This paper systematically analyzes the specific application of database programming technology in computer software engineering, so as to provide technical support for computer software engineering and realize the intelligent development goal of computer software engineering. Using database programming technology can drive the database system to run at high speed, so as to maximize the value of computer software engineering data. Database programming technology can efficiently store software data information and establish a comprehensive database information system, so as to improve the overall performance of computer software engineering. Therefore, increasing the application and optimization of database programming technology can further develop the core technology of computer software engineering and promote the technological innovation of various industries.
KEYWORDS: Clouds, Network security, Computer security, Computer networks, Data storage, Computing systems, Security technologies, Information technology, Information security, Data backup
Cloud computing technology integrates computer network technologies such as load balancing, network storage, utility computing and distributed computing, which has scalability, versatility, large-scale, virtualization and can provide reliable and cheap services. The services of cloud computing include IaaS (infrastructure as a service), PaaS (Platform as a service), and SaaS (Software as a service). The society is very concerned about the security problem of the cloud, which specifically involves the security level of the cloud, the application service layer and the infrastructure layer [1]. In view of this problem, China has established BIM cloud computing Center, 360, Green Alliance, Qiming Star Chen, Ruixing and other companies have formulated network security solutions, and appeared Ali Cloud, BIM Cloud and Baidu Cloud, thus providing an important guarantee for the security of cloud computing technology applications. This paper explains the application analysis of cloud computing technology in computer network security storage and provides a series of methods for how to apply it.
KEYWORDS: Computer networks, Electronics engineering, Information technology, Network security, Data centers, Computing systems, Computer security, Communication engineering, Data processing, Telecommunications
With the development of computer network technology, the coverage of the WAN is also getting bigger and bigger, while the electronic information engineering needs to provide long-distance communication channels and form a remote network. In the physical link of the WAN, the optical fiber, different from other media, can effectively resist external interference and realize information and data transmission through the optical pulse. However, in addition, the communication trunk line will also affect the transmission effect, which will need to distinguish between public lines and professional lines accordingly.
KEYWORDS: Information technology, Databases, Computer security, Data storage, Security technologies, Network security, Information security, Data conversion, Research management, Data processing
With the development of society, the use of computer technology is becoming more and more common, and it has had its own place in various fields and has a wide range of applications [1]. The application of computers can effectively improve people's work efficiency, and also have unique advantages in the field of information management. Through the development of computer technology, the information can be effectively controlled, so as to certain control and regulate the network. This paper effectively discusses and expounds the application of computer technology in information management.
KEYWORDS: Clouds, Computer security, Data processing, Security technologies, Network security, Data transmission, Data storage, Software, Computing systems, Mobile devices
The traditional computer has low computing efficiency, and the data processing mode is relatively single. However, the cloud computing technology has the ability of multiple information to accelerate data processing and can process the data in a short time. Therefore, by applying the cloud computing technology to the computer data processing, the speed and dynamic optimization technology of the cloud computing technology can effectively control the multi-source information data flow. At the same time, the cloud computing data processing service mode is built, which can integrate and reconstruct information resources, and solve the problem of computer resource scheduling. However, to prevent technology leakage, architectural security protocols are needed, and new encryption technologies are developed to reduce the cost of data operation as much as possible while ensuring the application security of cloud computing technology.
KEYWORDS: Clouds, Virtual reality, Data storage, Computing systems, Software development, Software, Data fusion, Internet, Data modeling, Data processing
Cloud storage technology and big data technology, as the two major branches of virtual reality technology, are applied to computer software technology, which can reprocess and modify the data resources of cloud space, and also make users feel the virtual three-dimensional space. With the support of computer software technology, the system virtual technology and cloud computing technology improve the computing level of computer equipment and the use efficiency of computer software and software by dividing the computing processing program into basic computing units.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.