SEARCH KEYWORD -- SOURCE CODE
How does computer boot up?
The whole boot process of computer can be summarized in 4 phases. 1. BIOS In the 70's read-only memory(ROM) was invented. The boot program is written into ROM, the first thing the computer does is to read and execute this program when it's powered on. The program in this chip is called "Basic Input/Output System" (BIOS). 1.1 Power-On Self-Test The BIOS will first check whether the computer hardware can fulfill the basic conditions for booting up, this process is called Power-On Self-Test...
Say good bye to netbook
Asus and Acer are the last two manufacturers of netbooks, but these two companies announced that they would not manufacture netbooks starting from January 1, 2013. Prior to them, Samsung, Hewlett-Packard and Dell stopped production of the netbooks. This means that the life cycle of netbook officially ended.Back to 2009, the U.S. market research firm ABI Research was very optimistic about netbook's future, they said netbook would open a new era for PC market and predicted netbook shipments would ...
Netbook,Tablet PC, Comparison 2013-01-02 11:53:33
Why to Build Modern Web Apps with ASP.NET?
ASP.NET offers multiple options for fabricating cloud-based web applications. Its features such as the ability to cope up with different platforms including Mac, Linux, and Windows along with its open source nature indicate its efficiency. The various architectural modifications in the core framework have made the system more affable, and modular components make the job easier by simplifying the various implications. Microsoft has worked on the roots of this software to render a sophistica...
WEB DEVELOPMENT,ASP.NET DEVELOPMENT, WEB APPLICATION DEVELOPMENT,.NET DEVELOPMENT 2016-01-25 03:43:26
Pandora's killer--iTunes Radio
As expected, this year's WWDC may make many people happy, but also doomed to make many start-up companies sleepless. iTunes Radio is such a product creates insomnia. In WWDC, iTunes Radio was released on schedule and it becomes Apple's new music service. iTunes Radio is a music stream service which can learn your taste, it can recommend your music based on what you heard and you're listening to. From the conference we can see this new service can access the entire iTunes catalog, i.e, there wil...
iTunes Radio,iRadio,Apple 2013-06-10 23:19:23
SIEM Big Data Visualization : Dashboard for Monitoring Scam Events in Critical Infrastructure
Project Design Purpose: In a Security Information and Event Management (SIEM) system, effective monitoring and visualization of scam events is crucial to detecting and responding to cyberattacks. Cybercriminals often use deceptive methods to exploit individuals or organizations, aiming to steal sensitive information, financial assets, or disrupt operations. This project seeks to develop a web plugin dashboard to help cybersecurity researchers and managers better understand the scope and impact ...
jQuery to check whether checkbox is checked
In Vanilla JavaScript, the correct way of checking whether a checkbox is checked is to get the property checked of the checkbox. Assuming there is an checkbox with id "checkbox1", below line will return true if the checkbox is checked while it will return false if the checkbox is unchecked: document.getElementById("checkbox1").checked In jQuery, there are a few ways to check this. The first one is to using the corresponding counterpart of the Vanilla JavaScript, it is to check the checked proper...
QScrollArea Scrollbar Display Solution
Qt framework is a popular C++ GUI framework developed by Nokia. And it is also cross platform compatible. Many developers are using Qt to develop C++ GUI programs. In Qt, some important components are deserved our close attention. Many developers faced the problem when they put some widgets in a QScrollArea widget and they want it to display scroll bars when the widgets inside the QScrollArea overflows. After many experiments, I propose a way which can show scroll bars as you expected. The...
C++,Qt,GUI,QScrollBar,ScrollBar,Not display,Solution 2012-03-03 07:48:36
10 notorious computer virus
The history of computer virus is the same as computer history. With more and more powerful computers, virus also are smarter and harder to be detected and killed. They have big impact on data security and system usability. We introduce 10 notorious computer virus in the history. 1. Creeper In 1971, the Creeper virus, an experimental self-replicating program, is written by Bob Thomas at BBN Technologies. Creeper infected DEC PDP-10 computers running the TENEX operating sy...
Computer virus,History,Security 2013-07-16 21:09:22
Cloud Computing’s most Basic Concepts-Service Models
With the containerization of Docker, Kubernetes, CNCF, and the development of open-source communities, related frameworks and technology is booming and iterating rapidly. Cloud Computing, been applied for many years, is pushing developers into the new technological era. Companies and developers who are not using or not planning to use Cloud-Native gradually feel tremendous pressure in keeping up with the technology trends. The first step is to understand the concepts of IaaS, PaaS, FaaS, SaaS, S...
Microsoft is attacking iPad again
Microsoft recently released a new advertisement on YouTube which attacked iPad. It aimed to show that iPad had a poorer performance in the classroom than Windows Tablet.Steve Jobs once said that iPad could liberate student's shoulder, students no longer need to carry their heavy school bags to the class. But from Microsoft's perspective, although iPad is lighter than student's school bag, the problem is that its performance in the classroom is not so satisfying. In Microsoft's advertisement, af...
Windows 8,iPad,Advertisement 2013-08-20 05:14:29
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>