Audio and video storage
VOD stores the source file before transcoding and the target file after transcoding for the on-demand service call, which is called audio and video storage.
Audio and video distribution
Distribute the content of audio and video source stations to all nodes in the country, reduce the delay of users viewing content, improve the response speed and availability of websites, and solve the problems of small network bandwidth, large user visits, and uneven distribution of outlets, which is called audio and video distribution.
Audio and video media
After a developer uploads a media file, the resource set formed by VOD after transcoding the media file, generating thumbnails, and obtaining meta information is called audio and video media assets.
Audio and video transcoding
VOD is a transcoding service that converts source audio and video files into the file formats required by various terminal devices to meet the playback needs of mobile phones, tablets, smart TVs, and PCs.
Hardware Security Machine
Hardware Security Machine, meeting the requirements of the national competent departments.
The user is a concept under the account system, and the account and the user are of a one-to-n relationship. The user is the operator of the resource, but not the owner of the resource. There is a globally unique user_id in Baidu AI Cloud System to identify a user, and user_name is unique under an account.
The Credential is the security information associated with the user, which mainly refers to the user's AKSK information. When a user is first created, the system will create a set of AKSKs for the user by default for signature authentication. For the temporary authorization scenario, a Security Token is also a type of credential.
Customer master key
For Customer Master Key, which refers to the key created by the user in the key management service of Baidu AI Cloud
The purpose of Email Authentication is to confirm the valid identity of an email. It is an important step in anti-spam, anti-forgery and anti-spoofing. Since the sender confirmation is not involved in the SMTP protocol, email verification is very necessary. Email authentication has such methods as SPF, DKIM, ADSP, DMARC, VBR, iprev, etc..
Email address authentication
Email address authentication is a way to ensure the validity of a mailbox by sending an activation email to the mailbox to be authenticated. The user responds to the link authentication request, verifies the validity of the authentication information, and completes the authentication.
Email domain authentication
Email domain authentication is a way to verify the validity of a mail domain through a token. After IAM generates a base64-encoded token, users verify the validity of the entire domain by adding the token to the DNS record of the mail domain.
Subcategory of the data under the specified measure. That is, a metric supports multiple fields. If the metric is wind, the metric can have two fields: direction and speed.
Domain Name, the name of a computer or computer group on the Internet composed of a series of dot-separated names, is used to identify the electronic location of the computer during data transmission (sometimes it also referred to as geographical location, geographic domain name, a local region with administrative autonomy). A domain name is an IP address with a "mask" on it. The purpose of a domain name is to facilitate the memorization and communication of a set of server addresses (website, email, FTP, etc).
Domain name resolution
Domain name resolution is a service that directs domain names to web space IPs so that people can easily access the website through registered domain names. IP address is a digital address that identifies a site on the network. To facilitate memory, a domain name is used instead of an IP address to identify a site address. Domain name resolution is the process of converting a domain name to an IP address. The domain name resolution is done by the DNS server.
Domain name registration is a method used in the Internet to solve the problem of address correspondence. Domain name registration follows the principle of first application first registration, and the management agency does not conduct any substantive examination on whether the domain name proposed by the applicant violates the rights of third parties. Every domain name is unique and not repeatable.