Samsung is likely to release the first head-mounted VR device Project Moonlight

August 21, 2014

moonlight

Foreign technology website The Verge reported that Samsung is likely to release a head-mounted virtualized reality equipment Project Moonlight on the Consumer Electronics Show in Berlin, Germany on September 3, Galaxy Note 4 may also appear together. read more …

Light blogging father Tumblr: Hash has supported 23,000 blogging requests / sec.

August 6, 2014

tumblr

Tumblr was founded in 2007, which is currently the world’s largest light blogging site with more than 196 million blogs, 93 billion posts. Meanwhile, the site Blogging request has reached to 23,000 per second. Recently, the company’s Web site reliability engineer Michael Schenck announced its architecture design on HighScalablity.

In Tumblr, blog is the largest part of the website traffic. In tumblelogs, the height cushioning performance is a very important feature. This is not easy given the high views / post ratio supported by Tumblr, Let’s check the supporting infrastructure of tumblelogs.

read more …

Half of American Shopping Malls Will Close Down in 10 Years

June 23, 2014

The Prospect of Online Shopping and Boutique Shops

From 1956 to 2005, over 1500 large shopping mall had been gone up in American. However, there was no new shopping center in the US since 2006. Nevertheless, there are about 1200 shopping center within the US. It is predicted that about 15% shopping mall will be closed down in 5 years and 50% will be disappeared in 10 years. In the year 2013, American online shopping has raised 14%, while the sales volume of the national retailing just added only 3%. Last September, totally over 0.12 billion customers surged up to online shopping and it hit a record of 1.46 billion USD. Here are the pictures from album Black Friday: The Collapse of American Shopping Mall by Seph Lawless, which shows the some abandoned malls in rural. 201465164152125919 201465164157375652 201465164153421505 In 1977, famous thriller director George A Romero utilize a shopping mall to build a creepy “ghost town” which was full of empty and gloomy stores. After 30 years later, the scene of the move is coming true unwittingly in some malls in rural. Since last century, the prospect of shopping center has made shopping mall become a part of the American classical culture. But in a recent report by estate analysis company CoStar Group, it predicted that 15% shopping malls would wind up business in 5 years. A 50-year domination of malls to people’s consumption will end up. According to analysis, this is attributed to economic depression, the raise of online shopping, change of malls’ environment and then generation of new type of city mall. read more …

Mysearchresults.com Homepage Hijacker, Remove It Manually

May 12, 2014

Where Does Mysearchresults.com Come from?

remove mysearchresults.com from Windows and Mac OS X

Many PC user cry out that they get mysearchresults.com homepage hijacker all of a sudden and thus they want to know where the browser hijacker comes from. As a web application, it can be easily inferred that mysearchresults.com spreads on the Internet. To get more details in the dissemination routine, please take a look at the list:

read more …

How to Remove Dm.StartNow.com, StartNow Browser Hijack Virus Removal

April 29, 2014

Dm.StartNow.com Tech Analysis

Dm.StartNow.com is another browser hijack virus which is related to Search.StartNow.com. It has been considered as a typical security infection that could be utilized by cyber criminals to boost website traffic on affected computer, and then carry out further damage in system compulsively. PC users may often have no idea when they get infected with this type of browser hijack virus. As a matter of fact, Dm.StartNow.com virus is adept at making full use of SEO poisoning techniques to diffuse its components. Most commonly, Dm.StartNow.com browser hijack virus may be often disguised as a browser plug-in or extension that can be downloaded and executed on popular-used browser, such as Internet Explorer, Mozilla Firefox and Google Chrome. When installed, the codes of Dm.StartNow.com virus could be then activated automatically on the compromised machine.

dmstartnow-com-1024x610 read more …

How to Fix USB Driver Problems, Common Error Troubleshooting

April 10, 2014

What is USB Driver?

A USB (Universal Serial Bus) driver is a software program that is used to access files and programs that have been stored on external devices, such as USB flash drive. In other words, a USB driver has the capability to distinguish how a computer interacts with the USB hardware. Up to now, USB drivers are widely designed and compatible for almost all type of computers, despite of Windows operating system or MAC OS they are using. In addition, a USB port is necessary in any machine, which technically functions as a portable hard drive. read more …

Stay away from SopPlayer 3.8.3 for windows to aviod ask toolbar

January 5, 2014

SopCast - 1

This post can be used to uninstall the SopCast and its bloatware Sopcast Toolbar (Ask Toolbar by APN, LLC). Now, follow the steps:

read more …

How to get rid of Java Runtime Environment (Java 7)

December 29, 2013

For your Windows security, you can at least remove the potentially unwanted Java in your system TEMPORARILY – You can reinstall it with easy when your installed app need it to run properly. Remember that you should visit this page REGULARLY to verify your current Java version, and to make it up-to-date.

read more …

Remove Trojan:Win32/Reveton with VilmaTech Instructions

December 24, 2013

Brief Introduction of Trojan:Win32/Reveton

Trojan:Win32/Reveton has been confirmed as ransom Trojan gang that scam money through screen lock and cutting off Internet connection. Most of victims suffering from this kind of malicious Trojan and its variant could do nothing but pay for a fine obediently and reluctantly to get their computers restore.

This Trojan is usually installed in computer system by a drive-by download that victims automatically download malware from the Internet without knowledge. Some victims may agree to agreement without reading carefully so that malware take advantage of vulnerability of web system and download malware automatically with no permission when they browse a website. In other ways, Trojan:Win32/Reveton may enter in computer when victims open a compromised webpage or it likely comes along with image or file attachments of junk mails. When it successfully arrives in computer system, it appears as DLL files with random name and creates a shortcut under Windows Startup folders. read more …

Get rid of Winamp and use a safer media player

December 15, 2013

Winamp - 0

read more …