SEARCH KEYWORD -- 2012
iPhone 5 first weekend sales over 5 million
Within 24 hours openning for pre-order, 2 million iPhone 5 have been ordered, Apple announces that sales of iPhone 5 are over 5 million in 3 days on sale., in addition, iOS devices upgraded to iOS6 are around 100 million. Apple CEO Tim Cook says : Demand for iPhone 5 has been incredible and we are working hard to get an iPhone 5 into the hands of every customer who wants one as quickly as possible,While we have sold out of our initial supply, stores continue to receive iPhone 5 shipments ...
iOS6 will not have YouTube pre-installed
2012 maybe Apple's year of "away from Google".Following the Google Maps, YouTube will be ruled out from iOS 6. According to 9to5Mac, iOS 6 beta 4 has removed the YouTube application that existed on iOS since the first version in 2007. Apple also confirmed that the agreement signed with Google to pre-install YouTube has expired. If you are a big fan of YouTube, don't worry, Apple doesn't completely rule out YouTube. In Safari, you can still visit YouTube, Google is also developing a new ver...
Crazy! 618 million daily active users on Facebook
Facebook released 2012 Q4 financial report. Facebook total revenue in the fourth quarter of 2012 is $1.585 billion, an increase of 40% over the same period last year, about 23% of the total revenue are from mobile advertising. Net profit is $64 million, down 79% over the same period last year.Now Facebook monthly active users reach 10.6 million, daily active users reach 618 million. The daily active users from mobile are more than the daily active users from desktop side the first time.In the e...
Facebook,Financial report,Mobile 2013-01-31 03:13:06
User experience distance
Good user experience can narrow the gap between product and users, it can also improve the user efficiency and increase satisfaction and comfort of users. Here we talk about user experience distance with different examples: 1. Floating bubble layer When users need to delete one picture,they click on the "Delete" button, then the floating bubble layer appears to prompt the user to confirm the deletion, users only need to focus on the picture which reduces the visual burden, and also no need to mo...
User experience, Design,Detail 2012-12-20 13:20:16
Microsoft unveils a new logo
When releasing Windows 8, many people thought that Microsoft would use the blue logo as company's logo. But we are "cheated", Microsoft unveils a new logo. Watch video below. Since unveiling its first logo in 1977, Microsoft has changed its logo a few times, they are In 1977, its "Micro-Soft" Microsoft "blibbet" logo, filed August 26, 1982 at the USPTO and used until 1987. Microsoft "Pac-Man" logo, designed by Scott Baker and used from 1987 to 2012 with the 1994–2002 slogan"W...
30 minutes to fix Java vulnerability
On September 25, Adam Gowdiak from the Polish security consulting firm Security Explorations submitted a Java security vulnerability to Oracle and provided a proof-of-concept. The vulnerability exists in Java 5 6,7, once the user accesses hosted malware site, an attacker can remotely control the infected machine.Gowdiak later got in touch again with Oracle and got the response that the fix has reached the final stage. He can expect the patch in four months later. He eventually unbearable Oracle'...
Java, Vulnerability,Fix 2012-10-29 11:53:43
Instagram has more than 100 million users
On TechCrunch Disrupt, Facebook CEO Mark Zuckerberg said that Instagram users is over $100 million.According to comScore data, Instagram traffic in July rose 38%, it becomes the 56th site in United States. And Instagram official said that the number of users was 80 million and over four billion photos uploaded to the server in July.Last week, Facebook formally completed the acquisition of Instagram, the final cost is $735 million. Zuckerberg says he wants to help the growth of the application, ...
A serious security vulnerability found in MySQL/MariaDB
Recently a serious security vulnerability was found in MySQL/MariaDB. It relates to the access to the database. The issue is described below.When a user connects to MariaDB/MySQL, a token (SHA over a password and a random scramble string) is calculated and compared with the expected value. Because of incorrect casting, it might've happened that the token and the expected value were considered equal, even if the memcmp() returned a non-zero value. In this case MySQL/MariaDB would think that the p...
Intel disclosed more configuration details of Win8 Tablet PC
Intel disclosed more hardware configuration information for future Windows 8 Tablet PC in a conference in Beijing on Thursday Tablet PC equipped with Microsoft new operating system is expected to be released in the second half of this year.Intel shows a Win8 Tablet PC model with Clover Trail platform Atom Z2760 processor, the dual-core processor support "burst mode" (burst mode, when needed to quickly improve performance) and Hyper-Threading Hyper-Threading can make dual-core chips in some...
Intel,Win8 Hardware comfiguration 2012-04-14 00:20:47
jQuery 2.0 will drop support for some IE6/7/8 oddities
jQuery official website releases its road map for the future jQuery development. This road map reveals that jQuery 1.8 will be released within a month and other consecutive versions will follow the following release plan:jQuery 1.9 (early 2013): many of the interfaces already deprecated in version 1.8 will be removed; some of them will be available as plugins or alternative APIs supported by the jQuery project. IE 6/7/8 will be supported as today.jQuery 1.9.x (ongoing in 2013 and beyond): This v...
jQuery 2.0,jQuery,IE support 2012-06-29 05:20:27
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>