百度智能云

All Product Document

          Reference

          W

          WAF

          Web Application Firewall Web Application Firewall is a product that specifically protects web applications by implementing a series of security policies for HTTP/HTTPS.

          Web attack

          Attacks against web applications, including but not limited to the following types of attacks: SQL injection, XSS cross-site, Webshell upload, command injection, illegal HTTP protocol request, unauthorized file access, etc.

          Web Vulnerability

          Web vulnerabilities usually refer to vulnerabilities in website programs, which may be caused by code writers' inadequate consideration when writing code. Common web vulnerabilities include SQL injection, CSRF, XSS vulnerabilities, upload vulnerabilities, and arbitrary file reading, command execution, file inclusion, etc.

          Extranet dedicated line

          Construct a dedicated physical line separately to connect the user's data center to Baidu AI Cloud, so that the user can exclusively occupy a physical line, which is not shared with other users.

          Gateway equipment

          The gateway device is a bridge that connects the internal devices of the enterprise (such as PC, PLC, SCADA, DCS) and the cloud services of the external network of the enterprise. It accepts the configuration issued by the device polling configuration management service, executes the read policy of the device polling configuration, and uploads the data back to the cloud after receiving the data returned by the device.

          Gateway subdevice

          It refers to the industrial equipment connected to the network where a gateway device is located. The data collected by the industrial equipment will be uploaded to the cloud via the gateway.

          Dimension

          The Dimension is used to describe various key value pairs (Key/Value, abbreviated as K/V pair) of monitoring item features. Different dimensions mean different items. For example, for the monitoring item CPUUsagePercent of a virtual machine, a typical dimension is the machine ID (InstanceId). At the same time, the dimension describing this monitoring item is also the image of the virtual machine.

          Document storage

          DOC stores source document files and transcoded files for online browsing, which is called document storage.

          Document distribution

          Distributing document content to all nodes nationwide, reducing the delay of users viewing the content, improving the response speed and availability of the website, and solving the problems of small network bandwidth, large user visits, and uneven distribution of outlets, etc. are called document distribution.

          Document transcoding

          DOC's computing service that converts source document files into HTML5 files suitable for online browsing in multi-terminal environments such as PC, WAP, and APP is called document transcoding.

          File storage (elastic file system, EFS)

          File storage is a type of cloud storage that provides standard file access interfaces (NFS, CIFS) for cloud hosts and Docker containers, featuring unlimited capacity, high performance, multi sharing and high availability.

          File system

          A file system is a means by which an operating system organizes and manages data stored on physical media.

          Physical backup

          It is the backup process of copying the original files that actually make up the database from one place to another.

          IoT card

          Mobile communication access services provided by operators for IoT users based on the IoT public service network.

          Physical model

          The object model consists of one or more attributes, and you can use it to represent a class of equipment. With the definition of the object model, it is more convenient to process object shadow data and counter-control based on the model-based interface. You can also forward the uploaded data to TSDB by directly configuring the properties of the model. Without writing complex SQL statements.

          Thing shadow

          The thing shadow reflects a thing in the physical world. It is the "Shadow" or "Digital Twin" of the thing in the cloud. At run time, the thing reports the monitored value to the thing shadow, and the thing shadow will use a json file to make a temporary storage for the thing. Other SkyEngineering products or your application can be accessed directly via MQTT or HTTP. At the same time, the thing shadow also provides counter-control functions.

          Previous
          V
          Next
          X