Skip to main content

云电脑真有可能成功

 
发信人: Caravel (克拉维尔), 信区: Military
标  题: 别说,云电脑真有可能成功
发信站: BBS 未名空间站 (Sat Sep 19 16:52:19 2020, 美东)

应该说云电脑并不是一个新概念,Jobs 97年就在promote这个概念。但是现在显然有更
好的条件

1. 当时的cpu速度还有很大增长空间,cpu处理普通的公务要求比如WORD,excel之类的
也不轻松,网络速度也不够快。现在这个已经不是问题,现在CPU性能对于普通工作的
需要已经完全过剩。网络条件也已经可以经得起视频会议的高带宽低时延考验。

2. 97年还没有大规模云计算集群的基础设施。现在这些集群已经是现成,已经开发出
大量的工具维护管理。虚拟化的部署这些技术也已经很成熟,去Amazon cloud上买一个
instance,几十秒就ready了。

3.这个技术估计最先可以在学校,政府机关来实验,先拿出一半的电脑部署到云上,看
看能不能真正减少成本。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...