SEARCH KEYWORD -- PSD to Wordpress Service
Google.com is considered as partially dangerous by Google
Google has a service called Transparency Report which is to examine billions of URLs per day to identify dangerous pages which may trigger downloading of malicious software. When you search a site, it will give the status of the site and also the safety details of the site if there are potential dangerous pages on the site. These details will help the site owners to identify the potential issues and fix them as early as possible, Embarrassingly when searching for Google.com, it is c...
GOOGLE,GOOGLE.COM 2016-04-20 00:38:15
Huawei is open to acquire Nokia
Last night Huawei unveiled a new flagship smartphone Ascend P6 in London. It may be the thinnest smartphone in the world and its potential competitor is Samsung Galaxy S4. Before the press event, an article from FT said that Huawei was open to buy Nokia. "We are considering these sorts of acquisitions,maybe the combination has some synerges but depends on the willingness of Nokia. We are open-minded." remarked by Huawei's Richard Yu. After this news, Nokia's share price surges 11% to $4.10 per ...
Something you may not know about Shell
Shell is also called command line interface, it is the interface between *nix users and computer. Shell is a program which provides service to access OS kernel services. This article is to introduce some not so well known but useful and interesting knowledge about shell. Wiki shell was born almost at the same time as Unix. The first UNIX shell was written by Ken Thompson in 1971 and its name is Thompson sh. It's older than Linux kernel. The default Shell in most *nix and MacOS is bash, bash was...
Login with Amazon
Many websites now allow users to login to their websites with some third party accounts such as login with Facebook or login with Twitter. This is because Facebook and Twitter have many users and they also provide a good API for third parties to access the user data. This also eases the work of users since they no need to enter the same data again and again in each website. Now Amazon also releases its own login with Amazon plugin. Now third party websites can embed the login with Amazon button...
Login with Amazon,OAuth 2013-05-29 13:07:09
What did iPhone bring to us in the past 5 years?
It is five years now since the first iPhone was released on 29th June 2007. In these 5 years, iPhone is the biggest variable in technology industry on this planet. It brings revolutionary change to many industries including the mobile phone, communication and Internet. It brings us into the era of mobile web. BuzzFeed collected a series of pictures to summarize the changes brought to us by iPhone in these 5 years. Here are some of them.1. Apple is the most valuable company in the worldIn August ...
5 Things You Can Do to Protect Your Data
The average cost of a data breach is $148 per record. Records include everything from personal addresses to birthdates to even more sensitive data, like Social Security Numbers and business files. Each year, these hacks cumulatively cost billions of dollars to companies and individual users. Nonetheless, like many other criminals, hackers tend to prey on easy targets. By following these essential steps, you’ll be able to ensure your data is always kept safe. 1) Use a File Encryption Servic...
DATA SECURITY 2019-08-20 08:35:54
Windows 8 launch event data
Today on Microsoft Windows 8 launch event, Microsoft CEO Steve Ballmer and Windows manager Steven Sinofsky shared with us some data. Let's see what's happening to Windows. Since launch, Windows 7 system gains a total of 670 million upgrade and 400 million new PC installed with Windows 7.Microsoft's cloud storage service Skydrive, 200 million users share 11 billion photos and 550 million documents. new 2PB file uploaded monthly.(1PB = 1024TB)Windows 8 has been tested in 190 countries for 1.24 bil...
Windows 8,Microsoft data 2012-10-25 13:16:30
Web Vs. Native: Which Is the Better Type of Mobile App?
An average US adult spends 3 hours and 15 minutes on their smartphone every day. This means that launching an app of your own is a great business opportunity. However, you need to decide whether you want to develop a native or a web app. The difference boils down to the fact that web apps run through a mobile browser and native apps are full-fledged programs. Each option has its pros and cons and can be successful under some circumstances. To make the right decision, you need to understand ...
MOBILE,WEB APP,NATIVE APP 2018-03-26 06:35:27
Google to build Google Babble to unify all its chat tools
--Note : Image is from www.36kr.com If Google Talk / Hangout / Voice / Messenger are put together, what will you find?They are all chat tools launched by Google, but with careful comparison, you will find that the difference between them is not very big. The useful tools are Google Talk and Google+, but both of them needs to be improve their user experience.According to Geek.com, Google is planning to launch a chat application Google Babble which will integrate all its chat tools and serv...
Google Babble,Chat tool 2013-03-19 13:02:47
bash network interface
Some of us may have seen /dev/tcp/<host>/<port> before, is this a special file system implemented in some BSD kernel? Because there is no /dev/tcp in Linux. Actually, this one is implemented in bash. We no need to rely on wget,nc to do network connection. It's very easy to use this interface: bash-4.2$ cat </dev/tcp/time.nist.gov/13 56188 12-09-18 15:34:26 50 0 0 733.5 UTC(NIST) * bash-4.2$ exec 3<>/dev/tcp/www.w3.org/80 bash-4.2$ echo -e "GET / HTTP/1.0\n\n" >&3 b...
Bash,Network interface,/dev/tcp 2013-07-20 00:57:52
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>