Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Low cost



  Let 's write some front end codes

I've seen a lot of arguments that there is no much technical value writing web portal, I think that the vast majority of good programmers will try many different things. The low level development and machine learning are not the only technologies which are  full of wisdom and challenges, I wrote web site for a few years, it is difficult to say that this is my initial interest, although I touched on other technologies as well, I still feel building website is challenging. Front end developme...

   Front end development, JavaScript,CSS     2013-01-22 04:00:24

  Today in history : Steve Wozniak invented Apple I in 1975

The original Apple Computer, also known retroactively as the Apple I, or Apple-1, is a personal computer invented by Steve Wozniak ion 29th June, 1975. Wozniak's friend Steve Jobs had the idea of selling the computer. Features:CPU : MCStek 6502CPU Speed : 1MHzBus Speed : 1MHzMemory : 8KbResolution : 60.05 Hz, 40*24 charactersPower : 58WPrice : $666.66The Apple I went on sale in July 1976 at a price of US$666.66, because Wozniak "liked repeating digits" and because they originally sold it to a lo...

   Apple I,History,Steve Wozniak     2012-06-29 06:00:08

  Upcoming Product from Nokia: Nokia 2

With the emergence of telephone, the field of communication has seen a revolution. It was the time when people were able to talk to each other on the phone directly, and the reliance on letters was just reduced. Later entered the cell phones where the users were able to communicate with a phone call or even with SMS. The cell phones made it easy for the users to talk to each other even if they are moving from one place to another. To add value to the cell phones then entered the smartphones to t...

   SMARTPHONE,NOKIA 2     2017-11-06 23:29:02

  A completely new approach to surveillance - should you be worried?

Paranoia is not necessarily a bad thing - assuming someone is really out there to get you. True or not, the paranoid have had issues they need to control explode as the internet developed, they also got specific tools to make their secrets (or their life, not everybody has a dark secret) more secure and under control. Unfortunately to them, and to the amazement of science and science fiction fans worldwide, a new way of obtaining secrets has appeared and it’s something very few expected. ...

   security     2014-08-11 05:41:58

  Is Shared Hosting Secure?

Shared hosting is incredibly popular with users who are looking for the cheapest hosting available – the problem is that along with the low price you get poor performance and even more concerning – questionable security. When running on a shared host dozens if not hundreds of other sites are running on the same servers – this means any single security flaw in any of those applications can compromise the entire server. This  dramatically increases the odds of your ...

   Shared hosting,Virtual host,Security,Data security     2012-02-14 10:48:59

  Tips for Putting a Price on Your Work

WHEN I first started as a freelance writer, I was eager to sell myself — but not eager to have to discuss money. So I more or less took whatever was offered. Then I read somewhere that no matter what price a new client states, you always say in a polite but firm tone, “I expected more.” The first time I tried it, I was sweating and I doubt my tone was firm — it probably sounded more like pleading — but to my great surprise, it worked. With th...

   Development,Price,Worl,Negotiation     2012-01-29 04:37:17

  Will Google+ be a "Ghost City"

Just now, I read an article about Google+’s status quo. The key point of this article is that it states that Google+ is now a “Ghost City”. According to the article, users of Google+ spend only 3 minutes per month on Google+, this is a very low participation rate for a social network website. After reading this, I wonder whether Google+ is really a Ghost City now, I cannot give my answer. Since it was released just around 8 months ago, so the user base is not very large. ...

   Google+,Social fayigue,User base,Ghost City     2012-02-28 09:44:39

  Is 99.8% Secure Secure?

A group of researchers (Arjen Lenstra and collaborators  from EPFL Lausanne and James Hughes from Palo Alto) published a study, Ron was wrong Whit is right, of new vulnerabilities of cryptosystems. The New York Times picked up the story. Although Lenstra et al discuss several cryptosystems, their results are particularly relevant to those based on RSA. The title mirrors their conviction that cryptosystems based on a single random element have fewe...

   Security,Percentage,Security index     2012-02-27 04:48:06

  Identify & Address 3 Common BYOD Adoption Problems

With an abundance of mobile phones, tablets, and other personal devices; delivering Enterprise Mobility Solutions has become much more easier as compared to early years, however; the new avenues that have opened up for Enterprise Mobility Consulting in India brings in new, interesting and unforeseen challenges as well. Alongside the growing presence of SaaS applications and BYOD; data protection and integrity has become very critical and a concern that demands immediate attention. Here are some ...

   enterprise mobility solutions, enterprise mobility consulting, enterprise mobility management servic     2015-03-16 06:05:21

  "Simplicity" is not a simple concept

I've come to avoid using the word "Simplicity" or its variants ("Simple," &c.) It means too many different things to different people.For example, my original land-line phone was simple:It's simple by eliminating extraneous use cases. It only handles one user scenario, the one that was the most common when it was invented. If we think of the number of affordances and the number of uses, this kind of simplicity lowers the number of affordances by lowering the number of uses. I call this kind ...

   Simplicity,Software,Usability,iPhone,Phone     2011-11-24 09:21:09