SEARCH KEYWORD -- SLOW
What do people think about IE?
Browser war among major browsers is continuing for a long time since last century. Just a few years ago, Internet Explorer was the most used web browser. But now the situation is completely different, people are making fun of Internet Explorer and switching to other browsers. Today we share some jokes about Internet Explorer, it's just for fun, so grab a cup of coffee and sit down and enjoy. Hmm, is IE so slow? What gun is it? Hmm, I am still one step behind And I am lost. Hey, what is HTML...
Use progressive JPEG to improve user experience
JPEG image files can have two different save types : Baseline JPEG and Progressive JPEG. Both of them have the same extension name but with different display effect. Baseline JPEG This type of JPEG files are scanned from top to bottom consecutively, each line of the image data will be saved sequentially. When opening this kind of images, data will be displayed with the save order line by line until all the data are read. If the image size is very large or network speed is very slow, the image wi...
USER EXPERIENCE,PROGRESSIVE JPEG,BASELINE JPEG 2013-07-25 08:11:50
Mark Zuckerberg : Facebook's biggest mistake is relying too much on HTML5
On Disrupt conference organized by TechCrunch, Facebook founder and CEO Mark Zuckerberg said they relied too heavily on HTML5 and ignored the advantages of the Native-App when talking about Facebook mobile product design strategy.Zuckerberg said the focus in HTML5 was his biggest mistake. This is the first time the young CEO admits he is wrong on HTML5 and native applications publicly. Zuckerberg later mentioned after transferring the Facebook client from HTML to Native applications, users coms...
Facebook,HTML5,Native app 2012-09-11 19:18:39
A completely new approach to surveillance - should you be worried?
Paranoia is not necessarily a bad thing - assuming someone is really out there to get you. True or not, the paranoid have had issues they need to control explode as the internet developed, they also got specific tools to make their secrets (or their life, not everybody has a dark secret) more secure and under control. Unfortunately to them, and to the amazement of science and science fiction fans worldwide, a new way of obtaining secrets has appeared and it’s something very few expected. ...
security 2014-08-11 05:41:58
Why MySQL 8 drops support of query cache
Many of you may have heard or used MySQL's query cache, because it used to be a popular way to improve MySQL's performance. As an important feature for improving MySQL's performance, the query cache was often recommended as a solution for slow queries. However, why has MySQL 8 abandoned the query cache? Today, we will analyze and explore this decision. What is query cache? According to official document: The query cache stores the text of a SELECT statement together with the correspon...
MYSQL 8,QUERY CACHE 2023-03-11 09:05:17
Tencent CEO : Mobile social gaming will be the profit breakthrough point of WeChat
Tencent CEO Ma Huateng said mobile social gaming would be one of the biggest light spot and also the profit profit breakthrough point of WeChat.Mr. Ma thinks that the principle of public accounts of WeChat is very simple, In the early period of QQ, users could also send messages and feedback, the reason why WeChat is so charming is because the phone has audio and video capabilities, this is very different from the text on the PC. Public account service providers can send voice passages to users ...
App's user value doesn't necessarily bring business value
There is an old saying in Internet world, you can get business value as long as you can achieve user value. Is this statement outdated in mobile Internet era? This statement originated from PC Internet era, but now the time users spend on PC drops and user behavior tends to be stable and conservative. In contrast, people are more willing to stay on mobile devices. The difference between PC and mobile is that users are freely to move around on PC end. People can navigate from one link to another ...
App,Business value,User value 2013-06-25 10:52:12
How Kafka achieves high throughput low latency
Kafka is a message streaming system with high throughput and low latency. It is widely adopted in lots of big companies. A well configured Kafka cluster can achieve super high throughput with millions of concurrent writes. How Kafka can achieve this? This post will try to explain some technologies used by Kafka. Page cache + Disk sequential write Every time when Kafka receives a record, it will write it to disk file eventually. But if it writes to disk every time it receives a record, it would ...
How to optimize MySQL insert statement
For a big data system, one problem is the data access efficiency, one more problem is that the data insertion is very slow. We had a service system, the data loading process would take 4-5 hours. This time consuming operation is risky since if the program is interrupted during the loading process, it might be rerun, this will be troublesome. So it's necessary to improve the insertion efficiency for big data systems. Here we provide two optimization suggestions. 1. Combine multiple insert stateme...
MySQL,insert,optimization 2012-10-24 22:03:13
Big Corporate Layoffs Hit Shenzhen IT Manufacturing Business
At 11:00 on March 29, 3 employees were ready to jump from Shenzhen Foxconn's longhua building G14. According to witnesses, those 3 employees were negotiating with company regarding the “Foxconn diversion plan”. Liu Kun, Foxconn public speaker, told reporters that many employees are working negatively to resist this plan, but Foxconn does not agree or support their actions in this way. " Company like Foxconn with large-scale labor-intensive manufacturing enterprises in Shenzhen, is f...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>