Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- DIGITAL MARKETER



  What was the Internet like in 1995?

The Internet evolves very fast since its birth. In 1995, a TV program called Computer Chronicles made an episode about new technology "The Internet". Now let's check out what the Internet looks like in 1995 through some video screenshots. First the host Stewart Cheifet appeared in the video where he was in a network cafe. There you can meet the real people and virtual person. That's a good thing. The first guide of us is the technology journalist from New York Times John Markoff. He said his f...

   Internet,History,1995,Computer Chronicles     2013-04-10 06:30:28

  Microsoft: Apple UI sucks, Metro UI is philosophy

Microsoft is a typical IT company of the last century - a huge strength, but turned a little less sensitive. Now, Microsoft is trying to change the tradition of no connection between home desktop and mobile system developers, the best indicator of this effort is their design.Microsoft products, especially software products, are now gradually using a simple, plain and neat appearance: Metro. But if you think the Metro is just on Windows 8, Windows Phone, the application market and Xbox Live,...

   Windows, Metro UI,Apple     2012-04-13 07:12:21

  What did iPhone bring to us in the past 5 years?

It is five years now since the first iPhone was released on 29th June 2007. In these 5 years, iPhone is the biggest variable in technology industry on this planet. It brings revolutionary change to many industries including the mobile phone, communication and Internet. It brings us into the era of mobile web. BuzzFeed collected a series of pictures to summarize the changes brought to us by iPhone in these 5 years. Here are some of them.1. Apple is the most valuable company in the worldIn August ...

   Apple,Change,World,Flash,iPhone     2012-07-09 14:27:32

  10 notorious computer virus

The history of computer virus is the same as computer history. With more and more powerful computers, virus also are smarter and harder to be detected and killed. They have big impact on data security and system usability. We introduce 10 notorious computer virus in the history. 1. Creeper In 1971, the Creeper virus, an experimental self-replicating program, is written by Bob Thomas at BBN Technologies. Creeper infected DEC PDP-10 computers running the TENEX operating sy...

   Computer virus,History,Security     2013-07-16 21:09:22

  Microsoft is transforming XBox into a PC controlled by expressions

According to the Voice of China "News Coverage" report. When Apple products are changing  the world, the original computer giant Microsoft is also quietly looking for their new foothold in the field of electronics. This time the breakthrough is from its game console Xbox.Xbox was originally a single function console, there are signs that Microsoft may be planning for the Xbox into the computer with new functions. The selling point of this new product lies in its function of communic...

   Microsoft,XBox,New PC,China     2012-04-01 06:57:04

  Top 10 reasons to use a low-code platform

Generally, as the best coding platforms, low code includes low code app development, process development solutions and software development tools. IT users utilize low code solutions as a source of the required building blocks for the building of workflows and applications. The building blocks make it easier to assemble apps and workflows without requiring hand-coding. The growth of low-code platforms therefore levels business grounds by reducing the time spent in coding among other benefits.&nb...

   LOW CODE,PROGRAMMING     2021-02-18 19:43:49

  10 Technological Trends that are Affecting Life of Teachers

Technology has reached the level where people think that they do not need anybody to teach them new things. When you do not know about anything, you simply Google it and get the answer. All this is good but in actual it is affecting the life of our teachers. So, whatever conclusions these folks have who are arriving today will always influence everyone else who is working in childhood education through their high school. Let us see how they are affecting the life of the teachers:  &nbs...

       2014-12-01 01:38:04

  Business Opportunities for Entrepreneurs – Check them Out Here

We are in the digital era, and today, starting a business seems to be easier than ever before. With a smart device and a reliable internet connection, you are almost halfway to becoming a business owner. The main challenge, however, comes in identifying a good business opportunity to venture in, especially considering the high competition in nearly all sectors. Today, nearly everything is done online, and you can take advantage of this to sell your products or services. The best part about onlin...

   BUSINESS     2020-05-13 11:25:28

  ICO Checklist: How to Launch a Successful Initial Coin Offering

Amongst the many important things that took place in Blockchain industry in 2017, Initial Coin Offerings (ICO) may be considered as the most important of all. ICO helps business/idea owners to pre-sell access to their services or products and in a way to fund the development of those services or products. To help founders/ startups define an effective launch process and provide perspective on everything that they will need on their ICO journey, we have jotted down few points which will serve as...

   INITIAL COIN OFFERING,ICO CHECKLIST,INITIAL COIN OFFERINGS (ICO)     2018-05-28 07:32:53

  Different types of keystore in Java -- Overview

Keystore is a storage facility to store cryptographic keys and certificates. They are most frequently used in SSL communications to prove the identity of servers and clients. A keystore can be a file or a hardware device. Three are three kinds of entries can be stored in a keystore depending on the types of keystores. The three types of entries are: PrivateKey : This is a type of keys which are used in asymmetric cryptography. It is usually protected with password because of its sensitivity. It ...

   JAVA,KEYSTORE,OVERVIEW,JKS,PKCS12,JCEKS,PKCS11,DKS,BKS     2014-08-18 02:09:54