SEARCH KEYWORD -- Information leak
Sales of phones with NFC capability increased by 300% in 2012
According to Sina Tech, Research firm Berg Insight latest report shows that the global NFC smartphone sales increased by 300% to 140 million units in 2012.The report said that the compound annual growth rate of NFC smartphones sales will reach 48.2% in next few years, and in 2017 the number of smartphones sold will reach 1 billion units.NFC is widely used in mobile phones began in 2011, In 2012, the top ten mobile phone manufacturers launched nearly 100 models of NFC mobile phones. In addition t...
Understand diff in Unix
diff is an important tool program in Unix. It is used to compare differences of two files, it is the foundation for code version control. If you type : $ diff <file_before_change> <file_after_change> diff will tell you what's the difference between these two files. The result may not be so easy to understand, so now I will show you how to understand diff. 1. 3 formats of diff diff has 3 formats due to historic reasons. normal diff context diff unified diff 2. Demo files For easy d...
diff,Unix,version control,git 2012-09-03 10:49:36
JShell -- The command line tool to run Java code in Java 9
Java 9 is currently a work-in-progress and is planned to be GAed in March 2017. Quite a few new features will be introduced in the new release. The coolest feature is project Jigsaw which is to modularize the Java packages so that a customized JDK can be built and shipped with only the necessary modules to fulfill their project requirement. Apart from this feature, another big new feature is project Kulla -- JShell. In simple, JShell is a command line tool which can be used to run...
Huawei phone with HarmonyOS installed is becoming real
In past few days, there is a photo of a Huawei phone with HarmonyOS installed appearing on the web. This is an engineering testing phone circulating inside Huawei according to the source. This is the first time that a real phone with Huawei's own operating system HarmonyOS installed is being seen on the web. This indicates that it will not be that far for general public to be able to access the new Huawei self developed OS. From the photo, there are a few indications: This phone sample s...
A mini guide to HTTP referer
In HTTP header, there is a field named Referer which is to provide the referrer of the current accessed page. In this post, we will introduce the usage of HTTP referer field. On the web, when a user visits a webpage, s/he must be from some place. This place is usually referred a s referer. This information is very important to some website operators and server owners as they want to know where they get the traffic from and this helps them provide better service for potential targeted users. In t...
HTML,HTTP REFERER,REFERRERPOLICY 2019-06-29 02:23:25
Which Type of IT Career is Best For You?
Considering the growth of the information technology job market, a career in IT is an incredibly smart career move. A career in IT can mean many things – you can become a network administration, website developer, database specialist, programmer or engineer. The job range is vast and can suit various personalities and levels of technical skill. Having a good insight into those job profiles is key to make the right decision about your career path. Here's a selection of some of the mos...
What is the Best Laptop for an Engineering Student?
There are a wide range of engineering degrees out there, reflecting the variety of specialties that an engineer can pursue in their professional lives. Engineering is definitely a solid career choice, and there is a specialty to appeal to anybody. You will, of course, need to learn to love math, as that will be at the heart of any engineering degree. But, no matter what type of engineering degree you are studying for, you will need a laptop to do your work on. In fact, depending on the engineeri...
HeartBleed: Inside the heart, what happens to a normal WEB user?
To be brief, our email, IM, facebook etc. are at the risk, so try to minimize the access in these few days. Especially we should try to avoid log into our internet-banking, because we may expose our user id and password. Also later when the service providers fix the bug, we would better to change a new password for all the web accounts that are important to us. Here comes the technical explanation. You might notice before that a lot of websites use URL starting with "https". For example, https:/...
HeartBleed,Analysis 2014-04-09 22:41:43
What was the Internet like in 1995?
The Internet evolves very fast since its birth. In 1995, a TV program called Computer Chronicles made an episode about new technology "The Internet". Now let's check out what the Internet looks like in 1995 through some video screenshots. First the host Stewart Cheifet appeared in the video where he was in a network cafe. There you can meet the real people and virtual person. That's a good thing. The first guide of us is the technology journalist from New York Times John Markoff. He said his f...
Internet,History,1995,Computer Chronicles 2013-04-10 06:30:28
Those interaction methods we can play with
Smartphones have become one important part of our lives, the phone apps also play more and more important roles. They can help us live through the boring time or help us connect to our close friends fat away from us or help us get information,etc. There are also some interesting interaction methods since the birth of smartphones. We can play with them while we interact with the smartphones. Here we summarize some of them. 1. Shake Since WeChat introduces the Shake method to find people which yo...
Interaction,Mobile device,Google glass 2013-05-07 05:21:15
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>