SEARCH KEYWORD -- ECOMMERCE SOFTWARE SOLUTIONS



  UC browser won Readers' Choice Award

China's leading mobile Internet software technology and application service provider UC excellent, its flagship product, UC browser, following the 2011 recommended by the world's leading classified information site About.com named the Readers' Choice Award in best mobile browser category, is once again awarded by About.com as Reader's Choice Award in Best Android Browser category. UC browser comes out on top in the About.com selection in two consecutive years.About.com, a part of The New York T...

   UC,About.com,Readers' Choice Aeard,2012     2012-04-03 08:08:03

  Kodiak PHP can run PHP codes offline on iPad

In the eyes of the vast majority of application developers, iPad is the terminal equipment for running code, rather than the tool used to write code. However, there are some applications developers finding iPad's potential to develop a wide variety of programming applications with some applications, such as Diet Coda, Koder, Gusto and so on. The family of applications for writing applications has added a new member -  Kodiak PHP. This application runs on iPad, it can be used to develop PHP ...

   Kodiak PHP, rogramming,iPad     2012-09-24 11:54:08

  A list of different CAPTCHA designs

Here is a list of website CAPTCHA designs which demonstrate all kinds of weird verification methods. By looking at these designs, as a website designer, you should distinguish which design is accessible and which is not.Is this human readable?What characters are in the picture?One moreWe will be crazy if we see theseOMG,What's the answer?IQ Test?Are you a normal person?You know how blind people read?ASCII PictureAre you an adult?3D verification codereCaptchaIt increase a new feature recently. It...

   CAPTCHA,Website design     2012-07-19 11:51:06

  How Do You Find the Best Password Managers?

Looking for a smart way to protect your range of electronic devices? Most of us access tons of websites and it could be difficult to store our passwords. It is important to not reuse store passwords that are easily identifiable. Keeping your information secure is more important than ever. Data breaches can occur anytime and sometimes takes months to discover. Sometimes, maybe, they aren’t. Target is a data breach, for instance, took months to discover. Information was leaked online from ce...

       2017-05-11 06:33:55

  Why does LinkedIn migrate to NodeJS from Ruby?

Node.js, the server-side JavaScript-based software platform used to build scalable network applications, has been all the rage among many developers for the past couple of years. Node.js uses an event-driven, non-blocking I/O model that makes it lightweight and efficient, perfect for data-intensive real-time applications that run across distributed devices. Because of these advantages, there are many websites are migrating to Node.js.One of them is LinkedIn. LinkedIn was initially built on Ruby...

   LinkedIn,NodeJS,Ruby     2014-03-21 23:39:25

  Using public key authentication in SSH

SSH is a popular cryptographic network protocol for secure network service operation. It is frequently used in remote server login. For a system administrator or software developer, SSH is frequently used to access remote servers or development servers or testing servers etc.  To login with SSH, there are different authentication mechanisms : password, public key and interactive etc. If a remote server needs to be accessed frequently, password authentication may be too troublesome as p...

   LINUX,DEBUG,SSH,PUBLIC KEY     2016-09-10 05:55:46

  Tom Uglow from Google : 5 steps to innovation

Google has been known for its innovation In Google there is a "welfare": each employee can spare 20% of his/her time to do what he/she likes to do so that any idea has a chance to be turned into reality. Perhaps this freedom makes Google capable of introducing new products and new ideas continuously. Google China held a small discussion session in its office in Tsinghua Science Park recently, Google Creative Director Tom Uglow shared some experience and cases of Google in production and innovat...

   Innovation,Technology,Google     2012-10-10 20:00:47

  Everything you need to know about what happened at Apple’s Special Event 2019

Apple’s special event that was announced in mid-November is finally over. The company held a presentation event in New York City where it highlighted the best apps and games of 2019 with no new software or hardware announcements at all.   On the event, five different nominations were announced: Apple’s chosen favourite apps, top free apps, top paid apps, top free games, and top paid games for 2019. Usual keynotes from Apple The tech industry is pretty accustomed to Apple’s...

   APPLE,EVENTS     2019-12-04 05:50:15

  Recover deleted file in Linux EXT3 file system

Environment : CentOS 5.3 x86_64, /dev/sdb1 is the data segment /data0. EXT3 file system. Problem : /data0/tcsql/cankao/phpcws-1.5.0/httpcws.cpp is deleted mistakenly and httpcws.cpp is not backed up. It will take much time to rewrite this program again. So we must recover it back. debugfs is feasible in EXT2 file system, but in EXT3 file system, it's not very useful. There is one open source software called ext3grep which can help us recover deleted file in EXT3 file system. The recovery steps a...

   Linux,EXT3,File recovery     2013-08-16 07:06:45

  Screen recording in Windows 10

Have you ever wondered how to take screen recording easily on Windows? Normally you would think to download some software online and install it on your machine such as Camtasia. However, many of them are either non-free or uneasy to use. Fortunately, there is a built-in tool provided in Windows 10 which can be used to take simple screen recording plus audio recording. The tool is called the Game Bar which is primarily intended for gamers to take screenshots of their plays and achievements. Don't...

   WINDOWS 10,GAME BAR,SCREEN RECORDING     2018-03-06 11:42:07