, 或 4G),局部通信(红外或者蓝牙),无线射频识别(RFID),WiMax,无线VoIP技术。
例如,对于远程通信,移动应用程序要半酣一堆网络(典型的蜂窝网络)来用红外、蓝牙或者其他短程网络链接到可程序化的借口。
网络和通信的能力直接影响着移动程序的服务质量(QoS)。
例如,记账程序需要部署在蜂窝网站上,而小额付款或手机零售就需要结合移动网络和基于wifi的无线局域网。
开发者可以利用这个MADFInformation-信息移动应用使用多媒体内容,三个挑战:内容来源和表现,安全的内容存储,内容挖掘。
呈现高质量的多媒体内容—包括结构化的和半结构化的数据,自然语言文本、图像、音频、视频—都是来自多源的(不同格式)在如此一个小小的屏幕上,要有低的需求的计算、存储、通信资源是个挑战。
此外,这样的呈现还要求为了适应特殊的设备不同形式的因素进行格式重定。
存储机制影响着访问速度和内容质量。
例如,开发者可能在一个移动设备上播放一个视频必须要降低其质量,但是他们还可以以一个高密度格式存储在数据库中。
数据镜像策略提高了荣誉也提高了可靠性,但是双重存储和相关的维护功能会导致额外的开销,降低了数据访问速度。
为排除这种挑战,移动应用程序应该集中数据到数据池中。
这种简化了设计和新架构的流程,造就了更一致的信息处理方法。
开发者能用景象模式等这些设计模式来解决建模。
由于客户端存储需求渐渐扩大,也变得复杂,他们应该考虑到在用户设备上创建缓存内容—开放移动网格的机会。
移动应用架构应该能够处理每个客户端设备的事件响应、同步活动的创意和在每一个移动设备上做修改。
为了定位用户的特殊资讯需求,必须要数据挖掘。
这是一个很有挑战的任务,因为数据海量、类型不一、由于来自不同信源的相同或相似的信息是不均匀的(不同格式)、不断更新的。
此外,为了满足不同对象的不同需求进行挖掘。
最后,移动内容管理应探索提供商务智能、集成、可靠性见得关系的机会。
Middleware and Binding-中间软件和绑定这一层绑定、约束了所提供的应用程序、服务或者内容。
移动中间软件技术就是为了整合或者固化一个移动软件程序的不同服务或者模块。
移动中间软件处理移动环境中的分布式的服务,提供改变设备类型的“胶”(与设备的操作环境一致)。
WAP和IMode是两个较为熟知的移动中间软件协议,建立在TCPIP之上,在开发中使用。
移动应用的连接不是均匀的。
应用程序是断断续续的执行、在不同的需要移动应用的位置、不同的阶段还需要连接、断开、再连接。
中间软件技术在执行的时候必须迎合这种模式的连接性。
Applications-应用程序应用程序包括企业在这一层留存的业务规则。
模拟移动过程是开发移动企业应用的一个至关重要的元素。
开发者可以用业务流程建模符号(())创建模型,确定业务在程序中如何用。
他们还可以对这些模式眼神进行移动过程合作。
过程模型帮助重建业务过程(定期讨论,非移动业务过程),从而提高业绩。