Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Сборник текстов по ИТ.doc
Скачиваний:
48
Добавлен:
20.11.2019
Размер:
774.14 Кб
Скачать

Information, people, one, processing, accurately, programmer, computers, instructions, components

Exercise 4. Now read the text more carefully. In every column choose the word which is a synonym of the underlined word. (Only one answer is possible in each case).

joint forces

unfortunately

unite

break

collaborate

open

crack

perhaps

combine

melt

of course

merge

Inevitably

solve

eventually

add

cut

at first

myriad

bit

potential

lot of

chip

power

innumerable

fragment

activity

large

piece

possibilities

plenty

share

range

great quantity

part

earnings

Exercise 5. Discuss the extract and say what new facts you’ve found in it.

Qwerty is the name of the standard typewriter keyboard. Q, W, E, R, T and Y are the first six keys in the upper row of letters. Together they make up the traditional name for the keyboard

The first practical typewriter was put together in Milwaukee between 1867 and 1872. The letters were arranged alphabetically at first, but this proved useless. Because of the mechanics of the machine the letters jammed together when you typed fast. The inventors asked a school teacher which letters were used most in English, and then designed a keyboard where the most-used letters were as far apart as possible — qwerty. Since then typewriters changed completely, but, despite all the changes, the keyboard has-remained the same. Even though they operate in quite a different way, computer keyboards have followed the typewriter, so that we have qwerty computers, too.

Text 8 Cloud and Security

Today, innovations in information technology are creating a new paradigm for human communication and collaboration on a global scale. The Internet is evolving into the cloud: the means through which everything will be delivered as a service — from computing power to business processes and personal interaction. The cloud is fundamentally changing the way we connect with each other and with information.

At Hewlett-Packard Labs the research is focused on delivering the secure application and computing end-state of “Everything-as-a-Service.” This research envisions billions of users securely accessing millions of services through thousands of service providers, over millions of servers that process exabytes of data, delivered securely through terabytes of network traffic. They’re creating the foundational technologies to expand the use and relevance of cloud computing in the enterprise. They’re working on an enterprise cloud platform, from computing resources to human skills. And they’re working on the security analytics that will automate enterprise-grade security and address one of the biggest obstacles in the broad adoption of the cloud in the enterprise.

Cloud and Security Big Bets:

Curious: Enterprise Cloud Software Platform

The curious vision is to lead HP in becoming the foremost Service Providers’ Service Provider, delivering a set of cloud capabilities that enable service providers to take full advantage of the power of the cloud. HP’s work enables service providers of all types to tap into foundational cloud capabilities – general purpose horizontal capabilities, as well as those tailored for specific industry verticals – that make it easy for them to develop, host and manage their services to deliver value from the cloud, and to integrate with an ecosystem of services from other providers.

Automating Security

HP’s security research agenda focuses on developing analytical and architectural computing models to support assured governance of information security management. In the context of a worsening threat environment, increased consumerization of IT, and the highly sought-after cloud computing paradigm, they are creating technology and methodologies that will improve situational awareness and help assure customers that security of their information assets is appropriately managed. Their approach is to introduce innovative analytics in the lifecycle of security management, to help analyze and drive appropriate desired security outcomes at the governance level; and to design the next generation of trusted system architectures that will help ensure that IT operations can achieve those outcomes reliably and with strong assurances.

Notes:

  • end-state – конечное состояние

  • bet – пари, ставка

  • exabytes – эксабайт, квадриллион килобайт

  • terabytes – терабайт , 1000 Гбайт

  • cloud – глобальная сеть

  • governance – управление

  • envision – представлять себе; предвидеть

  • relevance – значимость; существенность; важность

  • to have relevance to smth. – иметь отношение к чему-л.

  • assets – средства; фонды; имущество