英文文献翻译《Enterprise Mobile Applications》译文

合集下载

物联网中英文对照外文翻译文献

物联网中英文对照外文翻译文献

中英文资料外文翻译Internet of Things1.the definition of connotationThe English name of the Internet of Things The Internet of Things, referred to as: the IOT.Internet of Things through the pass, radio frequency identification technology, global positioning system technology, real-time acquisition of any monitoring, connectivity, interactive objects or processes, collecting their sound, light, heat, electricity, mechanics, chemistry, biology, the location of a variety of the information you need network access through a variety of possible things and things, objects and people in the Pan-link intelligent perception of items and processes, identification and management. The Internet of Things IntelliSense recognition technology and pervasive computing, ubiquitous network integration application, known as the third wave of the world's information industry development following the computer, the Internet. Not so much the Internet of Things is a network, as Internet of Things services and applications, Internet of Things is also seen as Internet application development. Therefore, the application of innovation is the core of the development of Internet of Things, and 2.0 of the user experience as the core innovation is the soul of Things.2.The meaning of "material"Where the "objects" to meet the following conditions can be included in the scope of the "Internet of Things":1. Receiver have the appropriate information;2. Have a data transmission path;3. Have a certain storage capabilities;4. T o have the CPU;5.T o have the operating system;6. Have specialized applications;7. Have a data transmitter;8. Follow the communication protocol of Things;9. World Network, a unique number that can be identified.3. "Chinese style" as defined inInternet of Things (Internet of Things) refers to is the ubiquitous (Ubiquitous) terminal equipment (Devices) and facilities (Facilities), including with the "inner intelligence" sensors, mobile terminals, industrial systems, floor control system, the family of Intelligentfacilities, video surveillance systems, and external can "(Enabled), such as RFID, a variety of assets (the Assets), personal and vehicle carrying the wireless terminal" intelligent objects or animals "or" smart dust "(the Mote), through a variety of wireless and / or cable over long distances and / or short-range communication networks to achieve interoperability (M2M), application integration (the Grand Integration), and based on cloud computing, SaaS operation mode, in internal network (intranet), private network (e xtranet), and / or the Internet (Internet) environment, the use of appropriate information security mechanisms to provide a safe, controlled and even personalized real-time online monitoring, retrospective positioning, alarm linkage, command and control plan management, remote control, security, remote repair and maintenance, online upgrades, statistical reporting, decision support, the leadership of the desktop (showcase of the Cockpit Dashboard) management and service functions, "Everything," "efficient, energy saving, security environmental protection, "" possession, control, Camp integration [1].4.EU definitionIn September 2009, the Internet of Things and enterprise environments held in Beijing, China-EU Seminar on the European Commission and Social Media Division RFID Division is responsible for Dr. Lorent Ferderix, given the EU's definition of things: the Internet of Things is a dynamic global network infrastructure, it has a standards-based and interoperable communication protocols, self-organizing capabilities, including physical and virtual "objects" of identity, physical attributes, virtual features and smart interface and seamless integration of information networks . Internet of Things Internet and media, the Internet and business Internet one, constitute the future of the Internet.5.changeThe Internet of Things (Internet of Things) the word universally recognized at home and abroad Ashton, Professor of the MIT Auto-ID Center in 1999 first proposed to study RFID. The report of the same name released in 2005, the International T elecommunication Union (ITU), the definition and scope of the Internet of Things has been a change in the coverage of a larger expansion, no longer refers only to the Internet of Things based on RFID technology.Since August 2009, Premier Wen Jiabao put forward the "Experience China" Internet of Things was officially listed as a national one of the five emerging strategic industries, to write the "Government Work Report" Internet of Things in China has been the great concern of the society as a whole degree of concern is unparalleled in the United States, European Union, as well as other countries.The concept of Internet of Things is not so much a foreign concept, as it has been the concept of a "Made in China", his coverage of the times, has gone beyond the scope of the 1999 Ashton professor and the 2005 ITU report referred to, Internet of Things has been labeled a "Chinese style" label.6.BackgroundThe concept of Internet of Things in 1999. Internet-based, RFID technology and EPC standards, on the basis of the computer Internet, the use of radio frequency identification technology, wireless data communication technology, a global items of information to real-time sharing of the physical Internet "Internet of things" (referred to as the Internet of Things) , which is also the basis of the first round of the China Internet of Things boom set off in 2003.The sensor network is built up based on sensing technology network. Chinese Academy of Sciences in 1999 on the start sensor network research and has made some achievements in scientific research, the establishment of applicable sensor network.1999, held in the United States, mobile computing and networking International Conference, "The sensor network is a development opportunity facing humanity in the next century. In 2003, the United States, "T echnology Review" proposed sensor network technology will be future changes ten people's lives first.November 17, 2005, the WSIS held in Tunis (WSIS), the International T elecommunication Union released ITU Internet Report 2005: Internet of Things ", citing the concept of the" Internet of things ". The report pointed out that the ubiquitous "Internet o f Things" communication era is approaching, all the objects in the world, from tires to toothbrushes, from housing to the tissue via the Internet, take the initiative to be exchanged. Radio Frequency Identification (RFID), sensor technology, nanotechnology, intelligent embedded technology will be more widely used.According to the description of the ITU, the era of things, a short-range mobile transceivers embedded in a variety of daily necessities, human beings in the world of information and communication will receive a new communication dimension, from any time communication between people of the place of connection extended to the communication connection between persons and things and things and things. The Internet of Things concept of the rise, largely due to the International T elecommunication Union (ITU), the title of Internet of Things 2005 annual Internet Report. However, the ITU report the lack of a clear definition of Things.Domestic Internet of Things is also there is no single standard definition, but the Internet of Things In essence, the Internet of Things is a polymer application of modern information technology to a certain stage of development and technological upgrading of various sensing technology modern network technology and artificial intelligence and automation technology aggregation and integration of applications, so that the human and material wisdom of dialogue to create a world of wisdom. Because the development of the Internet of Things technology, involving almost all aspects of IT, innovative application and development of a polymer, systematic, and therefore be called revolutionary innovation of information industry. Summed up the nature of the Internet of Things is mainly reflected in three aspects: First, the Internet features that need to be networked objects must be able to achieve the interoperability of the Internet; identification and communication features, that is included in the Internet of Things "objects" must to have the functions of automatic identification and physical objects communication (M2M); intelligent features, the network system should have automated, self-feedback and intelligent control features January 28, 2009, Obama became the President of the United States, held with U.S.business leaders a "round table", as one of the only two representatives, IBM CEO Sam Palmisano for the first time that "the wisdom of the Earth" this concept, it is recommended that the new government to invest in a new generation of intelligent infrastructure.February 24, 2009 news, IBM Greater China CEO money crowd called "Smarter Planet" strategy announced in the forum 2009IBM.This concept was put forth, that is the great concern of the United States from all walks of life, and even analysts believe that IBM's vision is very likely to rise to U.S. national strategy, and caused a sensation in the world. IBM believes that the industry, the next phase of the mission is to make full use of the new generation of IT technology in all walks of life among specifically, is the embedded sensors and equipment to the power grid, railways, bridges, tunnels, highways, buildings, water supply systems dams, oil and gas pipelines and other objects, and is generally connected to the formation of Things.Strategy conference, IBM, and implant the concept of "wisdom" in the implementation of the infrastructure, strong, not only in the short term to stimulate the economy, promote employment, and in a short period of time for China to build a mature wisdom infrastructure platform.IBM "Smarter Planet" strategy will set off again after the wave of Internet technology industrial revolution. Former IBM CEO Lou Gerstner has raised an important point of view, every 15 years, a revolution in computing model. This judgment is the same as Moore's Law accurately call it a "15-year cycle Law". Before and after 1965, changes to the mainframe as a symbol, 1980 marked by the popularization of personal computers, 1995, the Internet revolution. Each such technological change are caused by the enterprise, industry and even the national competitive landscape of major upheaval and change. T o a certain extent in the Internet revolution is ripening by the "information superhighway" strategy. 1990s, the Clinton administration plan for 20 years, $ 200 billion to -4000 billion, construction of the U.S. National Information Infrastructure, to create a huge economic and social benefits.T oday, the "Smarter Planet" strategy by many Americans that there are many similarities with the "information superhighway", the same they revive the economy, a key strategy for competitive advantage. The strategy can be set off, not only for the UnitedStates, such as the Internet revolution was the wave of technological and economic concern, more attention from the world."Internet of Things prospects are very bright, it will dramatically change our current way of life." Demonstration director of the Center of Nanjing University of Aeronautics and Astronautics, National Electrical and Electronic Zhao Guoan said. Industry experts said that the Internet of things to our life personification of the things became a kind of human.Goods (goods) in the world of physical objects associated with each other "exchange", without the need for human intervention. The Internet of Things using radio frequency identification (RFID) technology, to achieve the interconnection and sharing of the automatic identification of goods (products) and information through the computer Internet. It can be said that the Internet of Things depict the world is full of intelligent. In the world of Internet of Things, material objects connected to the dragnet.The second session, held at Peking University in November 2008, China Mobile Government Seminar "Knowledge Society and Innovation 2.0", the experts made the mobile technology, the Internet of Things technology led to the development of economic and social form, innovative forms of change, and promote the The next generation of innovation for the knowledge society as the core of user experience (innovative 2.0) the formation of innovation and development of the form to pay more attention to the user to focus on people-oriented. Research institutions is expected to 10 years, the Internet of Things may be mass adoption of this technology will develop into one of thousands of yuan-scale high-tech market, the industry than the Internet 30 times.It is learned that the things industry chain can be broken down into the identity, perception, processing and information transfer, four links, each link of the key technologies for the wireless transmission network of RFID, sensors, smart chip and telecom operators. EPOSS in the "Internet of Things in 2020" report, an analysis predicted that the future development of the Internet of Things will go through four stages, 2010, RFID is widely used in the field of logistics, retail and pharmaceutical objects interconnect 2010 to 2015, 2015 ~ In 2020, the object into the semi-intelligent, intelligent objects into 2020.As the vanguard of the Internet of Things, RFID has become the most concerned about the technology market. The data show that the global RFID market size in 2008 from$ 4.93 billion in 2007 rose to $ 5.29 billion, this figure covers all aspects of the RFID market, including tags, readers and other infrastructure, software and services. RFID card and card-related infrastructure will account for 57.3 percent of the market, reaching $ 3.03 billion. Application from financial and security industries will drive the market growth of RFID cards. Analysys International forecasts, the Chinese RFID market size in 2009 will reach 5.0 billion, a CAGR of 33%, in which the electronic tag is more than 3.8 billion yuan, the reader close to 700 million yuan, software and services market to reach 500 million yuan pattern.MEMS is the abbreviation of the micro-electromechanical systems, MEMS technology is built on the basis of micro / nano, the market prospect is broad. The main advantage of the MEMS sensor is the small size, large-scale mass production cost reduction, mainly used in two major areas of automoti ve and consumer electronics. Under ICInsight the latest report is expected in 2007-2012, global sales of semiconductor sensors and actuators based on MEMS will reach 19 percent compound annual growth rate (CAGR), compared with $ 4.1 billion in 2007 to five years will achieve $ 9.7 billion in annual sales. 7.PrincipleInternet of Things is on the basis of the computer Internet, RFID, wireless data communications technology, to construct a cover everything in the world's "Internet of Things". In this network, the goods (products) to each other "exchange", without the need for human intervention. Its essence is the use of radio frequency identification (RFID) technology to achieve the interconnection and sharing of the automatic identification of goods (products) and information through the computer Internet.The Internet of Things is a very important technology is radio frequency identification (RFID) technology. RFID is radio frequency identification (Radio Frequency Identification) technology abbreviation, is an automatic identification technology in the 1990s began to rise, the more advanced a non-contact identification technology. The development of RFID technology based on a simple RFID system, combined with existing network technology, database technology, middleware technology, to build a one composed by a large number of networked readers and numerous mobile label, much larger than the Internet of Things trend.RFID, It is able to let items "speak" a technique. In the "Internet of Things" concept, RFID tags are stored in the specification and interoperability information collected automatically by wireless data communications network to a central information system, to achieve the identification of goods (products), and then through the open computer network for information exchange and sharing, items "transparent" management.The information technology revolution in the Internet of Things is referred to as IT mobile Pan of a specific application. Internet of Things through IntelliSense, identification technology and pervasive computing, ubiquitous network convergence applications, breaking the conventional thinking before, human beings can achieve ubiquitous computing and network connectivity [3]. The traditional thinking has been the separation of physical infrastructure and IT infrastructure: on the one hand, airports, roads, buildings, while on the other hand, the data center, PC, broadband. In the era of the "Internet of Things", reinforced concrete, cable with the chip, broadband integration into a unified infrastructure, in this sense, the infrastructure is more like a new site of the Earth, the world really works it, which including economic management, production operation, social and even personal life. "Internet of Things" makes it much more refined and dynamic management of production and life, to manage the future of the city to achieve the status of "wisdom" to improve resource utilization and productivity levels, and improve the relationship between man and nature.8.Agency1, institution-buildingAs the first national Internet of Things industry community organizations - the application of professional Committee of China Electronic Chamber of Things technology products (referred to as: "objects of the IPCC"), the Ministry of Civil Affairs in June 2010, preliminary approved by the Ministry of August being reported that the Ministry of Civil Affairs for final approval.2, the main taskServe as a bridge between business and government to assist the Government of the industry guidance, coordination, consultation and services to help members to reflect the business requirements to the Government; coordinate the relationship between enterprisesto strengthen technical cooperation, product distribution, the elimination of vicious competition ; supervision of members the correct implementation of national laws and regulations, to regulate the industry; member of information communication technology products, cooperation, resource sharing, capital operation, and promote the app lication of Internet of Things technologies and products, and promote the Internet of Things industrial scale , co-development.9.ConstructionInternet of Things in the practical application to carry out requires the involvement of all walks of life, and need the guidance of the national government as well as related regulations and policies to assist the launching of the Internet of Things has the scale, broad participation, management, technical, and material properties, etc. other features, the technical problem is the most crucial issues of Things billion Bo logistics consulting, Internet of Things technology is an integrated technology, a system not yet which company has overall responsibility for network planning and construction of the entire system, theoretical studies have commenced in all walks of life and the practical application is limited to within the industry. The key is on the planning and design and research and development of the Internet of Things research in the field of RFID, sensors, embedded software, and transmission of data calculation. In general, to carry out the steps of the Internet of things mainly as follows:(1) identified the object attributes, properties, including static and dynamic properties of the static property can be stored directly in the label, the dynamic properties need to start with sensors to detect real-time;(2) the need to identify the equipment to complete the reading of object attributes, and information into a data format suitable for network transmission;(3) the object of information transmitted over the network to the information processing center (processing center may be distributed, such as home computers or mobile phones, may also be centralized, such as China Mobile IDC) by the processing center to complete the object communication calculation.10.key areasInternet of Things 4 key areas:(1) RFID;(2) sensor network;(3) The M2M;(4) integration of the two.11.TrendIndustry experts believe that the Internet of things on the one hand can improve economic efficiency and significant cost savings; the other hand, can provide technical impetus to global economic recovery. Currently, the United States, the European Union are all invested heavily in-depth study to explore the Internet of Things. The country is also highly concerned about the emphasis of Things, Industry and Information T echnology Ministry in conjunction with the relevant departments are conducting research in a new generation of IT to the formation of policies and measures to support the development of a new generation of IT.China Mobile CEO Wang Jianzhou has repeatedly mentioned the Internet of Things will become the focus of future development of China Mobile. He will be invited to T aiwan to produce RFID, sensors and bar code manufacturers and China Mobile. According to him, the use of the Internet of Things technology, Shanghai Mobile has a number of industrial customers tailor the data collection, transmission, processing and business management in one set of wireless application solutions. The latest data show that Shanghai Mobile has more than 100,000 chips mounted on a taxi, bus, various forms of matter networking applications in all walks of prowess, to ensure the orderly operation of the city. During the Shanghai World Expo, "the bus services through" will be fully applied to the Shanghai public transport system, the smooth flow traffic to the most advanced technology to protect Expo area; for logistics transportation management, e-logistics ", will provide users with real-time accurate information of Cargo, vehicle tracking and positioning, the transport path selection, logistics network design and optimization services greatly enhance the comprehensive competitiveness of logistics enterprises.In addition, the popularization of the "Internet of Things" for the number of animals, plants and machinery, sensors and RFID tags of items and related interface devices will greatly exceed the number of mobile phones. The promotion of the Internet of Things willbecome a drive to promote economic development for the industry to open up a potential development opportunities. According to the current demand on the Internet of Things, in recent years, billions of sensors and electronic tags, which will greatly promote the production of IT components, while increasing the number of job opportunities.According to reports, it is necessary to truly build an effective Internet of things, there are two important factors. First, the scale, only with the scale to make the items of intelligence play a role. For example, a city of one million vehicles, if we only 10000 vehicles installed on the smart system, it is impossible to form an intelligent transportation system; two mobility items are usually not static, but in the state of the movement , we must maintain the items in the state of motion, and even high-speed motion state can at any time for dialogue.FORRESTER of the authority of the U.S. advisory body predicted that 2020, the world of business of the Internet of Things, compared with the business of interpersonal communication, will reach 30 to 1, so the "Internet of Things" is known to be the next one trillion communications services.Internet of Things heat wave Why is rapidly growing in China? Internet of Things in China rapid rise thanks to the several advantages of our country in terms of things.In the early 1999 launched the Internet of Things core sensor network technology research, R & D level in the world; the second, sensor network field in the world, China is the standard one of the dominant country, the patent owner; third China is one of the countries to achieve a complete industrial chain of Things; Fourth, China's wireless communications network and broadband coverage provides a solid infrastructure to support the development of the Internet of Things; Fifth, China has become the world's first the three major economies, with strong economic strength to support the development of the Internet of Things.12.MythThe current understanding of the Internet of things there are a lot of misunderstanding, which is also a direct impact on our understanding of Things on the development of the logistics industry, it is necessary first to distinguish errors, clarify our thinking.One sensor networks or RFID network equivalent of Things. The fact that sensortechnology, or RFID technology, or are simply one of the information collection technology. In addition to the sensor technology and RFID technology, GPS, video recognition, infrared, laser, scanning can be achieved automatically identify physical objects to communicate technical information collection technology can become the Internet of Things. Sensor networks or RFID network is just an application of Things, but not all of Things.Second, the Internet of Things as a myriad of unlimited extension of the Internet of Things as a completely open for all things, all of the interconnections, all shared Internet platform.In fact, the Internet of Things is not simple infinite extension of the global sharing of the Internet. Even if the Internet is also not only refers to we typically think of the international sharing computer network, Internet, WAN and LAN. Internet of Things can be both an extension of our usual sense of the Internet to the matter; LAN, professional can also be based on real needs and industrial applications. The reality is not necessary and can not make all the items networking; no need to make professional, LAN must be connected to the global Internet sharing platform. Of things in the future the Internet will be very different from the professional network of similar smart logistics, smart transportation, smart grid; the intelligence community and other local area network is the largest use of space.T er, that the ubiquitous network of the Internet of Things Internet of Things, and therefore the Internet of Things is a castle in the air, is difficult to achieve the technology. In fact the Internet of things are real, many of the primary Internet of Things applications already for our services. The Internet of Things concept is introduced in many real-world applications based on polymeric integrated innovation, pre-existing network with the Internet of Things, intelligent, automated system, summarized and upgrading it upgraded from a higher perspective our knowledge.Four of Things as a basket, and everything installed inside; based on self-awareness, and only be able to interact, communication products as the Internet of Things applications. For example, just embedded some of the sensors, to become the so-called Internet of Things appliances; products labeled with RFID tags, became the Internet of Things applications.es。

英文文献与翻译:产品生命周期理论

英文文献与翻译:产品生命周期理论

外文翻译:产品生命周期理论原文来源:Raymond V ernon..《International investment and international trade in the product cycle》译文正文:产品生命周期(product life cycle),简称PLC,是产品的市场寿命,即一种新产品从开始进入市场到被市场淘汰的整个过程。

费农认为:产品生命是指市上的的营销生命,产中和人的生命一样,要经历形成、成长、成熟、衰退这样的周期。

就产品而言,也就是要经历一个开发、引进、成长、成熟、衰退的阶段。

而这个周期在不同的技术水平的国家里,发生的时间和过程是不一样的,期间存在一个较大的差距和时差,正是这一时差,表现为不同国家在技术上的差距,它反映了同一产品在不同国家市场上的竞争地位的差异,从而决定了国际贸易和国际投资的变化。

为了便于区分,费农把这些国家依次分成创新国(一般为最发达国家)、一般发达国家、发展中国家。

典型的产品生命周期一般可以分成四个阶段,即介绍期(或引入期)、成长期、成熟期和衰退期。

就像是人类,产品也有它自己的生命周期,从出生到死亡经过各种阶段。

新产品投入市场,便进入了介绍期。

此时产品品种少,顾客对产品还不了解,除少数追求新奇的顾客外,几乎无人实际购买该产品。

生产者为了扩大销路,不得不投入大量的促销费用,对产品进行宣传推广。

该阶段由于生产技术方面的限制,产品生产批量小,制造成本高,广告费用大,产品销售价格偏高,销售量极为有限,企业通常不能获利,反而可能亏损。

当产品进入引入期,销售取得成功之后,便进入了成长期。

成长期是指产品通过试销效果良好,购买者逐渐接受该产品,产品在市场上站住脚并且打开了销路。

这是需求增长阶段,需求量和销售额迅速上升。

生产成本大幅度下降,利润迅速增长。

与此同时,竞争者看到有利可图,将纷纷进入市场参与竞争,使同类产品供给量增加,价格随之下属,企业利润增长速度逐步减慢,最后达到生命周期利润的最高点。

旅行社管理系统中英文对照外文翻译文献

旅行社管理系统中英文对照外文翻译文献

中英文对照外文翻译(文档含英文原文和中文翻译) Overview is a unified Web development model that includes the services necessary for you to build enterprise-class Web applications with a minimum of coding. is part of the .NET Framework, and when coding applications you have access to classes in the .NET Framework. You can code your applications in any language compatible with the common language runtime (CLR), including Microsoft Visual Basic, C#, JScript .NET, and J#. These languages enable you to develop applications that benefit from the common language runtime, type safety, inheritance, and so on. includes:• A page and controls framework•The compiler•Security infrastructure•State-management facilities•Application configuration•Health monitoring and performance features•Debugging support•An XML Web services framework•Extensible hosting environment and application life cycle management•An extensible designer environmentThe page and controls framework is a programming framework that runs on a Web server to dynamically produce and render Web pages. Web pages can be requested from any browser or client device, and renders markup (such as HTML) to the requesting browser. As a rule, you can use the same page for multiple browsers, because renders the appropriate markup for the browser making the request. However, you can design your Web page to target a specific browser, such as Microsoft Internet Explorer 6, and take advantage of the features of that browser. supports mobile controls for Web-enabled devices such as cellular phones, handheld computers, and personal digital assistants (PDAs). Web pages are completely object-oriented. Within Web pages you can work with HTML elements using properties, methods, and events. The page framework removes the implementation details of the separation of client and server inherent in Web-based applications by presenting a unified model for responding to client events in code that runs at the server. The framework also automatically maintains the state of a page and the controls on that page during the page processing life cycle.The page and controls framework also enables you to encapsulate common UI functionality in easy-to-use, reusable controls. Controls are written once, can be used in many pages, and are integrated into the Web page that they are placed in during rendering.The page and controls framework also provides features to control the overall look and feel of your Web site via themes and skins. You can define themes and skins and then apply them at a page level or at a control level.In addition to themes, you can define master pages that you use to create a consistent layout for the pages in your application. A single master page defines the layout and standard behavior that you want for all the pages (or a group of pages) in your application. You can then create individual content pages that contain the page-specific content you want to display. When users request the content pages, they merge with the master pageto produce output that combines the layout of the master page with the content from the content page.All code is compiled, which enables strong typing, performance optimizations, and early binding, among other benefits. Once the code has been compiled, the common language runtime further compiles code to native code, providing improved performance. includes a compiler that will compile all your application components including pages and controls into an assembly that the hosting environment can then use to service user requests.In addition to the security features of .NET, provides an advanced security infrastructure for authenticating and authorizing user access as well as performing other security-related tasks. You can authenticate users using Windows authentication supplied by IIS, or you can manage authentication using your own user database using forms authentication and membership. Additionally, you can manage the authorization to the capabilities and information of your Web application using Windows groups or your own custom role database using roles. You can easily remove, add to, or replace these schemes depending upon the needs of your application. always runs with a particular Windows identity so you can secure your application using Windows capabilities such as NTFS Access Control Lists (ACLs), database permissions, and so on. For more information on the identity of , provides intrinsic state management functionality that enables you to store information between page requests, such as customer information or the contents of a shopping cart. You can save and manage application-specific, session-specific,page-specific, user-specific, and developer-defined information. This information can be independent of any controls on the page. offers distributed state facilities, which enable you to manage state information across multiple instances of the same application on one computer or on several computers. applications use a configuration system that enables you to define configuration settings for your Web server, for a Web site, or for individual applications. You can make configuration settings at the time your applications are deployed and can add or revise configuration settings at any time with minimal impact on operational Web applications and servers. configuration settings are stored in XML-based files. Because these XML files are ASCII text files, it is simple to make configuration changes to your Web applications. You can extend the configuration scheme to suit your requirements. includes features that enable you to monitor health and performance of your application. health monitoring enables reporting of key events that provide information about the health of an application and about error conditions. These events show a combination of diagnostics and monitoring characteristics and offer a high degree of flexibility in terms of what is logged and how it is logged. supports two groups of performance counters accessible to your applications: •The system performance counter group•The application performance counter group takes advantage of the run-time debugging infrastructure to provide cross-language and cross-computer debugging support. You can debug both managed and unmanaged objects, as well as all languages supported by the common language runtime and script languages.In addition, the page framework provides a trace mode that enables you to insert instrumentation messages into your Web pages. supports XML Web services. An XML Web service is a component containing business functionality that enables applications to exchange information across firewalls using standards like HTTP and XML messaging. XML Web services are not tied to a particular component technology or object-calling convention. As a result, programs written in any language, using any component model, and running on any operating system can access XML Web services. includes an extensible hosting environment that controls the life cycle of an application from when a user first accesses a resource (such as a page) in the application to the point at which the application is shut down. While relies on a Web server (IIS) as an application host, provides much of the hosting functionality itself. The architecture of enables you to respond to application events and create custom HTTP handlers and HTTP modules. includes enhanced support for creating designers for Web server controls for use with a visual design tool such as Visual Studio. Designers enable you to build a design-time user interface for a control, so that developers can configure your control's properties and content in the visual design tool.Introduction to the C# Language and the .NET Framework C# is an elegant and type-safe object-oriented language that enables developers to build a wide range of secure and robust applications that run on the .NET Framework. You can use C# to create traditional Windows client applications, XML Web services, distributed components,client-server applications, database applications, and much, much more. Microsoft Visual C# 2005 provides an advanced code editor, convenient user interface designers, integrated debugger, and many other tools to facilitate rapid application development based on version 2.0 of the C# language and the .NET Framework.NoteThe Visual C# documentation assumes that you have an understanding of basic programming concepts. If you are a complete beginner, you might want to explore Visual C# Express Edition, which is available on the Web. You can also take advantage of any of several excellent books and Web resources on C# to learnpractical programming skills.C# syntax is highly expressive, yet with less than 90 keywords, it is also simple and easy to learn. The curly-brace syntax of C# will be instantly recognizable to anyone familiar with C, C++ or Java. Developers who know any of these languages are typically able to begin working productively in C# within a very short time. C# syntax simplifies many of the complexities of C++ while providing powerful features such as nullable value types, enumerations, delegates, anonymous methods and direct memory access, which are not found in Java. C# also supports generic methods and types, which provide increased type safety and performance, and iterators, which enable implementers of collection classes to define custom iteration behaviors that are simple to use by client code.As an object-oriented language, C# supports the concepts of encapsulation, inheritance and polymorphism. All variables and methods, including the Main method, the application's entry point, are encapsulated within class definitions. A class may inherit directly from one parent class, but it may implement any number of interfaces. Methodsthat override virtual methods in a parent class require the override keyword as a way to avoid accidental redefinition. In C#, a struct is like a lightweight class; it is astack-allocated type that can implement interfaces but does not support inheritance.In addition to these basic object-oriented principles, C# facilitates the development of software components through several innovative language constructs, including: •Encapsulated method signatures called delegates, which enable type-safe event notifications.•Properties, which serve as accessors for private member variables. •Attributes, which provide declarative metadata about types at run time.•Inline XML documentation comments.If you need to interact with other Windows software such as COM objects or native Win32 DLLs, you can do this in C# through a process called "Interop." Interop enables C# programs to do just about anything that a native C++ application can do. C# even supports pointers and the concept of "unsafe" code for those cases in which direct memory access is absolutely critical.The C# build process is simple compared to C and C++ and more flexible than in Java. There are no separate header files, and no requirement that methods and types be declared in a particular order. A C# source file may define any number of classes, structs, interfaces, and events.C# programs run on the .NET Framework, an integral component of Windows that includes a virtual execution system called the common language runtime (CLR) and a unified set of class libraries. The CLR is Microsoft's commercial implementation of the common language infrastructure (CLI), an international standard that is the basis for creating execution and development environments in which languages and libraries work together seamlessly.Source code written in C# is compiled into an intermediate language (IL) that conforms to the CLI specification. The IL code, along with resources such as bitmaps and strings, is stored on disk in an executable file called an assembly, typically with an extension of .exe or .dll. An assembly contains a manifest that provides information on the assembly's types, version, culture, and security requirements.When the C# program is executed, the assembly is loaded into the CLR, which might take various actions based on the information in the manifest. Then, if the security requirements are met, the CLR performs just in time (JIT) compilation to convert the IL code into native machine instructions. The CLR also provides other services related to automatic garbage collection, exception handling, and resource management. Code that is executed by the CLR is sometimes referred to as "managed code," in contrast to "unmanaged code" which is compiled into native machine language that targets a specific system. The following diagram illustrates the compile-time and run time relationships of C# source code files, the base class libraries, assemblies, and the CLR.Language interoperability is a key feature of the .NET Framework. Because the IL code produced by the C# compiler conforms to the Common Type Specification (CTS), IL code generated from C# can interact with code that was generated from the .NET versions of Visual Basic, Visual C++, Visual J#, or any of more than 20 otherCTS-compliant languages. A single assembly may contain multiple modules written in different .NET languages, and the types can reference each other just as if they were written in the same language.In addition to the run time services, the .NET Framework also includes an extensive library of over 4000 classes organized into namespaces that provide a wide variety of useful functionality for everything from file input and output to string manipulation to XML parsing, to Windows Forms controls. The typical C# application uses the .NET Framework class library extensively to handle common "plumbing" chores. 概述 是一个统一的 Web 开发模型,它包括您使用尽可能少的代码生成企业级 Web 应用程序所必需的各种服务。

商务翻译Unit11商务报告

商务翻译Unit11商务报告
present maintenance staff we would not have sufficient workers who are available if big problems were to arise. The firm has been advertising for SEC 4 maintenance engineers for some weeks. We were still only working a twoshift system so that the machines were not getting the necessary SEC 5 maintenance.
SEC 6
SEC 7
SEC 8
返回
SECTION 1
SEC 2
商务报告具有自己独特的结构,绝大多数商务报告都可以分为三大部分:
引言(introduction)、正文(body)、结尾(final section)。同时,这大三部 SEC 3 分里面又包括了四个小的要素:引言里的职权范围(terms of reference)和执行程
SEC 7
SEC 8
返回
SECTION 2
SEC 1 Ⅰ.请尝试把下列商务报告的摘录翻译成汉语,注意其语言特点和所用到的翻译 技巧。
SEC 3
In line with recent efforts to increase staff satisfaction and company
efficiency, a feasibility study was carried out between January and March to
SEC 6 SEC 7
译文: 译文:
全自动 发生重大事故时能派上用场的

计算机java外文翻译外文文献英文文献

计算机java外文翻译外文文献英文文献

英文原文:Title: Business Applications of Java. Author: Erbschloe, Michael, Business Applications of Java -- Research Starters Business, 2008DataBase: Research Starters - BusinessBusiness Applications of JavaThis article examines the growing use of Java technology in business applications. The history of Java is briefly reviewed along with the impact of open standards on the growth of the World Wide Web. Key components and concepts of the Java programming language are explained including the Java Virtual Machine. Examples of how Java is being used bye-commerce leaders is provided along with an explanation of how Java is used to develop data warehousing, data mining, and industrial automation applications. The concept of metadata modeling and the use of Extendable Markup Language (XML) are also explained.Keywords Application Programming Interfaces (API's); Enterprise JavaBeans (EJB); Extendable Markup Language (XML); HyperText Markup Language (HTML); HyperText Transfer Protocol (HTTP); Java Authentication and Authorization Service (JAAS); Java Cryptography Architecture (JCA); Java Cryptography Extension (JCE); Java Programming Language; Java Virtual Machine (JVM); Java2 Platform, Enterprise Edition (J2EE); Metadata Business Information Systems > Business Applications of JavaOverviewOpen standards have driven the e-business revolution. Networking protocol standards, such as Transmission Control Protocol/Internet Protocol (TCP/IP), HyperText Transfer Protocol (HTTP), and the HyperText Markup Language (HTML) Web standards have enabled universal communication via the Internet and the World Wide Web. As e-business continues to develop, various computing technologies help to drive its evolution.The Java programming language and platform have emerged as major technologies for performing e-business functions. Java programming standards have enabled portability of applications and the reuse of application components across computing platforms. Sun Microsystems' Java Community Process continues to be a strong base for the growth of the Java infrastructure and language standards. This growth of open standards creates new opportunities for designers and developers of applications and services (Smith, 2001).Creation of Java TechnologyJava technology was created as a computer programming tool in a small, secret effort called "the Green Project" at Sun Microsystems in 1991. The Green Team, fully staffed at 13 people and led by James Gosling, locked themselves away in an anonymous office on Sand Hill Road in Menlo Park, cut off from all regular communications with Sun, and worked around the clock for18 months. Their initial conclusion was that at least one significant trend would be the convergence of digitally controlled consumer devices and computers. A device-independent programming language code-named "Oak" was the result.To demonstrate how this new language could power the future of digital devices, the Green Team developed an interactive, handheld home-entertainment device controller targeted at the digital cable television industry. But the idea was too far ahead of its time, and the digital cable television industry wasn't ready for the leap forward that Java technology offered them. As it turns out, the Internet was ready for Java technology, and just in time for its initial public introduction in 1995, the team was able to announce that the Netscape Navigator Internet browser would incorporate Java technology ("Learn about Java," 2007).Applications of JavaJava uses many familiar programming concepts and constructs and allows portability by providing a common interface through an external Java Virtual Machine (JVM). A virtual machine is a self-contained operating environment, created by a software layer that behaves as if it were a separate computer. Benefits of creating virtual machines include better exploitation of powerful computing resources and isolation of applications to prevent cross-corruption and improve security (Matlis, 2006).The JVM allows computing devices with limited processors or memory to handle more advanced applications by calling up software instructions inside the JVM to perform most of the work. This also reduces the size and complexity of Java applications because many of the core functions and processing instructions were built into the JVM. As a result, software developersno longer need to re-create the same application for every operating system. Java also provides security by instructing the application to interact with the virtual machine, which served as a barrier between applications and the core system, effectively protecting systems from malicious code.Among other things, Java is tailor-made for the growing Internet because it makes it easy to develop new, dynamic applications that could make the most of the Internet's power and capabilities. Java is now an open standard, meaning that no single entity controls its development and the tools for writing programs in the language are available to everyone. The power of open standards like Java is the ability to break down barriers and speed up progress.Today, you can find Java technology in networks and devices that range from the Internet and scientific supercomputers to laptops and cell phones, from Wall Street market simulators to home game players and credit cards. There are over 3 million Java developers and now there are several versions of the code. Most large corporations have in-house Java developers. In addition, the majority of key software vendors use Java in their commercial applications (Lazaridis, 2003).ApplicationsJava on the World Wide WebJava has found a place on some of the most popular websites in the world and the uses of Java continues to grow. Java applications not only provide unique user interfaces, they also help to power the backend of websites. Two e-commerce giants that everybody is probably familiar with (eBay and Amazon) have been Java pioneers on the World Wide Web.eBayFounded in 1995, eBay enables e-commerce on a local, national and international basis with an array of Web sites-including the eBay marketplaces, PayPal, Skype, and -that bring together millions of buyers and sellers every day. You can find it on eBay, even if you didn't know it existed. On a typical day, more than 100 million items are listed on eBay in tens of thousands of categories. Recent listings have included a tunnel boring machine from the Chunnel project, a cup of water that once belonged to Elvis, and the Volkswagen that Pope Benedict XVI owned before he moved up to the Popemobile. More than one hundred million items are available at any given time, from the massive to the miniature, the magical to the mundane, on eBay; the world's largest online marketplace.eBay uses Java almost everywhere. To address some security issues, eBay chose Sun Microsystems' Java System Identity Manager as the platform for revamping its identity management system. The task at hand was to provide identity management for more than 12,000 eBay employees and contractors.Now more than a thousand eBay software developers work daily with Java applications. Java's inherent portability allows eBay to move to new hardware to take advantage of new technology, packaging, or pricing, without having to rewrite Java code ("eBay drives explosive growth," 2007).Amazon (a large seller of books, CDs, and other products) has created a Web Service application that enables users to browse their product catalog and place orders. uses a Java application that searches the Amazon catalog for books whose subject matches a user-selected topic. The application displays ten books that match the chosen topic, and shows the author name, book title, list price, Amazon discount price, and the cover icon. The user may optionally view one review per displayed title and make a buying decision (Stearns & Garishakurthi, 2003).Java in Data Warehousing & MiningAlthough many companies currently benefit from data warehousing to support corporate decision making, new business intelligence approaches continue to emerge that can be powered by Java technology. Applications such as data warehousing, data mining, Enterprise Information Portals (EIP's), and Knowledge Management Systems (which can all comprise a businessintelligence application) are able to provide insight into customer retention, purchasing patterns, and even future buying behavior.These applications can not only tell what has happened but why and what may happen given certain business conditions; allowing for "what if" scenarios to be explored. As a result of this information growth, people at all levels inside the enterprise, as well as suppliers, customers, and others in the value chain, are clamoring for subsets of the vast stores of information such as billing, shipping, and inventory information, to help them make business decisions. While collecting and storing vast amounts of data is one thing, utilizing and deploying that data throughout the organization is another.The technical challenges inherent in integrating disparate data formats, platforms, and applications are significant. However, emerging standards such as the Application Programming Interfaces (API's) that comprise the Java platform, as well as Extendable Markup Language (XML) technologies can facilitate the interchange of data and the development of next generation data warehousing and business intelligence applications. While Java technology has been used extensively for client side access and to presentation layer challenges, it is rapidly emerging as a significant tool for developing scaleable server side programs. The Java2 Platform, Enterprise Edition (J2EE) provides the object, transaction, and security support for building such systems.Metadata IssuesOne of the key issues that business intelligence developers must solve is that of incompatible metadata formats. Metadata can be defined as information about data or simply "data about data." In practice, metadata is what most tools, databases, applications, and other information processes use to define, relate, and manipulate data objects within their own environments. It defines the structure and meaning of data objects managed by an application so that the application knows how to process requests or jobs involving those data objects. Developers can use this schema to create views for users. Also, users can browse the schema to better understand the structure and function of the database tables before launching a query.To address the metadata issue, a group of companies (including Unisys, Oracle, IBM, SAS Institute, Hyperion, Inline Software and Sun) have joined to develop the Java Metadata Interface (JMI) API. The JMI API permits the access and manipulation of metadata in Java with standard metadata services. JMI is based on the Meta Object Facility (MOF) specification from the Object Management Group (OMG). The MOF provides a model and a set of interfaces for the creation, storage, access, and interchange of metadata and metamodels (higher-level abstractions of metadata). Metamodel and metadata interchange is done via XML and uses the XML Metadata Interchange (XMI) specification, also from the OMG. JMI leverages Java technology to create an end-to-end data warehousing and business intelligence solutions framework.Enterprise JavaBeansA key tool provided by J2EE is Enterprise JavaBeans (EJB), an architecture for the development of component-based distributed business applications. Applications written using the EJB architecture are scalable, transactional, secure, and multi-user aware. These applications may be written once and then deployed on any server platform that supports J2EE. The EJB architecture makes it easy for developers to write components, since they do not need to understand or deal with complex, system-level details such as thread management, resource pooling, and transaction and security management. This allows for role-based development where component assemblers, platform providers and application assemblers can focus on their area of responsibility further simplifying application development.EJB's in the Travel IndustryA case study from the travel industry helps to illustrate how such applications could function. A travel company amasses a great deal of information about its operations in various applications distributed throughout multiple departments. Flight, hotel, and automobile reservation information is located in a database being accessed by travel agents worldwide. Another application contains information that must be updated with credit and billing historyfrom a financial services company. Data is periodically extracted from the travel reservation system databases to spreadsheets for use in future sales and marketing analysis.Utilizing J2EE, the company could consolidate application development within an EJB container, which can run on a variety of hardware and software platforms allowing existing databases and applications to coexist with newly developed ones. EJBs can be developed to model various data sets important to the travel reservation business including information about customer, hotel, car rental agency, and other attributes.Data Storage & AccessData stored in existing applications can be accessed with specialized connectors. Integration and interoperability of these data sources is further enabled by the metadata repository that contains metamodels of the data contained in the sources, which then can be accessed and interchanged uniformly via the JMI API. These metamodels capture the essential structure and semantics of business components, allowing them to be accessed and queried via the JMI API or to be interchanged via XML. Through all of these processes, the J2EE infrastructure ensures the security and integrity of the data through transaction management and propagation and the underlying security architecture.To consolidate historical information for analysis of sales and marketing trends, a data warehouse is often the best solution. In this example, data can be extracted from the operational systems with a variety of Extract, Transform and Load tools (ETL). The metamodels allow EJBsdesigned for filtering, transformation, and consolidation of data to operate uniformly on datafrom diverse data sources as the bean is able to query the metamodel to identify and extract the pertinent fields. Queries and reports can be run against the data warehouse that contains information from numerous sources in a consistent, enterprise-wide fashion through the use of the JMI API (Mosher & Oh, 2007).Java in Industrial SettingsMany people know Java only as a tool on the World Wide Web that enables sites to perform some of their fancier functions such as interactivity and animation. However, the actual uses for Java are much more widespread. Since Java is an object-oriented language like C++, the time needed for application development is minimal. Java also encourages good software engineering practices with clear separation of interfaces and implementations as well as easy exception handling.In addition, Java's automatic memory management and lack of pointers remove some leading causes of programming errors. Most importantly, application developers do not need to create different versions of the software for different platforms. The advantages available through Java have even found their way into hardware. The emerging new Java devices are streamlined systems that exploit network servers for much of their processing power, storage, content, and administration.Benefits of JavaThe benefits of Java translate across many industries, and some are specific to the control and automation environment. For example, many plant-floor applications use relatively simple equipment; upgrading to PCs would be expensive and undesirable. Java's ability to run on any platform enables the organization to make use of the existing equipment while enhancing the application.IntegrationWith few exceptions, applications running on the factory floor were never intended to exchange information with systems in the executive office, but managers have recently discovered the need for that type of information. Before Java, that often meant bringing together data from systems written on different platforms in different languages at different times. Integration was usually done on a piecemeal basis, resulting in a system that, once it worked, was unique to the two applications it was tying together. Additional integration required developing a brand new system from scratch, raising the cost of integration.Java makes system integration relatively easy. Foxboro Controls Inc., for example, used Java to make its dynamic-performance-monitor software package Internet-ready. This software provides senior executives with strategic information about a plant's operation. The dynamic performance monitor takes data from instruments throughout the plant and performs variousmathematical and statistical calculations on them, resulting in information (usually financial) that a manager can more readily absorb and use.ScalabilityAnother benefit of Java in the industrial environment is its scalability. In a plant, embedded applications such as automated data collection and machine diagnostics provide critical data regarding production-line readiness or operation efficiency. These data form a critical ingredient for applications that examine the health of a production line or run. Users of these devices can take advantage of the benefits of Java without changing or upgrading hardware. For example, operations and maintenance personnel could carry a handheld, wireless, embedded-Java device anywhere in the plant to monitor production status or problems.Even when internal compatibility is not an issue, companies often face difficulties when suppliers with whom they share information have incompatible systems. This becomes more of a problem as supply-chain management takes on a more critical role which requires manufacturers to interact more with offshore suppliers and clients. The greatest efficiency comes when all systems can communicate with each other and share information seamlessly. Since Java is so ubiquitous, it often solves these problems (Paula, 1997).Dynamic Web Page DevelopmentJava has been used by both large and small organizations for a wide variety of applications beyond consumer oriented websites. Sandia, a multiprogram laboratory of the U.S. Department of Energy's National Nuclear Security Administration, has developed a unique Java application. The lab was tasked with developing an enterprise-wide inventory tracking and equipment maintenance system that provides dynamic Web pages. The developers selected Java Studio Enterprise 7 for the project because of its Application Framework technology and Web Graphical User Interface (GUI) components, which allow the system to be indexed by an expandable catalog. The flexibility, scalability, and portability of Java helped to reduce development timeand costs (Garcia, 2004)IssueJava Security for E-Business ApplicationsTo support the expansion of their computing boundaries, businesses have deployed Web application servers (WAS). A WAS differs from a traditional Web server because it provides a more flexible foundation for dynamic transactions and objects, partly through the exploitation of Java technology. Traditional Web servers remain constrained to servicing standard HTTP requests, returning the contents of static HTML pages and images or the output from executed Common Gateway Interface (CGI ) scripts.An administrator can configure a WAS with policies based on security specifications for Java servlets and manage authentication and authorization with Java Authentication andAuthorization Service (JAAS) modules. An authentication and authorization service can bewritten in Java code or interface to an existing authentication or authorization infrastructure. Fora cryptography-based security infrastructure, the security server may exploit the Java Cryptography Architecture (JCA) and Java Cryptography Extension (JCE). To present the user with a usable interaction with the WAS environment, the Web server can readily employ a formof "single sign-on" to avoid redundant authentication requests. A single sign-on preserves user authentication across multiple HTTP requests so that the user is not prompted many times for authentication data (i.e., user ID and password).Based on the security policies, JAAS can be employed to handle the authentication process with the identity of the Java client. After successful authentication, the WAS securitycollaborator consults with the security server. The WAS environment authentication requirements can be fairly complex. In a given deployment environment, all applications or solutions may not originate from the same vendor. In addition, these applications may be running on different operating systems. Although Java is often the language of choice for portability between platforms, it needs to marry its security features with those of the containing environment.Authentication & AuthorizationAuthentication and authorization are key elements in any secure information handling system. Since the inception of Java technology, much of the authentication and authorization issues have been with respect to downloadable code running in Web browsers. In many ways, this had been the correct set of issues to address, since the client's system needs to be protected from mobile code obtained from arbitrary sites on the Internet. As Java technology moved from a client-centric Web technology to a server-side scripting and integration technology, it required additional authentication and authorization technologies.The kind of proof required for authentication may depend on the security requirements of a particular computing resource or specific enterprise security policies. To provide such flexibility, the JAAS authentication framework is based on the concept of configurable authenticators. This architecture allows system administrators to configure, or plug in, the appropriate authenticatorsto meet the security requirements of the deployed application. The JAAS architecture also allows applications to remain independent from underlying authentication mechanisms. So, as new authenticators become available or as current authentication services are updated, system administrators can easily replace authenticators without having to modify or recompile existing applications.At the end of a successful authentication, a request is associated with a user in the WAS user registry. After a successful authentication, the WAS consults security policies to determine if the user has the required permissions to complete the requested action on the servlet. This policy canbe enforced using the WAS configuration (declarative security) or by the servlet itself (programmatic security), or a combination of both.The WAS environment pulls together many different technologies to service the enterprise. Because of the heterogeneous nature of the client and server entities, Java technology is a good choice for both administrators and developers. However, to service the diverse security needs of these entities and their tasks, many Java security technologies must be used, not only at a primary level between client and server entities, but also at a secondary level, from served objects. By using a synergistic mix of the various Java security technologies, administrators and developers can make not only their Web application servers secure, but their WAS environments secure as well (Koved, 2001).ConclusionOpen standards have driven the e-business revolution. As e-business continues to develop, various computing technologies help to drive its evolution. The Java programming language and platform have emerged as major technologies for performing e-business functions. Java programming standards have enabled portability of applications and the reuse of application components. Java uses many familiar concepts and constructs and allows portability by providing a common interface through an external Java Virtual Machine (JVM). Today, you can find Java technology in networks and devices that range from the Internet and scientific supercomputers to laptops and cell phones, from Wall Street market simulators to home game players and credit cards.Java has found a place on some of the most popular websites in the world. Java applications not only provide unique user interfaces, they also help to power the backend of websites. While Java technology has been used extensively for client side access and in the presentation layer, it is also emerging as a significant tool for developing scaleable server side programs.Since Java is an object-oriented language like C++, the time needed for application development is minimal. Java also encourages good software engineering practices with clear separation of interfaces and implementations as well as easy exception handling. Java's automatic memory management and lack of pointers remove some leading causes of programming errors. The advantages available through Java have also found their way into hardware. The emerging new Java devices are streamlined systems that exploit network servers for much of their processing power, storage, content, and administration.中文翻译:标题:Java的商业应用。

云计算Cloud Computing-外文翻译

云计算Cloud Computing-外文翻译

毕业设计说明书英文文献及中文翻译学生姓名:学号:计算机与控制工程学院:专指导教师:2017 年 6 月英文文献Cloud Computing1. Cloud Computing at a Higher LevelIn many ways, cloud computing is simply a metaphor for the Internet, the increasing movement of compute and data resources onto the Web. But there’s a difference: cloud computing represents a new tipping point for the value of network computing. It delivers higher efficiency, massive scalability, and faster, easier software development. It’s about new programming models, new IT infrastructure, and the enabling of new business models.For those developers and enterprises who want to embrace cloud computing, Sun is developing critical technologies to deliver enterprise scale and systemic qualities to this new paradigm:(1) Interoperability — while most current clouds offer closed platforms and vendor lock-in, developers clamor for interoperability. Sun’s open-source product strategy and Java™ principles are focused on providing interoperability for large-scale computing resources. Think of the existing cloud “islands” merging into a new, interoperable “Intercloud” where applications can be moved to and operate across multiple platforms.(2) High-density horizontal computing —Sun is pioneering high-power-density compute-node architectures and extreme-scale Infiniband fabrics as part of our top-tier HPC deployments. This high-density technology is being incorporated into our large-scale cloud designs.(3)Data in the cloud —More than just compute utilities, cloud computing is increasingly about petascale data. Sun’s Open Storage products offer hybrid data servers with unprecedented efficiency and performance for the emerging data-intensive computing applications that will become a key part of the cloud.These technology bets are focused on driving more efficient large-scale cloud deployments that can provide the infrastructure for next-generation business opportunities: social networks, algorithmic trading, continuous risk analysis, and so on.2. Why Cloud Computing?(1)Clouds: Much More Than Cheap ComputingCloud computing brings a new level of efficiency and economy to delivering IT resources on demand — and in the process it opens up new business models and market opportunities.While many people think of current cloud computing offerings as purely “pay by the drink” compute platforms, they’re really a convergence of two major interdependent IT trends:IT Efficiency —Minimize costs where companies are converting their IT costs from capital expenses to operating expenses through technologies such as virtualization. Cloud computing begins as a way to improve infrastructure resource deployment and utilization, but fully exploiting this infrastructure eventually leads to a new application development model.Business Agility —Maximize return using IT as a competitive weapon through rapid time to market, integrated application stacks, instant machine image deployment, and petascale parallel programming. Cloud computing is embraced as a critical way to revolutionize time to service. But inevitably these services must be built on equally innovative rapid-deployment-infrastructure models.To be sure, these trends have existed in the IT industry for years. However, the recent emergence of massive network bandwidth and virtualization technologies has enabled this transformation to a new services-oriented infrastructure.Cloud computing enables IT organizations to increase hardware utilization rates dramatically, and to scale up to massive capacities in an instant — without constantly having to invest in new infrastructure, train new personnel, or license new software. It also creates new opportunities to build a better breed of network services, in less time, for less money.IT Efficiency on a Whole New ScaleCloud computing is all about efficiency. It provides a way to deploy and access everything from single systems to huge amounts of IT resources — on demand, in realtime, at an affordable cost. It makes high-performance compute and high-capacity storage available to anyone with a credit card. And since the best cloud strategies build on concepts and tools that developers already know, clouds also have the potential to redefine the relationship between information technology and the developers and business units that depend on it.Reduce capital expenditures — Cloud computing makes it possible for companies to convert IT costs from capital expense to operating expense through technologies such as virtualization.Cut the cost of running a datacenter — Cloud computing improves infrastructure utilization rates and streamlines resource management. For example, clouds allow for self-service provisioning through APIs, bringing a higher level of automation to the datacenter and reducing management costs.Eliminate over provisioning —Cloud computing provides scaling on demand, which, when combined with utility pricing, removes the need to overprovision to meet demand. With cloud computing, companies can scale up to massive capacities in an instant.For those who think cloud computing is just fluff, take a closer look at the cloud offerings that are already available. Major Internet providers , Google, and others are leveraging their infrastructure investments and “sharing” their large-scale economics. Already the bandwidth used by Amazon Web Services (AWS) exceeds that associated with their core e-tailing services. Forward-looking enterprises of all types —from Web 2.0 startups to global enterprises — are embracing cloud computing to reduce infrastructure costs.Faster, More Flexible ProgrammingCloud computing isn’t only about hardware —it’s also a programming revolution. Agile, easy-to-access, lightweight Web protocols — coupled with pervasive horizontally scaled architecture — can accelerate development cycles and time to market with new applications and services. New business functions are now just a script away.Accelerated cycles — The cloud computing model provides a faster, more efficientway to develop the new generation of applications and services. Faster development and testing cycles means businesses can accomplish in hours what used to take days, weeks, or months.Increase agility —Cloud computing accommodates change like no other model. For example, Animoto Productions, makers of a mashup tool that creates video from images and music, used cloud computing to scale up from 50 servers to 3,500 in just three days. Cloud computing can also provide a wider selection of more lightweight and agile development tools, simplifying and speeding up the development process.The immediate impact will be unprecedented flexibility in service creation and accelerated development cycles. But at the same time, development flexibility could become constrained by APIs if they’re not truly open. Cloud computing can usher in a new era of productivity for developers if they build on platforms that are designed to be federated rather than centralized. But there’s a major shift underway in p rogramming culture and the languages that will be used in clouds.Today, the integrated, optimized, open-source Apache, MySQL, PHP/Perl/Python (AMP) stack is the preferred platform for building and deploying new Web applications and services. Cloud computing will be the catalyst for the adoption of an even newer stack of more lightweight, agile tools such as lighttpd, an open-source Web server; Hadoop, the free Java software framework that supports data-intensive distributed applications; and MogileFS, a file system that enables horizontal scaling of storage across any number of machines.(2)Compelling New Opportunities: The Cloud EcosystemBut cloud computing isn’t just about a proliferation of Xen image stacks on a restricted handful of infrastructure prov iders. It’s also about an emerging ecosystem of complementary services that provide computing resources such as on-ramps for cloud abstraction, professional services to help in deployment, specialized application components such as distributed databases, and virtual private datacenters for the entire range of IT providers and consumers.These services span the range of customer requirements, from individualdevelopers and small startups to large enterprises. And they continue to expand the levels of virtualization, a key architectural component of the cloud that offers ever-higher abstractions of underlying services.(3) How Did Cloud Computing Start?At a basic level, cloud computing is simply a means of delivering IT resources as services. Almost all IT resources can be delivered as a cloud service: applications, compute power, storage capacity, networking, programming tools, even communications services and collaboration tools.Cloud computing began as large-scale Internet service providers such as Google, Amazon, and others built out their infrastructure. An architecture emerged: massively scaled, horizontally distributed system resources, abstracted as virtual IT services and managed as continuously configured, pooled resources. This architectural model was immortalized by George Gilder in his October 2006 Wired magazine article titled “The Information Factories.” The server farms Gilder wrote about were architecturally similar to grid computing, but where grids are used for loosely coupled, technical computing applications, this new cloud model was being applied to Internet services.Both clouds and grids are built to scale horizontally very efficiently. Both are built to withstand failures of individual elements or nodes. Both are charged on a per-use basis. But while grids typically process batch jobs, with a defined start and end point, cloud services can be continuous. What’s more, clouds expand the types of resources available — file storage, databases, and Web services — and extend the applicability to Web and enterprise applications.At the same time, the concept of utility computing became a focus of IT design and operations. As Nick Carr observed in his book The Big Switch, computing services infrastructure was beginning to parallel the development of electricity as a utility. Wouldn’t it be great if you could purchase compute resources, on demand, only paying for what you need, when you need it?For end users, cloud computing means there are no hardware acquisition costs, no software licenses or upgrades to manage, no new employees or consultants to hire, nofacilities to lease, no capital costs of any kind — and no hidden costs. Just a metered, per-use rate or a fixed subscription fee. Use only what you want, pay only for what you use.Cloud computi ng actually takes the utility model to the next level. It’s a new and evolved form of utility computing in which many different types of resources (hardware, software, storage, communications, and so on) can be combined and recombined on the fly into the specific capabilities or services customers require. From CPU cycles for HPC projects to storage capacity for enterprise-grade backups to complete IDEs for software development, cloud computing can deliver virtually any IT capability, in real time. Under the circumstances it is easy to see that a broad range of organizations and individuals would like to purchase “computing” as a service, and those firms already building hyperscale distributed data centers would inevitably choose to begin offering this infrastructure as a service.(4)Harnessing Cloud ComputingSo how does an individual or a business take advantage of the cloud computing trend? It’s not just about loading machine images consisting of your entire software stack onto a public cloud like AWS — there are several different ways to exploit this infrastructure and explore the ecosystem of new business models.Use the CloudThe number and quality of public, commercially available cloud-based service offerings is growing fast. Using the cloud is often the best option for startups, research projects, Web 2.0 developers, or niche players who want a simple, low-cost way to “load and go.”If you’re an Internet startup today, you will be mandated by your investors to keep you IT spend to a minimum. This is certainly what the cloud is for.Leverage the CloudTypically, enterprises are using public clouds for specific functions or workloads. The cloud is an attractive alternative for:Development and testing — this is perhaps the easiest cloud use case for enterprises (not just startup developers). Why wait to order servers when you don’t even know if theproject will pass the proof of concept?Functional offloading — you can use the cloud for specific workloads. For example, SmugMug does its image thumbnailing as a batch job in the cloud.Augmentation —Clouds give you a new option for handling peak load or anticipated spikes in demand for services. This is a very attractive option for enterprises, but also potentially one of the most difficult use cases. Success is dependent on the statefulness of the application and the interdependence with other datasets that may need to be replicated and load-balanced across the two sites.Experimenting — Why download demos of new software, and then install, license, and test it? In the future, software evaluation can be performed in the cloud, before licenses or support need to be purchased.Build the CloudMany large enterprises understand the economic benefits of cloud computing but want to ensure strict enforcement of secur ity policies. So they’re experimenting first with “private” clouds, with a longer-term option of migrating mature enterprise applications to a cloud that’s able to deliver the right service levels.Other companies may simply want to build private clouds to take advantage of the economics of resource pools and standardize their development and deployment processes.Be the CloudThis category includes both cloud computing service providers and cloud aggregators — companies that offer multiple types of cloud services.As enterprises and service providers gain experience with the cloud architecture model and confidence in the security and access-control technologies that are available, many will decide to deploy externally facing cloud services. The phenomenal growth rates of some of the public cloud offerings available today will no doubt accelerate the momentum. Amazon’s EC2 was introduced only two years ago and officially graduated from beta to general availability in October 2008.Cloud service providers can:Provide new routes to market for startups and Web 2.0 application developersOffer new value-added capabilities such as analyticsDerive a competitive edge through enterprise-level SLAsHelp enterprise customers develop their own cloudsIf you’re building large datacenters today, you should probably be thinking about whether you’re going to offer cloud services.(5)Public, Private, and Hybrid CloudsA company may choose to use a service provider’s cloud or build its own — but is it always all or nothing? Sun sees an opportunity to blend the advantages of the two primary options:Public clouds are run by third parties, and jobs from many different customers may be mixed together on the servers, storage systems, and other infrastructure within the cloud. End users don’t know who else’s job may be me running on the same server, network, or disk as their own jobs.Private clouds are a good option for companies dealing with data protection and service-level issues. Private clouds are on-demand infrastructure owned by a single customer who controls which applications run, and where. They own the server, network, and disk and can decide which users are allowed to use the infrastructure.But even those who feel compelled in the short term to build a private cloud will likely want to run applications both in privately owned infrastructure and in the public cloud space. This gives rise to the concept of a hybrid cloud.Hybrid clouds combine the public and private cloud models. You own parts and share other parts, though in a controlled way. Hybrid clouds offer the promise of on-demand, externally provisioned scale, but add the complexity of determining how to distribute applications across these different environments. While enterprises may be attracted to the promise of a hybrid cloud, this option, at least initially, will likely be reserved for simple stateless applications that require no complex databases or synchronization.3. Cloud Computing Defined(1)Cornerstone TechnologyWhile the basic technologies of cloud computing such as horizontally scaled, distributed compute nodes have been available for some time, virtualization —the abstraction of computer resources —is the cornerstone technology for all cloud architectures. With the ability to virtualize servers (behind a hypervisor-abstracted operating system), storage devices, desktops, and applications, a wide array of IT resources can now be allocated on demand.The dramatic growth in the ubiquitous availability of affordable high-bandwidth networking over the past several years is equally critical. What was available to only a small percentage of Internet users a decade ago is now offered to the majority of Internet users in North America, Europe, and Asia: high bandwidth, which allows massive compute and data resources to be accessed from the browser. Virtualized resources can truly be anywhere in the cloud — not just across gigabit datacenter LANs and WANs but also via broadband to remote programmers and end users.Additional enabling technologies for cloud computing can deliver IT capabilities on an absolutely unprecedented scale. Just a few examples:Sophisticated file systems such as ZFS can support virtually unlimited storage capacities, integration of the file system and volume management, snapshots and copy-on-write clones, on-line integrity checking, and repair.Patterns in architecture allow for accelerated development of superscale cloud architectures by providing repeatable solutions to common problems.New techniques for managing structured, unstructured, and semistructured data can provide radical improvements in data-intensive computing.Machine images can be instantly deployed, dramatically simplifying and accelerating resource allocation while increasing IT agility and responsiveness.(2)The Architectural Services Layers of Cloud ComputingWhile the first revolution of the Internet saw the three-tier (or n-tier) model emerge as a general architecture, the use of virtualization in clouds has created a new set of layers: applications, services, and infra structure. These layers don’t just encapsulateon-demand resources; they also define a new application development model. And within each layer of abstraction there are myriad business opportunities for defining services that can be offered on a pay-per-use basis.Software as a Service (SaaS)SaaS is at the highest layer and features a complete application offered as a service, on demand, via multitenancy — meaning a single instance of the software runs on the provider’s infrastructure and serves multiple client organizations.The most widely known example of SaaS is , but there are now many others, including the Google Apps offering of basic business services such as e-mail. Of course, ’s multitenant application has preceded the definition of cloud computing by a few years. On the other hand, like many other players in cloud computing, now operates at more than one cloud layer with its release of , a companion application development environment, or platform as a service. Platform as a Service (PaaS)The middle layer, or PaaS, is the encapsulation of a development environment abstraction and the packaging of a payload of services. The archetypal payload is a Xen image (part of Amazon Web Services) containing a basic Web stack (for example, a Linux distro, a Web server, and a programming environment such as Pearl or Ruby).PaaS offerings can provide for every phase of software development and testing, or they can be specialized around a particular area, such as content management.Commercial examples include Google App Engine, which serves applications on Google’s infrastructure. PaaS services such as these can provide a great deal of flexibility but may be constrained by the capabilities that are available through the provider.Infrastructure as a Service (IaaS)IaaS is at the lowest layer and is a means of delivering basic storage and compute capabilities as standardized services over the network. Servers, storage systems, switches, routers, and other systems are pooled (through virtualization technology, for example) to handle specific types of workloads —from batch processing toserver/storage augmentation during peak loads.The best-known commercial example is Amazon Web Services, whose EC2 and S3 services offer bare-bones compute and storage services (respectively). Another example is Joyent whose main product is a line of virtualized servers which provide a highly scalable on-demand infrastructure for running Web sites, including rich Web applications written in Ruby on Rails, PHP, Python, and Java.中文翻译云计算1.更高层次的云计算在很多情况下,云计算仅仅是互联网的一个隐喻,也就是网络上运算和数据资源日益增加的一个隐喻。

企业信息化建设外文翻译文献

企业信息化建设外文翻译文献

企业信息化建设外文翻译文献(文档含中英文对照即英文原文和中文翻译)原文:Analysis on the informatization construction of small and medium-sized enterprisesWorsley Susan【Abstract】:with the rapid development of information technology, the domestic,small and medium-sized enterprise informatization construction has entered a new stage ofdeve1opment, small and medium-sized enterprise informatization has become the small and medium enterprises out of its own advantage, improve competitive,advantage to enhance competition ability and development ability is an important choice. This paper analyzes the important role of informatization in small and medium-sized enterprises, summarizes the main problems in information system construction, and puts forwardthe countermeasures to solve the problem.IntroductionA l ong w ith the information technique change rapid l y deve l opme n t, eco n omic g lo ba l iz a ti o n a nd th e knowle dg e e co n o m y r ap id de vel opmen t,mar ket c o m pe titi o n b e co m ing i nc r easi n gly fi e rc e, man y s m all a nd m e d i um en t e rp ri se s q u i cke n th e informatiza t io n co n s tr uc t ion, ente rp rise i nformat i zation leve l direc tl y affects the com p e t itiveness o f ente rp rises. Enter p rise info r mat i zation i s t o show the en t erpr i se i s in p r o d uct i on, ci r c u lation and service and o th er busi n ess ac ti vities,th e use o f mo d ern information techno1ogy, t hrough adva n ced com p uter n etwork t echno l ogy to i n teg r ate the ex i sting p ro du ctio n, management, design,man uf ac tu ri n g a nd other secto r s, ente rp r i ses r eal i ze the automa t io n o f the p roduct i on p rocess, management o f the network, intell i ge n ce of d ecision-making a nd bu siness ope r at i o n o f the elec tr onic, so as t o improve th e econo m ic ef f ic i ency of e n ter p rises and th e co m pet i t i veness ofente rp r i ses i n the p r ocess.1.Strengthening the informatization construction of small and medium-sizedenterprises the important role1.1contribute to the technical progress of the enterpriseInformation tech n o l ogy promotes the sma ll and medium-sized enterprise technology innovation. Be helpful for technical innovation in enterprises of interstitial diffusio n.1.2contributes to improve the adaptability of enterprisesWith the h elp of info r mation t ech n ology and network, the en t erpr i se can time l y access to ma rk e t i n forma t ion, t o ex p and th e sco p e of the ma rk e t, be he lp ful for fac t o r o f p r oduct i on opt i mize con fi gu r at i on, ma k e th e ente rp rise adap t t o vary fr om m i n u te to min u te market e n vironme nt, enhance th e e n ter pri se ag ilit y.1.3to help improve the management efficiency of enterprisesIn f orma t ion management autom a tion, i nte ll igent ca n redu c e the cos t of po li cy, imp r ove th e ef fi ciency o f d e ci sio n ma ki ng.2.the current small and medium-sized enterprise informatization to build theproblem of existence2.1misunderstandingsAlthough many medium and small enterprises have different levels to carry out the informatization construction,but most are not on what is enterprise informatization, how to carry out informatization to have a thorough understanding.Many managers think that informatization construction is the enterprise business process" original copy", use the computer instead of manual operation, the traditiona1 habits and standard on the system and using the process of evaluation, and accordingly put forward to modify an opinion.2.2insufficient capital investmentEnterprise informatization is a n eed fo r lo n g-te r m deve l opme nt of investme nt p r ojec t, n o t on l y in the i ni t i a l stage w i1l cos t a lo t o f money t o buy ha rd ware and m a t chi n g software reso ur ce, in the la tt er par t of t he t ra i n i ng of person n el t ec hni cal f o ll ow-up sys t em up g r a d e a n d mai nt e n ance aspec t is t o i n ves t e n or m ous ca pi tal.2.3composite talent shortageSmall and medium-sized enterprises have already know IT technology and understand the business processes and complex business management backbone little talent which to a large extent restricts the small and medium-sized enterprise informatization construction quality and speed.2.4Management supporting backwardEnterprise information to promote information technology plays its role in management must with the advanced management means and methods to combine, melting into the modern management idea and method.2.5Problems in the external environment1)Government support is not enough, the lack of scientific guidance. Governmentsupport for small and medium sized enterprise informatization construction is not enough, insufficient guidance, mainly reflected in the following two aspects: first, large enterprises is present at all levels of Government Informatization Transformation of special funds focus on the funding, and the informatization construction of small and medium sized enterprises lack of attention; the, government departments themselves in the process of information did not take the lead, such as lack of the information-based degree of the industrial and commercial bureau, tax bureau, making every month the company but also to the Inland Revenue Department ranked team for a long time to make statements and so on, which in a certain extent, affected the enthusiasm of the informatization construction of small and medium sized enterprises.2)The relevant laws and regulations are not perfect. At present our country in theinformation construction of enterprises is still not unified planning and standards, the corresponding laws and regulations are not perfect, the informatization construction of the regional industry basically in a state of fragmentation. For the network economic crimes, China is also lack of effective technical means and legal sanctions basis, so the first use of information technology companies to pay the price is relatively large. So many small and medium enterprises in the face of dazzling computer hardware and software market and numerous information systems development failures phenomenon, many confused, indecisive.3)Services Limited, the environment is poor. Compared with foreign countries, thedevelopment of China's software industry is lagging behind. On the market a lot of enterprise information solutions are provided by foreign large software companies, such as SAP, the United States, the United States, and so on.However, these programs are very expensive, small and medium enterprises can not afford to buy. Although there are a lot of Domestic Company for small and medium enterprises to provide the so-called tailored management software products, the price is not expensive, but the software can not meet the actual needs of small and medium enterprises, service has not kept up with. In addition, the small and medium enterprises in the construction of information technology has expertise in consulting company, the construction of information technology is not enough, leading to the project quality can not be guaranteed. Electronic payment, information security, social credit system and other aspects of the existing problems that the enterprise believes that now is not the best time to carry out information.3.Accelerating the information construction of small and medium-sizedenterprises measures3.1Enterprise1)Correct understanding of informationThe rapid development in information technology today economic globalization pace accelerate, make enterprise information construction becomes the trend of the times to be a trend which cannot be rmation process, which is to integratethe various resources within the enterprise through the computer network technology, optimize the management process, and then improve the process of economic efficiency and competitiveness of enterprises. Enterprise information is not equal to the simple computer, it is a complex process. Only business process reengineering, so that information technology into the enterprise's financial, sales, planning, production, procurement and other business processes, or else simply do not talk about what the enterprise information.2)Accelerate composite information talentsEnterprises should establish corresponding mechanism cultivate and maintain a technology to improve the team all staff and managers in the management of information technology knowledge and theory level.Talents are the most valuable resources for enterprises. In order to promote the development of information technology, small and medium enterprises must do a good job in both hands. On the one hand, enterprises must formulate human resource strategy, adopt various methods and means to recruit and introduce talents for enterprises, especially the advanced technology. On the other hand, enterprises should carry out more training activities within the enterprise, through technical exchanges and cooperation and other ways to cultivate a large number of professional knowledge, with practical ability of information technology personnel, improve the comprehensive ability of the enterprise to improve the normal operation of enterprise information.3)Take the key breakthrough of phased implementationEnterprise information is a step is not possible nor practical, should take steps to implement, key breakthrough system construction mode, can be divided into several different stages to implement it step by step. As small and medium-sized enterprises, by their own limitations, can input information construction funds will not too much.4)Plays by society and government supportOur country small and medium-sized enterprise information is still in its infancy, is inseparable from the government’s guidance and social support.Small and medium enterprise informationization is a revolution ,is a complex and arduous systemproject ,involving all aspects of the business small and medium-sized enterprise informatization level is directly related to the level of the whole national informatization level. Small and medium-sized enterprises want to survive and develop, infromatization construction to be imperative informatization construction of small and medium-sized enterprises to obtain the competitive advantage will become the inevitable choice.5)To make the overall planning of enterprise informationEnterprise information planning, also known as enterprise IT planning, it is the guidance of enterprise development strategy, diagnosis and analysis of enterprise management status, optimize the business process, and put forward the enterprise information system architecture, determine the logic relationship between each part of the information system. In the preparation of enterprise information construction, the research on the status quo and future development of enterprises should be made, including a series of complete planning including enterprise information network, technical route, the choice of software, implementation and consulting team, information realization steps and so on.3.2government and social aspects1)To strengthen the policy support to the informatization construction of small andmedium sized enterprises.To give full play to the role of the national enterprise information work leading group and local business information work leading group, all levels of government information technology to reform the special funds also have a certain tilt, adhere to the policy of the government to promote, market guidance, business entities, industry breakthrough, regional expansion, and strengthen enterprise information engineering support, and provide more effective macro guidance, organization and policy support.2)To create a good legal environment. Governments at all levels should developinformation management regulations as soon as possible,Strengthen the management of information resources. In order to solve theproblem of security and electronic contract authentication of online transactions and settlement, online contract law should be introduced as soon as possible to enhance the security of online transactions. To strengthen the laws and regulations on the fight against Internet crimes and to strengthen the protection of intellectual property rights. At the same time, we should further improve the information security monitoring system, establish an effective mechanism for information security and emergency handling mechanism, in the focus on the protection of basic network and important system security based on comprehensive information security protection.3)To strengthen the information guidance, play the role of the third party resourcesand platform.Small and medium enterprise information is still in the enlightenment, need to actively cooperate with the full range of positive guidance. Government to play the role of policy guidance to play the role of enterprise information, the media should play an active role in promoting and promoting the role of. At the same time, we should give full play to the role of the third party resources and platform. If the enterprise from the construction of network platform, run the server group, support a team to start, really need a high input. But in fact, they can outsource these operations, the business can only focus on the core business process. The use of third party platform to establish supply management system, often can achieve the goal of low cost, high efficiency, dynamic, very worthy of small and medium enterprises for reference.4.ConclusionIn recent years, the Chinese government has strengthened the guidance andpromotion of the small and medium-sized enterprise information, and hasachieved some results. But from the level of development of informationtechnology and Chinese enterprises to participate in the global competition point of view, is still a long way to go. The government should continue to increasesupport for small and medium-sized enterprises, accelerate the construction of information infrastructure and public information resources, accelerate theconstruction of small and medium enterprise information service team, andactively carry out e-government, so as to mobilize and encourage theimplementation of information technology in small and medium enterprises.译文:中小企业信息化建设分析沃斯利-苏珊【摘要】:随着信息技术的飞速发展,国内、中小企业信息化建设进入了新的发展阶段,中小企业信息化已成为中小企业自身优势,提高竞争优势,增强竞争力和发展能力是一个重要的选择。

MOBILE APPLICATIONS

MOBILE APPLICATIONS

专利名称:MOBILE APPLICATIONS发明人:Adam Bosworth,Richard Burdon,AlexanderKhesin,Alexander Lloyd,Farokh H. Eskafi,KenOng,Terry Leonard Lucas,AlexanderBosworth申请号:US11857352申请日:20070918公开号:US20090300656A1公开日:20091203专利内容由知识产权出版社提供专利附图:摘要:Providing a framework for developing, deploying and managing sophisticatedmobile solutions, with a simple Web-like programming model that integrates with existing enterprise components. Mobile applications may consist of a data model definition, user interface templates, a client side controller, which includes scripts that define actions, and, on the server side, a collection of conduits, which describe how to mediate between the data model and the enterprise. In one embodiment, the occasionally-connected application server assumes that data used by mobile applications is persistently stored and managed by external systems. The occasionally-connected data model can be a METAdata description of the mobile application's anticipated usage of this data, and be optimized to enable the efficient traversal and synchronization of this data between occasionally connected devices and external systems.申请人:Adam Bosworth,Richard Burdon,Alexander Khesin,Alexander Lloyd,Farokh H. Eskafi,Ken Ong,Terry Leonard Lucas,Alexander Bosworth地址:Mercer Island WA US,Brooklyn NY US,New York NY US,New York City NY US,Brooklyn NY US,Rancho Santa Fe CA US,Snohomish WA US,Mercer Island WA US 国籍:US,US,US,US,US,US,US,US更多信息请下载全文后查看。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

企业移动应用开发框架Bhuvan Unhelkar, MethodScience广受尊敬的咨询家、培训老师、作家和演讲者San Murugesan, BRITE Professional Services企业面临一些挑战派遣移动应用, 出自功能,如位置独立, contextualization 、个性化。

这six-layer 企业 移动应用开发提供了一个系统框架 和综合的解决方案,以移动应用程序开发和软件 维护。

最近几年移动技术和应用变得特别普遍,在各行各业都是。

企业都在通过采取移动技术上的应用来提高自己的运营效率(给员工提供更强的实时信息接口访问),提高产品的竞争力,利用移动革命,满足新的顾客需求。

这种移动应用为用户访问信息、应用提供了存储独立个性化,提高了用户满意度。

移动应用还能够为用户提供环境感知响应,如用户位置、使用时间或者其他属性。

例如,可以提供银行、旅游、紧急服务等和用户位置、使用时间相关的业务。

尽管移动技术和移动应用给企业带来很多新的机会,但是同样带来开发和实施的挑战。

这些挑战还不包括定位、有线网络桌面应用的挑战。

例如,企业移动应用的开发和部署必须和计算通信模式整合。

一些移动应用必须要确定用户的位置来提供服务,然后不断地追踪用户位置,来提供相应的服务和信息。

然后还包括一些安全性、可靠性、服务质量的等级等等都是新的挑战。

图1 一种新的企业移动用用分类标准。

高层应用比底层的更丰富也跟更复杂(改编自早期的M 提出的一个模型) MethodScience,一个澳大利亚咨询公司,提供卓越国际美誉在各个过程、建模和管理造成实质性的和可测量的质量在公司和软件的开发。

科学的方法成功应用,作为一个实用的学科,为广泛的客户环境。

在此,我们提出一种新的企业移动应用分类模型,建立在科学方法所提出的基础之上,同时还研究了移动应用的挑战。

为了成功的用系统的综合的方式来应对这些挑战,我们提出了六层移动应用开发框架(MADF)。

A New Taxonomy for Enterprise Mobile Applications新的分类标准既然企业已经广泛的应用移动技术来做移动应用,我们需要更好地了解应用程序以及应用程序带来的需求。

我们提出了如图1中的企业移动应用的新的划分标准。

我们概括的将移动应用分为5类:移动推广、信息、交易、经营、合作。

后三个类别的应用内容丰富复杂,比前两个需要更多地需求和挑战。

我们的分类方法能够帮助应用程序开发者关注开发实现应用程序的主要部分。

Mobile Broadcast-移动推广推广一些内容给移动用户,例如紧急情况下的方向指引,在商场的打折促销信息,用户未注册、普通Mobile Information-移动信息用户需要的信息,信息流通常是单向的,例如大事件、产品、服务、促销、时刻表、价格等。

对安全要求不高,但是仍要保证可用性和隐私保护。

Mobile Transaction-移动交易除了推广和提供信息,这种应用程序还需要促进和构成交易。

让用户买卖商品和服务,定位、跟踪订单,电子支付。

这种应用程序需要提供比前两类更好地安全性、更快的响应能力、更高的交易可靠性、更高的性能以及更可信的服务。

包括三个部分:用户(客户)、业务相关者(服务提供商、网上商店、航空线等)、财务中间人(在线付款网关、贝宝-类似支付宝)Mobile Operation-移动经营这些应用主要支持商务运营方面的,但不是直接和顾客或者客户直接交互的。

通常都是提供一些便利的实时信息,当前股票信息,生产时间表,工资信息,leave balances 整合企业的不同后端系统和不同的数据库也是一个关键的挑战。

Mobile Collaboration-移动合作促进不同员工、部门之间的合作,促进商业伙伴和同僚见得合作。

帮助建立和管理人群(员工、客户、企业)的社交网络应用也是这类的。

利益相关者之间的动态互动和支持这些互动的软件模块提高了应用的复杂性,这同时也给编程和数据管理带来挑战。

Mobile Application Development Challenges移动应用开发的挑战移动应用开发强化和延伸了传统企业应用程序的开发的挑战。

比如在定位程序的开发中要把用户的定位信息加到程序里分析、架构、设计、编码、测试。

另外,在移动应用程序开发中还有客户定制化的开发需求,要根据用户的需求、访问、可用性,来达到最好的用户体验在移动设备上有贷款的限制、无线通信的差的可靠性条件下。

处理好这些挑战是企业成功开发和部署移动程序的关键。

分为三类挑战:Devices and Platforms-设备和平台一般用来播放和接收数据的设备屏幕和键盘都很小,所以开发者要格外的注重可用性,比如单键导航,去除一些特性来尽量用易感知的方式来表现数据内容。

界面设计还要考虑到一些选项:语音激活,灵敏触摸的屏,新颖的菜单写字笔,手写、手势识别。

你开发出来的应用程序还需要适用于不同的手持设备,在不同的平台、不同的接口。

同样的程序还需要再不同格式的移动设备上运行,所以还得考虑设备的配置和操作平台。

巧妙的使用小型电池让其充一次电保证能够延长设备运行时间也是很大的挑战。

User Location, Usage, and Content-用户位置、用途、内容移动设备比台式电脑更加的私人化,越来越多人依赖他们的移动设备。

那就更需要个性化的应用程序,不同的用户可能喜欢通过不同的方式来获取信息通知,根据个人的喜好、不同类型的设备的不同用法。

有一些应用程序要需要适应用户的位置不断变化,包括对应信息的环境-变化。

例如经常要考虑到在提供相关信息和服务时的位置、使用时间、当前任务、使用历史等这些参数。

一种多功能的应用程序还需要能够处理多元化的、甚至是不断变化的对象目标。

例如,一个提供某一个常经过的车站的电车时刻表的程序还应该提供交通信息。

当然,根据不同的用途、意义移动应用程序也会大相径庭。

可以提供警务人员就剩服务、医务护理、促进社交网络、休闲运动、音乐下载、个性化彩铃、营销等次不同的应用程序根据不同的可用性、有效性有不同的需求。

网页内容—文本、连接、图像、视频—提供的功能、范围都要适用于移动设备。

移动应用程序应该能够提供混合格式的多媒体内容(视频、音频、数据)。

移动应用程序还需要其他模式的报告格式。

除了文本、图像,还应有其他的发送模式,例如语音提示。

例如,声音相应更适合于司机的及时注意。

Dynamic Communication and Networks 动态通信网络移动应用开发必须考虑到移动通信网络的带宽、以及潜在的通信障碍。

同样,无线通信的安全性和通信交易中出现故障都必须圆满解决。

图2 六层企业移动应用程序开发框架。

安全层包含了其他几层。

企业移动应用程序开发框架Enterprise MADF我们的移动应用程序开发框架(MADF)六层分别是:通信、信息、中间软件和绑定、应用程序、描述、安全层(见图2)。

安全层是覆盖了其他层、并与其它层正交。

这种分层的框架把软件建设元素、设计、所需的支持通信的基本设施(网络、协议)、来自不同信息源的不同类型的信息存储集中到一起。

同样它还把用户接口设计、编码设计模式复用和应用程序设计联系到一起,可以设计出更好的移动应用程序架构。

建立起例如扎克曼框架的企业级架构框架(()),技术层((/ togaf ))的开放集团脚骨框架为理解MADF提供了相关背景。

Communication-通信移动网络为移动应用程序提供了基础通信设施。

开发者要懂基本的TCP、互联网协议(IP),无线应用协议(WAP),人局域网(PAN),城域网(MANs)。

下一个要考虑的就是标准,例如IEEE 802.1x群网络协议,移动蜂窝通信标准(2G, 2.5G, 3G, 或 4G),局部通信(红外或者蓝牙),无线射频识别(RFID),WiMax,无线VoIP技术。

例如,对于远程通信,移动应用程序要半酣一堆网络(典型的蜂窝网络)来用红外、蓝牙或者其他短程网络链接到可程序化的借口。

网络和通信的能力直接影响着移动程序的服务质量(QoS)。

例如,记账程序需要部署在蜂窝网站上,而小额付款或手机零售就需要结合移动网络和基于wifi的无线局域网。

开发者可以利用这个MADFInformation-信息移动应用使用多媒体内容,三个挑战:内容来源和表现,安全的内容存储,内容挖掘。

呈现高质量的多媒体内容—包括结构化的和半结构化的数据,自然语言文本、图像、音频、视频—都是来自多源的(不同格式)在如此一个小小的屏幕上,要有低的需求的计算、存储、通信资源是个挑战。

此外,这样的呈现还要求为了适应特殊的设备不同形式的因素进行格式重定。

存储机制影响着访问速度和内容质量。

例如,开发者可能在一个移动设备上播放一个视频必须要降低其质量,但是他们还可以以一个高密度格式存储在数据库中。

数据镜像策略提高了荣誉也提高了可靠性,但是双重存储和相关的维护功能会导致额外的开销,降低了数据访问速度。

为排除这种挑战,移动应用程序应该集中数据到数据池中。

这种简化了设计和新架构的流程,造就了更一致的信息处理方法。

开发者能用景象模式等这些设计模式来解决建模。

由于客户端存储需求渐渐扩大,也变得复杂,他们应该考虑到在用户设备上创建缓存内容—开放移动网格的机会。

移动应用架构应该能够处理每个客户端设备的事件响应、同步活动的创意和在每一个移动设备上做修改。

为了定位用户的特殊资讯需求,必须要数据挖掘。

这是一个很有挑战的任务,因为数据海量、类型不一、由于来自不同信源的相同或相似的信息是不均匀的(不同格式)、不断更新的。

此外,为了满足不同对象的不同需求进行挖掘。

最后,移动内容管理应探索提供商务智能、集成、可靠性见得关系的机会。

Middleware and Binding-中间软件和绑定这一层绑定、约束了所提供的应用程序、服务或者内容。

移动中间软件技术就是为了整合或者固化一个移动软件程序的不同服务或者模块。

移动中间软件处理移动环境中的分布式的服务,提供改变设备类型的“胶”(与设备的操作环境一致)。

WAP和IMode是两个较为熟知的移动中间软件协议,建立在TCPIP之上,在开发中使用。

移动应用的连接不是均匀的。

应用程序是断断续续的执行、在不同的需要移动应用的位置、不同的阶段还需要连接、断开、再连接。

中间软件技术在执行的时候必须迎合这种模式的连接性。

Applications-应用程序应用程序包括企业在这一层留存的业务规则。

模拟移动过程是开发移动企业应用的一个至关重要的元素。

开发者可以用业务流程建模符号(())创建模型,确定业务在程序中如何用。

他们还可以对这些模式眼神进行移动过程合作。

过程模型帮助重建业务过程(定期讨论,非移动业务过程),从而提高业绩。

相关文档
最新文档