{"title":"Research on Application of Information Management Technology in Computer Big Data System","authors":"Wenjun Ji","doi":"10.1145/3449365.3449366","DOIUrl":null,"url":null,"abstract":"In the context of the important data era, information data has increased, and information processing and storage have become more extensive. People's requirements for computer information processing technology continue to increase, and security issues such as malicious hacker attacks and computer virus intrusion have also increased correspondingly. Therefore, technicians are innovating computers. In information processing technology, computer information processing technology should be optimized to ensure computer network security and important data security. These technologies include data mining technology, cloud computing technology, modern intelligent algorithm technology and firewall technology. As mentioned above, the scientific and reasonable application of computers and information processing technology should attract the attention of technicians and users. We plan to continue to carry out corresponding work in the future to improve the data model structure.","PeriodicalId":188200,"journal":{"name":"Proceedings of the 2021 3rd Asia Pacific Information Technology Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2021 3rd Asia Pacific Information Technology Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3449365.3449366","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
In the context of the important data era, information data has increased, and information processing and storage have become more extensive. People's requirements for computer information processing technology continue to increase, and security issues such as malicious hacker attacks and computer virus intrusion have also increased correspondingly. Therefore, technicians are innovating computers. In information processing technology, computer information processing technology should be optimized to ensure computer network security and important data security. These technologies include data mining technology, cloud computing technology, modern intelligent algorithm technology and firewall technology. As mentioned above, the scientific and reasonable application of computers and information processing technology should attract the attention of technicians and users. We plan to continue to carry out corresponding work in the future to improve the data model structure.