SEARCH KEYWORD -- CLOUD AUTO DIALER
When will Google be back to China?
There will be news about Google returning back to China every now and then since the search giant left China in 2010. Every sign of change about Google in China will give people big hope on its return. But Chinese are still waiting for the dream to become true though nothing real happen until now. On Thursday, it seems there is "proof" again that Google is going back to China. In the morning, many Chinese noticed that the official Google China weibo(China's Twitter) account uploaded a photo with...
GOOGLE,CHINA,SEARCH ENGINE,BAIDU 2017-03-02 09:39:51
Login with Amazon
Many websites now allow users to login to their websites with some third party accounts such as login with Facebook or login with Twitter. This is because Facebook and Twitter have many users and they also provide a good API for third parties to access the user data. This also eases the work of users since they no need to enter the same data again and again in each website. Now Amazon also releases its own login with Amazon plugin. Now third party websites can embed the login with Amazon button...
Login with Amazon,OAuth 2013-05-29 13:07:09
Office will finally be on iOS and Android in 2013
It was confirmed that Office would land on iOS and Android platforms by Microsoft in October. Microsoft claims that Office will be on these two platforms in some way. Now many sources indicated that Office will be officially launched at the beginning of 2013. It is reported that the mobile version of Office will be free on Android and iOS, it allows users to view Office documents. Mobile version of Office also requires a Microsoft account just like SkyDrive and OneNote App. After login, users c...
Office,Android,iOS,Office 365 2012-11-07 11:57:50
iWatch is coming to us before 2014
There are a variety of rumors around Apple iWatch. But according to Bloomberg, Apple's smart watch is expected to be on sale at the end of this year.It is reported that iWatch might have phone and location tracking capabilities, it will also have a built-in pedometer and some health monitoring sensors. Previously Apple supplier and Gorilla Glass manufacturer Corning said that iWatch would be available only after at least 3 years. But recently Apple retained some iWatch related patents, it...
iWatch,Apple,Google Glass 2013-03-04 18:09:42
WeChat has 100 million international users now
Just one month ago, Tencent announced that it had 70 million international users outside of China mainland. Today, they announced that WeChat hit 100 million international users. In just one month, the international users increase by 30 million. WeChat becomes one of the most tough competitors in the international IM market. Although there are still Whatsapp, Line and some other IMs, WeChat provides many different robust features, especially in the newly released WeChat 5. The new features in W...
WeChat,Tencent,Internationalization 2013-08-20 02:38:14
Motorola : A Google company
According to Sina Tech, Motorola Mobility has changed its company logo this week. The new logo comes with new graphic design and new font design. The new logo still has the 'M' badge and "MOTOROLA". However, the color of the 'M' badge changes from the old white to the new gray and the outer ring color also changes from red to multi-color. It is more like the Google logo's color scheme. At the same time, the "MOTOROLA" string on the logo also changes from upper case letters to lower case letters...
Motorola Mobility,Logo,Google 2013-06-26 11:40:02
Chrome time machine : Chrome starts from 0 to 1
Time flies, Chrome has been around us for four years since its birth. The Chrome team launched a Chrome time machine on Google's official blog, you just need a simple click or scroll back and forth with mouse, it will show you what happened to Chrome in last four years. If you find clues hidden between the lines, type a few mysterious characters, you may also be able to find a special birthday gift prepared by Chrome team.Four years, Chrome started from scratch and now it's the No.1 web browser...
Chrome time machine,4 years 2012-09-05 06:54:05
Some hidden XSS injection vulnerabilities
XSS injection refers to a Web page generates some unexpected executable js codes based on user input and these executable codes are executed by web browser,i.e, the source code sent to web browser by the server contains some illegal js codes, and these illegal js codes are related to user's input. Common XSS injection vulnerabilities can be fixed with some functions such as htmlspecialchars(escaping HTML special characters) and strip_tags() or similar, but there are some hidden XSS injecti...
XSS,PHP,Security,Code,JavaScript 2012-08-27 20:32:08
The first 30 tweets on Twitter
Six years ago, we didn't know what a tweet was. But now, there are 340 million tweets posted every day. Looking back, do you know what are the earliest tweets on Twitter when it was released? Let's check them out. Before that, let's check Twitter's background first. Six years ago, Twitter was called twttr (similar to Flickr), the earliest version was similar to an SMS broadcast service, i.e sending short message to friends to tell them what I am doing. It was put online on 22nd October, 2006, J...
When no need 3 handshakes in TCP?
Overview In the previous article titled Why TCP needs 3 handshakes simple answers were provided to the following three questions: Can application data be carried during the first handshake? Can application data be carried during the second handshake? Can application data be carried during the third handshake? Briefly, traditional TCP requires a three-way handshake to establish a connection, and during these three handshakes, only simple SYN and ACK packets are sent. From the perspective o...
REASON,NETWORK,TCP,EXPLANATION 2024-09-29 03:19:35
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>