用时:14ms

5G产业报告-PDF版

您的当前位置:首页 > 信息科技 > 大数据
  • 凯捷(Capgemini):消费者产品和零售组织如何加速从数据中获取价值(英文版)(44页).pdf

    如今,企业不仅拥有比以往任何时候都多的数据,而且有最大的机会将丰富的数据流转化为巨大的竞争优势:与消费者更亲近、优化运营、快速推出新产品/服务。在这些领域实现价值需要考虑到新出现的趋势和中断。消费者要.

    发布时间2021-06-10 44页 推荐指数推荐指数推荐指数推荐指数推荐指数5星级
  • 华利安:2021年财务信息、数据和分析垂直覆盖春季更新报告(英文版)(19页).pdf

    Houlihan Lokey很高兴介绍其2020年第四季度的财务信息、数据和分析市场更新。首先,我们希望您和您的家人保持安全和健康。在这个混乱的时代,我们在过去的六个月里显著地增加了数据和分析团队,在.

    发布时间2021-06-09 19页 推荐指数推荐指数推荐指数推荐指数推荐指数5星级
  • 大西洋理事会:新技术和数据的地缘政治影响建议报告(英文版)(166页).pdf

    在为美国及其盟国(包括国会议员、新总统政府、私营企业、学术界和志同道合的国家)编写这份报告时,新技术和数据的地缘政治影响委员会试图提供一个指南针,在2020-2021年的世界地位和一个更自由的世界之间.

    发布时间2021-06-09 166页 推荐指数推荐指数推荐指数推荐指数推荐指数5星级
  • 数据中心高质量发展协会:数据中心产业发展指数(2021)(15页).pdf

    北京作为我国的首都,政治、经济、文化等领域的发展处于全国领先位置,头部企业数量在全国占比较高,数据中心市场需求旺盛。机架规模较大、资本吸引力强、绿色等级数据中心数量较多。北京市数据中心主要分布在东部、.

    发布时间2021-05-28 15页 推荐指数推荐指数推荐指数推荐指数推荐指数5星级
  • 数据中心高质量发展协会:超融合数据中心网络白皮书(19页).pdf

    3.2.2 全生命周期自动管理收益分析在数据中心的整个生命周期中,80% 以上的时间都是在运维,运维效率决定了数据中心的运行效率。经过十余年的发展,数据中心中积累了数量繁多、功能各异的网络辅助管理软件.

    发布时间2021-05-28 19页 推荐指数推荐指数推荐指数推荐指数推荐指数5星级
  • Data2x:2021年性别数据融资状况(英文版)(56页).pdf

    对更多更好的性别数据的需求正在上升。全球、区域和国家倡议都提到两性平等的经济和社会价值。由于许多倡导者的努力,我们对性别数据重要性的集体认识有所提高。我们现在对性别数据差距有了更好的了解:差距在哪里,造成差距的原因,以及需要做些什么来填补差距。然而,对性别数据的重要性和统计系统中的差距的认识的提高并没有得到资金的增加。特别是对援助数据和性别数据的监测表明,近年来资金流动停滞不前。性别数据的供资水平持续偏低,与性别数据差距反复出现密切相关。如何解决这个问题,打破这个恶性循环?本报告从对性别数据生态系统、该系统的核心要素、其利益攸关方以及性别数据与政策的联系的总体评估入手,详细审查了性别数据筹资的状况。然后,该报告重点介绍了现有的性别数据供资,以及该供资目前支持的性别数据系统,报告还概述了填补资金缺口的各种融资选择,并就今后的六个行动领域提出了建议。这项研究的主要信息是:1.性别数据工具与健全的统计系统所需要的工具有很大的重叠。2.对100多个性别数据利益攸关方的审查表明,大多数支持性别数据的工作都是在国际一级进行的,这表明需要在区域、国家和地方各级加强宣传工作。3.大多数性别数据利益攸关方注重生产,而不是使用性别数据。更加注重数据使用将有助于促进需求的良性循环,从而增加供应。分析还表明,虽然这是一个拥挤的空间,有许多组织对性别数据感兴趣,但很少有组织自己为这些努力提供资金。

    发布时间2021-05-26 56页 推荐指数推荐指数推荐指数推荐指数推荐指数5星级
  • 数据猿:2021中国数据智能产业发展研究报告(47页).pdf

    数据智能在金融:技术架构和应用场景在金融领域需要积累大量的用户数据,尤其是信用、资金相关的数据,构建统一的数据中台,然后探索智能应用场景。依据数据猿的市场调研,智能营销、大数据风控、反洗钱是比较看好的.

    发布时间2021-05-20 47页 推荐指数推荐指数推荐指数推荐指数推荐指数5星级
  • 华利安(Houlihan Lokey):2021年公司数据与分析集团:治理、风险和合规垂直覆盖范围(英文版)(15页).pdf

    Houlihan Lokey很高兴介绍2021年第一季度的治理、风险和合规市场更新。首先,我们希望你和你的家人安全健康。在这混乱的时期,我们在过去的九个月中显著地增加了数据和分析团队,在纽约有六名新员.

    发布时间2021-05-18 15页 推荐指数推荐指数推荐指数推荐指数推荐指数5星级
  • 百度人民网:2021国潮骄傲搜索大数据报告(21页).pdf

    在科技创新的时代背景下,国潮也在全面进化。今天的国潮早已不局限于新国货,而是文化、科技等各个领域背后中国力量的全面崛起。这一切不仅体现在我们身边的大事和日常生活里,也体现在亿万网民的一次次搜索里。百度.

    发布时间2021-05-14 21页 推荐指数推荐指数推荐指数推荐指数推荐指数5星级
  • 华利安(Houlihan Lokey):2021年公司数据与分析集团:治理、风险和合规垂直覆盖范围(英文版)(15页).pdf

    Data &Analytics GroupGovernance, Risk,and Compliance Vertical CoverageMARKET UPDATEIMARCH 2021#page#.

    发布时间2021-05-13 15页 推荐指数推荐指数推荐指数推荐指数推荐指数5星级
  • 亚洲开发银行(ADB):马绍尔群岛两性平等概览:知情决策的关键统计数据(英文版)(51页).pdf

    这份出版物介绍了马绍尔群岛的性别统计数字。报告还简要概述了马绍尔群岛的情况,为统计数字提供背景。性别统计有助于监测和评价两性平等的进展,并为今后的两性平等政策、计划和执行提供信息。两性平等是实现可持续.

    发布时间2021-05-12 51页 推荐指数推荐指数推荐指数推荐指数推荐指数5星级
  • 智慧芽:2021大数据技术前景分析报告(57页).pdf

    大数据技术前景分析报告智慧芽Insights英策专利分析系统数据范围在126个国家/地区中,搜索出109,327组申请检索条件检索式:TAC_ALL:(“bloom filter”or bloomfi.

    发布时间2021-05-01 57页 推荐指数推荐指数推荐指数推荐指数推荐指数5星级
  • Qlik:现代数据分析指南:7种加速业务洞察的方法(英文版)(12页).pdf

    #page#page#A recent IDC study* reveals that01IData Historian VS.Active Intelligence helps accelerate.

    发布时间2021-04-21 12页 推荐指数推荐指数推荐指数推荐指数推荐指数5星级
  • Citihub 数据:实现企业和云的秘密管理的成熟(英文版)(19页).pdf

    CO CitihubDigitalThe Secret to GoodSecretsManagement for theCloudEnterprise and Achieving Maturity in Secrets Management for the Enterprise and CloudOctober 2020Recoding the Digital DNA of Financial S#page#CO CitihubDigitalAbstractWhat is Secrets Management? Why is it so important to thedigital enterprise to have a rationalized Secrets Managementstrategy for the Enterprise and Cloud? In this paper wediscuss key considerations and positioning for centralizedmanagement of secrets for humans and systems.were traditionally handled by human users, at an order ofmagnitude more frequently with response timesmeasured in millisecondsthe traditional safeguards and risk mitigation strategies that are inherent in a trusted perimeter are noprivacy.Simplyputfailure tosecureresources and datd wil likely getyouonthefront page ofhenewswith severe legal financialand reputational consequencesthe strategy around Secrets Manageeand Cloudimplementation of management solutions across the Enterprise it is necessary to centralize, standardizeand govern use and avoid the product sprawl that would otherwise complicate managementmaintenance and abilityy to secure.#page#page#CO CitihubDigitalIntroductionThe explosion of the digital economy serves as a boon to business andtechnology innovators: Enterprise Security professionals - who traditionallyacted as the doorman for entry, exit and lateral movement in theorganization- are now faced with the rapidly growing challenge of scalingsecurity for a huge number of B2B, B2C and S2Si interactions across theorganization, from critical business system flows all the way down to thecompute infrastructure team offering self-service compute on bare metal andall the use cases in between.While we could write a lengthy paper on building managing and assertingidentities, the subject of this whitepaper is to discuss Secrets Management forEnterprise and Cloud.SECRETSSecrets exist to establish various permutations of system-to-system,qeua sulaned uoleolunuuuios wasAs-o-ueuunu pue uelunu-o-ueuunuexist across roles and zones, trusted and untrusted networks: examplesof secrets that you have likely heard of include user passwords, onetime auto-generated passwords,application keys/credentials, ssh keys,database passwords, system-to-system passwords, private certificates.private encryption keys, binary license files, hardware and softwaregenerated passwords (eg. RSA).S2S-SystemoSystem#page#CO CitihubDigitalDs alau aopid auousapasasouolJoounsod nas buupupuosobulbuauuolapIsynon-triviallifecycle to manage for each and every secret.This lifecycle is often neglected by anyone outsideofa Security or Riskdiscipline.Managing secrels atscale introduces signiicantchalenges.includingTopicTypical Pain PointsSegmented management of secrets across critical systems deployed inSegregation & Leastseveraltrustedand untrusted zoneswith avariety ofenvironments spanningPrivilegedevelopment,OAUATand productionDesigning forthe principles ofleast privilegeAcknowledgement and validation of new secrets requestsApplyingrepeatableandsustainable standardsforthegeneration andSecrets Generation &DistributionSupport for on-demand secrets generationEnacting policies for secret qualityage-outinvalidation/removal ortermination based on types ofusers andLeasing & Revocationrolesmaintenance of standards forsecrets expirySlasn ueunu pue suasAs Aued ps paisnlslasn uasAsGovernance of controls both within individual vaults and across differentvaultsSecurity of SecretsEndto-endencryptionofsecrets encrypted-intransitand atrestEliminating plaintext exposure of secretsUnderstandingwhen oneormorevaults hasa vulnerabilitySupportinghigherfrequency requests with greatergeographicdistributonScaling,Highfor system-to-systemtransactionsAvailability&Supportingjustin-timeand dynamic secrets generationat scaleRedundancyProviding both gooduser and developerexperiencesProviding reports for both producers and receivers/users of secrets, theirMonitoring &utilization characteristics,andadministrative changes performedReportingMonitoriingalerting and reportiing on anomalliesand potentialthreats#page#CO CitihubDigitalManagementforthe Enterprise and Cloud? How isyour organizationfaring with existing commercialorinbuAodu alUM spupuap Abolouual pup ssauisnq nox uoddns ol pauolsod ypIs uolnos Iuaunssecurty posture andavoiding high proflecyberincidents andattacks aimedatdisrupting businessservices and stealing data.Assessing Current StateTakinga cuefromtheinfamousDeming CydleofConinuousImprovemen.the bestplacetostartiswhere you are now,whether your enterprise is invested in commercial products- such as CyberArk,uolniosasnou-uuDnDA DHpenpA Kayanz Jabpupw SasSMy snl puokagnDA dolusDHor any combination thereofcapabilitiesthe use cases youhave adopton for anda generalided about existing strategy You also havedrive new secrets requirementsn a better opportunity to get the attention ofsenior leadership onimplementation(s) that cover PrivlegedAccess Management torboth humans andapplications) BreakGlass credentials and other pockets of Secure Credentials Vaults for your core business and criticalinfrastructure systems.When itcomesto an enterprise strategy forsecuring secrets andcredentials.ithaswith step up verification challenges forthe most critical and entiled systems and superusers within your4Longstanding struggles across User ExperienceDeveloper Experience,OperationalOwnership and RiskManagementhave brought about stronger practices around persistent access.least prvilege roles andcommon-sense separation of duties.The unpopular removal of super-user privileges from DevelopmentQA and other staff is likely mostly complete, ensuring more control and standards around the restriction ofLolpJadopup adolaaadaAo-duoL slunooop Jasn paypply oransodxa Bupnpal pup ssaoop uononpoldexperiences,investmentin workfows and processes to handle shortlived.temporaryaccess ormonitoredcredentials and entitlementswithgeneralre-use ofcredentials across appication components. within the secure enterprise networkmaintained.PrvlegedAccess Management PAM poicies foryour known human users and applicationsystem users typiicalycoexistinnyourActiveDirectory. KerberosRadius,OAuth,OIDC,and/orSAML#page#CO CitihubDigitalthe creaton by applicaton teams of digitaly signed certificates forweb-based communications.whileAgpqold s Du Ino人 alouukup sMIoMlau ajps pup palsni uo bulaq suoupoliddp uo Aal.up Aidujs no人standing on end thinking about all of the AWS and Azure authentication tokens sitting inside scripts ancsource code repositories that have been rushed together for sprint demos. Its also likely there are severaappications on Public CloudFragmentation in the MarketWhen it comes to Secrets Management you are probably hearing about new products out there, someno doubt you arestarting tohear “why dont we use XYZ?”every other day. But,as an experiencedITprofessional you know that a cardinal sin of IT and a surefire way to miss-the-mark is to open thepocketbook without understanding whatyou have,whatyou need to have,andassessing the costo-CyberArk-does that meanyouhave whatyou need? Ordoyouneed to widen the toolkit Like everyhinginlife,itdepends.#page#CO CitihubDigitalSecrets Management CapabititiesThe first questionrequiring clear definitionis,are youlooking to buldanew Secrets Management systembuiltto mangge human users andsome levelofcriticalsystemsecrets ltmay bethatthis isthe decisionfacing youasyoureadthrough this papersolets diga bit deeperinto the capabilities you shouldpup upunu aBpupu AaApalos oMou uo suoIsipap BupnB pup ABabs anoA u noqb BuluutaqapplicationsecretsCapability #1: Centralized SecretsCentralizing Secrets Management provides a significant opportunity to take a fresh look across theinfrastructures you have accumulated overtime and rationalize the logicalboundaries and policesthatgovern the interactions inside and outunder centralized managemeent.Thesecouldincludethings like4.DevOps pipeline tools and orchestration accounts5. System users and trusted delegatorsnent,incorrectly applied policies,unprotectedofthesecriticalassets risks exposures due to mismandgersecrets andalack of visibiity monitoring and governanceWhile, to non-Security and Risk personnel this lack of centralized oversightmay be benefitting agilitythe reality is that tokens. passwords,administrative accounts andidentities risk being embedded in codeconfiguration, scripts,database tables, bespoke key/value stores,Excel files and sticky notes.Aside frommay break ifthis is changed.saopidiapu pausliqpisa Jo/pup suibnid jo las Isngolp ing aApu aopds siuluislappal pup Iuauabpup#page#CO CitihubDigitalwhere fitforpurpose integration approaches can beselected.The badnewsisthatthe bruntoftheisnoadoptonmagicwandthere arefeatures thatenable moreeasieradopuonor greenfeldintegrationButmore on that in Capability #5.This will involve using scanning tools,however inmercial and open source tools like SonarQube, Fortify,and/or Tenable tcharden theinfrastructurethat managesyoursecrets,inadditon tobudgetingdeployingandintegratingtooling that will help stop the proliferation of unmanaged secrets! But more on that in Capability #4Capability #2: Secrets Generation and Distributionmore and more credential and data breaches.there is a trend towards the elimination of static and/orbulapisuo uaum apmuos ainos uado pup Jaus-aulJo Iplauuo Jo uoddns uibnid JoKugpipAthe best solution for your enterprise. Where modern. cloud-native applications and infrastructure will findhouse systems to a Secrets Management solutionand Risk teams.This may also include database and storage access, administration clients, and/or VendorSaaS software that performs privileged tasks and automation.#page#CO CitihubDigitalCapability #3:Leasing and RevocationSecrets shouldhave ashorttime-to-livemeaning as shortasreasonably possible based on the usecase.Our suggested way to evaluate features for the management of lease and revocation policies is tooffeatures available areTime-bound secretsOne-time secretsAutomatic onboarding /reconciliaton of unmanaged accountsUser revocationSession suspensioncapabilities have enabled IAM teams to implement Just In Time JIT) creation.sometimes referred to asenables rapid adoption and on-demand processes to take advantage of managed secrets without havingusers as well where you may want to build workflows around conditional approval criteria for creation ofvalid credentials with specific accesses fora specific lease timecomplefely. offering anorderofmagnitude improvementto security postureldeallythe use ofanypersistent privileged accounts for human or system users can be displaced in favor ofDynamic Secrets. AScontroversialas that sounds,this is where this space is ultimatelyheadedbutitrequires notjusttechnicacapabiity but significant culture change as well The best guarded secrets are those that never existedorior to needing them,havearigoroutmanaged during their short lifespan.Handling of Unmanaged Secretsdiscovery enrollment and consolidation of unmanaged secrets into the strategic platform. Coupled withDynamic Secrets. the adoption approaches for transition to managed secrets willhave higher end-usersatisfaction and more likely to be executed successfuly.Cyber Resiliency#page#CO CitihubDigitalscaled issuance ofsecrets underscore theneed to respond & restore.Typical cyber resiliency scenariossuch as hijacked credentials man-inthe-middle attacks and infrastructure vulnerabiities may exposeJaSpub sallasuauapupw ssa5y paballdnoK uioq Jo SObuikiapun aul ol ssap pazlouinpunManagement as well as theindividual endpoints and user accounts where secrets are employedalua buloaluau bulpuadsnsshasn 6ulyoAalojuoubuoinp pasbqainl pup YooqApidD BuIADHbuilding robust cyber resiliency.Capability #4:Security of Secretsaccount and apply robust security across the full stack ofinfrastructure and data flows,notjust thoseand monioring. We wicoverlogging andmonitoring in Capabilty#7Encryption ofSecret Materialchannelofcommunication (eg TLS/SSL and ofthedatd Ghesecret) itselkin anideal transit patn both theKowau upup Aomuipdapou pa p padkpua uoq alp uslupuu supuaupup pporkpd pppSecrets-in-memory pertains to temporary storaapplications memory space or host containers memory space-as environment variables are often usedto temporarily hold runtime configuration and may include credentials.data paths,in-mermory storage and disk storage encryptionAccess Policy Managementgoal.Its unlikely that any mature product will lack in a core ability to create, organize and customizegranular policylevel definitionssothe keywill be to makesureyoucan effectvely identify and correlateyour needs to sets of capabilities aroundnce of those provider service groupingsthey be easily recovered/restored (both latest and specific version)Versiion controlof all data & confiiguration objects#page#CO CitihubDigitalSecretsManagementProxyEncrypted ClusteredFile SystemBackendEncrypted ProtocolEncrypted ProtocolFiesystem(SSLTLS,etc)(SSL,TLS,etc)2FilesystemManagerBackendFilesystemApplication/cientSecretsSecrets MgrEncrypted ProtocolManagementBackend(SSLTLSetc)ServerPlugin/clienFilesystem(Active/Primay9BackendFilesystemReplicatedReplicatedClusterClusteri2FIGURE 1: HIGH LEVEL LOGICAL DATA FLOWS TO PROTECTFigure l illustrates a typical architecture of an application or client and the round-trip data flows tod centralized Secrets Management server and its backend infrastructure,including its replicatedclustersThis demonstrates an end-to-end implementation that considers handing of sensitive secretsin-transit and atrest through the patterned use of encryption protocols and distributed backendstorage.#page#CO CitihubDigitalInfrastrnucture Hardeninghardening considerations around the underlying infrastructure runningyour Secrets Management solutionservice-mesh middleware,and storage backend. Some of the top considerations in this area areConsiderationsbootstrappedwith arecovery key that can be put in a break glass system? Given theMaster Tokensobvious threat ofa hijacked root key credentialyoushould be asking yourself fyoucandelete itfrom existence andrely on breakglass access onlycompliance scanning using OpenSCAP or SCAP Workbench to help identify and remediateOS Hardening andexposures acrossyourinfrastructure.Similarly youwill wanttoseeksimilar PCIDSSVulnerability Scanninghardeningapproachesforwindows Serverasneeded.Considertheuse ofFIPS encryptionaswellarethoughttobesecurerepos.On linuxsystemsenablegpgcheck onevery repoandsimilarly with Windows MSI ensure you are using trusted publishersSoftware supply Chainpublic repos should be considered unverified and could potentially lead to arbitrarycommand execution.Ifyouareusing terraform or otherinfrastructure orchestration engines makesureyou arecomparing signed checksums or your organizations digitalsignatures so that compromisedpackages arent being unknowingly deployed.In-memory SecretsPrevent scenarios in which memory can be dumped to the filesystem including core filesLeaksand hibernationstates.Set quotas,throttles,timeouts,back-offsand/orothersafeguardsagainst DDoSorDenialofServiceunintentional resource starvation to ensure the stability of your system from excessiveProtectionrequests#page#CO CitihubDigitalCapability #5:Scaling, High Availability and RedundancyAsimple single datacenter solution design will not provide mechanisms for disasterrecovery or recoveryfrom cyberincidents.Secrets Managementinfrastructurewillneed tobereplicated andmade highlyavaildble in performantways across multiple datacenters and geographies. Understanding how toscale the overall Secrets Mandgement platform across your globalenterprise entails considering not justThe critical end-to-end components and infrastructure as described in Capability 4 (Security are key toensuring each component in your design is accounted for and have known set of performance limitationsin which to medsure and alert by As well as understanding the impact of the types and volumes of secretstorageStorage requirement for a secretStorage requirement for policiesMaximum size ofa secretMaximum limits for each fieldin a policyMaximum size ofa policyMaximumnumber of policiesthatcan be assigned toa group oridentityMaximum#ofproviderservices orenginesuptime across the enterpriseFrom a disaster recovery and cyberresiliency perspective twill allowyou to plan forimpactandrecoveryas well as assure your RTO/RPO when it comes to recovery ofrepliicated secrets#page#page#CO CitihubDigitalBalancing Build vs BuyAccess Management wil youmaintain astaffofengineers andlor developers to build maintain.anditsproprietaryintegrationfootprint and leveragemorecustomizablebut outofthe boxsoftwareuauabpubuu abupup pup loluos uoisJan Inogp DuM csuoipbalul npoid aauibua pup suiBnid ponpoldSulpling o Kullgisuodsaleu uo apioplpoquo uupal Kuunas eg aul sizsipaiutpup saipuuoupcompliance and monitoring in the SIEM?deployment model across regions,lanes,and clusters encompassing your DevelopmentQA,UAT andusers,with rationalization opportunities further down the roadmapcrets could be a significantand application secrets to complement existing services and capabiliies in your organization regardlessof which journey you are on#page#CO CitihubDigitalHow Citihub can HelpCitihub have experience ofimplementing both cloud-oriented Secrets Management products andpup Buiuappu Bus uouuauardu uBisap uo Burdau osp ng saHdps WI Joxu npodsecurity across encoded secretsintegration of business and technology applications in public, private and hybrid operating environments.Our consultants have extensive pedigree in financial services. capital markets,and heavily regulatedindustries and understand how to apply and scale solutions to the highest level of securrity and quality#page#C Cithub DigitalAboutCitihub Digital8Recoding the Digital DNA中of Financial ServicesCitihub specializes in digital transformation for financial services.We arepassionate about building more agile, dynamic companies by harnessingthe full power of cloud technologies. Together with our clients, we solvesome of the industrys toughest challenges.Digital Natives, Born in Financial ServicesWehrive in thecomplex.highlyregulatedenvironmentoffinancialservices.Were inimate withthedaap aApu pup salas suauAod paloupuouanbaubuu uol suasAsoa uolddpskusnpuexperienceresolving security risk andcompliancechalenges.we bring domainspecific methods andiP toevery project.Going Beyond TechnologyThe work we do reaches far beyond technology: it requires fundamental changes to the operating modelsIslIpeds Ausnpu pup sIsIbojouual Jo supal papualq no uolbzlupbJo up Jo ainuin pup sassaoldspan diverse functions and disciplines.acting as catalysts to bridge silos and maximize the value of yourown teamBuilding Lasting RelationshipsWe work with 9/I0 of the biggest banks in North America and Europe.Our clients trust us to deliver and theystaywith us becausewe do.Weve hadyear-on-year relationships with our top 15 cients foranaverageof8yearsLondon l New York | Toronto I Hong K#page#G 2020 citihub digiital#page#

    发布时间2021-04-21 19页 推荐指数推荐指数推荐指数推荐指数推荐指数5星级
  • 2021年中国数据库行业前景及商业模式分析报告(31页).docx

    武汉达梦:背靠中国电子,主攻混合型数据库 HTAP背靠 CEC 中国电子,主攻混合型数据库 HTAP。武汉达梦成立于 2000 年,为中国电子信 息产业集团(CEC)旗下基础软件企业。应用于金融、电力.

    发布时间2021-04-20 31页 推荐指数推荐指数推荐指数推荐指数推荐指数5星级
  • 腾讯研究院:腾讯隐私计算白皮书2021(30页).pdf

    技术趋势平台化和容器化是未来可信计算与云平台融合的关键路径。可信计算开发和部署成本较高,为了满足多样化业务的需求,向使用者提供简易和低成本的服务,平台化和容器化正成为各大厂商的主流选择。例如通过将远程.

    发布时间2021-04-20 26页 推荐指数推荐指数推荐指数推荐指数推荐指数5星级
  • ICON:利用历史数据进行罕见疾病试验(英文版)(20页).pdf

    在对计划试验的分析中纳入或借用历史数据可以提高估计的精度,从而提高统计检验的统计能力,并减少样本量。历史数据可以完全或部分取代对照组,可以从已发表的临床试验和/或医学图表中获得。前者可能会有问题,因为通常很难(如果不是不可能)确定已发表试验中的患者是否与计划研究中的患者具有可比性。问题较少的是来自医疗图表的患者级数据,特别是那些从定期进行临床试验的大型中心获得的数据。在这种情况下,通常可以让最近完成的研究的参与者组成计划研究的外部小组。美国食品药品监督管理局(FDA)和欧洲药品管理局(EMA)都表示愿意接受历史对照研究。有两种主要的方法来分析历史数据。一种是使用贝叶斯方法。这涉及到使用外部数据库中的信息来形成你对结果的“先验信念”。然后,先验信念与你从研究中得到的数据混合,形成后验分布,或你的试验结果。

    发布时间2021-04-20 20页 推荐指数推荐指数推荐指数推荐指数推荐指数5星级
  • 2021年中国互联网券商行业供需及龙头企业分析报告(28页).docx

    富途证券成立于 2012 年 4 月,是一家专注为投资者提供一站式港股、美股交易服务的跨境互联网券商。2009 年,富途团队开始从零了解香港市场和券商运作规 则,并着手组建港股交易团队,从用户角度去深.

    发布时间2021-04-19 28页 推荐指数推荐指数推荐指数推荐指数推荐指数5星级
  • Egress:2021年出口数据丢失预防报告:防止日常数据丢失(英文版)(32页).pdf

    IT领导者面临着数据丢失的巨大挑战。快速、自由流动的信息交换对成功的运营至关重要,但员工可以使用的各种共享渠道,以及他们使用渠道的频率,意味着数据丢失的风险无处不在。过去一年的挑战只会使局势更加恶化。.

    发布时间2021-04-19 32页 推荐指数推荐指数推荐指数推荐指数推荐指数5星级
1049条  共53
前往
客服
商务合作
小程序
服务号
折叠