Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- USER RESEARCH



  Is 99.8% Secure Secure?

A group of researchers (Arjen Lenstra and collaborators  from EPFL Lausanne and James Hughes from Palo Alto) published a study, Ron was wrong Whit is right, of new vulnerabilities of cryptosystems. The New York Times picked up the story. Although Lenstra et al discuss several cryptosystems, their results are particularly relevant to those based on RSA. The title mirrors their conviction that cryptosystems based on a single random element have fewe...

   Security,Percentage,Security index     2012-02-27 04:48:06

  The Internet : from 1969-1974

Internet was born 43 years ago. There are some big events in the history of Internet development. In my opinion, most of the big events happened at the first five years, i.e, from 1969-1974.  1969 : ARPANETThe Advanced Research Projects Agency Network (ARPANET), was the world's first operational packet switching network and the core network of a set that came to compose the global Internet. The first ARPANET transmission was between Stanford Research Institute and UCLA on 29th, October 1969...

   Internet,History     2012-06-22 09:55:51

  4 Often-Forgotten Elements of Starting a Small Business

Starting a new business can be an unnerving experience, however, it can be equally rewarding at the same time. The road from idea to launch can be long but when you finally open your doors for business, it will be worth every step of the journey. There is a lot to consider to get to that point. From paperwork to practicalities, it is easy for some of the seemingly minor elements of starting a business to slip through the cracks.  To ensure your business gets off to the best start possible,...

   BUSINESS,AUSTRALIA     2021-05-15 04:13:19

  Understanding database, instance and schema in Oracle database

Oracle database is the most popular database system among enterprises. To start working on Oracle database, some concepts must be understood first. They include database, instance, schema and user etc. And among these concepts, some have different meanings from those in other database systems such as MS SQL, MySQL, DB2. On the web, there are already some good posts which explain different concepts such as Ask Tom's database vs instances, Difference between database vs user vs schema. In this pos...

   DIFFERENCE,DATABASE,ORACLE DATABASE,INSTANCE,SCHEMA,USER     2016-12-14 23:30:56

  Emotion analysis on Twitter for past 5 years

Emotion analysis is a new research direction in computer science in these years, what it does is expressing emotions and feelings of people with data. The means to do emotion analysis include natural language processing, statistical and signal processing. The platforms which are most suitable for emotion analysis are also microblogging like social networking platform, Twitter is one good example.Computing Laboratory of the University of Vermont project Hedonometer conducted emotion analysis for...

   Emotion analysisTwitter,Hedonometer,happiness     2013-05-08 06:17:25

  Do scientists really need a PhD?

Young scientists at a Chinese genomics institute are foregoing conventional postgraduate training for the chance to be part of major scientific initiatives. Is this the way of the future?The approach to extended postgraduate training varies from country to country. The United States and Europe, for example, have long believed that students need to finish a multiyear programme of postgraduate work before they can fully participate in the front rank of research, whether in industry or acad...

   Career,PhD,Scientist,Relationship,BGI     2012-01-02 08:19:32

  Google has done more for the world with ngrams

Data is valuable asset for a company in the Internet world. With data of users, a company can gain lots of benefits. They can push specified ads to users by analyzing user behaviors, they can even sell the data to third parties. Data is very important for a company's success, so some companies will keep their data secret in order to gain advantages over competitors. However, Google seems do it in another way. Google shared their ngrams text corpus publicly, which basically contains valuable info...

   Ngram,NLP,Data     2013-12-12 07:56:02

  Top 3 Cybersecurity Trends to Watch Out for Today

One trend in cybersecurity that never changes is that it’s getting more important with every passing year. According to statistics, the number of cyberattacks and severity of the losses they incur are growing at an alarming rate. Every day about 24,000 of malicious mobile apps get blocked yet more pop up overnight. For a business today cybersecurity isn’t an option, it’s a necessary measure one needs to invest in heavily. And it’s essential to follow the trends and develo...

   SECURITY,CYBER SECURITY     2019-05-14 09:03:24

  Yahoo is going to recycle inactive user IDs

According to Sina Tech, Yahoo announced that it would provide users with shorter, more lovely and more memorable Yahoo IDs starting from July 15. For IDs like emily@yahoo.com, if they are in inactive status in the past 12 months, then other users will be able to get this ID. Yahoo plans to reset Yahoo ID system to help users get the ID they want in mid of July. By mid-August, users who apply for a Yahoo user ID will be informed what kind of ID they get.This means that users can apply multiple ID...

   Yahoo,ID recycle     2013-06-12 21:22:15

  Change password of postgres account in Postgres

When installing Postgres on Windows, there is some default account created for user to login. One of them is postgres, but we often don;t know what's the password for this account when we first login using this account. We need to change the password for this account. How to change it? Step 1. Modify the pg_hba.conffile Go to the /data/ and open the pg_hba.conf. # TYPE  DATABASE        USER            ...

   Postgres,password, user account     2013-03-04 01:51:02