Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

Exercise 1. Read the definitions to the given key-terms and analyze the context in which they are used.

Lesson Twenty-Six | Lesson Twenty-seven | A View into the Future of eLearning | Lesson Thirty-One. IT Jobs | Product evangelist | How to Avoid Blowing Your IT Job Interview | Exercise 1. Read the definitions to the given key-terms and analyze the context in which they are used. | Other types of e-payments. | MOBILE PAYMENTS | Interview with Max Levchin |


Читайте также:
  1. A Decide which of these statements are true (T) or false (F).
  2. A peninsula is a piece of land, which is almost completely surrounded by water, but is joined to a larger mass of land.
  3. A strait is a narrow passage of water between two areas of land, which is connecting two seas.
  4. A The following are dictionary definitions of different types of markets.
  5. A) Before listening, read the definitions of the words and phrases below and understand what they mean.
  6. A) Pronunciation drill. Pronounce the words, then look at the given map and fill in the table below.
  7. A) Read the following text and do the exercises below.

 

Cloud computing a colloquial expression used to describe a variety of different types of computing concepts that involve a large number of computers that are connected through a real-time communication network (typically the Internet). Cloud computing is the next stage in the Internet's evolution, providing the means through which everything can be delivered to you as a service wherever and whenever you need.
Service-oriented Architecture (SOA) a software design and software architecture design pattern based on structured collections of discrete software modules, known as services, that collectively provide the complete functionality of a large software application. CBDI advises that good SOA is all about style—policy, practice and frameworks. This makes process matters an essential consideration.
QoS (quality of service) several related aspects of telephony and computer networks that allow the transport of traffic with special requirements. In particular, much technology has been developed to allow computer networks to become as useful as telephone networks for audio conversations, as well as supporting new applications with even stricter service demands. The QoS concept of quality is one in which the requirements of some applications and users are more critical than others, which means that some traffic needs preferential treatment.
Client–server model a distributed application structure in computing that partitions tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients. Some of the most popular applications on the Internet follow the client-server model including email, FTP and Web services.
Grid computing the collection of computer resources from multiple locations to reach a common goal. The grid can be thought of as a distributed system with non-interactive workloads that involve a large number of files. Grid computing does require special software that is unique to the computing project for which the grid is being used.
Mainframe computers computers used primarily by corporate and governmental organizations for critical applications, bulk data processing such as census, industry and consumer statistics, enterprise resource planning, and transaction processing. The term originally referred to the large cabinets that housed the central processing unit and main memory of early computers. Several manufacturers produced mainframe computers from the late 1950s through the 1970s.
Utility computing packaging of computing resources, such as computation, storage and services, as a metered service. To provide utility computing services, a company can "bundle" the resources of members of the public for sale, who might be paid with a portion of the revenue from clients.
Peer-to-peer a type of decentralized and distributed network architecture in which individual nodes in the network (called "peers") act as both suppliers and consumers of resources, in contrast to the centralized client–server model where client nodes request access to resources provided by central servers. Peer-to-peer systems pose unique challenges from a computer security perspective.
Public cloud a set of computers and computer network resources based on the standard cloud computing model, in which a service provider makes resources, such as applications and storage, available to the general public over the Internet. Public cloud services may be free or offered on a pay-per-usage model. The public cloud is sometimes regarded as less secure than private clouds. - See more.
Hybrid cloud is a combination of a private cloud combined with the use of public cloud services where one or several touch points exist between the environments. The goal is to combine services and data from a variety of cloud models to create a unified, automated, and well-managed computing environment. A hybrid cloud is a cloud computing environment in which an organization provides and manages some resources in-house and has others provided externally.
Cloud bursting an application deployment model in which an application runs in a private cloud or data centre and bursts into a public cloud when the demand for computing capacity spikes. The advantage of such a hybrid cloud deployment is that an organization only pays for extra compute resources when they are needed. Experts recommend cloud bursting for high performance, non-critical applications that handle non-sensitive information.
FISMA Federal Information Security Management Act is a United States federal law enacted in 2002 as Title III of the E-Government Act of 2002. The act recognized the importance of information security to the economic and national security interests of the United States. FISMA requires agency program officials, chief information officers, and inspectors general (IGs) to conduct annual reviews of the agency’s information security program and report the results to Office of Management and Budget (OMB).
HIPAA The Health Insurance Portability and Accountability Act was enacted by the United States Congress and signed by President Bill Clinton in 1996. It has been known as the Kennedy-Kassebaum Act after two of its leading sponsors. The portion of HIPAA addressing the ability to retain health coverage is actually overseen by the California Department of Insurance and the California Department of Managed Health Care.
SOX The Sarbanes-Oxley Act of 2002 (often shortened to SOX) is legislation enacted in response to the high-profile Enron and WorldCom financial scandals to protect shareholders and the general public from accounting errors and fraudulent practices in the enterprise. The major corporate scandals in the USA in the early 2000s gave rise to the SOX, which targets to prevent misconduct and improve corporate governance practices.

 

Exercise 3. Match the definitions with words:

 

· remote machines owned by another company would run everything from e-mail to word processing to complex data analysis programs · Client–server model
· the underlying structure supporting communications between services · Service-oriented Architecture (SOA)
· the idea that transmission rates, error rates, and other characteristics can be measured, improved, and, to some extent, guaranteed in advance. · Public cloud
· popular model for computer networking that utilizes client and server devices each designed for specific purposes. · Mainframe computers
· harnesses unused processing cycles of all computers in a network for solving problems too intensive for any stand-alone machine. · Grid computing
· very large and expensive computer capable of supporting hundreds, or even thousands, of users simultaneously · Cloud computing
· enterprise-level computing model in which the technology and computing resources are allocated to the organization and its individual users on an as-needed basis. · FISMA
· type of decentralized and distributed network · Peer-to-peer
· set of computers and computer network resources in which a service provider makes resources available to the general public · QoS (quality of service)
· a composition of at least one private cloud and at least one public cloud. · Hybrid cloud
· application deployment model in which an application runs in a private cloud or data centre · Cloud bursting
· Federal Information Security Management Act · SOX
· The Health Insurance Portability and Accountability Act · HIPAA
· The Sarbanes-Oxley Act · Utility computing

 

Exercise 4. Complete the following scheme:

Exercise 5. Complete the following table:

Nr Type of Cloud Computing Possibilties
1.    
2.    
3.    

Exercise 6. Watch the video http://www.youtube.com/watch?v=z2TfxOVvTL8


Дата добавления: 2015-11-14; просмотров: 37 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
Lesson Thirty-Three. Cloud.| Exercise 7. Make the tapescript of the video from the previous exercise.

mybiblioteka.su - 2015-2024 год. (0.006 сек.)