transparent computing ppt
#1
Smile 

transparent computing
characteristics and its advantages
Reply
#2
Any change in a computing system, such as a new feature or new component, is transparent if the system after change adheres to previous external interface as much as possible while changing its internal behaviour. The purpose is to shield from change all systems (or human users) on the other end of the interface. Confusingly, the term refers to overall invisibility of the component, it does not refer to visibility of component's internals (as in white box or open system). The term transparent is widely used in computing marketing in substitution of the term invisible, since the term invisible has a bad connotation (usually seen as something that the user can't see and has no control over) while the term transparent has a good connotation (usually associated with not hiding anything). The vast majority of the times, the term transparent is used in a misleading way to refer to the actual invisibility of a computing process.

The term is used particularly often with regard to an abstraction layer that is invisible either from its upper or lower neighbouring layer.

Also temporarily used later around 1969 in IBM and Honeywell programming manuals[citation needed] the term referred to a certain computer programming technique. An application code was transparent when it was clear of the low-level detail (such as device-specific management) and contained only the logic solving a main problem. It was achieved through encapsulation – putting the code into modules that hid internal details, making them invisible for the main application.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: transparent computing cs branch seminar topic,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
Smile Book on cloud computing 0 18,047 07-09-2021, 10:11 AM
Last Post:
  cloud computing comprehensive viva questions 0 675 22-09-2018, 11:55 PM
Last Post: Guest
  vtu 7th sem cse ashok kumar notes pdf embedded computing system 0 1,284 16-08-2018, 07:25 PM
Last Post: Guest
  vtu 7th sem cse ashok kumar notes pdf embedded computing system 0 496 30-05-2018, 12:13 AM
Last Post: Guest
  cloud computing techmax publications download ebook 0 632 20-05-2018, 05:17 PM
Last Post: Guest
  ppt on convergence and computing technology class 9 0 611 07-04-2018, 09:52 AM
Last Post: Guest
  transparent electronics documentation 0 299 20-03-2018, 06:47 PM
Last Post: Guest
  transparent electronics documentation 0 342 10-03-2018, 10:44 PM
Last Post: Guest
  seminar report on fog computing in vishveshwaraya technology 2 887 22-02-2018, 06:29 PM
Last Post: Guest
  ieee seminar report on surface computing 1 478 12-02-2018, 03:53 PM
Last Post: dhanabhagya

Forum Jump: