SEARCH KEYWORD -- DIGITAL WORLD
What is encryption? Its role in the modern age
“Messages and calls are end-to-end encrypted.” If you are a WhatsApp user, you must have read this statement at the top of chats you open. Now, what does it mean? The statement signifies that all the messages or voice notes shared between users are encrypted, and no one can read or listen in on them. As mostly all of us use messaging apps and emails, information security has become a major concern. Moreover, we don’t know how many digital footprints we leave on the web can be t...
DATA SECURITY,VPN 2021-01-21 08:04:16
5 Things You Can Do to Protect Your Data
The average cost of a data breach is $148 per record. Records include everything from personal addresses to birthdates to even more sensitive data, like Social Security Numbers and business files. Each year, these hacks cumulatively cost billions of dollars to companies and individual users. Nonetheless, like many other criminals, hackers tend to prey on easy targets. By following these essential steps, you’ll be able to ensure your data is always kept safe. 1) Use a File Encryption Servic...
DATA SECURITY 2019-08-20 08:35:54
What can we do about Facebook?
Around 4 years ago, we have posted an article Is Facebook becoming Tencent like? to analyze the strategy Facebook adopted to build its technology empire at that time. Today, we would continue this discussion since the story seems not end there. Facebook is still on the way of copying others. The latest victim being copied is Snapchat where lots of its new features have been copied by Instagram -- an app owned by Facebook. This has helped Instagram acquired lots of active users, especi...
World of Father of Ruby
"I am Yukihiro Matsumoto, I believe keyboard can change the world" is a video about Father of Ruby -- Yukihiro Matsumoto. This video introduces us a father, a husband rather than a programmer. Yukihiro Matsumoto shared his understanding about programming in this video. Computer is not quite smart, it cannot understand human languages, so if we want computers to complete jobs we assign to them, then we need something both human beings and computers can understand. That's why we have program...
Yukihiro Matsumoto 2013-08-30 22:45:26
10 Easy Things to Do to Enhance Your Online Security Today
If you think you don’t need to take extra steps to increase your cyber security, you are wrong. Statistics on cybercrime are shocking and clearly prove that you can’t have ‘too much security’ while using the Internet today. For example, did you know that by 2023 cybercriminals will have stolen over 33 billion private records or that 15 million Americans became victims of digital identity theft in 2017 (Norton)? That’s not even mentioning millions of monetary losses ...
DATA SECURITY,SECUIRITY 2019-01-21 07:01:37
Difference between Beijing and Silicon Valley on innovation
The fundamental difference between Beijing and Silicon Valley is not the sky color, but the fact that on one side the young people are talking about buying a new house, a new car and getting married, while on the other side young people are talking about how to change the world. Now and then we can read from the newspaper or the Internet that a Silicon Valley company is valued over 1 billion US dollars. Also we can see many famous US IT brands on the Internet such as Google, Facebook,Twitter, Am...
China,Silicon Valley,Innovation, Comparison 2013-06-24 03:09:54
Facebook's new milestone : 1 billion active users per month
Social network giant Facebook's monthly active users reach a new milestone -- 1 billion, this means 1 out serven people on earth is using it. Facebook CEO Mark Zuckerberg announced this news in an open letter. He wrote : This morning, there are more than one billion people using Facebook actively each month.If you're reading this: thank you for giving me and my little team the honor of serving you.Helping a billion people connect is amazing, humbling and by far the thing I am most proud of in m...
Facebook, Active user,Milestone 2012-10-05 05:02:32
Chrome is dominating the browser world
Microsoft has announced recently that their Edge browser will abandon its own kernel and switch to use Google Chromium. This by no means indicates that Microsoft admitted it lost the war against Google on browser. For Microsoft, making such a decision is certainly not easy, but it is absolutely a wise decision. After all, the market share of both parties are not at the same competing level anymore. According to NetMarketShare's statistics, Chrome's market share in desktop world has reached 67.29...
Vine video sharing drops significantly
According to Sina Tech, social media analytics site Topsy data shows that Vine's short video sharing has dropped significantly since Facebook's photo sharing service Instagram launched the video sharing feature.Instagram co-founder Kevin Systrom announced on Thursday that Instagram supported short video sharing. Vine was once called the Instagram in video sharing world, but now, Instagram has launched its own 15-second short video sharing feature for its 130 million users.Vine, was acquired by T...
10 modern technologies we will still use in 2030
Although there is rapid revolution for new technology, some technologies can survive with the passage of time. Here are 10 modern technologies which may continue to exist in 2030. 1. QWERTY keyboard Speech recognition, handwriting recognition and gesture control input will become the trend for the next two decades. Nonetheless QWERTY keyboard input is still one of the most accurate way - although not necessarily the most convenient. Although physical keyboard disappear on phones and tablet PCs, ...
New technology,Trend 2012-11-12 11:02:02
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>