SEARCH KEYWORD -- Ecommerce Web Development Company



  Google is returning back to China

It has been five years since Google announced its difficult decision to leave China in 2010. The well known reason was that Google didn't want to conform to China's censorship request on sensitive information. During these five years, many stories happened bbetween these two sides. Things may turn around now as there are a few indications where Google may return back to China at an appropriate time soon. The most convincing indication is that a customized Google play -- Google online shop may a...

   Google,China,Alphabet,Google play     2015-09-06 04:13:30

  Oracle CEO Mark Hurd : IBM PureSystem is far behind Oracle

Oracle CEO Mark Hurd had an interview with Chinese media in San Francisco on 19th April. Mark Hurd first introduced different levels of Oracle's overall strategy: 1) the product must achieve best among similar products; 2) system open, vertical integration to provide customers with maximum performance; 3) Industry specific solutions; 4) give users the right to choose and the integration of the cloud environment (private cloud, public cloud, mixed cloud). In addition, Mark Hurd share his own...

   Oracle,IBM,Pureystem,Hardware/Software     2012-04-19 07:17:24

  Microsoft unveils a new logo

When releasing Windows 8, many people thought that Microsoft would use the blue logo as company's logo. But we are "cheated", Microsoft unveils a new logo. Watch video below. Since unveiling its first logo in 1977, Microsoft has changed its logo a few times, they are  In 1977, its "Micro-Soft" Microsoft "blibbet" logo, filed August 26, 1982 at the USPTO and used until 1987. Microsoft "Pac-Man" logo, designed by Scott Baker and used from 1987 to 2012 with the 1994–2002 slogan"W...

   Microsoft,Logo,Windows 8     2012-08-23 20:04:03

  How Cybersecurity Preparedness Can Minimize Downtime During Cyber-Attacks

According to statistics, the average cost of a data breach reached $4.88 million in 2024, marking the highest recorded average to date. Moreover, 68 percent of data breaches in 2024 involved a human element. Cyber-attacks are no longer rare events—they’re an everyday risk for businesses. When a business isn’t prepared, even a minor attack can lead to costly downtime, disrupt operations, and harm its reputation. The good news is that businesses can reduce these impacts with pro...

   CYBER SECURITY ,CYBER ATTACK     2024-11-14 02:38:42

  Is ERP on Cards? - Here is a Comprehensive Buying Guide for the Solution

2015 is around the corners, knocking at the doors!!And it usually happens; with year coming to a closure; a lot of speculations are already under way for the next year!  As a matter of fact, with a constant technological progress, the business world has been set abuzz with numerous theories about the possible and path-breaking trends which might change the course of action. And customized ERP software solution has not been left out of these speculations. It is usually seen that implementati...

   erp, enterprise, erp software solution, erp system     2015-01-20 04:50:51

  Java 9 release is delayed again

The original Java 9 planned release date is March 2017. But latest source shows that Java 9 release will be delayed again to July 2017. It's four months later than the planned date. Oracle Chief Architect of Java Platform group Mark Reinhold proposes this new release date in a message sent on the OpenJDK mailing list.  Despite this progress, at this point it's clear that Jigsaw needs more time. We recently received critical feedback that motivated a redesign of the module ...

   JAVA,RELEASE DATE,JAVA 9,JAVA 9 DELAY     2016-09-26 12:22:53

  Embrace open source

In past few days, there are many tech news which are related to open source. For example, Microsoft enables Linux on its Windows Azure cloud, Facebook open sourced its C++ library Folly and Samsung joined Linux foundation. Now more and more big companies realize the power of open source and are willing to contribute to the open source community. It will benefit not only developers but also these big companies as well.By providing some open source libraries or projects, developer may reduce their...

   Open source,Microsoft,Samsung,Facebook,Linux     2012-06-06 05:37:59

  IoT System Cyber Attack Case Study 02: Python Deserialization Attack and Library Hijacking Attack

Project Design Purpose: The objective of this cyber attack case study is to develop a workshop that demonstrates how a red team attacker can permanently compromise a people detection radar IoT device. The attack path is achieved through a series of attacks, including traffic eavesdropping, data deserialization attacks, web shell attacks, remote command/code execution, and Python library hijacking attacks. This case study is intended for IoT and data security professional training, aiming to ill...

       2024-07-14 01:40:09

  Use of Erlang in WhatsApp

After many years, people are still discussing whether Erlang is a small language. People have all sorts of doubt about it, but with the appearance of WhatsApp, we may change our mind. What is WhatsApp, from its official website: WhatsApp Messenger is a cross-platform mobile messaging app which allows you to exchange messages without having to pay for SMS. The more funny thing is the main developer of WhatsApp Rick Reed worked in Yahoo and SGI before he joined WhatsApp and he didn't have any know...

   Erlang,WhatsApp,Architecture     2013-06-16 03:03:46

  How Chinese tech websites survive

As a tech site which aims to share knowledge and experience, content is its core value. To attract readers, it needs to produce valuable content and keep the originality of the content. When an article is published on a site, it should be a copyrighted property of that site or the original author while others should be very careful when considering to copy that article to their own site. They should generally avoid to copying the whole content of the article. However, in reality, this is no...

   WEBSITE,COPYRIGHT,CHINESE     2017-08-08 21:54:32