SEARCH KEYWORD -- HTML to Wordpress Conversion
Google to build Google Babble to unify all its chat tools
--Note : Image is from www.36kr.com If Google Talk / Hangout / Voice / Messenger are put together, what will you find?They are all chat tools launched by Google, but with careful comparison, you will find that the difference between them is not very big. The useful tools are Google Talk and Google+, but both of them needs to be improve their user experience.According to Geek.com, Google is planning to launch a chat application Google Babble which will integrate all its chat tools and serv...
Google Babble,Chat tool 2013-03-19 13:02:47
Say good bye to netbook
Asus and Acer are the last two manufacturers of netbooks, but these two companies announced that they would not manufacture netbooks starting from January 1, 2013. Prior to them, Samsung, Hewlett-Packard and Dell stopped production of the netbooks. This means that the life cycle of netbook officially ended.Back to 2009, the U.S. market research firm ABI Research was very optimistic about netbook's future, they said netbook would open a new era for PC market and predicted netbook shipments would ...
Netbook,Tablet PC, Comparison 2013-01-02 11:53:33
Facebook open sources its C++ library named Folly
Recently, Facebook open sourced its low level C++ function library for its internal use named Folly. Folly is an open sourced C++11 component library, it provides functions similar to what boost and std libraries provide, including string, vector and memory allocation, bit operation etc, to fulfill large scale high performance requirements.Currently Folly is tested with gcc4.6 on some 64 bit systems such as Fedora 17, Ubuntu 12.04 and Debian wheezy, it may also be OK on other 64 bit platforms wi...
Facebook,Folly,C++,open source 2012-06-05 08:31:12
Useful functions to provide secure PHP application
Security is a very important aspect of programming. There are many functions or modules in any kind of real programming language providing security functionalities In modern websites, we may often get inputs form users all around the world.There is a famous saying which says that never trust user input. So in web programming languages, we will often see functions which will guarantee the security of the data input from users. Today we will cover some of these functions in the most famous o...
PHP,security,SQL Injection,XSS,AJAX 2014-10-30 04:21:59
Pandora's killer--iTunes Radio
As expected, this year's WWDC may make many people happy, but also doomed to make many start-up companies sleepless. iTunes Radio is such a product creates insomnia. In WWDC, iTunes Radio was released on schedule and it becomes Apple's new music service. iTunes Radio is a music stream service which can learn your taste, it can recommend your music based on what you heard and you're listening to. From the conference we can see this new service can access the entire iTunes catalog, i.e, there wil...
iTunes Radio,iRadio,Apple 2013-06-10 23:19:23
Microsoft is attacking iPad again
Microsoft recently released a new advertisement on YouTube which attacked iPad. It aimed to show that iPad had a poorer performance in the classroom than Windows Tablet.Steve Jobs once said that iPad could liberate student's shoulder, students no longer need to carry their heavy school bags to the class. But from Microsoft's perspective, although iPad is lighter than student's school bag, the problem is that its performance in the classroom is not so satisfying. In Microsoft's advertisement, af...
Windows 8,iPad,Advertisement 2013-08-20 05:14:29
Java SynchronizedList and Iterator
While reading some material about concurrency, I come up with some writing about using SynchronizedList wrap about normal List to enable synchronization. But one interesting thing is http://docs.oracle.com/javase/7/docs/api/java/util/Collections.html#synchronizedList%28java.util.List%29 It says It is imperative that the user manually synchronize on the returned list when iterating over it: 1 List list = Collections.synchronizedList(new A...
ConcurrentHashMap vs Collections.synchronizedMap()
ConcurrentHashMap and Collections.synchronizedMap() both provide thread-safe operations of collections of data. They are used in multithreaded programs to provide both thread safety and performance improvements. In many cases, we can use either of them. But the realization of thread safety is different for these two implementations. ConcurrentHashMap will create an HashEntry[] array internally to store the elements passed in from a Map, while Collections.synchronizedMap() will return a Synchroni...
ConcurrentHashMap,Collections.synchronizedMap 2014-09-18 05:04:59
Samsung loses $12.3 billion in one day
Following the court decision last Friday on Samsung's infringement of Apple's patents, Apple did not stop, they immediately submitted an application to the court to ban some Samsung smartphones, including 8 types of Samsung smartphones sold in United States. Apple listed in detail in the document what patents these phones infringed. These 8 smartphones are: Galaxy S 4G Galaxy S2 (AT&T) Galaxy S2 (Skyrocket) Galaxy S2 (T-Mobile) Galaxy S2 Epic 4G Galaxy S Showcase Droid Charge Galaxy Prevail...
A new SSL 3.0 vulnerability named POODLE is released
Today a new SSL v3 security vulnerability is released by Google and it affects all products which is using SSL v3 protocol as this vulnerability is introduced by a design flaw. Google revealed details of the design flaw on Tuesday, and dubbed it POODLE – short for Padding Oracle On Downgraded Legacy Encryption. It is a blunder within the blueprints of SSL 3.0 rather than a software bug, so it affects any product following the protocol – from Google Chrome and Mozilla Firefox to Micro...
SSL v3, vulnerability, Google, POODLE 2014-10-15 04:48:59
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>