SEARCH KEYWORD -- DIGITAL WORLD
Chrome time machine : Chrome starts from 0 to 1
Time flies, Chrome has been around us for four years since its birth. The Chrome team launched a Chrome time machine on Google's official blog, you just need a simple click or scroll back and forth with mouse, it will show you what happened to Chrome in last four years. If you find clues hidden between the lines, type a few mysterious characters, you may also be able to find a special birthday gift prepared by Chrome team.Four years, Chrome started from scratch and now it's the No.1 web browser...
Chrome time machine,4 years 2012-09-05 06:54:05
What was the Internet like in 1995?
The Internet evolves very fast since its birth. In 1995, a TV program called Computer Chronicles made an episode about new technology "The Internet". Now let's check out what the Internet looks like in 1995 through some video screenshots. First the host Stewart Cheifet appeared in the video where he was in a network cafe. There you can meet the real people and virtual person. That's a good thing. The first guide of us is the technology journalist from New York Times John Markoff. He said his f...
Internet,History,1995,Computer Chronicles 2013-04-10 06:30:28
Here is why Mark Zuckerberg wears the same thing every day
Have you noticed that Facebook CEO Mark Zuckerberg always wears the same thing every day when he appears in the public? A grey t-shirt which is now a symbol of Mark Zuckerberg. The reason why he wears the same thing every day is "I want to clear my life to make it that I have to make as few decisions as possible about anything except how to best serve this community" as what he said in an in-person public Q&A at the Facebook HQ in Menlo Park where he answered questions from people around th...
Facebook,Mark Zuckerberg, grey T-shirt 2015-03-01 01:01:16
Microsoft: Apple UI sucks, Metro UI is philosophy
Microsoft is a typical IT company of the last century - a huge strength, but turned a little less sensitive. Now, Microsoft is trying to change the tradition of no connection between home desktop and mobile system developers, the best indicator of this effort is their design.Microsoft products, especially software products, are now gradually using a simple, plain and neat appearance: Metro. But if you think the Metro is just on Windows 8, Windows Phone, the application market and Xbox Live,...
Windows 8 launch event data
Today on Microsoft Windows 8 launch event, Microsoft CEO Steve Ballmer and Windows manager Steven Sinofsky shared with us some data. Let's see what's happening to Windows. Since launch, Windows 7 system gains a total of 670 million upgrade and 400 million new PC installed with Windows 7.Microsoft's cloud storage service Skydrive, 200 million users share 11 billion photos and 550 million documents. new 2PB file uploaded monthly.(1PB = 1024TB)Windows 8 has been tested in 190 countries for 1.24 bil...
Windows 8,Microsoft data 2012-10-25 13:16:30
The video Twitter is coming
Last October, Vine was acquired by Twitter before it released. Now Twitter launched this app. Vine only supports 6 seconds video recording, when you tap on the screen, the video recording starts, when you finger leaves the screen, the video recording stops. It can contain a few frames in 6 seconds. You can share the video on Twitter and Facebook. Vine seems like a video version of Instagram because it allows user to record video and share it. It has the same features as Instagram such as L...
Twitter,Vine,Video Twitter 2013-01-25 05:10:29
You know what UTF-8 is when you see it?
When we are coding we may often see some encoding specifications in our source codes such as UTF-8,GB2312. Do you know what these encoding mean and why we need them? In this post, Julián Solórzano will introduce the most widely used encoding specification around the world accomodating all different character sets in the world. UTF-8 is a method for encoding Unicode characters using 8-bit sequences. Unicode is a standard for representing a great variety of characters from many ...
10 notorious computer virus
The history of computer virus is the same as computer history. With more and more powerful computers, virus also are smarter and harder to be detected and killed. They have big impact on data security and system usability. We introduce 10 notorious computer virus in the history. 1. Creeper In 1971, the Creeper virus, an experimental self-replicating program, is written by Bob Thomas at BBN Technologies. Creeper infected DEC PDP-10 computers running the TENEX operating sy...
Computer virus,History,Security 2013-07-16 21:09:22
How DNS lookup works
When accessing a website, a domain name would be needed normally. To get to the actual web server, the domain name must be mapped to an actual IP address and the IP address will be used to reach the web server. The process of finding the IP address from a domain name is called DNS lookup. How does DNS lookup work? There are tons of domain name and IP address around the world, there must be some well-designed architecture to support fast lookup. This post will explain how this works. DNS Se...
DNS,DNS LOOKUP 2022-09-09 23:11:03
OT Railway System Development: How to Use PLC to Implement Land Based Railway Track Fixed Block Sign
Figure-00: Railway fixed block signaling system over view diagram, version v1.3 (2024) Project Design Purpose: This project aims to use Programmable Logic Controllers (PLC) with train detection sensors and train control signals to develop an automated OT system for railway track fixed block signaling control. The system will include a digital equivalent simulation to explain the logic of the track fixed block Automatic Train Control (ATC) mechanism for demonstration and training purposes. In th...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>