Rechercher

Article
· Oct 29, 2024 2m de lecture

第五章 主设备、当前设备、空设备

第五章 主设备、当前设备、空设备

一个进程拥有一台设备

一次只有一个进程可以拥有一个设备,顺序文件除外。

换句话说,在进程成功向设备发出OPEN命令后,在第一个进程释放该设备之前,其他进程都无法打开该设备。进程通过以下任一方式释放设备:

  • 通过显式发出CLOSE命令。

  • 通过停下来。

每个进程都有一个主设备

每个 IRIS 进程都有一个主要输入设备和一个主要输出设备。默认情况下,这些是同一设备。当您登录终端并激活 IRIS 时,该终端将成为主要设备。由于 IRIS 隐式向该终端发出OPENUSE命令,因此可以立即向它发出READWRITE命令。 IRIS 主设备是操作系统指定为主输入设备的设备。 $PRINCIPAL特殊变量包含主设备的设备 ID

Discussion (0)1
Connectez-vous ou inscrivez-vous pour continuer
Discussion (4)3
Connectez-vous ou inscrivez-vous pour continuer
Discussion (4)2
Connectez-vous ou inscrivez-vous pour continuer
Question
· Oct 29, 2024

git-source-control configuration for remote development

How do you configure it to have source control on a namespace accessed via the InterSystems Server Manager extension?

An example from the video explains only how it will work with a cloned git repo on a local machine (PC/Mac), but so far, I can't get it to work on a remote development server (replacing existing remote Studio via RDP with local VS Code).

2 Comments
Discussion (2)3
Connectez-vous ou inscrivez-vous pour continuer
Annonce
· Oct 29, 2024

[Video] Securing AI Implementations - Moving from Experimentation to Production

Hey Community,

Watch the new video on InterSystems Developers YouTube:

⏯ Securing AI Implementations - Moving from Experimentation to Production @ Global Summit 2024

As AI systems transition to full-scale production environments, their security demands not only traditional cybersecurity best practices (such as good access controls and authentication mechanisms), but also specialized protections tailored to AI technologies. Key among these is maintaining an inventory of AI usage (comprehensive AI Bills of Materials (AI-BOMs) that enumerate all components of AI systems), robust logging practices, and continuous monitoring of prompts, and inference results to swiftly identify and mitigate potential security threats. This presentation will cover the top security risks facing Large Language Model (LLM) implementations, with a focus on protecting sensitive data and proprietary information. We will discuss a few industry-wide initiatives and highlight best practices in securing AI systems, Retrieval Augmented Generation (RAG) implementations, and the "LLM stack".

🗣 Presenter: Omar Santos, Distinguished Engineer, Cisco

Enjoy watching, and expect more videos! 👍

2 Comments
Discussion (2)2
Connectez-vous ou inscrivez-vous pour continuer