专业英语翻译 (6)

更新时间:2023-05-28 03:41:15 阅读: 评论:0

 New technique of the computer network
Abstract
The 21 century is an ages of the information economy, being the computer network technique of reprentative techniques this ages, will be at very fast speed develop soon in continuously creatively, and will go deep into the people's work, life and study. Therefore, control this technique and then em to be more to deliver the importance. Now I mainly introduce the new technique of a few networks in actuality live of application.
Keywords:
Internet ; Digital Certificates  ; Digital Wallets   ;Grid Storage
幼儿园什么时候开学
1. Foreword
Internet turns 36, still a work in progress
公务员车补标准Thirty-six years after computer scientists at UCLA linked two bulky computers using a 15-fo
ot gray cable, testing a new way for exchanging data over networks, what would ultimately become the Internet remains a work in progress.
University rearchers are experimenting with ways to increa its capacity and speed. Programmers are trying to imbue Web pages with intelligence. And work is underway to re-engineer the network to reduce spam(junk mail) and curity troubles.
儿童医保怎么办理All the while threats loom: Critics warn that commercial, legal and political pressures could hinder the types of innovations that made the Internet what it is today.
Stephen Crocker and Vinton Cerf were among the graduate students who joined UCLA professor Len Kleinrock in an engineering lab on Sept. 2, 1969, as bits of meaningless test data flowed silently between the two computers. By January, three other "nodes" joined the fledgling network.
Then came e-mail a few years later, a core communications protocol called TCP/IP in the late 70s, the domain name system in the 80s and the World Wide Web - now the cond
most popular application behind e-mail - in 1990. The Internet expanded beyond its initial military and educational domain into business and homes around the world.
Today, Crocker continues work on the Internet, designing better tools for collaboration. And as curity chairman for the Internet's key oversight body, he is trying to defend the core addressing system from outside threats.
控烟宣传资料
He acknowledges the Internet he helped build is far from finished, and changes are in store to meet growing demands for multimedia. Network providers now make only "best efforts" at delivering data packets, and Crocker said better guarantees are needed to prevent the skips and stutters now common with video.
企业债券
Cerf, now at MCI Inc., said he wished he could have designed the Internet with curity built-in. Microsoft Corp., Yahoo Inc. and America Online Inc., among others, are currently trying to retrofit the network so e-mail nders can be authenticated - a way to cut down on junk messages nt using spoofed address.
Many features being developed today wouldn't have been possible at birth given the slower computing speeds and narrower Internet pipes, or bandwidth, Cerf said.
2.Digital Certificates
Digital certificates are data files ud to establish the identity of people and electronic asts on the Internet. They allow for cure, encrypted online communication and are often ud to protect online transactions.
社会事务Digital certificates are issued by a trusted third party known as a certification authority (CA). The CA validates the identity of a certificate holder and “signs” the certificate to attest that it hasn’t been forged or altered in any way.
New Us For Digital Certificates
Digital certificates are now being ud to provide curity and validation for wireless connections, and hardware manufacturers are one of the latest groups to u them. Not long ago, VeriSign Inc. announced its Cable Modem Authentication Services, which allow
不开头成语
hardware manufacturers to embed digital certificates into cable modems to help prevent the pirating of broadband rvices through device cloning.
Using VeriSign software, hardware makers can generate cryptographic keys and corresponding digital certificates that manufacturers or cable rvice providers can u to automatically identify individual modems.
卑的读音
This ‘ast-mile’authentication not only protects the value of existing content and rvices but also positions cable system operators to bring a broad new range of content, applications and value-added rvices to market.
When a certificate is digitally signed by a CA, its owner can u it as an electronic passport to prove his identity. It can be prented to Web sites, networks or individuals that require cure access.
Identifying information embedded in the certificate includes the holder’ s name and e-mail address, the name of the CA, a rial number and any activation or expiration data for th
e certificate. When a ur’s identity is verified by the CA, the certificate us the holder’s public encryption key to protect this data.

本文发布于:2023-05-28 03:41:15,感谢您对本站的认可!

本文链接:https://www.wtabcd.cn/fanwen/fan/82/796779.html

版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。

标签:资料   时候   标准   办理   社会   成语   控烟
相关文章
留言与评论(共有 0 条评论)
   
验证码:
推荐文章
排行榜
Copyright ©2019-2022 Comsenz Inc.Powered by © 专利检索| 网站地图