SEARCH KEYWORD -- POPULAR COLOR



  Enterprise Mobility Solution From A DreamFactory of Software to Accelerate Customer Experience

Today the conventional model that suppliers follow i.e. the make, sell and ship process is no longer enough to keep your customers happy and satisfied. The landscapes have evolved such that, manufacturers not only have to continue making the best quality products but also be in complete sync with the new age  customer requirements, encourage customer involvement and henceforth achieve the best products. This can be achieved by using the emerging mobile technology to deliver improved custom...

   enterprise mobility, enterprise management, enterprise mobility management     2014-12-10 00:36:56

  What is Deep Web- all you need to know about it?

Deep web is the most nefarious out of sight underground area that exists and not accessible to the public domain. The deep web sites cannot be accessed through standard search engines. Many experts believe to have compared this part of the internet hidden from paywalls and forms. The truth is that deep web is a hidden iceberg while the usual internet available to the public domain is just the tip of the iceberg. That part of what is available from search engines such as Bing or Google ...

   DEEP WEB,DARK WEB     2018-07-05 08:26:58

  8 Essential Mobile Game App Development Tools

Who doesn’t love playing a game on their mobile? Temple run had caught the whole world’s attention to such an extent that right from children to elder people in the household were glued to this game. It is indeed interesting that mobile games can keep your kids occupied. In fact, they are the best stress busters available in the present times. Remember how you used to steal some hours just to play candy crush while on the break? This way you used to relieve yourself of the stress bun...

       2014-10-09 05:00:05

  Jackie the smart quadcopter to launch at Robotics Week

Flying security camera synced to smartphone kicks off Kickstarter campaign Entrepreneurs and robotics graduate students Jackie Wu and Ritwik Ummalaneni, in Northwestern University’s Master’s in Robotics program, are launching their new product, Jackie, during the National Robotics Week. The flying security camera quadcopter syncs straight to a smartphone, and is the next evolution in home security platforms that consumers have been waiting for. Jackie’s intuitive and easy co...

   Startup,Quadcopter,Security camera,Jackie Wu     2015-04-05 20:56:11

  jQuery 2.0 gives up IE 6/7/8

jQuery 2.0 is released after 10 months development. jQuery 2.0 is customized for modern web browsers and also considers about mobile devices. But one big change is that jQuery 2.0 will not be  compatible with old versions of IE and its size is 10% less than the version 1.9.1. The execution efficiency is higher as well. jQuery 1.9.x will still be maintained by jQuery team, they will also provide update for it. Those websites which want to be compatible with all browsers should not upgrade to...

   jQuery 2.0,IE support     2013-04-20 07:58:16

  10 modern technologies we will still use in 2030

Although there is rapid revolution for new technology, some technologies can survive with the passage of time. Here are 10 modern technologies which may continue to exist in 2030. 1. QWERTY keyboard Speech recognition, handwriting recognition and gesture control input will become the trend for the next two decades. Nonetheless QWERTY keyboard input is still one of the most accurate way - although not necessarily the most convenient. Although physical keyboard disappear on phones and tablet PCs, ...

   New technology,Trend     2012-11-12 11:02:02

  Use of log in programming

Usually, The purposes of log are for troubleshooting and displaying program running status. Good log will help us locate the error easier. Many programmers think log in programs is very simple, but it's not an easy task to write log codes to efficiently locate the error. Here we discuss about program log in three aspects: Where to log What to log Log styles to be avoided Where to log 1. When calling external functions When your program is calling some external functions which are not written b...

   Log, Programming,Debug     2012-11-28 11:42:23

  noConflict mechanism in jQuery

Many JavaScript frameworks like to use $ as function or variable name, jQuery is one of them. In jQuery, $ is just a reference to window.jQuery, so even if $ is deleted, window.jQuery will still be available to ensure the whole library can work normally. jQuery API design takes fully consideration of multiple frameworks conflicts, we can use jQuery.noConflict function to easily handle control. jQuery.noConflict accepts one optional boolean parameter[1] to determine whether to hand jQuery object ...

   jQuery,noConflict,$     2013-03-14 19:40:36

  Add ContextMenu to a customized View in Android

In Android, we may sometimes need to add ContextMenu to a View, it's not so easy to add ContextMenu to a customized View. Here we explain how to add ContextMenu to a customized View. First, we may need to create View.OnCreateContextMenuListener so that the customized view can register for it. Here is the class definition: public class GraphView extends View {     private View.OnCreateContextMenuListener vC = new View.OnCreateContextMenuListener() {       &...

   Android, ContextMenu,Customized view     2012-11-04 07:10:40

  How to Encrypt Your Online Conversations

Do you ever get the feeling that somebody might be listening to or reading your private conversations? You're not crazy.  Online platforms don’t hide that they use data from chats, searches, emails, and other places for targeted advertisements. Aside from being a massive invasion of privacy, it also puts your security at risk.  But it is possible to prevent people from snooping on you. All you need is a little encryption. Check out these different ways you can add encryption into...

   DATA SECURITY,VPN     2020-01-30 07:33:29