百度智能云

All Product Document

          Reference

          Z

          Incremental backup

          A backup of all modifications since the last backup of any type.

          Site monitoring

          Site monitoring refers to the availability monitoring of the user's site from the outside, and currently supports HTTP, HTTPS, PING, and TCP monitoring.

          Account

          An account is created when registering on the Baidu AI Cloud console. The account corresponds to the account id, which is unique to Baidu AI Cloud. The account is the owner of Baidu AI Cloud resources and is the smallest billing subject. When creating an account, the system will also create a root user (super administrator) by default. After that, the actual operation identity for logging in with the username and password of the account is root. An account, when created, will also be associated with a domain with the same id (openstack concept), so in Baidu AI Cloud system, root_user_id = account_id = domain_id.

          Read-only instance

          In order to expand the read request capability of the RDS master instance, RDS instances that support user read-only requests and have a synchronous relationship with the master instance are supported. The read-only instance belongs to the master instance, and the two are in a master-slave relationship. Before creating a read-only instance, you must first create a master instance. When the master instance is released, its dependent read-only instances are automatically released.

          Live pull

          Pull refers to the process of pulling live streams to the source site specified by the user through the LSS cloud. LSS supports two types, i.e. the whole station pull, and a single live room pull.

          Live push

          Live push refers to the process of encoding and compressing the real-time information of the live scene to the LSS cloud.

          Confidence

          The video content review service will output a confidence level in the review results. If the confidence is higher, the audit result is more negative; Similarly, if the confidence is lower, the audit result is more positive. The value of the confidence in VCR ranges from 0 to 100 floating point numbers, with 2 decimal places reserved.

          Master node

          It is the node in the master instance used to provide users with read and write request services. When the master instance fails, it will automatically switch to the standby node to ensure high availability of RDS.

          Master instance

          RDS instances with active and standby architectures that support user read and write requests.

          DCC

          That is, the user's exclusive physical server resources. After the user confirms the purchase behavior, the server is marked as the user's exclusive server. The DCC has a virtualization program deployed by default. Users need to divide the DCC into dedicated instances before they can actually start using it.

          Dedicated instance

          That is a virtual machine created by user using a virtualization system on a DCC instance. The user can freely create a dedicated instance when the DCC resources allow. A dedicated instance is equivalent to a BCC instance that can be used independently.

          Resource

          The resources are cloud service presents an abstraction to the user and the object body that the user interacts with, such as BCC instance, BOS bucket.

          Resource management and control operations

          It refers to cloud resource lifecycle management and operation and maintenance management operations, such as creation, stop, restart of BCC instances, creation, modification, and deletion of BOS buckets.

          Resource usage operations

          It refers to using the core functions of resources, such as data upload/download of BOS bucket.

          Subnet

          A subnet is a user-definable range of IP addresses within a VPC. Depending on business needs, CIDR (Classless Inter-Domain Routing) can specify different address spaces and IP segments. In the future, users can use the subnet as a unit to define Internet access privileges, routing rules, and security policies.

          User-defined monitoring

          Custom monitoring means that users can push their own generated data into BCM and monitor it.

          Custom face library

          Public figures are those who have a special social status within a certain range, have important influences, are widely known and concerned by people, and can thus get huge benefits from society and are closely related to social public interests. The four common public figure elements, including its social popularity, social status, whether it has received huge benefits, and the impact on public interests over a long period of time, are indispensable and collectively reflect the features of public figures.

          Custom Dimension Analysis

          Baidu AI Cloud provides customizable transcoding templates for users who need to analyze videos in a single dimension or several dimensions to help them meet their personalized needs under complex business conditions.

          Automatic backup

          RDS automatically backs up the backup set once a day. RDS supports the setting of custom backup cycles to fully meet the different backup needs of users, thereby reducing the burden on users.

          32960 Protocol

          The GB/T 32960 protocol specifies the protocol structure, communication connection, data packet structure and definition, data unit format and definition in the electric vehicle remote service and management system. This protocol is applicable to the communication between platforms in the remote service and management system of electric vehicles. The transmission from the vehicle terminal to the platform should be implemented with reference to it.

          808 Protocol

          The JT T808 protocol specifies the communication protocol and data format between the Plough compatible vehicle terminal of the road transport vehicle and the supervision/monitoring platform, including the protocol basis, communication connection, message processing, protocol classification and description, and data format.

          Previous
          Y
          Next
          Region Selection Introduction