SEARCH KEYWORD -- USER RESEARCH



  Google's acquisition of Quickoffice threatens Microsoft

Windows has over 90% market share in desktop operating systems, even though now other OS such as Mac OS and Linux are saying they are more user friendly, more stable and safer than Windows, Windows still has a weapon MS Office which can defeat all of them. However, with the development of mobile network and cloud computing, Windows is now challenged by different competitors on mobile and cloud areas.  Mobile and cloud are weak sides of Microsoft , but they are strength of Google.Google sudd...

   Google,QuickOffice,Microsoft,MS Office     2012-06-07 11:40:10

  How to check which Ohai plugin hangs in chef client run

Ohai plugins are very important components in chef client which aims to provide resource management automation on a server. The data discovered by Ohai plugins are describing the current state of the server and they will be used to maintain the server in a desired state. Each Ohai plugin discovers a specific pierce of information about the server such as cpu, memory, middleware etc. However, there are rare occasions(well I am a bit optimistic here) someone may find that the chef client...

   HOW TO,CHEF-CLIENT,OHAI,UPTIME,HANG     2017-12-24 22:09:59

  Mobile devices are facing new threats

More and more companies allow employees to use smartphones and tablet PCs in workplace, but they are facing a new potential threat - malware embedded in games and applications.Dan Hoffman, network security company Juniper Networks mobile security director, said the application store is quickly becoming the main delivery mechanism of infected applications. Consumers purchase applications for their equipments through an online application store.As the consumers are free to download applicatio...

   Mobile device,Data security,Malicious software     2012-04-05 13:00:57

  Something you may not know about Shell

Shell is also called command line interface, it is the interface between *nix users and computer. Shell is a program which provides service to access OS kernel services. This article is to introduce some not so well known but useful and interesting knowledge about shell. Wiki shell was born almost at the same time as Unix. The first UNIX shell was written by Ken Thompson in 1971 and its name is Thompson sh. It's older than Linux kernel. The default Shell in most *nix and MacOS is bash, bash was...

   Linux, Unix,Shell,Command     2012-11-24 07:19:47

  Video website in big data era

Big data initially means the large data set which is not able to be analyzed, but later it was derivatized to the method to analyze huge amounts of data in  order to gain great value.This is a form which gradually gets attention, It's difficult to analyze these data and it's also difficult to store these data and it needs some unprecedented way, Now in China many companies use the open source Hadoop distributed data cluster to meet the needs of data statistics. Since we can get segmented d...

   Netflix,Big data,Data mining     2013-04-11 04:20:40

  10 major updates of Windows 8.1

Last night, the 2013 Microsoft Build Developer Conference started in San Francisco. The highlight of the first day is Microsoft CEO Steve Ballmer announced the release of Windows 8.1 Preview . The final version will be released in November and he also mentioned that there would be over 300 updates on the new OS. Now let's summarize 10 major updates of the new OS. 1. Classical desktop mode After getting a lot of feedback from users, Microsoft adds a new setting. Users can choose to start in clas...

   Windows 8.1,Build     2013-06-27 05:45:02

  Why doesn't Google copy successful startup ideas?

Google is definitely one of the largest players in Internet world. It owns the most popular search engine, mobile operating system and mapping service. It not only has huge user base but also is extremely rich. It can copy and create any product that is proven to be successful with its talent pool and money. But why doesn't Google copy those successful startup ideas? Based on the current status quo and culture gene of Google, there are several reasons Google doesn't copy startup ideas. First, Go...

   Google,Startup,Copy     2013-09-11 07:03:02

  How does computer boot up?

The whole boot process of computer can be summarized in 4 phases. 1. BIOS In the 70's  read-only memory(ROM) was invented. The boot program is written into ROM, the first thing the computer does is to read and execute this program when it's powered on. The program in this chip is called "Basic Input/Output System" (BIOS). 1.1 Power-On Self-Test The BIOS will first check whether the computer hardware can fulfill the basic conditions for booting up, this process is called Power-On Self-Test...

   Computer, boot, partition     2013-02-23 23:19:47

  Data Scientists and Their Harder Skills than Big Data

The field of data science is often confused with that of big data. Data science is an aid to decision makers in a company with a logical approach.  Who is a Data Scientist?  A Data Scientist reviews a huge collection of data(that may extend to a couple of terabytes of disk space or thousands of excel sheets). This humongous chunk of data is not feasible for being handled, sorted and analyzed by a single person. Here we require the help of data science, and most recently, the field of A...

   BIG DATA     2017-12-13 04:22:55

  Some hidden XSS injection vulnerabilities

XSS injection refers to a Web page generates some unexpected executable js codes based on user input  and these executable codes are executed by web browser,i.e, the source code sent to web browser by the server contains some illegal js codes, and these illegal js codes are related to user's input. Common XSS injection vulnerabilities can be fixed with some functions such as htmlspecialchars(escaping HTML special characters) and strip_tags() or similar, but there are some hidden XSS injecti...

   XSS,PHP,Security,Code,JavaScript     2012-08-27 20:32:08