SEARCH KEYWORD -- GOOGLE ALGORITHM
Google's acquisition of Quickoffice threatens Microsoft
Windows has over 90% market share in desktop operating systems, even though now other OS such as Mac OS and Linux are saying they are more user friendly, more stable and safer than Windows, Windows still has a weapon MS Office which can defeat all of them. However, with the development of mobile network and cloud computing, Windows is now challenged by different competitors on mobile and cloud areas. Mobile and cloud are weak sides of Microsoft , but they are strength of Google.Google sudd...
Google,QuickOffice,Microsoft,MS Office 2012-06-07 11:40:10
Google will launch new rendering engine Blink
Google announced new rendering engine Blink derived from the open source WebKit on Chromium project's official blog. This is to speed up the innovation and development process. It will take some time for Chrome to switch from Webkit to Blink.Opera has just switched to WebKit, what will they think about Google's move? Opera's Bruce Lawson said in a blog that Opera browser would use Blink engine and contribute to Blink community.For Google, a powerful rendering engine means that Chrome OS ca...
Google,Blink,,Webkit,Render engine 2013-04-04 04:11:23
What has Google done on improving programming languages
Google is now becoming the most innovative IT company in the world. Every now and then they would deliver one revolutionary product to us such as Google Glass, Google Fiber, Automatic Mobile Cars etc. All these great products are backed up by the powerful software system built into. Google has used many programming languages to develop these software and they have put much resource in improving the programming languages they use and we use today. What has Google done in improving programming lan...
Google,Programming 2014-02-21 09:36:34
Different types of keystore in Java -- Windows-MY
Windows-MY is a type of keystore on Windows which is managed by the Windows operating system. It stores the user keys and certificates which can be used to perform cryptographic operations such as signature verification, data encryption etc. Since it's a kind of native keystore, Java doesn't have a general API to access it. To help Java applications access the keys and certificates stored in Windows-MY keystore, Java provides a separate API -- SunMSCAPI. The SunMSCAPI provider is ...
JAVA,KEYSTORE,WINDOWS-MY,SUNMSCAPI 2016-01-09 05:45:59
Maybe we need //Comment comment
Do we need comment in our programs? Depends, if we can write a program which can clearly tell s the reader what the program does, then we had better to avoid unnecessary comments. However, if the program we develop is complex enough and it involves some uncommon logic which needs more explanation, then we have to add comment and make sure the comment we add can correctly tell the readers what we do. The worst scenarios is not you forget or you don't want to add comment, it's that you add comment...
comment,programming 2014-07-23 04:38:04
Good bye, IE8, Google Apps leaves you
Google Apps team annouced not supporting IE 8 and lower version of IE, this will affect every Google App user including commercial, education and government. The time for leaving IE 8 is 15 November, at that time, IE 10 will be released for a few weeks. Google Apps team explained here: As we announced last year, we support the latest version of Google Chrome (which automatically updates whenever it detects that a new version of the browser is available) as well as the current and prior major re...
IE8, Google apps 2012-09-17 11:33:00
The history of the name Google
Google now is known almost by everyone who has internet access. It's the most frequently accessed search engine around the world and it provides fast speed and high quality search results. While you are using Google, have you ever wondered how the name Google comes? According to Steven Levy, the author of the book In The Plex: How Google Thinks, Works, and Shapes Our Lives. The original name for the project was named BackRub and was coded by Sergey Brin. He was thinking that web pages made thei...
GOOGLE,HISTORY,GOOGLE NAME,GOOGOL 2016-12-03 20:58:06
Google open sources Leak Finder for JavaScript
Google recently open sourced a tools for finding memory leaks in JavaScript programs. In JavaScript you cannot have "memory leaks" in the traditional sense, but you can have objects which are unintentionally kept alive and which in turn keep alive other objects, e.g., large parts of DOM. Leak Finder for JavaScript works against the Developer tools remote inspecting protocol of Chrome, retrieves heap snapshots, and detects objects which are "memory leaks" according to a given leak definition. The...
Google,Open source,JavaScript 2012-08-15 13:45:34
Learn these technical skills within one day
It takes days and days reading books, practicing and involving in real project if you want to learn a programming language well. It's just like a marathon, you will get more if you can insist longer. During this long and boring period, there are always something you can learn within a short period of time, like within one day. These skills can bring your big satisfaction. Below are a list of technical skills which you can pick up within one single day, they are advocated by Jacob Jensen, a Googl...
Technical skill 2014-06-12 09:33:15
Will Google+ be a "Ghost City"
Just now, I read an article about Google+’s status quo. The key point of this article is that it states that Google+ is now a “Ghost Cityâ€. According to the article, users of Google+ spend only 3 minutes per month on Google+, this is a very low participation rate for a social network website. After reading this, I wonder whether Google+ is really a Ghost City now, I cannot give my answer. Since it was released just around 8 months ago, so the user base is not very large. ...
Google+,Social fayigue,User base,Ghost City 2012-02-28 09:44:39
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>