SEARCH KEYWORD -- Source map
2 million iPhone 5 sold in China in 3 days
Apple announces that since it was available in China from last Friday, iPhone 5 has been sold over 2 million units in 3 days. iPhone 5 was available for sale in China starting from 14th Dec, the price is 5288RMB and up, there are two cooperated vendors in China : China Telecom and China Unicom. They start sell iPhone 5 on their own sales channels, moreover Apple starts selling iPhone in their own Apple Store and official website. According to Tim Cook, because of the high demand of Apple product...
2013 Google Code Jam is around the corner
According to Google Code Jam, the registration time of Google Code Jam 2013 will start on 12th March, and the deadline for registration will be 14th April 00:00UTC. This year the champion will get $15,000. Besides the prize and title, the champion will be enrolled in the qualification round in 2014 directly. Since 2003, Google Code Jam attracted many professional and students to solve the hardest algorithm problems in the world. Last year, there were over 35000 programmers participated in this c...
Google,Code Jam 2013 2013-03-13 05:48:24
Qihoo 360 confirms the cooperation with Google
Affected by the news that Qihoo 360 would cooperate with Google, Qihoo 360 and Baidu are treated differently in capital market at the beginning of 2013. Analysts have high expectations on Qihoo 360 and increase its performance expectations for fiscal year 2013, while Baidu suffered price target downgrades.According to Sina technology news, Qihoo 360 confirmed this news to ZDNet, but they refused to disclose more details. According to Qihoo 360, there is some kind of cooperation existed between ...
10gen provides free training courses for MongoDB
MongoDB is an open source document oriented database, developed with C++, it is to solve some real problems existing among development communities. In October 2007, MongoDB development began at 10gen, in 2009, MongoDB was open sourced as a standalone product. 10gen provides technical support, training and consultancy service. According to 10gen education, 10gen will provide some training courses for MongoDB starting from 22 October, 2012. Now it's available for registration. There are two cours...
How to check whether a struct implements an interface in GoLang
Unlike other programming languages like Java, when implementing an interface in GoLang, there is no syntax like below to explicit tell the relationship: type I interface { } type A struct implements I { } When looking at the code or running the code in GoLang, it might lead to a case one doesn't know whether a struct implements interface before trying to use it as some interface. According to GoLang spec, as long as a struct implements all functions of an interface, it is considered as having i...
GOLANG,INTERFACE,IMPLEMENTATION,CHECK 2020-05-03 00:05:54
30 minutes to fix Java vulnerability
On September 25, Adam Gowdiak from the Polish security consulting firm Security Explorations submitted a Java security vulnerability to Oracle and provided a proof-of-concept. The vulnerability exists in Java 5 6,7, once the user accesses hosted malware site, an attacker can remotely control the infected machine.Gowdiak later got in touch again with Oracle and got the response that the fix has reached the final stage. He can expect the patch in four months later. He eventually unbearable Oracle'...
Java, Vulnerability,Fix 2012-10-29 11:53:43
Huawei is open to acquire Nokia
Last night Huawei unveiled a new flagship smartphone Ascend P6 in London. It may be the thinnest smartphone in the world and its potential competitor is Samsung Galaxy S4. Before the press event, an article from FT said that Huawei was open to buy Nokia. "We are considering these sorts of acquisitions,maybe the combination has some synerges but depends on the willingness of Nokia. We are open-minded." remarked by Huawei's Richard Yu. After this news, Nokia's share price surges 11% to $4.10 per ...
Never ever touch a programmer
This is a technical license plate block example. We don't know whether it is working or not, however, the idea is very good. When you drive through some of the junctions, the camera captures the license number and convert it into text with OCR, and then insert them into the database. Therefore, this license plate on the car becomes a SQL injection. This picture tells us -- never trust user input.Author : 陈皓 Source : http://coolshell.cn/articles/6639.html#more-6639...
Programmer,SQL injection 2012-04-21 01:19:48
Office will finally be on iOS and Android in 2013
It was confirmed that Office would land on iOS and Android platforms by Microsoft in October. Microsoft claims that Office will be on these two platforms in some way. Now many sources indicated that Office will be officially launched at the beginning of 2013. It is reported that the mobile version of Office will be free on Android and iOS, it allows users to view Office documents. Mobile version of Office also requires a Microsoft account just like SkyDrive and OneNote App. After login, users c...
Office,Android,iOS,Office 365 2012-11-07 11:57:50
iWatch is coming to us before 2014
There are a variety of rumors around Apple iWatch. But according to Bloomberg, Apple's smart watch is expected to be on sale at the end of this year.It is reported that iWatch might have phone and location tracking capabilities, it will also have a built-in pedometer and some health monitoring sensors. Previously Apple supplier and Gorilla Glass manufacturer Corning said that iWatch would be available only after at least 3 years. But recently Apple retained some iWatch related patents, it...
iWatch,Apple,Google Glass 2013-03-04 18:09:42
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>