Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- MICROSOFT BAND 2



  Gmail supports 10 GB attachment after integrating with Google Drive

Google today announced Gmail allows users to send attachment up to 10GB after integrating with Google Drive, the attachment size can be 400 times larger than traditional mail attachment size.Google also added another feature recently, it will pop up a separate window when writing new email. The integration of Gmail with Google Drive will introduce one Google Drive button at the bottom of the popup window, as a solution for sending large attachment.At the same time, because the attachment will b...

   Google Drive, Gmail,SkyDrive,attachment     2012-11-28 11:12:56

  What does a Bing driven Siri mean to Google?

On Tuesday, Apple announced that Bing would become the default search engine of the upcoming iOS 7. This is another Google service kicked out by Apple after Youtube and Google Maps.For Siri: if the default system of Siri can not answer your question, it will try to search the Internet. Currently, Siri connects to the Safari browser by default, and Safari's primary search engine is Google (Can change to Yahoo or Bing). But in iOS 7, Siri's default search engine will be replaced by Bing. Siri will...

   Siri,Bing,Google     2013-06-12 00:20:34

  Windows 8 first impressions: It's a game changer

NEW YORK (CNNMoney) -- The PC needs saving. With Windows 8, Microsoft believes it has the magic cure.It just might. I've been testing a consumer preview version of Windows 8 for the past week, and it's unlike anything I've ever seen in a PC operating system.The stunning "Metro" interface just begs you to touch and interact with it. Beautifully designed apps, ultra-simple navigation, and instinctive commands make it hard to believe Metro came from the same company that brought us Windows Vista...

   Windows 8,Hands on,Game changer,Impression     2012-03-17 04:26:54

  CSS Box Shadow Illustration

Used in casting shadows off block-level elements (like divs)..shadow { -moz-box-shadow: 5px 5px 5px #ccc; -webkit-box-shadow: 5px 5px 5px #ccc; box-shadow: 5px 5px 5px #ccc; }The horizontal offset of the shadow, positive means the shadow will be on the right of the box, a negative offset will put the shadow on the left of the box.The vertical offset of the shadow, a negative one means the box-shadow will be above the box, a positive one means the shadow will be below the box.The blur r...

   CSS,Box Shadow,Apple,Chrome,Safari,IE,Il     2011-06-30 04:03:38

  Java code to retrieve Bing background image path

When Microsoft presented their search engine Bing, this new design gave us some surprise, especially its background images, they are very beautiful and it will change every day. But   unfortunately we cannot save the image onto our PC by right clicking the mouse.  After some research on its source code, I found a feasible but not so sophisticated way to achieve this, we can retrieve the image path from the source code and then use this path we can download the image. This is just to sh...

   Java,Bing,Background image path,URL,Download,Save     2012-05-02 10:51:51

  ARM adopts 64-bit architecture

ARM has disclosed technical details about its new v8 architecture - the first to include a 64-bit instruction set - at ARM TechCon 2011 in Santa Clara, California.The next-gen architecture will expand the reach of ARM processors in the consumer and enterprise markets where extended virtual addressing and 64-bit data processing are required.According to ARM CTO Mike Muller, ARMv8 architecture consists of two main execution states: AArch64 and AArch32. 

The AArch64 execution state int...

   ARM,Processor,64 bit,Architecture,v8,Nvidia     2011-10-28 10:31:52

  Why accessing Java HashMap may cause infinite loop in concurrent environment

HashMap in Java is frequently used to handle key/value pairs. But it is not a good candidate to be used in concurrent environment where ConcurrentHashMap should be used instead. If used in concurrent environment, it may cause lots of unexpected behavior even including make the program getting into an infinite loop situation. To understand how this can happen, let's first discuss how HaspMap works internally. In this post we will use implementation of HashMap before Java 8 as example, Java 8 prov...

   JAVA,HASHMAP,INFINITE LOOP     2020-03-29 01:47:00

  The Death of .NET and the Power of Perception

One of my long-standing issues with Microsoft is its inability to control the perceptions surrounding its own products. One of the biggest examples was during the Windows Vista years when, even after the product had been fully patched and worked fine, Apple continued to do a better job to define the image of Windows (compilation of ads here) than Microsoft did, costing Microsoft billions in lost revenue for the millions it saved on a strong advertising campaign. The firm has a history of being p...

   .NET,future,death,bottleneck,development     2011-08-10 03:13:40

  Let’s Find Out What the Future holds for .Net Technology

Technology is more like an evolution, not a revolution. The disruptive industry seems to be changing day in day out. Due to which tech companies by default have to chase new trends in order to stay ahead of the curve. Now, Microsoft.Net framework has been around since the 1990s! Do you think such refined technology can be considered relevant now? From what I can see, .Net is going through a major transformation. It’s gone largely open source and has been getting modernized so that its wor...

   ASP.NET ,.NET     2018-06-12 05:07:53

  10 notorious computer virus

The history of computer virus is the same as computer history. With more and more powerful computers, virus also are smarter and harder to be detected and killed. They have big impact on data security and system usability. We introduce 10 notorious computer virus in the history. 1. Creeper In 1971, the Creeper virus, an experimental self-replicating program, is written by Bob Thomas at BBN Technologies. Creeper infected DEC PDP-10 computers running the TENEX operating sy...

   Computer virus,History,Security     2013-07-16 21:09:22