Iglesias et al., 2023 - Google Patents
Network management and design for an animation and creative studioIglesias et al., 2023
View PDF- Document ID
- 9067226199239685657
- Author
- Iglesias E
- Buladaco M
- Publication year
- Publication venue
- International Journal
External Links
Snippet
Filipino artists are in-demand for outsourcing and freelance work. This caused animation studios to slowly gain popularity in the Philippines. A rarity in the eyes of the public but slowly growing as multimedia and entertainment grow overseas. Effective computer …
- 238000013461 design 0 title abstract description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30575—Replication, distribution or synchronisation of data between databases or within a distributed database; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30017—Multimedia data retrieval; Retrieval of more than one type of audiovisual media
- G06F17/3005—Presentation of query results
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9886563B2 (en) | Personalized online content access experiences using inferred user intent to configure online session attributes | |
US10325076B2 (en) | Personalized online content access experiences using online session attributes | |
US10554668B2 (en) | Method and apparatus for providing vendor remote support and management | |
CN106411857B (en) | A kind of private clound GIS service access control method based on virtual isolation mech isolation test | |
US8015282B2 (en) | System and method to synthesize custom metric attributes from a set of metric attributes associated with an application in an application server environment | |
KR20110040691A (en) | Apparatus and method for managing network resources | |
US20020169858A1 (en) | Broadband network service delivery method and device | |
US20160323323A1 (en) | Method and apparatus for centralized policy programming and distributive policy enforcement | |
US10348772B2 (en) | Method and apparatus for enforcing realtime access controls for endpoints | |
WO2001080522A2 (en) | Methods and systems for hairpins in virtual networks | |
CN103703443A (en) | Strong rights management for computing application functionality | |
US9577982B2 (en) | Method and apparatus for extending remote network visibility of the push functionality | |
CN105592052A (en) | Method and device for configuring firewall rules | |
Miseviciene et al. | Educational infrastructure using virtualization technologies: Experience at kaunas university of technology | |
Khan et al. | On edge cloud service provision with distributed home servers | |
US9762613B2 (en) | Method and apparatus for providing extended availability of representatives for remote support and management | |
Iglesias et al. | Network management and design for an animation and creative studio | |
Buladaco et al. | A Proposed Ideal Network Design for Collaborative Workspace Businesses | |
Helali | Systems and Network Infrastructure Integration: Design, Implementation, Safety and Supervision | |
CN118869629B (en) | A virtual networking method and computer topology network | |
Kasacavage | Complete book of remote access: connectivity and security | |
Cuenca Martínez | Analysing and upgrading the network infrastructure of a supermarket chain | |
Bager | Remote access: don't be a victim | |
Nwagu et al. | Risk Assessment: Harnessing Positive Risks in ICT Systems | |
Sharma et al. | Survey on federated identity management systems |