Discovering Services Is Not Enough
- 格式:pdf
- 大小:190.29 KB
- 文档页数:10
版主你好,我有个问题想问问你,就是我在往discover中输入井位文件的时候(用的Microsoft Excel格式),点开wellbase模块,一输入数据就会显示打开数据库失败(当然是英文,我用中文表达的,呵呵),特征显示就是Microsoft Excel表格刚一出现黄框框的时候就会弹出个对话框说打开数据库失败!我也请教了许多人,该修改的地方都改好了,例如discover的服务是不是打开了,病毒软件是不是关了,等等,全部不起作用,我也不知道是什么原因,难道是这个软件和我的电脑不兼容?!?那也太郁闷了把~!希望版主能尽早给小弟我一个回复!先在这里谢了!~当你再出现如此错误的时候,请打开运行--〉odbcad32,第一个选项卡,选中gxdb,配置,connect test,看一下是否连通,如果不连通,那么选择database选项卡,看一下server name 是否为GGX_+n你的计算机名,network 中,tcp/ip中写入“ip=127.0.0.1",重新connect test,如果还是不能连通,确定你在安装discovery的时候,选择了所有用户都能使用,或者只限自己则没有更换登陆账户,如果还是不行,请打开excel,设置一下安全性,使之能运行gxdb.xla宏如果还是不行,我挂了各位大侠,怎么在PRIZM中怎么把岩心测试数据加入到测井曲线上谢谢了!curves菜单中--〉core,选择show core curves,然后再某一线性道中添加岩性离散数据点,然后用aera fill我是一个Dicovery软件初学者,现在遇到了一个比较棘手的问题。
我目前研究的工区逆断层发育,有些井是过断层的,出现地层重复,在分层数据表中,同一地层名字下有两个深度数值,请问这种情况下,分层数据如何加载?在数据文件中增加一列,例如well2存在底层重复,则wellname obs formati onnamewell2 ES1/default/1 ES1/defautl/topMDwell2 Es1/default/2 ES1/default/topMD我合并两个工区时遇到错误,两个有重叠的工区,线道号不连续,怎么合并到一起呢如果重合的部分都拥有相同的线道号,例如seis1线号1-100,seis2线号50-200,并且道间距、旋转角度、采样间隔等都相同,也就是说,这两块地震体原来为一块统一的大地震体分割而成,那么加载时候如同线道连续的两块地震体请教一个问题:如何在DISCOVERY中制作油藏剖面图?s首先在atlas中制作各层构造图,然后再xsection中的isomap选项喀中,把各个构造图选中,其余的和底层对比的设置相同‘(除了岩性填充)(、如果构造面上存在断层,其显示效果并不好,而如果手工绘制断层,那只是个示意图罢了)请问:我的断层文件由蓝马输出,好多条断层使用相同的断层名字,所以输入discovery中后,断层在剖面上显示比较乱。
DNS—Domain Name Servers 域名服务Computer Emergency Response Team (CERT)计算机应急响应小组The Department of Defense (DoD)国防部The IATF is based on the concept of an information infrastructure. An information infrastructure comprises communications networks, computers, databases, management, applications, and consumer electronics and can exist at the global, national, or local level. The global information infrastructure is not controlled or owned by a single organization—“ownership” is distributed among corporate, academic, and government entities as well as by individuals. The Internet is an example of a global information infrastructure as is the global telecommunications network. Most organizations that communicate externally rely upon this global system in conducting their operations using a combination of global, virtual networks, dedicated networks, Wide Area Networks (WAN), and customized information systems.IATF 建立在信息基础设施的概念上。
name or service not known异常处理方法总结-回复关于“[name or service not known]异常处理方法总结”的问题,以下将逐步回答和解答问题。
首先,[name or service not known]异常通常指的是无法解析域名或者服务名。
当计算机在尝试解析域名或服务名时,如果发现无法找到相应的资源或服务器,则会抛出此异常。
这可能是由于网络配置问题、DNS 服务器故障、主机不可达等原因导致的。
接下来,我们将通过以下步骤来解决此异常:1. 检查网络连接:首先,确保计算机的网络连接正常。
可以尝试通过ping命令或者访问其他网站来检查是否能够成功连接到互联网。
如果网络连接存在问题,则需要调查和解决网络故障,例如检查网络配置、重启路由器等。
2. 检查DNS设置:DNS(Domain Name System)用于将域名转换为IP地址。
当计算机无法解析域名时,可能是由于DNS设置不正确或者DNS服务器故障导致的。
可以通过以下方法来解决DNS相关问题:- 检查DNS服务器设置:在Windows系统中,可以通过查看“网络和共享中心”中的网络适配器设置,确保DNS服务器设置正确。
在Linux 系统中,可以查看“/etc/resolv.conf”文件来确认DNS服务器设置正确。
- 更换DNS服务器:如果DNS服务器故障或者无法正常工作,可以尝试使用其他公共的DNS服务器,例如Google的8.8.8.8和8.8.4.4,或者OpenDNS的208.67.222.222和208.67.220.220。
3. 检查主机可达性:当计算机无法解析服务名时,可能是因为目标主机不可达或者网络路径中间存在故障导致的。
可以通过以下方法来解决主机不可达的问题:- 检查目标主机的网络连接:确保目标主机的网络连接正常。
可以尝试通过ping命令或者访问该主机的其他服务来检查是否能够成功连接到目标主机。
IntroductionThis article provides an overview of the MNC face particularly demanding challenges when their do the business in the other country. They have to face high challenges compare with domestic market. By using the related real business example, we will find many factors that influence MNC operation in other countries. Such as the country differences, cultural, Human Resources, Communication and Foreign Government Regulations and so on. These factors are all important, any of lose may cause operation failure. Finally, this essay will introduce the importance of CSR for the MNC. Different attitudes towards CSR can generate a different corporate image from the society.Main pointA multinational company (MNC) is mean that a corporate registered in at least one country or operations in various countries. A large company provides their same products or service in other different countries.Multinational companies are exist all over the world rely on their subsidiaries or joint ventures. By this way, they can obtain the competitive advantage on other different companies in different regions.A multinational company is a global strategy, through production all overthe world and large-scale operations and cheap labor costs to gain cost advantages. Breadtalk is a good example for a MNC, which is a chain of retail outlets that provide bread, cakes, buns and pastries to customer. It was founded in July 2000 in Singapore and has a good reputation in local community, now it has operated in China, Malaysia, Indonesia, Thailand, Philippines and so on. So why more and more MNCs wants are operate their business in other country?There are many reasons for companies invest another country. One reason is MNCs have access to more sources of capital than domestic firms because of the international nature of their operations. The other reason is the countries like China, India and Vietnam are wealth of resources, therefore the MNC can get more cost efficient. Sometimes MNCs enter into another market is steady their brand position for their competitors are coming and they do not want to lose the market share.In detail, as an example to Breadtalk operation in China, why are they opening outlets in there? Why they are not continued to focus their host country? The answer is China is the different country compare with Singapore. As we know, Singapore is a small country and the market size is limitation. If Breadtalk continue focus to their domestic market, it is easy to saturate and cannot earn the extra profit from it. They are only famous in Singapore and always a local brand. However, China, which economy continues to growing especially under the background of theglobal economy crisis. It has 1.3 billion people and has a huge market for Breadtalk discovering. It is very easy to obtain huge profits if locals accept one of their products. Moreover, compare with Singapore, China has abundant resources and have many cheaper raw materials for supply. Meanwhile, they also have cheap labor market, which can reduce the operation cost. On the other hand, China has not the more famous brand in baking industry. This is Breaktalk golden period for entering Chinese market. It may helps Breadbalk obtains the first-mover advantage, which first gain control of resources that the other following company may not able to get it. Therefore, Investment in China not only can help Breadtalk improve their brand awareness, but also is a new way to earn the extra profits.However, MNCs who want entry other country market for running successful is not an easy thing. Compare with their domestic counterparts, they have to face higher level of challenges. There are some challenges that the manager should be consideration if they decide to expand its operations globally.Geographical diversificationOne of the main challenges faced by multinational companies is the geographical diversification. This may cause problem in term of management and policy making. Because it is not conducive to the company-wide policy making without taking into account thegeographical diversification. On the other hand, domestic companies do not have this problem. The company founded in home country, their decision-making or policy based on their culture. Their products or services based on the needs of local customers. For instance, Breadtalk, a Singapore company, which is provide the local flavor to Singaporean. But do their business in China; the manager should consider the eating habits in different regions. Whether is accept it, especially in northeast China, which has different culture or habits compare with Singapore.Cultural ProblemsMultinational company has their problems in the cultural difference issue. Multi- national staffs have many different backgrounds. The cultural differences affect employee behavior, communication style and emotional expression. It is a very important concept that culture can distinguish between different people into different groups, for employees will join to their culture similar group with casual. In contrast, domestic enterprises do not have to face this issue. Their employees can clearly and accurately understand each other because they are come from the same cultural background. For example, in Asian culture, the staff is to obey the leaders' decisions, even if they know that this decision is wrong. But in West culture, employees have the right to express their different opinion against the leader. To solve this cultural problem, managers mustto understand the main difference of both culture and then they can better understand staffs.Human ResourcesMultinational companies are also having this problem when it opened outlet globally. For example, as the company recruitment, the HR manager may find themselves have to overcome cultural barriers to find high performance employee for jobs overseas. At some case, the manager may find that there is lack of excellent employee to fill in the key job positions. Therefore the solution is selecting the new employees from their own country. But there are some employees are not willing to work abroad and even if them so, MNC need to pay their high wages compare with the local staff.Foreign Government RegulationsOne of the challenges faced by the MNC is how to deal with different countries regulation, which may increase the company's additional expenses, which can benefit from the policy. For instance, foreign governments make a policy to increasing value-added taxes in goods and services. The related company should to examine this policy to see whether affects on their own operation, if so, how to face it. This could hire local counsel for the company helps them adapt to the local business environment. For example, China have been adjustment some policy, such as the export tax rebate policy, land policy, environment policy andso on. From these adjustments, we can see that the Chinese government will rely more on the market, rather than relying on preferential policies to attract foreign investment. Such a policy orientation will make China pay more attention to absorb high-quality foreign investment, further limit resource consumption and heavy pollution projects. It encourages resource-saving and environment-friendly projects come to China. CommunicationMNC also need to deal with the problem on communication issue. Basically, there are so many employees come from different countries in multinational companies. They speak the different countries language when they working. For them, the biggest difficulty is communicated with others. Even if they are in the same company, also speak the same language. There may be English, German, French or Spanish. However, surely, there are always somebody will misunderstand the meaning and resulting in the problem. After all, this is not their first language. On the contrary, there is no communication problem in the domestic companies. For their employee are come from the home country. They speak same language which is their first language. So it is easily to get every words meaning and do not cause misunderstanding.Multinational Corporations & their Corporate Social Responsibility Aside from the above statement, one of the big challenges of Multinational Corporation is how to treat their corporate socialresponsibility (CSR) related to the local society. A MNC who want to earn the profit in other country and depend on what policy, they must be taken into consideration.CSR has been defined as the firm’s consideration of, and response to, accomplish social or environmental benefits, which the company seeks. There are two sides to the debate, which is defensive approach and proactive approach. The former emphasized maximum the interest of their shareholders and minimal commitment to social responsibility. The latter focused to considerate the all stakeholders’interest and seeing businesses as an instrument to create social value. In today’s world, more and more MNCs are realizing good social responsibility can make them better integrate into the local community. There are many viewpoints supports the latter that Multinational Corporations as a non-profits role is better their operating within society. As a non-profit role, it is better for corporate attained the higher market share and meet the employee high-level satisfaction within society. Therefore, these MNCs can attract high performance employees. The elevated quality of employees can allows MNC raise the level of its goods and services, which may be able to help company get the more market share. A MNC who has the good CSR related to society can save a lot of expenditure and good for company image. CSR has become a cost-effective form of public-relations compare with advertising spending. For example, Yum!,which the world-famous food brand. They always have been concerned about China's next generation nutrition and health problems. It’s mainly take action on the sponsored nutrition and health research. During the Sichuan Earthquake, Yum and their employees have been donated more than¥21 million. In addition, Foundation for Poverty Alleviation launched the "donate one dollar, to send love and nourishment" activities, Yum positive response; they hope that through many years in the health and food professional experience to give disaster children more care. These actions not only increase their brand awareness in China, but also let customer believes Yum group are really care and value people and their opinions. Thus, received favorable reputation from society obviously is better than do any advertising. For the former is the customer’s own perspective to firm, the latter is the company show to the customer what they wants to show.On the contrary, defensive approach is company take a defensive stance to their CSR. These companies will be particularly following with the law to ensure there are nobody can take legal action against them. It is reasonable from the shareholder’s perspective, but it is unreasonable for the MNC long-term operating. Nowadays, company is no longer a moneymaking machine. Instead, as one of the members in society, they should to take their social responsibility. Even if a company has a high-level quality of product, they have a defensive attitude to their CSRand escape to do it. People are still has a negative perception to their brand image, thus affecting the company’s performance. What’s more are MNCs, which faced so many high level challenges that needed to overcome. For example, Seiko Epson Corporation, which is a MNC and provide digital products to customer. Chinese consumers sued Epson ink residue too much. After referred Guangzhou Product Quality Supervision Bureau Inspection and testing, the result shows "ink has run out" of the Epson ink cartridges, black ink cartridges accounted for the remaining 29.2% in the total , whereas the remaining amount of the color ink container up to a 58.2%. Although this company is try to do their best to carry out recycling in the world. However, in the Chinese market they has basically let these ink cartridges with large number of toxic substances drift into China's rivers and land and causing water pollution. Epson these double standards on environmental protection caused the people strongly questioned and dissatisfaction with their CSR. So that Chinese people began to boycott the company's product. This event is not only reduced its sales in China, but also serious damage to its brand image in China, which is difficult to recover in a short time.ConclusionIn conclusion, nowadays, there are more and more company is willing to invest or open outlets in other country. They can obtain the competitiveadvantage on other different companies in different regions through large-scale operations and cheap labor costs. However, they also have to face high-level challenges than their domestic market. At all, different countries can cause the different problem to MNC: Geographical diversification let MNC consider their products or services are whether accept by the different regions locals. Cultural Problems give them a question that how to manage their staff which have variety of background and integrate to it. In addition, Human Resources and employee communication is a big challenges to the MNC. Beside of that, the CSR are more and more important to every MNC. Proactive approach can let MNC has a positive corporate image to the society. By taken the social responsibility, MNC not only can improve their brand awareness shortly, but also can earn the good reputation from the local community. This strategy is good for MNC long-term operating. Company take a defensive stance to their CSR is bad for they build a good relationship to the locals and people are easy to get the negative impression with their corporate which are both harmful to MNC’s image.References- Hill, Charles W. L (2011) International Business: Competing in the Global Marketplace, 9/E, McGrawHill Irwin.- Griffin, R.W. and Pustay, M.W (2010) International Business, 6/E.Prentice Hall.- MNCs impact on labour conditions in developing countries - MBSInterculturalhttp://www.munich-business-school.de/intercultural/index.php/MNCs_impact_on_labour_condi tions_in_developing_countries. ( accessed 22/07/2013)-The Mighty Entrepreneur: Multinational Corporations & The Idea of Corporate Social Responsibility-http://the-mighty-entrepreneur.blogspot.sg/2010/03/multinational-corporations-idea-of.ht ml(Accessed 23/07/2013)-Why Companies Invest Overseas | Globalization101-/why-do-companies-invest-overseas (Accessed 24/07/2013)。
小学上册英语第1单元综合卷(有答案)英语试题一、综合题(本题有100小题,每小题1分,共100分.每小题不选、错误,均不给分)1.The ancient Greeks made significant advancements in ________ (科学).2. A small ___ (松鼠) gathers nuts for winter.3.The _____ (花粉) helps in the reproduction of plants.4.The _______ (小鹿) grazes peacefully in the meadow.5.The _____ (木偶) dances when I pull the string.6.When I write a card to my friend, I start with "To my dear __." (当我给我的朋友写卡片时,我开始写“致我亲爱的。
”)7.The concept of biodiversity conservation aims to protect various ______ forms.8.ry _____ (乐观) and always looks on the bright side. She is v9.My favorite toy is a ________ that moves.10.I enjoy drawing landscapes and ______ (人物). Art allows me to express my imagination.11.The _____ (温暖) climate allows for a variety of plants to thrive.12.The unit of measure for pressure is the ______.13.The capital of Bahrain is _______.14. A ____ is a funny animal often seen wearing colorful costumes.15. A __________ occurs when there is a significant shift in the earth's crust.16.The cake is _____ (delicious/yummy).17.The concept of ecosystem services highlights the benefits provided by ______ ecosystems.18.The dog is ___ in the house. (sleeping)19.What is the term for a young fox?A. CubB. KitC. PupD. Calf答案:B.Kit20.I think my neighbor is a __________ (很有趣的人) with many stories.21.Plants release _____ (氧气) during photosynthesis.22.How many letters are in the English alphabet?A. 24B. 25C. 26D. 27答案:C.2623.What do we call a young deer?A. FawnB. CalfC. KidD. Lamb答案:A24.I can ______ (帮助) my friends.25.连词成句。
小学上册英语第五单元自测题(有答案)英语试题一、综合题(本题有100小题,每小题1分,共100分.每小题不选、错误,均不给分)1.The _______ (小独耳猫) is a rare breed of cat.2.What do we call a person who studies the interaction of living organisms with their environment?A. EcologistB. BiologistC. ZoologistD. Botanist答案: A3. A __________ is a geological feature that can impact transportation routes.4.The electrons in the outermost shell are called ______ electrons.5.My classmate is called ______ (小华). He is good at ______ (运动).6.My favorite food is ________ (披萨).7.Which fruit is yellow and has a thick skin?A. AppleB. BananaC. GrapeD. Cherry答案:B.Banana8.I find it ________ (有趣) to learn about space.munity resilience framework) supports recovery from challenges. The ____10.The molecule responsible for carrying oxygen in the blood is ______.11.The _____ (狐狸) is clever and sly.12.We see a _____ (car/bird) in the tree.13.The man has a funny ________.14. A galaxy can contain millions or even billions of ______.15.I want to _____ (learn/play) a song.16.My grandmother makes the best __________. (汤)17.What do we call the study of the structure of the body?A. AnatomyB. PhysiologyC. PathologyD. Histology答案: A18. A ______ (种植计划) can enhance community well-being.19.The assassination of ________ (肯尼迪) shocked the nation.20.The ______ is a critical part of the food web.21.What is 30 15?A. 10B. 12C. 14D. 15答案:D22. A _______ is a reaction that produces a gas as a product.23.Who is known for flying a kite in a storm?A. George WashingtonB. Benjamin FranklinC. Thomas EdisonD. Albert Einstein答案: B24.The ________ (ball) is round and bouncy.25.I have a toy _______ that looks just like a real one.26.The capital of the United Arab Emirates is ________ (阿布扎比).27. A ______ is a substance that speeds up a chemical reaction.28.I can ______ a song on the guitar. (play)29.an Revolution was the first successful ________ (奴隶起义). The Hima30.My favorite movie is _______ (《狮子王》), and I watch it every _______ (周末).31.The _______ (The Protestant Reformation) challenged the Catholic Church's authority.32.The __________ (历史的探索挑战) invite curiosity.33.The teacher is _____ the students. (helping)34.What is the name of the famous American civil rights leader known for his "I Havea Dream" speech?A. Malcolm XB. Martin Luther King Jr.C. Nelson MandelaD. Rosa Parks答案: B35.Plants can be classified into ______ categories like annuals and perennials. (植物可以分为一年生植物和多年生植物等类别。
小学下册英语第二单元期末试卷英语试题一、综合题(本题有100小题,每小题1分,共100分.每小题不选、错误,均不给分)1. A _____ (snapdragon) adds charm to gardens.2.What is the term for a baby horse?A. CalfB. FoalC. KidD. LambB3.What is the main purpose of a dictionary?A. To define wordsB. To tell storiesC. To teach mathD. To provide recipes4.The __________ is a large area that is home to many different animals.5.I love listening to __________ music because it makes me feel __________. My favorite singer is __________. I like to sing along to his/her songs when I am__________.6. A _____ (植物园) showcases different species.7. A __________ is a small animal that often lives in groups.8.The __________ was a major trade route connecting Asia and Europe. (丝绸之路)9.The International Space Station orbits the Earth and serves as a ______ for astronauts.10.The ______ (生态环境) is changing worldwide.11. A ______ (生态教育) can raise awareness about conservation.12. A _______ is a type of reaction where a single compound breaks down into two or more products.13.The ______ (鳗鱼) is long and thin, living in water.14. A frog goes through ______ stages in its life.15.What do we call a person who flies an airplane?A. PilotB. EngineerC. CaptainD. Navigator16.I like to ___ (jump/climb) trees.17.The __________ (历史的积累) shapes our identity.18.What do you call the person who teaches you at school?A. DoctorB. TeacherC. ChefD. ArtistB19.What do we call a person who collects stamps?A. PhilatelistB. NumismatistC. CollectorD. Hobbyist20.The __________ (非洲殖民时期) changed many countries.21.She has a beautiful ________ (声音).22.Where do plants grow?A. In the airB. In waterC. In soilD. In space23.The ice cream is ______ (cold) and refreshing.24. A beaker is a common piece of ______ glassware.25. A _______ can measure the amount of energy consumed by an appliance over time.26.Pressure is force applied over a ______ area.27.The dog is very _____ (可爱).28.The bear forages for food in the dense ____.29.The element with atomic number is __________.30.What is the first letter of the alphabet?A. AB. BC. CD. D31.My parents go _______ (工作) every day.32.The atmosphere protects the Earth from harmful ______ rays.33.What is 10 4?A. 5B. 6C. 7D. 834.The __________ is a famous city known for its fashion and art. (米兰)35.What do we call a person who studies rocks?A. GeologistB. BiologistC. ArchaeologistD. Meteorologist36. A __________ is a popular location for family vacations.37.My brother has a remote-controlled _____ (飞机).38.The butterfly is a symbol of ______ (美丽).39.The formula for water is ______.40.What do you call the study of human behavior?A. PsychologyB. SociologyC. AnthropologyD. All of the above41.What do we call the lines that run north to south on a map?A. LongitudeB. LatitudeC. EquatorD. MeridianA42.The __________ (历史的冲突) highlight the struggles for power.43.My brother is very __________ (幽默的) and makes me laugh.44.We have a ______ (丰富的) calendar of events.45.What is the capital city of Greece?A. AthensB. RomeC. IstanbulD. CairoA Athens46.The ancient Romans established ________ to provide public services.47.Magnetic fields are produced by moving ______.48.Cleopatra was the last active ruler of the __________ (埃及) dynasty.49.What do we call the process of water falling from clouds?A. RainB. SnowC. HailD. Sleet50.Which animal is known as "man's best friend"?A. CatB. DogC. HamsterD. BirdB51.When I write a card to my friend, I start with "To my dear __." (当我给我的朋友写卡片时,我开始写“致我亲爱的。
Unit 3 Discovering Useful Structures & Listening and Talking1、Congratulations! You've got the marathon _______(冠军).2、It's my _______(荣幸) to be here.3、We hope that his _______(伤害) isn't so serious.4、They won the three gold _______(奖牌) all by training very hard.5、All the _______(比赛项目) are included in the list.6、I couldn’t totally____________ (同意) him,but what he said was partly reasonable.7、I believe the world is one big family, and we need to_______________ (相互帮助).8、As a middle school student, ifs unwise of you to________ (假装知道)what you don’t know.9、Instead of being black, the sky was blue and___________ (数百万)stars seemed to twinkle with happiness.10、It doesn’t ___________ (有道理)to buy the cheapest brand of computer just to save a few dollars.11、他去年加入了排球队。
He last year.12、史密斯先生认为自己是个失败者。
专业英语八级(作文)模拟试卷65(题后含答案及解析)题型有:1. summarize briefly the article; 2. express your own opinion, especially whether automatic translation technology will eliminate foreign language learning. I hear more and more about automatic translation technology. Skype recently announced their Skype Translator Preview. This translation technology will make it possible for people to communicate via Skype across languages. Two people can speak two different languages, and the conversation is automatically translated for each person to hear in his or her own language. This technology is not surprising. Google Translate is already quite accurate for many languages, although not for all. The more closely related the languages are in vocabulary and structure, the more accurate the translations are. Recently, text-to-speech technology has greatly improved, enabling any text to be accurately voiced for someone to listen to. How is this likely to affect language learning? I recently did a Google search for articles on the subject and came across a blog post by a Benny the Irish Polyglot where he discusses a product called V ocre. Benny points out that these translations are not always reliable. To me, this is a minor problem. The quality of these translations can only improve over time, since they are based the accumulation of context examples of ever increasing quantity, and in this way the context based-accuracy improves. I already find that Google Translate is much better than it was, and usually serves my purpose. So I don’t think that it is the accuracy of this technology that will be the main reason why it will not replace the need to learn languages. Rather it is because language learning is not just about learning to ask for directions and ordering beer. Language learning, in my opinion, is about connecting with a different language group, getting an insight into how these people think and getting exposure to their history and culture. This new automatic interpreting technology is helpful for situations like the ones that I will face in Myanmar and Vietnam as a tourist, where I don’t speak the language, and very specific questions that I need to have answered. It is an interim communication tool. It is not a substitute for learning the language. On the contrary, if after visiting Vietnam and Myanmar, I find that one of these countries is sufficiently fascinating, I may very well want to learn the language in order to get closer to those people, their history and their culture. I may simply want to be able to interact naturally with speakers of those languages, not via some interpreting device. Just as the advent of the computer increased the consumption of paper, I tend to think that the introduction of this kind of technology will increase the interest of people in language learning, and not decrease it. It is a short-term bridge or crutch which enables communication across certain language barriers, but not a longer-term resource for really getting to know people and discovering other cultures. This new translation technology will again make our world smaller, bring people closer together, and as a result, people will want to take the next step in getting closer to people who share their world, and learn their language.正确答案:Translation Technology Will Not Eliminate Language LearningThe emergence of automatic translation technology, such as Google Translation and Skype Translator Preview, raises the debate whether it will eliminate foreign language learning. It is pointed out by the above excerpt that automatic translation technology will overcome the problem of inaccuracy if data of context examples is enough. However, the author also holds the opinion that translation technology will not eliminate language learning, as language learning is not only related to information exchange but also a way of knowing the essence of the culture of the target language. Therefore, automatic translation technology, rather than saving people the efforts in language learning, becomes a useful intermediary which can surely arouse people’s passion for language learning by affording them the ease in receiving information from other languages. As I see it, translation technology will not eliminate language learning. Firstly, the current “automatic”translation technology is still in its developing phase, instead of eliminating language learning, the R&D process requires more talents in language studies. The key technologies used, including text-to-speech, or speech recognition, text analysis, language matching, can only be realized by masters of both the source language and the target language. Secondly, instead of “automatic” translation, a more appropriate way of calling the technology would be computed aided translation (CAT) because the translation offered by translation software needs further editing and proofreading before being used, a process requiring more people who are proficient in both languages. Lastly, getting the information conveyed by languages is not the only purpose of learning languages. Learning languages will guide people into other cultures and other ways of thinking, which cannot be realized by only reading translated texts. Based on the reasons above, automatic translation technology will not eliminate language learning; instead, it will boost language learning in the R&D process, editing process and arouse strong enthusiasm for people who want to know another culture through languages.解析:材料对“翻译技术是否会减少语言学习的需求”进行了探讨,总体而言,作者认为翻译技术不会影响学习语言的必要性。
IEEE DISTRIBUTED SYSTEMS ONLINE 1541-4922 © 2004 Published by the IEEE Computer SocietyVol. 5, No. 8; August 2004Discovering Services Is Not EnoughO. Andrei Dragoi and James P. BlackUniversity of WaterlooFaced with multiple electronic devices, service providers, and ISPs, tomorrow's mobile users might find it challenging to identify available services and acquire the rights to use them. The authors tackle this problem, combining the acquisition of role-based credentials with service discovery.As the Web becomes increasingly woven in all our activities, the need arises for solutions that can help simplify and structure interactions with ubiquitous services. This is particularly true for mobile users, who often must interact with surrounding services in unfamiliar ubiquitous computing environments. Having discovered the services, they must also determine how to invoke them. Furthermore, these services might be spread across multiple administrative domains; they might have arbitrary semantics and purposes; and communicating with them might require obtaining credentials for an appropriate ISP.Carefully designed middleware can bring significant value to such chaotic scenarios, presenting convenient abstractions and interfaces to all participants: users, providers of ubiquitous computing services, ISPs, tool and application developers, and administrators. The middleware should assist in discovering and interacting with local services in unfamiliar ubiquitous computing environments, handling authentication and authorization, mediating among participants, and coping with limited a priori relationships among those participants.We've designed a proxy-based middleware solution that facilitates user interactions in potentially chaotic ubiquitous computing environments. Part of our approach combines service discovery and role-based authentication, and we describe how to implement and present this combination so that users can exploit ubiquitous computing environments.Middleware design requirementsWe assume Web-based interactions in which human users employ standard Web browsers (on various personal devices) to access Web pages and services. Because the users are in unfamiliar locations or situations, we further assume that they participate actively in discovering and exploiting the electronic context, with an awareness that strangers might need to acquire and exploit various local credentials to use local servicessuccessfully. This is similar to asking someone for directions, acquiring a room key in a hotel, using a conference badge to gain access to an event, or arranging payment for a service by presenting a credit card.Therefore, a good design for ubiquitous computing middleware should have several key properties. First, users shouldn't have to preinstall special-purpose code on their devices, and any code downloads during Web browsing should be minimized. Second, the design should require only local implementations, without any large-scale changes to the Internet, and it should be able to exploit colocation of participants as needed. Third, it should support incremental deployment, facilitate the use of existing legacy services, and allow graceful degradation of functionality when necessary. Fourth, it should facilitate offerings by multiple, competing, and perhaps small service providers. Fifth, it should enable the creation of markets in which all participants can realize value or obtain revenue. Finally, and most important, it should be intuitive and nonintrusive for users.We decompose the problem into four components:A proxy to transform the Web traffic so that users can interact with the middleware and thecontextual servicesA software-development framework for ubiquitous computingService directories and an authorization framework for ubiquitous servicesService and credential discovery (through role assertions)Regarding the first two components, the technical key to enabling access to contextual services is the Web proxy. Such proxies commonly serve to transcode Web content for specific devices or to control access to a network that requires authenticated or paying users. In our case, the proxy, called Continuum, also decorates Web pages with contextual toolboxes so that users can interact with services in the environment. Continuum adds hotspots to Web pages as they pass through. These serve the dual purpose of associating a toolbox visually with certain data in the Web page, and acting as user-interface artifacts on which the user clicks to access the tools. A page can have many hotspots, associating toolboxes with different components, such as an image, a link, or the entire page. The proxy adds the menu and the associated JavaScript to implement it dynamically as part of a process we call publication. The tools are a user-interface notion. We call the software abstraction behind each tool a frame because, like the frame of an exhibit case, it unites several functional elements. For example, frames might provide access to printing on nearby printers; large-screen displays near the user; or storage, bookmarking, and transcoding services. We also provide a software-development framework that facilitates the design and implementation of tools and frames.Each frame contains an applet in the client browser, requiring JavaScript support, and a servlet running inside Continuum. The applet is responsible for the user interface and communication with the servlet. The servlet mediates access to an external service or provides the service directly to the user. The Continuum runtime environment provides mechanisms for discovering and using either built-in or external services, and for constructing the frame-user interface. Continuum itself interacts with candidate frames to determine which of them to publish. Continuum adds hotspots to Web pages and publishes frames for each of them. We've strived to ensure that the frame applets are portable across several major browsers for mobile devices.In this article, however, we focus on the latter two components: combining service discovery and role-based authentication. These are crucial, practical aspects of using an unfamiliar ubiquitous computing environment (see the "Related Work" sidebar). We've incorporated these two aspects into our prototype and designed them into our software-development framework.A hotel scenarioWe use the following example to illustrate our work. Imagine a small hotel in a large building or convention center that wishes to provide a rich ubiquitous computing environment to its guests. A local ISP provides basic wireless connectivity and a proxy. Local services include a printer for hotel guests in the lobby, and perhaps a vending machine and a cash dispenser. An incoming guest must first use the network to establish a Continuum session. The initial presentation of this session comprises a selection of tools relevant in the local context. (The guest might or might not have a business relationship with the specific ISP.) As the session evolves, the set of tools can change as the user browses and acquires more context.When the guest checks in, the registration clerk and the guest arrange for the browser on the guest's PDA to acquire an electronic credential, or role assertion. The role assertion contains further information about local service directories, and the proxy can use this information to influence tools and contextual information published to the guest as he or she browses. Figure 1 shows a textual representation of a role assertion. In addition to the basic role information, the assertion also gives two service directories, where users can find services that accept the role: a Service Location Protocol (SLP) directory that the hotel maintains, and a Jini directory that a local third party maintains. One of the tools on one of the hotspots (perhaps a general hotspot associated with the entire page) implements a frame for role assertion acquisition.Figure 1. Example of a hotel Guest role assertion.Once the frame applet has added the role assertion to the browser attribute store, the proxy can detect role assertions in traffic to and from frames and use the role and directory information to publish frames for servicesthat accept the role. In this way, those services have no need to create or maintain a relationship with the guest. When the guest tries to access one of the services, that service need only accept the role granted by the hotel. A service can also apply checks or validations to verify the user's authenticity.Obtaining a role assertionSolving the challenge of service and role discovery with multiple administrative domains involves three key concepts. First, it's necessary to create a particular role assertion and communicate it to an interested user. Second, Continuum and the frames rely on information in the role assertions to discover relevant services. Subsequently, the user relies on the assertions and other attributes to secure access to a service. Now, using the hotel example, we describe how a user acquires the Guest role assertion and uses it in subsequent service invocations.During an initial login procedure, Continuum responds to any HTTP request by publishing a tool that requests information from the user. In a trivial implementation, a simple HTTP form would be sufficient. A more sophisticated frame applet can obtain some of the requested attributes through introspective JavaScript code. The user's response establishes a session attribute cache. Tool-publication heuristics use the cache to identify relevant tools and services, and to create the user interface that is, the hotspots and toolboxes added to eachpage. Attributes available from the client include its IP address and perhaps the user's public key or identity, trusted home node, device location, and device type. We assume the user wishes to disclose the URL of the home node to the proxy so that the home node service can interact with it. Once the session is established, Continuum transmits the result of the original HTTP request to the user. A frame for issuing or acquiring a role assertion appears in Continuum Tools, the global toolbox not associated with specific data on the Web page.Figure 2 illustrates what the guest and the clerk might see in the current implementation, as they create and exchange the role assertion. The numbers beside each image indicate the sequence in which the two users' actions occur. The upper part of the figure refers to the issuer; the bottom, to the recipient. They both begin by clicking on a hotspot and choosing Continuum Tools; then, in step 1, they choose the Receive orIssue Role tool, respectively. In steps 2 through 5, each participant generates a simple password and communicates it verbally to the other.Figure 2. Exchanging the Guest role assertion.Continuum uses the pair of passwords to match the two users' sessions. Then in steps 6 through 8, the Issue Role frame uses the clerk's home node to generate the role assertion (assuming this is too onerous to accomplish on the clerk's PDA). Step 7 confirms the URL of the home with the clerk, obtaining the URL from the attribute pool. Immediately following this, the home node might challenge the guest for credentials. Then, in steps 9 and 10, the guest's home node receives and perhaps stores the assertion, possibly after a request for credentials from the guest. The procedure ends after the guest and the clerk receive confirmations (steps 11 and 12).Discovering and using a serviceSuppose the user wants to print a Web object on the printer in the hotel lobby, and a local copy center owns and operates the printer. Assume that the hotel and the copy center have arranged that hotel guests may use the printer upon successful presentation of the Guest role. Whether the copy center charges the hotel for guest use and whether the charge appears on the guest's bill are separate issues left to the hotel's discretion.The user chooses a print service by clicking on a hotspot to reveal a menu that includes the print frame, among others published in the toolbox. When the applet communicates with the servlet, it provides attributes such as the hotel Guest role assertion and, with Continuum's help, a reference to the object to be printed. The servlet then interrogates the directories listed in the role assertion to discover relevant printing services. If the servlet finds more than one, the frame offers a choice to the user. The frame servlet requests access to the printing service, which in turn challenges it for attributes in particular, for an appropriate role assertion. The service might determine that it needs further attributes or validation, such as some assurance that the user indeed possesses the private key corresponding to the role assertion holder's pseudonym. Once authorization occurs, the servlet invokes the service on the data with which the tool was associated. Then, the servlet converts theobject to a format, such as PostScript, that the printer accepts. Figure 3 shows part of the interactions of a print frame as it executes. (These snapshots don't reflect the hotel example.)Figure 3. Several snapshots of a print frame as it executes.In general, services can make their own decisions about the validity of attributes. For example, a vending machine might require some indication that a requesting user is physically near before completing a transaction. The indication might involve some automatic location technology or physical interaction with the user. Other services might accept role assertions or other attributes at face value without any interactive verification. Continuum imposes no particular view on how services evaluate or validate attributes.Roles, services, and discoveryWhat does a service provider (SP) such as the hotel need to do to create and sign its own role assertions? It must negotiate role names and their semantics with local SPs and possibly one or more ISPs whose transmission facilities are available inside the hotel (for example, 802.11b wireless or cellular wireless). If the hotel also wants to make services available to holders of its roles, it needs to advertise those services in its own service directory or in some public service directory that, say, the ISP maintains. If the hotel wishes to make some special services available, it might also want to develop custom frames and disseminate the code to ISPs, who, in turn, can publish them for the appropriate clients.In our design, middleware at the edge of the network (the frames and the Continuum server) assists with discovery and authorization, among other tasks. It helps SPs broker service-discovery operations; it helps users acquire signed assertions, each of which asserts that the holder is acting in a particular role. There are several prerequisites to enabling role assertions as the basis for service discovery, authentication, and authorization:An SP must ensure that service directories list its services and that signing authorities issue role assertions that bind users to particular roles. The assertions also list service directories that might accept the role. The roles and their implied semantics are a convention of the services accepting them. The signers of the assertions could be the service provider itself or any business partner or select user whose signature is acceptable. (Recall the example of Figure 1.)The SP must ensure that the middleware can publish user tools for its services either directly by providing and disseminating code or indirectly by adhering to standards. As a trivial example, if a printer follows a standard protocol, and a standard service directory advertises this printer, a general printing tool published by the proxy could provide the user interface and manage the interactions with the printer on behalf of the user. The user acquires a role assertion for the service. The user can acquire this assertion independently through some interaction with a signing authority or through an interaction mediated by tools that the proxy publishes. (This assumes the user's proxy is the same as the signer's proxy, or that the two proxies cooperate.) The signing authority can be a service or another user.The user finds out about a service because a tool has been published. The tool execution invokes the service, supplying an acceptable role assertion along with other user attributes and parameters such as the data for which the tool was published. The service might consider the role assertion sufficient, or it might try to validate the assertion and attributes. The user's device can acquire attributes in various ways. Continuum can cache them in a user-associated session. Our framework is flexible enough to support various trust relationships and implementation choices.There are several ways to implement roles and associated service directories. If a particular role or set of roles can access several different services, it might make sense to group them in one or more directories. An individual SP can host a directory for private roles it creates. Alternatively, the SP could rely on some third party to host the directory. If the third party happens to be the user's ISP, the frames for those services might appear automatically for the user. However, this works only if the ISP and the SP are colocated or have a prior business relationship.SPs can let others (business partners, ISPs, or other SPs) sign role assertions, yet the former still maintains control over authentication and authorization. For an existing service, the SP might want to rely on some challenge-response mechanism with the user to verify the assertion. Or the tool vendor could implement some custom verification with the SP before invoking the service. A third possibility is that the service interface implemented in the tool involves some standard authentication and authorization negotiation with a special-purpose or standard-based service.Users can acquire and manage role assertions independently of SPs or ISPs. Examples include users exchanging role assertions through email, beaming them between handheld devices, storing them on some medium for future use with a different user device, or keeping them in persistent storage provided by some trusted service such as their PC.ISPs can provide added value through service aggregation and tools for exchanging role assertions. Because of the multiplicity of communications media available in a chaotic ubiquitous computing scenario, the user's ISP might not be physically close to or actually aware of the user's location. Even so, by querying the service directories listed in role assertions that the user has acquired independently, the proxy can obtain enough context about the user to publish valuable tools. Of course, closer coupling between the proxy and a physical location could provide better functionality to the user, in the form of a more appropriate set of tools to access local services and acquire local roles. In fact, just having the proxy know where certain roles are relevant could yield an improved set of tools. For instance, a role assertion might also indicate a physical area where the role is valid.ConclusionWe plan to explore attribute validation further in particular, location validation. We'd also like to prototype peer-to-peer, wireless exchange of role assertions, and assess how well it works over common wireless technologies such as Bluetooth. We plan to investigate the use of direct attribute challenges from services, bypassing the proxy. Another open problem we hope to study is the relation between ISPs and SPs for disseminating information about role semantics.AcknowledgmentsBell University Laboratories at the University of Waterloo and the Natural Sciences and Engineering Research Council of Canada supported this research.O. Andrei Dragoi is a PhD student in the School of Computer Science at the University of Waterloo, Canada. His research interests include mobile and pervasive computing, middleware for ubiquitous computing, and ad hoc service access and interactions. He received his advanced studies diploma in computer science and engineering from University Politehnica of Bucharest, Romania. Contact him atoadragoi@shoshin.uwaterloo.ca.James P. Black is an associate professor in the School of Computer Science at the University of Waterloo. His research interests include pervasive, mobile, and wireless computing; distributed systems; wireless networks; the behavior of distributed applications and systems; and computer system performance analysis, modeling, and simulation. He received his PhD in computer science from the University of Waterloo. He is a member of the IEEE Computer Society and the ACM. Contact him at jpblack@uwaterloo.ca. Related WorkIn ubiquitous computing, privacy issues can be more severe than in the wired world. Privacy becomes a matter of concealing not only what data the user is accessing but also the user's location and daily routine. Privacy flaws in ubiquitous computing can have serious consequences that can go as far as physically endangering the user. Nevertheless, there is a tradeoff between convenience and privacy: Anyone wishing to access a service might have to provide personal information to acquire a particular role. However, the decision to release that information and use the service rests with that person rather than the middleware or the role's issuer. The Web Services Federation and Liberty Alliance make similar assumptions.13The ubiquitous computing paradigm also increases the complexity of authorization and access control, even compared with traditional distributed computing. This area has been the subject of much research in distributed systems. However, solutions for that domain don't apply readily to ubiquitous computing, because of its inherently ad hoc and unpredictable interactions, user mobility, and multiple administrative domains. In a ubiquitous computing paradigm, the interactions are more like those in a real society, which isn't always the case in traditional distributed computing. Colin English and his colleagues point out that in society, the notion of trust is subjective, depends on the situation, and evolves as information becomes available.4 Trust comes from personal observations, recommendations, and reputation a dynamism that current ubiquitous computing environments don't generally model. Our use of role assertions acquired from other users considers this dynamism. Our framework applies the general notion of user roles to the ubiquitous computing environment. The Centaurus project is another example of a related research effort to adapt role-based access control and trust delegation to ubiquitous computing.57 Centaurus proposes an authorization framework for a hierarchy ofsmart spaces. Security agents record delegations and revocations of rights between services. This limits the solution's applicability across noncooperating administrative domains. In contrast, using tools to issue and acquire role assertions, our framework investigates trust delegation without resorting to additional entities. In addition, we incorporate peer-to-peer communication, which is natural in wireless environments. Centaurus doesn't exploit this capability, mainly because of the requirement to access the security agent for delegation and revocation operations. Our framework extends the notion of assertion to serve additional purposes, such as pointing users to service directories that might use the assertion for authorization purposes.Finding relevant service directories is a central issue in ubiquitous computing. Tightly coupled environments such as smart spaces rely on a well-known directory service or a centralized repository of service advertisements (for example, the event heap in the iRoom project8). However, these approaches aren't satisfactory when there are multiple administrative domains. Some service-discovery protocols, such as Jini,9 specify mechanisms for finding service directories through a network broadcast or multicast; others, such as the Simple Service Directory Protocol10 in universal plug and play11 and the Service Location Protocol,12 canfind services directly. However, in networking, "close" doesn't always mean physically or logically. Among discovery protocols, SLP integrates with the Dynamic Host Configuration Protocol.13 Therefore, software on the user's device can obtain a URL of, say, a directory agent (a service directory in SLP) from a DHCP server at the same time as the IP, gateway, and Domain Name System information. However, this is insufficient when there are multiple service directories, each relevant to different users, especially since a DHCP server at network login can't necessarily determine what's relevant to the user logging in.References1. "Federation of Identities in a Web Services World," IBM and Microsoft, July 2003; www-/developerworks/library/ws-fedworld.2. "Introduction to the Liberty Alliance Identity Architecture, Revision 1.0," Liberty Alliance Project, Mar. 2003;/resources/whitepapers/LAP%20Identity%20Architecture%20Whitepaper%20Final.pdf.3. "Liberty Alliance Project White Paper Liberty Alliance and WS-Federation: A Comparative Overview," Liberty Alliance Project, Oct. 2003; /resources/whitepapers/wsfed-liberty-overview-10-13-03.pdf.4. C. English , et al., "Dynamic Trust Models for Ubiquitous Computing,"Proc. Workshop Security in Ubiquitous Computing (UbiComp 02), 2002; /~philip/ubicomp2002ws/organize/paddy.pdf.5. L. Kagal , et al., "Centaurus: A Framework for Intelligent Services in a Mobile Environment,"Proc. 21st Int'l Conf. Distributed Computing Systems Workshops (ICDCSW 01), IEEE CS Press, 2001,pp. 195201; /comp/proceedings/icdcsw/2001/1080/00/10800195abs.htm.6. R. Sandhu , et al., "Role-Based Access-Control Models,"Computer, vol. 29, no. 2, 1996,pp. 3847; /comp/mags/co/1996/02/r2038abs.htm.7. M. Blaze , J. Feigenbaum, and J. Lacy , "Decentralized Trust Management,"Proc. IEEE Symp. Research in Security and Privacy, IEEE CS Press, 1996,pp. 164173;/comp/proceedings/sp/1996/7417/00/74170164abs.htm.8. B. Johanson , A. Fox, and T. Winograd , "The Interactive Workspaces Project: Experiences with Ubiquitous Computing Rooms,"IEEE Pervasive Computing, vol. 1, no. 2, pp. 6774;/comp/mags/pc/2002/02/b2067abs.htm.9. "Jini Technology Architectural Overview," Sun Microsystems, Jan. 1999;/software/jini/whitepapers/architecture.html.10. Y.Y. Goland , et al., "Simple Service Discovery Protocol/1.0, Operating without an Arbiter," IETF Internet Draft, Jan. 2000;/~rhan/CSCI_7143_002_Fall_2001/Papers/draft_cai_ssdp_v1_03.txt.11. "Understanding Universal Plug and Play," Microsoft, June 2000;/download/UPNP_UnderstandingUPNP.doc.12. E. Guttman , et al., "Service Location Protocol, Version 2," IETF Network Working Group RFC 2608, Internet Soc., June 1999; /rfc/rfc2608.txt?number=2608.13. R. Droms, "Dynamic Host Configuration Protocol," IETF Network Working Group RFC 2131, Mar. 1997; /rfc/rfc2131.txt?number=2131。