SEARCH KEYWORD -- Software and hardware
Huateng Ma becomes the richest person in China
On 22 July, Licai Zhoubao, a famous wealth management media in China, released a ranking about Chinese most richest people. In this ranking, Tencent CEO, Huateng Ma for the first time becomes the richest person in China with 46.7 billion RMB(around $7.6 billion), his wealth was 35.4 billion RMB(around $5.76 billion) last year. That means his wealth increases 11.3 billion RMB($1.84 billion) in one year. In 2012, Tencent Corp had a revenue of 43.9 billion RMB(around $7.15 billion), which inc...
Tencent,WeChat,Huateng Ma 2013-07-22 08:55:13
One interesting story about Chinese software development
I have once seen an interesting complaint written by one foreigner about Beijing South Railway Station (China) on foursquare. It says: "There is simply no way to buy a ticket at the machine unless you have a Chinese ID. What the hell they have English interface for then?" Apparently,the foreigner cannot buy ticket because he doesn’t have Chinese ID but there still presents an English interface for foreigners on the vending machine. Because of my profession, I find this awkward situation w...
Software design,User experience,Importance 2012-03-26 14:42:50
Galaxy S III will be released on May 3
Samsung Galaxy S II's popularity makes people look forward to the next generation of Galaxy mobile phones. As 2012 London Olympic Games is approaching us, Galaxy S III is also near us. An anonymous message says that the Galaxy S III conference was scheduled on May 3 at London, UK, this year's Olympic Games host city.According to the information previously circulated, Samsung Galaxy S III will have a 720p high-definition display Super AMOLED, the screen size will be between 4.6 to 4.8 inches, a...
Samsung Galaxy S III,Release 2012-04-16 16:09:18
Full disk encryption is too good, says US intelligence agency
You might be shocked to learn this, but when a quivering-lipped Chloe from 24 cracks the encryption on a terrorist’s hard drive in 30 seconds, the TV show is faking it. “So what? It’s just a TV show.†Well, yes, but it turns out that real federal intelligence agencies, like the FBI, CIA, and NSA, also have a problem cracking encrypted hard disks — and according to a new research paper, this is a serious risk to national security.The study...
FDE,Full disk encryption,Crack,Difficulty 2011-11-19 01:55:17
The Best Video Editing Software for Windows 7
It might seem like it was only recently that we witnessed the release of Windows 7 by Microsoft but in reality it was initially released more than 9 years ago. Despite being ‘ancient’ according to the modern technology standards, Windows 7 still holds a special place in many people’s hearts. It is still widely used by people around the world due to its much more user friendly environment than its successors the Windows 8 and 10. However, many software companies do not care abou...
New Android simulator has some big improvements
Message from the Android developer blog, the Android emulator now has a number of improvements and optimizations. It allows developers to develop applications more conveniently.The Android emulator is an important tool for Android developers developing and testing applications. Due to the rapid growth of Android hardware, the simulator has been slightly left behind. The new simulator brings some new functions including support for GPU, the CPU acceleration sensor support, multi-touch input suppo...
How to Prevent a Data Breach: Guide For Businesses
The consequences of a data breach are nothing to joke about. From reputation damage to regulatory fines, it is a disaster for any business. So you should always strive to do your best to prevent it. But with so many steps to take, where do you even begin? Businesses of all shapes and sizes should follow this 8-step approach: 1. Outline Your Assets Your assets, whether digital or physical, should always remain in your sight. It should be the very first step you take. Picture anything that might r...
DATA SECURITY 2020-03-04 08:16:44
System programming is still there
System programming is the practice of writing system software. System software lives at a low level, interfacing directly with the kernel and core system libraries. Your shell and your text editor, your compiler and your debugger, your core utilities and system daemons are all system software. But so are the network server, the web server, and the database. These components are entirely system software, primarily if not exclusively interfacing with the kernel and the C library. But nowadays more...
System programming 2014-02-27 05:46:48
Jackie the smart quadcopter to launch at Robotics Week
Flying security camera synced to smartphone kicks off Kickstarter campaign Entrepreneurs and robotics graduate students Jackie Wu and Ritwik Ummalaneni, in Northwestern University’s Master’s in Robotics program, are launching their new product, Jackie, during the National Robotics Week. The flying security camera quadcopter syncs straight to a smartphone, and is the next evolution in home security platforms that consumers have been waiting for. Jackie’s intuitive and easy co...
Startup,Quadcopter,Security camera,Jackie Wu 2015-04-05 20:56:11
Why Outsourcing .Net Services is a Growing Trend?
IT companies are focusing more on .net for application development. This is because; the .net platform empowers developers with a wide range of tools and libraries to create diverse applications in an easy and efficient manner. The dot net framework allows users i.e. developers, to design and develop applications that can interact with web services and a range of online devices. .Net programming language is richer than others in many contexts. It has several objects oriented features like proper...
dot net services, outsourcing, .net, framework 2014-10-23 22:30:43
RECENT
- The Role of Coding Skills in Advancing Tech Careers
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- GoLand connect to Hologres
- A journey to investigate a goroutine leakage case
- Understanding Slice Behavior in Go
- Breaking Barriers: How 3D Printing is Democratizing Product Development
- more>>