百度智能云

All Product Document

          Reference

          D

          DCC Security Group

          A security group is a set of security access rules agreed upon for a set of exclusive instances. Dedicated instances can choose the default security group or a custom security group. The default security group allows all inbound and outbound access to pass through. Custom security groups define the inbound and outbound rules you want.

          DCC mirroring

          An image is a template for a dedicated instance's operating environment, including the operating system and installed software and configuration information. The user can use the image to create a dedicated instance and replace the system disk of the dedicated instance. Baidu AI Cloud provides a variety of public images for users to choose when creating exclusive instances. The user can also create a custom image based on the dedicated instance system disk at a certain time, and the image can only be seen by the user himself.

          DCC snapshot

          A snapshot is an available copy of a user-specified data set. The copy includes a mirror of the corresponding data at a user-specified point in time (the point in time when the copy started). Currently, the dedicated instance only supports creating system disk snapshots. It does not support creating local disk snapshots. When users need to back up local disk data, it is recommended that important data can be stored in the database, or purchase professional storage products such as CDS or BOS for storage.

          DDoS

          Service DDoS attack refers to use customer/server technology to combine multiple computers as an attack platform to launch a DDoS attack on one or more targets, thereby multiplying power of the denial of service attack. Generally, an attacker uses a stolen account to install DDoS master control program on a computer. At a set time, the master control program will communicate with a large number of agent programs that have been installed on many computers on the Internet. Agent program launches an attack when it receives instructions. The master control program can use customer/server technology to activate hundreds or thousands of agent program run in seconds.

          DMP

          Data Management Platform

          DNS

          Domain Name System, a distributed database on the Internet that maps domain names and IP addresses to each other, enables users to more easily access the Internet without having to remember IP strings that can be read directly by machines. The process of obtaining the IP address corresponding to a host name from a host name is called domain name resolution (or host name resolution).

          DOGO example

          The concept of an instance is similar to a resource. Each instance in the same project has a unique instance ID, and each car corresponds to an instance ID, forming a binding between the instance and the vehicle.

          DOGO project

          Multiple projects can be created under one account. The vehicle model of the same project is the same. When a user creates a project, a vehicle model of a project is automatically created for the user.

          DomainKeys Identified Mail

          DKIM is an email authentication standard. Developed by the Internet Engineering Task Force (IETF), it targets email fraud, one of the most serious threats to the Internet. Generally, the sender inserts DKIM-Signature and electronic signature information into the header of the email, and the receiver verifies the public key through DNS query.

          DSP

          Demand Side Platform

          DuMap

          Location Services DuMap provides users with high-precision, wide-coverage, and stable location services based on the massive location data and advanced positioning capabilities of Baidu Maps.

          Proxy instance

          The proxy instance can automatically allocate database requests to their corresponding master or read-only instances according to the type of read and write to achieve automatic separation of read and write. Only one proxy instance can be created for each RDS master instance. The master instance must be created before the proxy instance is created. When the master instance is released, its corresponding proxy instance is automatically released.

          Agent instance dedicated account

          The created account of the master instance cannot be synchronized in the proxy instance, so if you need to establish a connection, you also need to create a dedicated account for the proxy instance. Operations such as creating and modifying a dedicated account for the proxy instance will be automatically synchronized to the master instance to create an account with the same name.

          Region

          BCC is a multi-region deployment service. Region refers to the physical location where the BCC instance is located. Baidu AI Cloud currently supports multi-region support. You can choose cloud server services in different regions according to the distribution of your customer base. Please see the region selection instructions. The intranets of BCC instances in different regions can be interconnected with each other. The intranets of BCC instances in different regions are not interconnected. Since the cost of acquiring physical resources varies, each region has slightly different prices.

          Read and write separation

          The master instance processes database write requests, while the read-only instance processes database read requests.

          Metric

          The categories of data indicators, such as engine temperature, engine speed, analog quantity, etc.

          SMS Quota

          The SMS quota is the maximum number of SMS messages that a user can send in a day.

          Peer connection

          The peer connection provides users with VPC-level network interconnection services, enabling users to implement traffic interconnection between different virtual networks, and realize stable and high-speed virtual network interconnection between the same region/cross region and the same user/different users.

          Previous
          C
          Next
          E