![]() Also, social networking sites must quickly verify multiple files, ensuring that their users are not trying to post banned content, such as encouraging terrorism, or violence, or portraying them. This reduces the cost of transferring and storing files. several users have saved the same music file), then “deduplication” may be used – meaning that the file is flagged, thus making it available to a further user, without it having to be uploaded a second time and saved on a server. ![]() If the file is already in the cloud (e.g. When a file is uploaded “into the cloud”, the cloud services provider may want to check whether it already has an identical file in storage. ![]() The average user seldom has such problems, but they can be an issue, for example, for cloud services providers. But what if we need to find a file among hundreds of thousands of others? In such situations, we usually resort to the search function built into the operating system but in the end, we just have to browse through the files, one at a time, until we find (or not) the right one. One of the many uses of hash functions is the identification and verification of computer files.Įveryone has experienced having to frantically search for an important document that was saved “somewhere in the computer” but is needed immediately.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |