SEARCH KEYWORD -- MICROSOFT BAND 2
What does a Bing driven Siri mean to Google?
On Tuesday, Apple announced that Bing would become the default search engine of the upcoming iOS 7. This is another Google service kicked out by Apple after Youtube and Google Maps.For Siri: if the default system of Siri can not answer your question, it will try to search the Internet. Currently, Siri connects to the Safari browser by default, and Safari's primary search engine is Google (Can change to Yahoo or Bing). But in iOS 7, Siri's default search engine will be replaced by Bing. Siri will...
Windows 8 first impressions: It's a game changer
NEW YORK (CNNMoney) -- The PC needs saving. With Windows 8, Microsoft believes it has the magic cure.It just might. I've been testing a consumer preview version of Windows 8 for the past week, and it's unlike anything I've ever seen in a PC operating system.The stunning "Metro" interface just begs you to touch and interact with it. Beautifully designed apps, ultra-simple navigation, and instinctive commands make it hard to believe Metro came from the same company that brought us Windows Vista...
Windows 8,Hands on,Game changer,Impression 2012-03-17 04:26:54
CSS Box Shadow Illustration
Used in casting shadows off block-level elements (like divs)..shadow { -moz-box-shadow: 5px 5px 5px #ccc; -webkit-box-shadow: 5px 5px 5px #ccc; box-shadow: 5px 5px 5px #ccc; }The horizontal offset of the shadow, positive means the shadow will be on the right of the box, a negative offset will put the shadow on the left of the box.The vertical offset of the shadow, a negative one means the box-shadow will be above the box, a positive one means the shadow will be below the box.The blur r...
CSS,Box Shadow,Apple,Chrome,Safari,IE,Il 2011-06-30 04:03:38
Java code to retrieve Bing background image path
When Microsoft presented their search engine Bing, this new design gave us some surprise, especially its background images, they are very beautiful and it will change every day. But unfortunately we cannot save the image onto our PC by right clicking the mouse. After some research on its source code, I found a feasible but not so sophisticated way to achieve this, we can retrieve the image path from the source code and then use this path we can download the image. This is just to sh...
Java,Bing,Background image path,URL,Download,Save 2012-05-02 10:51:51
ARM adopts 64-bit architecture
ARM has disclosed technical details about its new v8 architecture - the first to include a 64-bit instruction set - at ARM TechCon 2011 in Santa Clara, California.The next-gen architecture will expand the reach of ARM processors in the consumer and enterprise markets where extended virtual addressing and 64-bit data processing are required.According to ARM CTO Mike Muller, ARMv8 architecture consists of two main execution states: AArch64 and AArch32. 

The AArch64 execution state int...
ARM,Processor,64 bit,Architecture,v8,Nvidia 2011-10-28 10:31:52
Why accessing Java HashMap may cause infinite loop in concurrent environment
HashMap in Java is frequently used to handle key/value pairs. But it is not a good candidate to be used in concurrent environment where ConcurrentHashMap should be used instead. If used in concurrent environment, it may cause lots of unexpected behavior even including make the program getting into an infinite loop situation. To understand how this can happen, let's first discuss how HaspMap works internally. In this post we will use implementation of HashMap before Java 8 as example, Java 8 prov...
JAVA,HASHMAP,INFINITE LOOP 2020-03-29 01:47:00
The Death of .NET and the Power of Perception
One of my long-standing issues with Microsoft is its inability to control the perceptions surrounding its own products. One of the biggest examples was during the Windows Vista years when, even after the product had been fully patched and worked fine, Apple continued to do a better job to define the image of Windows (compilation of ads here) than Microsoft did, costing Microsoft billions in lost revenue for the millions it saved on a strong advertising campaign. The firm has a history of being p...
.NET,future,death,bottleneck,development 2011-08-10 03:13:40
Let’s Find Out What the Future holds for .Net Technology
Technology is more like an evolution, not a revolution. The disruptive industry seems to be changing day in day out. Due to which tech companies by default have to chase new trends in order to stay ahead of the curve. Now, Microsoft.Net framework has been around since the 1990s! Do you think such refined technology can be considered relevant now? From what I can see, .Net is going through a major transformation. It’s gone largely open source and has been getting modernized so that its wor...
10 notorious computer virus
The history of computer virus is the same as computer history. With more and more powerful computers, virus also are smarter and harder to be detected and killed. They have big impact on data security and system usability. We introduce 10 notorious computer virus in the history. 1. Creeper In 1971, the Creeper virus, an experimental self-replicating program, is written by Bob Thomas at BBN Technologies. Creeper infected DEC PDP-10 computers running the TENEX operating sy...
Computer virus,History,Security 2013-07-16 21:09:22
The future smells like JavaScript
Of course I am only repeating what others are preaching about the recent rise of JavaScript. But I think the movement is significant and can't be overstated. And recent developments are really even making it more and more interesting. Nobody can deny hat JavaScript is the de facto programming language of Html5. Every other language trying to bolt itself onto Html5 looks like pure friction so far. And Html5 is looking upon a prospering future. Today we are used to some established JavaScri...
JavaScript,Future,Node.js,Client-side 2012-02-03 08:06:43
RECENT
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- Exploring the Impact of a Loan Origination System on Financial Institutions
- Power Grid OT Simulation System
- Why is Golang's Compilation Speed So Fast?
- SIEM Big Data Visualization : Dashboard for Monitoring Scam Events in Critical Infrastructure
- Introduction to the Application of eBPF in Golang
- Flows.network: Writing an LLM Application in Rust
- more>>