kubernetes - search results
If you're not happy with the results, please do another search
Key Technologies for Building Modules (MultiChip)
A multi-chip module (MCM) according to Wikipedia is generically an electronic assembly where multiple integrated circuits, semiconductor dies and/or other discrete components are fully...
Five Misunderstandings of Big Data Analytics
In this post, we have provided five Misunderstandings of Big Data Analytics: Only by cracking the misunderstandings can we tap the value of data.
Big...
Robotics: What Technologies do Cloud Robots Need?
The technological development momentum of the modern world is swift and violent. What Technologies do Cloud Robots need to Escort? The "new generation of information technology" along...
Electronic Whiteboard: Research, Teaching & e-Learning
Electronic Whiteboard: thinking in the rapid progress on Research, Teaching and e-Learning. In recent decades, the interactive whiteboard (IWB) has become a relatively for...
Don’t Interpret “Big Data & AI” as a “Big Myth”
"Big data and AI" is very hot right now. In a sense, now or in the future, "the one who obtains the data gets wealth"...
Big Data Mining and Semantic Analysis with Weibo Development
Big data mining and semantic analysis break the bottleneck of Weibo development. Recently, the new version of Tencent Weibo has been fully launched, featuring...
China’s Cloud Computing Industry is still in Overheating Period
CHINA's cloud computing industry has just started, at the peak of the overheating period, and some blindness has been exposed in the implementation process....
Big Data Basic Terms You Should Know in the Era of Big Data Analytics
This post is for those people who wants to speak fluent ‘data-ese’. You will agree with me that knowing the basic terms in big...
Public Opinion Monitoring in the Era of Big Data Trends
Education Public opinion monitoring in the era of big data needs "gold rush in the sand" Currently, the Internet has entered the era of...
Protecting Credentials and Company Secrets with DLP
Protecting Credentials and Company Secrets with DLP software has become paramount in every organization. Question; What can you do as an individual to protect and secure...