SEARCH KEYWORD -- INTERNET SECURITY
Focus of Baidu in the future
In addition to the new generation "Baidu ladies", The biggest highlight of the annual meeting of Baidu is undoubtedly the passionate speech delivered by CEO Yanhong Li with a "Zoro" suite. He emphasized four business focus of Baidu in the future, i.e the traditional search, mobile cloud, LBS and international strategy. Although the strategy is clear, but what's more important is that there must be some corresponding products to align with these focus. How will Baidu carry out four key business?...
Baidu, Anuual meeting, LBS,Baidu Cloud 2013-01-23 03:51:09
6 time management tips for startups
Many people are fighting for their startups, they are willing to put all their time in company operations. This 24x7 passion is necessary for startup founders. For the team in startups, the most important thing is time management, time management is a top challenge for everyentrepreneur. After years of experience working with entrepreneurs and business owners, Rieva Lesonsky has learned a few tricks for getting more done in the 24 hours we all have. Here are 6 tips what he shared...
startup,time management 2012-05-29 05:30:07
Fix 'this authentication plugin is not supported' issue while using Go to connect MySQL 8
MySQL 8 has changed its default authentication plugin from mysql_native_password to caching_sha2_password to improve its security. However many third party libraries seem act slowly to catch up with this change. This causes some compatible issues with their connection to MySQL. One of the issues is seen in Go libraries while it's trying to connect to MySQL 8. The specific error has been observed is "this authentication plugin is not supported". The root cause of this issue is that the go-sq...
MYSQL,GO,MYSQL 8,AUTHENTICATION PLUGIN 2018-07-11 08:55:02
Convert JKS to BKS using keytool
There are lots of questions(question 1, question 2) on Stackoverflow about how to convert JKS keystore to BKS keystore(a keystore format provided by BouncyCastle) using Java keytool. The reason why this conversion gets lots of questions is that BKS is not a keystore format supported by Java SE, it's a third party keystore format. To convert JSK to BKS, the BKS provider has to be downloaded first. And a few more options needs to be added when running the keytool command. The typical co...
Yahoo to change name to Altaba and becomes Alibaba's father
Yahoo, one of the most successful Internet giants in later 1990s, is now becoming a company living with selling assets(offices, domain names) and holding the stocks from Alibaba. Its core business which it was proud of has been sold to Verison with $4.8 billion as disclosed in some document submitted to SEC. Now it's starting the process of changing its name to Altaba. After the acquisition, the current Yahoo CEO Marissa Mayer will resign from the board. But the company will still keep some val...
How to play with cross domain request
What is cross domain request In simple, cross domain request is to request resource from other domain in one domain. Note, the "other domain" doesn't just mean domain name only, it includes much more. If the protocol, domain name, port is not the same, two domains will be considered different. Below example describes what is considered as different domain. http://www.a.com/a.jshttp://www.a.com/b.js # Same domainhttp://www.a.com/lab/a.js &nb...
FRONT END,JSONP,CROSS DOMAIN,CROSS ORIGIN,CORS,DOCUMENT.DOMAIN,WINDOW.NAME 2016-11-06 00:48:54
Google CEO Sundar Pichai : Google is open to return to China
At the Code Conference on Wednesday, Google CEO Sundar Pichai expressed his thought on Google's position in China. He expressed the openness of Google to return to China. "Google is in China....But Google Search is not there in China...But personally for me, I care about serving users globally in every corner. I always thought Google is for everyone, that applies to China, too. So wherever possible, we want to be in China to serve Chinese users....If we do it in a right and thoug...
GOOGLE,CHINA,SUNDAR PICHAI,CODE CONFERENCE 2016-06-02 01:09:21
The Web: Important Events in its History
Straight forward simple fact of the functioning evening: The netting is normally not the same element as appearing the world vast world wide web. Brain damaged, correct? Related to the Included Press Stylebook, the “Net is normally a decentralized, world-wide web 2 . 0 of pcs that may talk with every solo diverse. The Environment Huge World wide web, like announcements, is usually normally a subset of the World wide web.” If the web is not really the internet, then what is it? The c...
Huateng Ma becomes the richest person in China
On 22 July, Licai Zhoubao, a famous wealth management media in China, released a ranking about Chinese most richest people. In this ranking, Tencent CEO, Huateng Ma for the first time becomes the richest person in China with 46.7 billion RMB(around $7.6 billion), his wealth was 35.4 billion RMB(around $5.76 billion) last year. That means his wealth increases 11.3 billion RMB($1.84 billion) in one year. In 2012, Tencent Corp had a revenue of 43.9 billion RMB(around $7.15 billion), which inc...
Tencent,WeChat,Huateng Ma 2013-07-22 08:55:13
Meta tag in HTML header
In server response, we can use response.setHeader() to set the meta information in header of a HTML page. The usage is response.setHeader(name,context); meta is used to simulate the response header of HTTP protocol in HTML page. It should be put between the <head> and </head> tag. 1. <meta name="Generator" content="" > <!--This is to specify the tool which generates this page such as Microsoft FrontPage 4.0 etc --> 2. <meta name="keywords" content=""> <!-- To tel...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>