Saturday, October 23, 2010

Optional U disk watch "shell" scam

A few years ago also are luxury U disk, now put down his value, consumers increasingly approached. And compared to the traditional three-inch disk, U disk is not only the potbellied, pretend to be under the various "build" a large photo, music, games, also less susceptible to external damage, better data security .

Meanwhile, the small chic look, cool colors, all make the big tolerance gadgets as a young person's new jewelry, and more laid its next-generation storage tools dominance.

How to make this new "hegemony" is practical and obedient? Three-step, to help you create the perfect plan U disk!

Eyes that care "shell" U disk

Xiao Xu lives in dense downtown areas of Shanghai University Northeast films, more often stalls hawking cheap goods to sell Tuizhao Che, which Daorangxiaoxu benefit. One day, Xiao Xu see a students face Tuizhuo Che selling headsets, Repeater, U disk and the like. A random quotations, 64M, U disk even as long as 50! Although not a big brand, but Xiaoxu always wanted this thing U disk, not any number of technical content, so they did not hesitate to buy one. Who would have thought to try to go home only to find, the computer simply undetectable U disk, and then look closely, actually just bought an empty shells!

銆?銆怱mall alarm

How can I spend the least money to the best product? This may be the general topics of interest to consumers. This also made a lot of unscrupulous traders psychological advantage of the loophole. In fact, U disk market is very competitive, many businesses have adopted low-cost competitive strategy. Therefore, consumers can pay more attention to product advertising, through formal channels can, buy cheap affordable U disk.

In addition to pay more attention to store information, a proper understanding of the small number of U disk selection knowledge will help choose a cheap U-disk Oh!

First of all, Mo greedy, buy regular. Most ordinary people the role of U-disk data exchange not only data storage, so do not buy very greedy U-disk, generally between 32M-128M is a practical choice. General case of promotion, better brand of 64 trillion U disk selling for 70 yuan or so, so do not spread the risk to buy a shell on the U disk.

Secondly, the stability of the most important. Do not be so-called carry-Q advertisers advertising push email confused by language, in fact, the most important feature is the U disk data storage, can be stably stored without loss of data, U is the most important criteria for site selection. In fact, most users only use this function.

In second place is the start and hardware encryption. And some of the speculation out of the concept, nothing more than some of the U disk preloaded software, only to achieve specific functions, and of little practical significance. In fact, if you will, can create their own "scores of one" U-disk products.

Finally, to judge by the appearance of quality. U disk enclosure seal, there are two processes. One is fixed with screws, appearance, and there is not a good sealing; the other is the use of ultrasound technology package, high sealing, packaging and long service life out of U disk, but using this package on the plant and equipment and demanding process, the general small factories can not be achieved. Therefore, in general, U-disk sealed packaging and quality in the process will be more secure Oh!

Beware of tight to prevent leakage of the virus

Xiaodong usually like to surf the Internet side of the picture downloaded to the U side dish, but this month he found home broadband charges as high as 200 yuan, but his time spent online is absolutely no more than 80 hours, according to regulations due only 100 ah! After "the census", Xiaodong found himself broadband user name and password was cracked, and the culprit is the U disk dyed a strange virus.

In fact, Xiaodong have to feel badly: When using U disk, not only the message window will appear inexplicable, "the school I eat enough food, snack tray is garbage !!!", U heart will automatically generate a file while running this file will be a "program damaged, can not run" warning - can not think of this is the legendary Trojan!

銆?銆怱mall alarm

Xiaodong infection is quite popular recently, "e-album" (Win32.Troj.cimspark) virus, in fact the deleted method is simple. Experts, they do not run the program, the computer will not be infected with the virus. First, remove by hand. First of all, the system directory windows \ system32 under search SVCHOST.EXE file, if found red "heart" file, the first in Task Manager to end its process, and then delete the file. Second, anti-virus tools, such as PC omnipotent wizard, Duba Trojans only kill the virus can be cleared.

In fact, the use of U disk if there are good habits to avoid infection. When the Internet is best not to use U disk. As this would increase the infection probability of a virus or Trojan horse programs, and if the Internet must use flash drives to read data is the best write-protect switch to open it. Once your U disk speed is too slow or has an unknown file there, I remember first went to a professional drug test online antivirus antivirus website, do not rashly run that virus file, to avoid unnecessary losses suffered.

Through the use of errors across minefields

Millet, U disk, though not to buy any big-name goods, but also regular factory product. For some reason, less than half a year with millet, it appears the data loss, running too slow and so on. Insert the USB interface, sometimes, to try several times to be identified. U can look at other people's plate is not a big shipment, with more than a year are still fast. In the end how the back thing?

銆?銆怱mall alarm

In fact, tools, must find the know-how. Down the temper of these tools will not only more you use the more smoothly, but also reduce their losses. U disk in the process of using the same, a lot of misunderstanding, seems a small thing, but in use it will affect the efficiency of the process.

Take the U disk speed is too slow, if excluded, computer virus and quality of U disk itself, probably because when using the flash drive does not open the system, "write cache opened" this feature. Opened, write caching is: in Win98, WinMe may be by right-clicking "My Computer", select "Properties 鈫?Properties 鈫?File System 鈫?removable disk" enabled "after the write cache" dialog box before the tick ; in under WinXP can open the "My Computer", right-click the removable disk, select "Properties 鈫?Hardware" and then select the flash disk drive is located, click the "Properties 鈫?Strategy", select "for the performance Optimization ... ... "dialog box, and click OK.

Similarly, the usually careful attention in the use and maintenance, are also important. For example, never in the flash of light when the flash was quickly pulled out flash drives, because then U disk is reading or writing data, pull out halfway may cause hardware damage to the data. Also, do not shut down immediately after the backup documentation related to the procedure, because at that time on the U drive is still flashing light, indicating procedures have not completely ended, then unplug the U disk, it is easy to affect the backup. So, back to the flash file, it should be some time to close the related procedures to prevent accidents; the same token, the system prompts "can not stop" Do not pull out when U disk, it will also cause data loss.

In addition, attention will be placed in the U disk dry environment, do not let U disk interface prolonged exposure to air, otherwise easily lead to the surface of metal oxide, reduced interface to sensitivity. At the same time, do not need a long time has been inserted in the U-disk USB interface, or interfaces while easily lead to aging, the other on the U drive is also a loss.


The problem is with Chinese characters - five-stroke input

Review Helpdesk And Remote PC

Next-generation iPhone were reviewed by the Ministry of Industry

China OLPC Alliance Brewing Threat Of Wintel Alliance Formed

AVI to DivX

Food And Drink Storage

HTML 5 will be discarded, and the elements will be enhanced

New Converters And OPTIMIZERS

AMT share AND create competitive

Chen Zhou reflect years of business success: The greatest scar has not come yet

Middle figure PAINTING


Unformat sd card unformat sd card data unformat

MKV To Zune

Monday, October 18, 2010

Flash CS4 Production rotating three-dimensional character animation

The case of thinking: The circular array emission words, for the text to create the traditional motion tween, and add the "fuzzy", "light" and "projection" filter to modify graphics.

First, arrange the text

(1) Start Flash CS4, create a new document, document properties and then do the settings shown in Figure 1.

Figure 1

(2) Click the "tool box" in the "Text tool" button, and then in its properties panel to do the settings shown in Figure 2 and Figure 3 shows the input stage of the text.

Figure 2 to set the font properties

Figure 3 Enter the text

(3) create a new "Layer 2", then hold down the Shift key while using the "Ellipse Tool" draw a circle as shown in Figure 4.

Figure 4 Round Draw

(4) select the text, then press Ctrl + B key combination to break up the text, shown in Figure 5.

Figure 5 break up text

(5) use the "Select Tool" to drag the text to the text around the circle to the line emission, shown in Figure 6.

Figure 6 Emission text


In emissions can be activated when the text "tool box" in the "Snap to Object" button (activated state), so that when the discharge will automatically closely aligns the text round the line.

(6) in turn to select a single text, and then press the F8 key words are to each movie clip, then use the "arbitrary deformation tool" to adjust the text direction, as shown in Figure 7, delete the circular line, and then select all the text will eventually convert it to movie clip, the effect shown in Figure 8.

Figure 7 to adjust the text direction

Figure 8 text effect

Second, rotation animation

(1) into the movie clip editing area, then select the first 100, then press F6 key to insert a key frame, as shown in Figure 9.

Figure 9 to create a key frame

(2) select the first one, then right-click on the frame, and in the pop-up menu, select "Create a traditional meeting between the" command, the last in the properties panel to do the settings as shown in Figure 11.

Figure 10 to create the traditional meeting rooms

Figure 11 Rotation property to set

(3) to return to the "Scene 1", create a "background layer", and then use the "rectangle tool" to produce a green background, as shown in Figure 12.

Figure 12 Add a background

(4) Select the movie clip, then press the F8 key then transformed into movie clip (named "spin the word"), then enter the movie clip's editor, create a new layer, and finally copy the movie clip to new layer, as shown in Figure 13.

Figure 13 Copy Graphics

(5) selected the first 50 frames of two layers, then press the F6 key to insert a key frame, as shown in Figure 14.

Figure 14 insert key frame

(6) and then select the first 100 frames of two layers, press F6 key to insert a key frame, then the first 50 in two layers to create the traditional motion tween, shown in Figure 15.

Figure 15 to create the traditional motion tween

(7) selected the first 100, then use the "arbitrary deformation tool" of the two layers into a movie clip to adjust the effect as shown in Figure 2-16.

Figure 16 to adjust the text shape

(8) to create two layers, then in 170 and 200 Department to create a key frame, again using the same methods in two layers between 170 ~ 200 created a traditional motion tween, and finally two layers of the video clip to adjust the text as shown in Figure 17 into effect.

Figure 17 to create the traditional motion tween

(9) Select "Layer 1" and "movie clip", and then moving down the number of pixels, and then to add "fuzzy" and "light" filter specific parameter settings shown in Figure 18.

Figure 18 Add a filter

(10) to create two layers, then the first two layers 340 and 400 Department to create a key frame, again using the same method to create between 340 ~ 400 out of the traditional motion tween, Finally, "Layer 2" s 400 Division into a movie clip to adjust the effect as shown in Figure 19.

Figure 19 to create the traditional motion tween

(11) Select "Layer 1" at 400 Department of movie clips, then move up a number of pixels, then set the text color to black, and finally use the "arbitrary deformation tool" to adjust the results as shown in Figure 20 .

Figure 20 to adjust the text

(12) to create two layers, then the first two layers to create Division 500 key frames, and then the "layer 2" of the black text to add "projection" filter, and finally adjust, "Layer 1 "in white writing" light "in the color filter, the specific parameter settings as shown in Figure 21.

Figure 21 to adjust filter parameters

(13) using the previous method to create loop back frame animation (the first one will be copied to the back of the frame to form a loop animation), then rotate the text as shown in Figure 22 results.

Figure 22 animation

(14) to return to the "Scene 1", then the movie clip add a "light" filter specific parameter settings shown in Figure 23.

Figure 23 Add a filter

(15) press Ctrl + Enter key combination release animation.

Recommended links:

Why not read the disk drive?


Good Font TOOLS

The basics of intrusion detection rules

Internal control: harm than GOOD, or at every step

Comment Multimedia Creation Tools


How to identify real And can automatically create index index

Detailed Analysis: Teach You To Master The Table Character Set And Proofreading

How to stop rundll32 exe errors fixing errors

With JSF + Spring + IBatis build a simple framework

Chen Qishen: Production is not magic

Simple FTP Clients

SA118 Chinese Translation 2


Alternative: FrontPage also play image format conversion

Friday, October 8, 2010

"Deceiving" or "enlightened approach"

Not long ago, the United States have made a home for 2 more than 1000 computer crime survey of SMEs in the network, 88% of companies surveyed in 2005 had at least one safety incident occurred, but nearly half of the company up to four security breaches have occurred accident! Correspondingly, is a separate survey showed that more than 90% of IT managers think that business has been conducted on the company's effective security protection, and only less than 4% of the people a correct understanding of the enterprise information system is difficult to be 100% perfect security.

In fact, most enterprises, especially SMEs, IT director of information security appears blind optimism is not accidental. They tend to believe that their business structure is as complex as many large enterprises, and has been equipped with the mainstream market, anti-virus software and firewall equipment, so should be able to sit back and relax.

However, these enterprises, especially SMEs located in the business environment and the need to face the main enemy - the hacker, and five years ago have made a big difference ... ...

The lifeblood of exposure

First, from the environmental point of view, the network spread and spread, making it the most important drivers for SME development, Er the competitiveness of SMEs edge, largely embodied in its markets and customers a high degree of rapid response, therefore, more dependent upon information networks.

More and more SMEs into their business systems on the network, the network security threats for the information also will increase:

1. Unlike earlier centralized applications, computer systems are mostly small and medium enterprises is based on client / server model and Internet / Intranet network computing model for distributed applications, in such an environment, the company's database servers, file servers, application servers are connected to the network's "door", as long as there is a "gate" did not fully protect, "hackers" will enter the system through the door, theft or destruction of all resources.

2. Intranet improving, with hierarchical network structure, a leading Internet company's transmission link, due to the growing third-party connections, on-site office of the temporary staff needed to connect to the corporate network, and the company's own employees are increasingly mobile stronger, resulting in threats to the Internet can bypass border controls, and then from within a relatively rapid rate of spread. According to ICSA, currently within the system from the enterprise security threat by up to 60%. Therefore, in addition to the original need to protect the growing number of infrastructure, the companies now need to protect the internal network and systems.

3. As the need to maintain a competitive edge, so each company must be applied more rapidly emerging technologies (eg, WLAN, VoIP, and Web services) and all existing technologies and platforms, the new version. Together with a number of important applications built on the internal network, such as property marketing system, customer management systems, office systems. All enterprises not only to manage and protect more computing infrastructure and applications, but most of them are emerging complex structure and procedures, highly fragmented. Results are due to configuration errors and negligence leading to the increasing vulnerability of code.

4. SMEs are usually high growth companies, with the continuous development and growth of enterprises, number of terminals within the enterprise increasingly expanding and changing, increasing the security management more difficult.

Hackers armed

And the increasingly complex and difficult to manage than the information environment, SMEs face a more direct challenge comes from the hacker. In recent years more and more motivation for committing the crime hackers strongly driven by economic interests, and most of the development of SMEs which customer records, financial data, technical characteristics of high commercial value, but the protective measures are often relatively single, so be the best target for hackers.

The past, people might think that hackers will not be developed for SMEs specific means of attack, because it looks more harm than good, in fact, according to Symantec survey found that the development of new malicious software, making the difficulty of getting lower and lower, increasingly sophisticated hacking toolkit growing and can be downloaded anywhere on the Internet, threatening the production of software and modular construction techniques led to the development threat to the behavior of common variants.

At the same time, these security threats are increasingly shorter generation time. From the discovery of new vulnerabilities to launch attacks against the vulnerability of a particular time between the inevitably shortened. In fact, according to recent statistics, leaving enterprises "patch" of the "window of time" on average only six days. Therefore, even if some businesses related to staff time to time on the vulnerabilities the updates, the network is still difficult to guarantee their safety, but at present most SMEs rely on antivirus software and firewall during the update of time, are facing similar problems.

Finally, the hackers use through the use of a variety of mechanisms, and effective method of load or spread of the hybrid means are more likely to avoid the invasion of defense enterprises, and successfully achieve its purpose. Another reason for the worsening situation led to a hacker attack system and the current main weaknesses in the application layer, not the network layer of vulnerability. In this way, they often focus on network layer attack protection strategy activities slip through the net, unfortunately, as mentioned at the outset, most SMEs are only by virtue of such security measures to protect themselves, and that has been foolproof.

Comprehensive intrusion prevention

Bring these issues to face the confusion and challenges for SMEs, Symantec believes that the key point is that the majority of SMEs by focusing on the border is highly reactive defensive measures, it can not maintain the current trend of ever-changing threats synchronization. The new security threats now emerging, and spread with unprecedented speed, will inevitably lead to the current chaos.

In other words, SMEs should be aware of multi-level security measures onion theory, adopt the intrusion detection, intrusion prevention represented mixed preventive measures possible to ensure network security. This is because normally the firewall access control policy is to implement a system of checks flowing through the network traffic, block non-compliant packets. Traditional firewalls to reject those obvious suspicious network traffic, but still allow certain traffic through, so do anything for many intrusion. An invasion of protection technology through the monitoring network or system resources, look for violations of security policies, action or intrusion signs, activities and attacks on the invasion of intercept network traffic and avoid the resulting loss, this way, the problem packets, and all follow-up from the same data stream of data packets, in the IPS device can be removed.

Symantec network security solutions for SMEs, the integration of and highlights the intrusion detection and intrusion prevention system role, such as the Symantec Network Security 7100 (hereinafter referred to as SNS) line of security appliances, regardless of the environment in which the network topology run, by clicking the mouse in the intrusion detection and intrusion prevention switch between modes, this flexibility in the protection of security, network applications as possible to ensure patency.

姝ゅ锛岃櫧鐒惰禌闂ㄩ搧鍏嬬殑鍏ヤ镜闃叉姢绯荤粺铏界劧鏄熀浜庣綉缁滅殑璁惧锛屼絾瀹冨嵈涓昏鐢ㄤ簬鍦ㄨ绠楀爢鏍堢殑鎵?湁灞傞樆姝㈡敾鍑伙紝鍥犳闃叉姢涓ュ瘑鍏ㄩ潰銆傚叾涓昏鎶?湳鐗规?濡備笅锛?br />
路閲囩敤鍒涙柊鍏ヤ镜闃茶寖缁熶竴缃戠粶寮曟搸 (IMUNE)銆侷MUNE 鏋舵瀯缁撳悎浜嗗绉嶆娴嬫妧鏈紝涓嶄粎鍙互鍑嗙‘鏍囪瘑宸茬煡鍜屾湭鐭ユ敾鍑伙紝鑰屼笖鍙互灏嗗涓嶅瓨鍦ㄥ▉鑳佺殑鍚堟硶閫氫俊鐨勫奖鍝嶉檷鑷虫渶浣庛?IMUNE 绯荤粺杩樺寘鍚鑷畾涔夌壒寰佺殑鏀寔锛涙壂鎻忋?渚﹀療鍜屾帰娴嬫娴嬶紱鎷掔粷鏈嶅姟妫?祴銆佸悗闂ㄦ娴嬩互鍙?IDS 鍥為伩妫?祴銆?br />
路瀵规敾鍑讳富鍔ㄦ嫤鎴?SNS璁惧鍙互宸ヤ綔鍦ㄩ?鏄庢ā寮忎笅锛屽湪涓嶆敼鍙樼綉缁滅粨鏋勭殑鍓嶆彁涓嬶紝鑷姩鎷︽埅闈炴硶鐨勭綉缁滆闂紝瀹炵幇涓诲姩闃插尽銆?br />
路娣峰悎妫?祴浣撶郴缁撴瀯锛岃瘑鍒浂鏃堕棿鏀诲嚮銆係NS缁勫悎鍗忚寮傚父妫?祴銆佺姸鎬佺壒寰佺鍚嶃?婕忔礊鏀诲嚮鎷︽埅銆侀?淇¢?鐜囩洃鎺с?IDS 閫冮伩澶勭悊銆佹暟鎹祦绛栫暐鍐茬獊銆両P 鍦板潃鎷嗗垎閲嶇粍浠ュ強鑷畾涔夊寮虹壒寰佺鍚嶆弿杩拌瑷?潵鏀堕泦鎭舵剰娲诲姩鐨勮瘉鎹?SNS 7100 鐨勫崗璁紓甯告娴嬫湁鍔╀簬妫?祴浠ュ墠鏈煡鐨勬敾鍑诲拰鏂版敾鍑伙紙鍦ㄥ畠浠彂鐢熸椂妫?祴锛夈?姝ゅ姛鑳界О涓衡?闆舵椂闂粹?妫?祴銆?br />
路瀹炴椂浜嬩欢鍏宠仈鍜屽垎鏋愶紝蹇?瀹氫綅浼佷笟缃戝▉鑳佹潵婧愩?SNS鐨勫叧鑱斿拰鍒嗘瀽寮曟搸鍙护鎺夊啑浣欐暟鎹?鍙垎鏋愮浉鍏充俊鎭紝浠庤?浣垮緱鎻愪緵鐨勫▉鑳侀?鐭ヤ笉浼氬嚭鐜版暟鎹秴杞姐?SNS 浣跨敤璺ㄨ妭鐐瑰垎鏋愬湪浼佷笟缃戝唴鏀堕泦淇℃伅锛屼粠鑰屽揩閫熷湴甯姪绠$悊鍛樺紕娓呮瓒嬪娍骞跺湪鐩稿叧浜嬩欢鍜屼簨鏁呭彂鐢熸椂璇嗗埆瀹冧滑銆?br />
路鑷姩鐨凷ymantec 瀹夊叏鏇存柊銆傛潵鑷?Symantec 瀹夊叏鍝嶅簲涓績鐨勫畾鏈熴?蹇?鍝嶅簲 瀹夊叏鏇存柊鍙彁渚涙渶浣崇殑瀹夊叏淇濇姢鍜屾渶鏂扮殑瀹夊叏涓婁笅鏂囦俊鎭紝鍖呮嫭鍒╃敤鍜屾紡娲炰俊鎭?浜嬩欢璇存槑浠ュ強鐢ㄤ簬闃插尽涓嶆柇澧炲鐨勫▉鑳佺殑浜嬩欢缁嗗寲瑙勫垯銆傝繖浜涙搷浣滃ぇ澶у噺灏戜簡浼佷笟绠$悊鍛樼殑缁存姢宸ヤ綔閲忋?

鐢辨鎴戜滑鍙互鐪嬪嚭锛岃禌闂ㄩ搧鍏嬫彁渚涚殑涓皬浼佷笟鍏ヤ镜闃叉姢绯荤粺锛屼笉浠呯潃鐪间簬灏嗕腑灏忎紒涓氱殑瀹夊叏闃叉姢姘村钩鎻愬崌鍒颁笌鐜伴樁娈靛畨鍏ㄥ▉鑳佺浉閫傚簲鐨勬柊楂樺害锛屾洿浠庨儴缃层?缁存姢鐨勪究鍒╂?锛屽崌绾с?绠$悊鐨勭畝渚挎?涓婏紝璁╀腑灏忎紒涓氱殑淇℃伅瀹夊叏闃叉姢锛岀湡姝d粠鈥滄帺鑰崇洍閾冣?浼肩殑鐩茬洰涔愯杞彉涓衡?鎴愮鍦ㄨ兏鈥濈殑瀹夋灂鏃犲咖銆?br />


Hot REMOTE Computing

Install And Setup Introduction

Foreign general manager of Intel low-key arrival in shaping China's power structure

After the wedding, the trouble Unicom iPhone

C2C staged "Three Kingdoms"

Faster "Save All"

Samsung s5150 diva coming on january

Was the fate of the attention of young people again and again - Liu Chuanwei


AVI to DivX

First Financial Weekly: direct supply in the Shadow of Digital China

Harvest autumn harvest eMEX Internal Security Code

Shell Tools brief

EVD GB Classic caught in foreign control of position to defend the right to speak

XviD to WMV

The Face Of OOXML, How Can We Do?

Simple MANAGEMENT And Distribution

Wednesday, September 29, 2010

Focus Media second quarter net profit of 37.7 million U.S. dollars

U.S. Eastern Time at 16 o'clock on the September 27th (Beijing time at 4 o'clock on the 28 September) News, Focus Media (Nasdaq: FMCN) announced today that as of June 30 in the second quarter of 2007 unaudited financial statements . The report shows that Focus Media revenue for the second quarter of the total 113.3 million U.S. dollars, up 126.3%, 97.5% previous quarter; in accordance with GAAP, net income for the second quarter of 37.7 million U.S. dollars, up 126.2% , up 131.5% sequentially.

Main results:

- Focus Media revenue for the second quarter of the total 113.3 million U.S. dollars, up 126.3%, 97.5% previous quarter.

- Focus Media Net income for the second quarter of 37.7 million U.S. dollars, up 126.2 percent, 131.5 percent growth the previous quarter. Focus Media second quarter fully diluted earnings per ADS was 0.32 U.S. dollars. Excluding non-cash share-based compensation expenses and amortization of intangible assets resulting from acquisitions (not in accordance with GAAP), Focus Media Net income for the second quarter of 45.3 million U.S. dollars, fully diluted earnings per ADS 0.38 U.S. dollars.

- As for the advertisers products growing digital media, Focus Media will be three different categories according to the report of advertising revenue, are: (1) digital outdoor advertising, including commercial building network (network A network of commercial buildings Other commercial premises network, outdoor LED network and movie theater advertising network), store network, apartment elevator print media network; (2) Mobile advertising; (3) Internet advertising.

- Focus Media Digital Outdoor Advertising second-quarter revenue of 76.9 million U.S. dollars, which come from the commercial location network, including outdoor LED network (iStreet Network) and movie theater advertising network, advertising service revenue was 51.1 million U.S. dollars, up 67.8 % increase 61.4% sequentially; from the store network advertising service revenue for the 7.2 million U.S. dollars, up 10.8%, up 9.1% sequentially. Network from the apartment elevator print media advertising revenues for the 18.5 million U.S. dollars, up 89.7%, 46.4% previous quarter.

- Focus Media, mobile advertising revenues for the second quarter of 10.9 million U.S. dollars, up 253.8%, 81.1% previous quarter.

- Focus Media Internet advertising revenues for the second quarter of 25.2 million U.S. dollars. Focus Media Internet advertising revenue primarily from the first quarter of 2007, acquired Allyes.

Financial Analysis:

Focus Media revenue for the second quarter of the total 113.3 million U.S. dollars, compared with last year's 50.1 million U.S. dollars increased 126.3 percent, 57.3 million U.S. dollars the previous quarter growth of 97.5%.

Focus Media's digital outdoor advertising second quarter revenue of 76.9 million U.S. dollars, compared with last year's 46.8 million U.S. dollars increased 64.4%, 51 million U.S. dollars the previous quarter growth of 50.8%. From the second quarter of Focus Media commercial location network, advertising service revenue was 51.1 million U.S. dollars, in the digital outdoor advertising revenue accounted for 66.4%; from the store network advertising service revenue was 7.2 million dollars, revenue in the digital outdoor advertising accounted for 9.4%. Network from the apartment elevator print media advertising revenues for the 18.5 million U.S. dollars, in the digital outdoor advertising revenue accounted for 24.1%.

As the growing media products, and customer demand continues to grow, Focus Media started in accordance with the needs of large advertisers to provide customized media solutions. Focus Media also given to commercial buildings in the city network to extend the cycle time to 12 minutes. Affected, Focus Media reported in the previous financial network provided 30-second commercial advertising time slots of the volume and the average time per 30-second ad revenue is no longer representative. So this year, Focus Media will no longer provide such data.

As of June 30, 2007, Focus Media commercial location network installation

The total quantity of liquid crystal screen 89 687, of which 85,010 are directly owned by the company's network of regional distributors is 4677. As of June 30, 2007, Focus Media in 1205 installed a large supermarket LCD screen, higher than as of March 31 of 1196. As of June 30, 2007, Focus Media at 734 supermarkets and 2,056 convenience stores to install the LCD screen. As of June 30, 2007, Focus Media store network in the total quantity of liquid crystal screen 41 322 as of March 31 to 40 736. As of June 30, 2007, Focus Media Advertising Framework available for the total number of 161,435, as of March 31 was 124,542. As of August 30, 2007, Focus Media has installed 6,796 digital 2.0 framework, mainly located in Beijing, Shanghai, Guangzhou and Shenzhen.

The second quarter of Focus Media Focus Media Wireless from advertising revenues for the 10.9 million U.S. dollars, compared with last year's 3.1 million U.S. dollars increased 253.8 percent, six million U.S. dollars the previous quarter growth of 81.1%.

Focus Media second quarter from Allyes revenues of 25.2 million U.S. dollars. In Focus Media Internet advertising revenue, digital marketing, digital marketing technology and digital performance media accounted for 90.0%, respectively, 3.4% and 6.6% proportion.

Focus Media second quarter gross margin was 61.8 million U.S. dollars, compared with last year's 28.5 million U.S. dollars increased 117.2 percent, 31.8 million U.S. dollars the previous quarter growth of 94.8%. Second quarter of 2007, Focus Media's digital outdoor advertising gross margin was 63.1%. In Focus Media Digital outdoor advertising business, commercial network gross margin was 65.0%, store network gross margin was 28.4%, flat apartment elevator network gross margin was 71.6%. Focus Media mobile advertising gross margin was 58.0%. Focus Media Internet advertising gross margin was 27.1%. Focus Media second quarter gross margin was 54.6%, 56.9% lower than the same period last year, mainly due to lower profit margins to join the Internet advertising business.

Focus Media operating expenses for the second quarter of 23.7 million U.S. dollars, which included the acquisition of the 800,000 U.S. dollars generated by amortization of intangible assets and 460 million non-cash stock compensation expense. Focus Media operating expenses in the second quarter of the total revenue accounted for 20.9%, 30.2% the previous quarter. Focus Media General and administrative expenses of the second quarter to 11.6 million U.S. dollars, the proportion of total revenue 10.3%, which included 2.6 million U.S. dollars in stock-based compensation; sales and marketing expenses for the 13.2 million U.S. dollars, the total operating percentage of revenue was 11.6%, which included 2 million U.S. dollars in stock compensation expense. Focus Media second quarter operating margin was 33.7%, 25.2% the previous quarter. Excluding non-cash share-based compensation expenses and amortization of intangible assets (not in accordance with GAAP), Focus Media's second quarter operating margin was 40.4%.

Focus Media Net income for the second quarter of 37.7 million U.S. dollars, up 126.2 percent, 131.5 percent growth the previous quarter. Focus Media second quarter fully diluted earnings per ADS was 0.32 U.S. dollars. Excluding non-cash share-based compensation expenses and amortization of intangible assets resulting from acquisitions (not in accordance with GAAP), Focus Media Net income for the second quarter of 45.3 million U.S. dollars, fully diluted earnings per ADS 0.38 U.S. dollars.


Focus Media expects third quarter 2007 total revenues of 132 million U.S. dollars to 135 million U.S. dollars; not included in share-based compensation expenses and amortization of intangible assets resulting from acquisitions (not in accordance with GAAP), Focus Media expects third-quarter Net income was 52 million U.S. dollars to 54 million U.S. dollars, fully diluted earnings per ADS 0.41 dollars to 0.43 U.S. dollars. As the Internet advertising business growing faster than expected, Focus Media will be in 2007 revenue estimate from 390 million U.S. dollars to 400 million U.S. dollars, raised 440 million U.S. dollars to 4.5 billion.

Conference Call:

After the earnings release, Focus Media will be Eastern Time at 21 o'clock on the September 27th (Beijing time at 9 o'clock on the 28 September) conference call. Focus Media will be the management will attend the meeting, results and highlights and to answer questions raised by investors and analysts. Focus Media to listen to the conference call, U.S. investors can call toll-free number +1-866-700-7477, Hong Kong investors may call +852-3002-1672, international investors can call +1-617-213 -8 840, the password is "81045580."

U.S. Eastern Time on September 27 to October 4 between the U.S. investors can call toll-free number +1-888-286-8010, international investors may dial +1-617-801-6888, to listen to Focus Media conference call recording, the password is "34979673." In addition, investors can access the Focus Media web site, listen to the teleconference webcast and recording.

Recommended links:

COMPILATION of various source - col

Review Network MONITORING

Flash To MPEG

Talent War Broke Out, The Direct Selling Industry Executives 300 000 -50 Million Annual Salary

Across Threads In C # Winform Control Access

Directory Web Development

Unicom frankly difficult to govern without legal constraint SP is critical violations

How far from the Focus to the expertise?

SWF to MP4


Fax Tools comparison

Information integration between pdm and erp

CHINA'S attitude towards certain of HL7

mapgis basic knowledge and simple Learning materials

Change with THE time

Thursday, September 16, 2010

Review the DB2 Viper

DB2 Viper's hybrid XML / relational data server in practice is how to work? This personal experience with you the actual performance of DB2 Viper and handling, so that you know the actual DB2 Viper test which aspects should be focused on.

IBM is the data server to the next stage of development: introduced to manage relations between pure and pure XML data in a single hybrid engine. DB2 Viper the new technology used for many companies to understand the relationship between non-business data, such as Excel spreadsheets inside financial information, or commonly found in paper or word processing document, an important contract. Using DB2 Viper, a join statement can only be the rich business data combined with traditional relational data in full view. For electronic forms, contracts, fax image, or receipt of manual search can be a simple statement to be replaced. Access this XML data standard mechanism to ensure that: the existing reporting tools and interfaces to these new data can be provided directly to the desktop. Pure XML technology is critical for business success agility.

New hybrid XML / relational functioning, not for Linux, Unix and Windows, DB2 Viper is the only new features are. This article will discuss the main features of DB2 Viper has. Readers can open by Viper test procedures (, personally try some of these features.

XML-driven business

In addition to relational data can be stored outside, DB2 Viper hybrid engine can also use plain XML structure to store the XML document. Thus, the increasing recourse to XML, companies can use high-performance XML storage engine, you can also use the existing employee database skills to manage and protect XML data (see Figure 1).

XML on the importance of today's companies, which for many reasons. In service-oriented architecture (SOA) environment, if you use a separate universal service, you do not need for each application developed their own access methods, and contribute to integrated applications. XML is often between applications and common services, contact the language used in messaging. For example, in stock, the customer through the Web interface to buy a share of stock. The Web process XML messages to send to the broker system, said to perform transactions. The XML message is temporary, only to trigger agent systems exist. DB2 Viper can save this XML message, while allowing digital signatures remain the same. Thus, these XML messages are now available for regulatory compliance audits.

Today, most companies can not easily access existing business data, because the use of database technology, the large number of platforms and data formats. By creating a unified data format, SOA common services can access data from the original data source, the data Ge Shihua into the standard format and stored in XML, thus contributing to flexible, standards of access to critical business data.

Able to store critical business-type documents (such as Excel spreadsheets, or legal contracts), and the relationship between the data and related data link, which is one of the main advantages Viper. Microsoft Office, Adobe programs and products provide the majority of prospects will be stored as XML document formats. Enterprise users can now easily access the electronic form data, because the Microsoft Excel spreadsheet (often used to store important financial decision-making statistical data) as the XML format can now be stored in the DB2 Viper data server which, not stored in easily damaged file server or hard top.

Pure XML

Existing relational data server XML document stored as a character or binary large object (CLOB or BLOB). But in the CLOB or BLOB, the data is stored as a single unit or a continuous string of bytes. If the query a value inside XML documents, or just update the XML document as part of the performance of this storage format will bring problems. Analysis of the entire record must be read and then can be evaluate predicate (predicate evaluation). Indexing can reduce search costs; However, XML documents need to update the index on the XML update. In addition, the updated XML document need to rewrite the entire document.

Decomposition of the XML document is the relational database management system (RDBMS) another storage method. By mapping each element of XML document to the relevant Series, XML documents can be stored in multiple tables and columns. Once the document is decomposed, structure, and any related items (such as digital signatures) will be lost; However, if the entire XML document need not retained, decomposition may be a practical solution.

DB2 Viper灏嗘渶绾补褰㈠紡鐨刋ML淇濆瓨涓虹粡杩囬鍏堣В鏋愮殑甯︽敞瑙g殑鏍戙?濡備粖甯傞潰涓婂凡鏈夌函XML鏁版嵁搴擄紝浣嗕笉鏄贩鍚堝瀷鏁版嵁搴擄紙杩欐剰鍛崇潃瀹冧滑娌℃湁鍚屾椂瀛樺偍XML鏁版嵁鍜屽叧绯绘暟鎹殑浼樼偣锛夈?鏈変簡DB2 Viper锛孹ML灏卞彲浠ュ瓨鍌ㄤ负鍩轰簬鑺傜偣鐨勫眰娆℃ā鍨嬨?鍦ㄨ繖绉嶆ā鍨嬩腑锛屾瘡涓妭鐐逛笉浣嗕笌鍏剁埗鑺傜偣鐩歌繛鎺ワ紝杩樹笌鍏跺瓙鑺傜偣鐩歌繛鎺ャ?杩欑绾疿ML瀛樺偍鏄闂強瀛樺偍鏁翠釜XML鏂囨。鐨勬渶鏈夋晥鏂规硶锛屾彁渚涗簡鏋佸ぇ鐨勬?鑳戒紭鍔裤?

绾疿ML瀛樺偍鍙互鍘熷皝涓嶅姩鍦板瓨鍌╔ML鏂囨。锛屼粠鑰屾彁渚涗簡BLOB鍜孋LOB鐨勪紭鐐癸紝杩樿В鍐充簡鎬ц兘闂锛屽洜涓烘枃妗e瓨鍌ㄦ病鏈夎铏氭嫙鍖栨垚鍗曚竴銆佽繛缁殑瀛楄妭鑼冨洿銆傛暣缁勬枃妗g殑瀛樺偍琚櫄鎷熷寲鎴愯繛缁殑瀛楄妭鑼冨洿锛屼絾鍚勪釜鑺傜偣鍙互瀹夌疆鍒拌繖涓寖鍥翠腑锛屽鍏朵粬鑺傜偣鍜岀储寮曠殑褰卞搷鏋佸皬銆?br />
DB2 Viper鏃㈡敮鎸佸垎瑙g殑XML锛屽張鏀寔绾疿ML銆傛敮鎸佸垎瑙e姛鑳藉緢閲嶈锛屽洜涓篨ML鍙敤鏉ユ彁渚涚幇鏈夌殑鍏崇郴妯″紡銆傚洜涓烘枃妗d細鍙樺ぇ锛屽湪璁稿鎯呭喌涓嬭繕鍙互鏇存柊锛屾墍浠ML鏂囨。鐨勯潪BLOB瀛樺偍锛堝寘鎷湪鑺傜偣灞傞潰鑰屼笉鏄湪鏂囨。灞傞潰杩涜瀛樺偍锛夊叿鏈夌殑浼樺娍寰堟樉钁椼?

澶у鏁板叕鍙稿唴閮ㄥ凡缁忔湁鍏崇郴鏁版嵁鏈嶅姟鍣紝鑰屼笖鏈夎礋璐f敮鎸佺殑鍛樺伐銆傝櫧鐒禫iper浠h〃鐫?柊棰栥?鍏堣繘鐨刋ML鎶?湳锛屼絾骞朵笉瑕佹眰鍏徃闆囩敤鏂扮殑绮鹃?XML鐨勫紑鍙戜汉鍛樸?涓轰簡鍒涘缓DB2娣峰悎琛紙璇ヨ〃鍚屾椂鍚湁鍏崇郴鏁版嵁鍜孹ML鏁版嵁锛夛紝鍙渶瑕佷竴涓畝鍗曠殑CREATE TABLE璇彞鍙婃柊鐨刋ML鏁版嵁绫诲瀷锛?br />
create table clients(

銆?d int primary key not null,

銆?ame varchar(50),

銆?tatus varchar(10),

銆?ontactinfo xml


涓轰簡璁块棶娣峰悎琛紝IBM鏀寔 SQL鍩轰簬琛屼笟鏍囧噯鐨勬墿灞曪細SQL/XML銆傝繖浜涙墿灞曞彲浠ヤ娇鐢ㄧ畝鍗曠殑SELECT璇彞鏉ユ绱?XML鏂囨。鎴栬?XML鏂囨。鐨勪竴閮ㄥ垎銆傞櫎浜哠QL/XML澶栵紝DB2杩樻敮鎸佹柊鐨刋ML Query锛堝嵆XQuery锛夎瑷??XQuery鏄敱涓囩淮缃戣仈鐩燂紙W3C锛夋帹鍔ㄧ殑涓?」鏍囧噯锛屾棬鍦ㄥ彲浠ユ煡璇ML鐨勫眰娆″寲缁撴瀯锛屾濡係QL鏃ㄥ湪鍙互鏌ヨ琛ㄦ牸鏁版嵁缁撴瀯閭f牱銆俋Query涓嶅悓浜嶴QL鐨勪竴涓湴鏂瑰氨鍦ㄤ簬锛屽畠鑳藉鎻愪緵璺緞琛ㄨ揪寮忥紝浠庤?浣跨▼搴忓憳鑳藉杞绘澗娴忚XML鐨勫眰娆″寲缁撴瀯銆備互涓嬬ず渚嬪氨鏄繑鍥炲鎴疯仈绯讳汉鏁版嵁鐨勭畝鍗昘Query锛?br />
xquery db2-fn:xmlcolumn(''CLIENTS.CONTACTINFO'')

鍋囪甯屾湜妫?储鎵?湁瀹㈡埛鐨勪紶鐪熷彿鐮併?浠ヤ笅鏄彲浠ョ紪鍐欐煡璇㈢殑涓?釜鏂规硶锛?br />

for $y in db2-fn:xmlcolumn


return $y

绗竴琛屾寚浠B2璋冪敤鍏禭Query瑙f瀽鍣ㄣ?涓嬩竴琛屾寚浠?DB2閬嶅巻CLIENTS.CONTACTINFO鍒椾腑 Client鍏冪礌鐨刦ax瀛愬厓绱犮?姣忎釜fax鍏冪礌杩涜?琚粦瀹氬埌鍙橀噺$y銆傜涓夎琛ㄦ槑锛氭瘡娆¤凯浠h繑鍥?y鐨勫?銆傜粨鏋滃氨鏄笅闈㈢殑XML鍏冪礌搴忓垪锛?br />
< fax>4081112222< /fax>

< fax>5559998888< /fax>

DB2鏀寔 XQuery锛岃繖鎰忓懗鐫?畠鏍规湰涓嶅繀鎶奨Query杞崲涓篠QL锛堣浆鎹細甯︽潵涓嶅繀瑕佺殑寮?攢锛屽苟涓旈?鎴愯涔変笉涓?嚧锛夈?瀹冧篃涓嶉渶瑕佸鎴峰皢XQuery璇彞灏佽鍦⊿QL璇彞閲岄潰銆傜浉鍙嶏紝DB2瀹㈡埛鍙互鍦ㄩ渶瑕佹椂鍏呭垎鍒╃敤XQuery鍜孲QL锛涚敋鑷冲彲鏈涘埄鐢ㄢ?鍙岃鈥濇煡璇紝浠庤?鍒╃敤姣忕璇█鍏锋湁鐨勭嫭鐗瑰姛鑳姐?鏂扮殑銆佸厛杩涚殑XML绱㈠紩鎶?湳琛ュ厖浜哣iper瀵筍QL/XML鍜孹Query鐨勬敮鎸侊紝鑳藉鎻愪緵鑹ソ鐨勮繍琛屾?鑳姐?


DB2 Viper绠?寲浜嗗湪鑷繁寮?彂鎴栬?濂楄鐨勫簲鐢ㄧ▼搴忎腑瀹炵幇DB2銆傛柊璁捐鐨勫紑鍙戝伐浣滃彴锛圖eveloper Workbench锛夊熀浜嶦clipse骞冲彴锛岃兘澶熷悓鍩轰簬Eclipse鐨勫伐鍏峰Rational Application Developer瀹炵幇鍏煎銆傚紑鍙戝伐浣滃彴銆佹敮鎸佺殑鎵?湁寮?彂鐣岄潰鍜孉PI浠ュ強鏂板伐鍏凤紙濡俋Query鏋勫缓鍣級閮藉寘鎷簡鏀寔鏂扮殑XML鎶?湳杩欎竴鍔熻兘銆傛槗浜庝娇鐢ㄧ殑XQuery鏋勫缓鍣ㄦ彁渚涗簡璇硶褰╄壊鏄剧ず銆佷唬鐮佽嚜鍔ㄥ畬鎴愶紝浠ュ強鍔犲揩鍒涘缓XQuery鍜?XML鏂囨。鐨勫叾浠栬澶氬疄鐢ㄧ▼搴忋?

涓轰簡瑙e喅鏁版嵁璐ㄩ噺闂锛孌B2 Viper鍏佽鍦ㄦ湰鍦癉B2瀛樺偍搴撲腑鍒涘缓鍙婃敞鍐孹ML妯″紡锛堣繖鏄彲閫夋搷浣滐級銆傜劧鍚庯紝搴旂敤绋嬪簭璇曞浘灏嗘枃妗f彃鍏ユ垨鑰呭鍏ヨ〃涓椂锛孌B2灏卞彲浠ュ鐓ц繖浜涙ā寮忔潵楠岃瘉XML鏁版嵁銆備负浜嗚幏寰楁渶澶х殑鐏垫椿鎬э紝DB2鍏佽鍦ㄨ〃鐨勫悓涓?垪涓瓨鍌ㄤ笌涓嶅悓 XML妯″紡鐩稿叧鐨刋ML鏂囨。銆傝繖鏍蜂竴鏉ュ彲浠ユ敮鎸佹ā寮忔紨鍖栵紝骞朵笖浣緿B2鑳藉婊¤冻涓嶆柇鍙樺寲鐨勪笟鍔¢渶姹傦紝鍙堢敤涓嶇潃鐮村潖鐜版湁鐨勫簲鐢ㄧ▼搴忥紝鎴栬?琚揩瀵规暟鎹簱妯″紡杩涜鎴愭湰楂樻槀鐨勪慨鏀广?

闄や簡XML鏂归潰鐨勬敼杩涘锛孌B2 Viper杩樺.NET鐜鍋氫簡鏇存繁鍏ョ殑鍒嗘瀽銆侱B2鏂扮殑.NET鏁版嵁鎻愪緵绋嬪簭鏈夊姪浜庡.NET Framework 2.0绫诲簱杩涜璁块棶銆傚畠杩樺彲浠ラ?杩囩紪绋嬩汉鍛橀?鎷╃殑璇█缂栧啓鑰屾垚鐨勫瓨鍌ㄨ繃绋嬫潵鎵╁睍 DB2鏁版嵁婧愯闂姛鑳斤紝杩欎簺璇█鍖呮嫭涓庨?鐢ㄨ瑷?繍琛屾椂锛圕LR锛夊吋瀹圭殑浠讳綍璇█锛堝C#鎴栬?Visual Basic .NET锛夈?DB2 Viper杩樺紩鍏ヤ簡鏀寔 Visual Studio 2005鐨勫寮哄瀷鏁版嵁搴撴彃浠躲?杩欎簺鐗规?鍙互鍏卞悓甯姪寮?彂浜哄憳缂╃煭涓篋B2鏈嶅姟鍣ㄧ郴鍒楀紑鍙?Net搴旂敤绋嬪簭鐨勬椂闂淬?



鍥? 鏃㈣兘绠$悊鍏崇郴瀛樺偍鍙堣兘绠$悊绾疿ML瀛樺偍鐨凞B2娣峰悎鍨嬫暟鎹湇鍔″櫒

DB2 Viper閲囩敤浜嗘柊鐨勫唴瀛樿皟鏁寸壒鎬э紝瀹冨彲浠ヨ嚜鍔ㄨ缃唴瀛橀厤缃弬鏁板拰缂撳啿姹犲ぇ灏忕殑鍊笺?涓?棪琚惎鐢紝鍐呭瓨璋冩暣鍣ㄥ氨浼氬湪鍑犱釜鍐呭瓨浣跨敤鑰呬箣闂村姩鎬佸垎閰嶅彲鐢ㄥ唴瀛樿祫婧愶紝鍐呭瓨浣跨敤鑰呭寘鎷帓搴忋?鍖呯紦瀛樸?閿佸垪琛ㄥ尯鍩熷拰缂撳啿姹犮?鍦╓indows鍜孉IX骞冲彴涓婏紝鑷垜璋冩暣鍐呭瓨鐗规?杩樺彲浠ョ‘瀹氭?鐨勬暟鎹簱鍐呭瓨闇?眰锛屽苟鍔ㄦ?璋冩暣鏁版嵁搴撳叡浜殑鍐呭瓨銆傝繖椤圭壒鎬цDB2鍦ㄥ伐浣滆礋杞介渶瑕佹椂鍙互浣跨敤鏇村鐨勭墿鐞嗗唴瀛橈紱鏁版嵁搴撳唴瀛橀渶姹傚緢浣庢椂锛屽彲浠ュ皢鍐呭瓨閲婃斁缁欐搷浣滅郴缁熴?



闈㈠悜Linux銆乁nix鍜學indows鐨凞B2寮曞叆浜嗕竴椤规柊鐨勫垎鍖烘妧鏈紝鍙互鎻愰珮鏁版嵁浠撳簱鐨勬?鑳斤紝骞剁缉鐭鐞嗘椂闂淬?鏂扮殑琛ㄥ垎鍖烘柟娉曢?甯哥О涓鸿寖鍥村垎鍖猴紙range partitioning锛夛紝鍙互涓烘瘡涓垎鍖哄畾涔夋暟鎹寖鍥达紝骞舵牴鎹暟鎹寖鍥村皢鏁版嵁瀛樺偍涓虹嫭绔嬪璞°?璀璇达紝鍙互鏍规嵁琛ㄤ腑鐨勬棩鏈熷垪锛屾寜鐓у勾鍜屾湀瀵硅〃杩涜鍒嗗尯銆傝繖浜涘瓨鍌ㄥ璞″彲浠ヤ綅浜庝笉鍚岀殑琛ㄧ┖闂淬?鍚屼竴琛ㄧ┖闂达紝鎴栬?涓ょ鎯呭喌鐨勭粍鍚堬紙瑙佸浘2锛夈?

涓嶈灏嗚繖绉嶅垎鍖烘妧鏈笌鏁版嵁搴撳垎鍖哄姛鑳斤紙DPF锛夌浉娣锋穯锛孌PF 鍏佽鏍规嵁鍒嗗竷閿拰鏁e垪鍑芥暟璺ㄥ涓暟鎹簱鍒嗗尯瀵规暟鎹繘琛屽垎甯冿紝寰?線鐢ㄤ簬鎻愰珮鍙墿灞曟?锛屼粠鑰屾敮鎸侀潪甯稿ぇ鐨勬暟鎹簱銆?br />
琛ㄥ垎鍖鸿瀛樺偍瀵硅薄鐨勮涓哄氨鍍忓崟涓殑琛ㄩ偅鏍凤紝閫氳繃浣跨敤ALTER TABLE...ATTACH璇彞灏嗙幇鏈夌殑琛ㄤ笌鍒嗗尯鐨勮〃杩涜鍚堝苟锛屼粠鑰岃交鏉惧疄鐜板揩閫熻浆鍏ワ紙roll-in锛夈?鍚屾牱锛岀敤ALTER TABLE...DETACH 璇彞寰堝鏄撳疄鐜拌浆鍑猴紙roll-out锛夈?鏌ヨ澶勭悊鍙互鍒╃敤鍒嗛殧鏉ラ伩鍏嶆壂鎻忔棤鍏崇殑鏁版嵁锛屼粠鑰屼负璁稿鏁版嵁浠撳簱椋庢牸鐨勬煡璇㈡彁渚涙洿濂界殑鏌ヨ鎬ц兘銆?br />
琛ㄥ垎鍖哄線寰?敤鏉ュ瓨鍌ㄤ緵鍒嗘瀽鐨勫巻鍙叉暟鎹?璀璇达紝鍏稿瀷鐨勪繚闄╂暟鎹粨搴撳彲鑳戒繚瀛樹簡涓夊勾鐨勭储璧旀暟鎹?灏嗘瘡涓湀鐨勬暟鎹浇鍏ヤ粨搴撳悗锛屾渶鏃╅偅涓湀鐨勬暟鎹氨琚瓨妗o紝骞朵粠娲诲姩琛ㄤ腑鍒犻櫎銆傛柊鐨勮浆鍏ュ拰杞嚭鐗规?鏈夊姪浜庤繖绉嶆暟鎹Щ鍔紝浠庤?缂╃煭浜嗙鐞嗘椂闂淬?鍙壂鎻忛?鐢ㄥ垎鍖轰腑鐨勬暟鎹彲浠ュ姞蹇煡璇㈤?搴︼紝浠庤?鎻愰珮鎬ц兘銆傝寖鍥村湪CREATE TABLE璇彞鐨凱ARTITION BY瀛愬彞涓姞浠ユ寚瀹氥?杩欎釜瀹氫箟浣跨敤鐨勫垪琚О涓鸿〃鍒嗗尯閿垪銆?br />
琛ㄥ垎鍖哄彲浠ュ崟鐙娇鐢紝涔熷彲浠ョ粨鍚堝叾浠栫粍缁囨柟妗堜娇鐢ㄣ?CREATE TABLE璇彞鐨勬瘡涓瓙鍙ラ兘鍚湁绠楁硶鏉ヨ〃鏄庡簲濡備綍缁勭粐鏁版嵁銆備互涓嬩笁涓瓙鍙ヨ〃鏄庝簡鏁版嵁缁勭粐绾у埆锛岃繖浜涚骇鍒彲浠ヤ互浠讳綍缁勫悎褰㈠紡鏉ヤ娇鐢細

鈼?DISTRIBUTE BY璺ㄦ暟鎹簱鍒嗗尯鍧囧寑鍦板垎甯冩暟鎹?浣跨敤杩欎釜瀛愬彞鍙疄鐜版煡璇㈤棿骞惰鏈哄埗锛屽苟涓旇法姣忎釜鏁版嵁搴撳垎鍖鸿繘琛岃礋杞藉钩琛°?杩欎釜姒傚康绉颁负鏁版嵁搴撳垎鍖猴紝寰楀埌浜咲PF鐨勬敮鎸併?

鈼?PARTITION BY鎶婁竴涓淮涓叿鏈夌浉浼煎?鐨勮鍒嗙粍鍦ㄥ悓涓?暟鎹垎鍖轰腑銆傝繖涓蹇电О涓鸿〃鍒嗗尯銆?br />
鈼?ORGANIZE BY 鎶婂涓淮涓叿鏈夌浉浼煎?鐨勮鍒嗙粍鍦ㄥ悓涓?〃鍖洪棿涓?杩欎釜姒傚康绉颁负澶氱淮缇ら泦锛圡DC锛夈?

杩欎釜璇硶鎻愪緵浜嗗瓙鍙ヤ箣闂寸殑涓?嚧鎬э紝杩樹负灏嗘潵鐨勬暟鎹粍缁囩畻娉曟彁渚涗簡鏀寔銆傜粨鍚堜娇鐢–REATE TABLE璇彞鐨凞ISTRIBUTE BY鍜孭ARTITION BY瀛愬彞浣挎暟鎹兘澶熻法鏁版嵁搴撳垎鍖猴紙鍒嗗尯鏈韩妯法澶氫釜琛ㄧ┖闂达級杩涜鍒嗗竷銆?br />
DB2 Viper灏嗘槸绗竴涓悓鏃舵敮鎸佹墍鏈変笁绉嶅父瑙佺殑鏁版嵁搴撳垎鍖烘柟娉曠殑鏁版嵁鏈嶅姟鍣ㄢ?鈥旇繖鏄姞寮烘暟鎹鐞嗐?鎻愰珮淇℃伅鍙敤鎬ф柟闈㈢殑閲嶅ぇ鍒涙柊銆?br />
鏁版嵁琛屽帇缂?br />
鏃╂湡鐨勬祴璇曠粨鏋滆〃鏄庯紝DB2 Viper鍘嬬缉鎶?湳鏈?鍙互鑺傜渷80%鐨勫瓨鍌ㄧ┖闂淬?鐢变簬琛岀殑澶у皬鍑忓皬鈥斺?杩欎細灏介噺鍑忓皯I/O鎿嶄綔銆佹彁楂樼紦鍐叉睜鐨勫懡涓巼锛岀墿鐞咺/O鎿嶄綔鐨勬暟閲忓拰缂撳啿姹犻渶姹備篃闅忎箣鍑忓皯銆傛渶缁堢粨鏋滄槸锛岀敤浜庡瓨鍌ㄦ柟闈㈢殑棰勭畻鍑忓皯浜嗭紱鍦ㄦ煇浜涙儏鍐典笅锛岃繕鎻愰珮浜嗘?鑳姐?

DB2 Viper鍘嬬缉瑙e喅鏂规绫讳技闈㈠悜z/OS鐨凞B2鎵?敤鐨勮В鍐虫柟妗堛?鍘嬬缉鏂规硶灏辨槸鎶婃暟鎹閲岄潰鐨勯噸澶嶆暟鎹ā寮忔槧灏勬垚姣旇緝灏忕殑绗﹀彿锛屼粠鑰屽噺灏忚〃鏁版嵁鐨勬?澶у皬銆傝繖绉嶈В鍐虫柟妗堜娇鐢ㄥ熀浜庤瘝鍏哥殑闈欐?鍘嬬缉绠楁硶锛岄?琛岃繘琛屽帇缂┿?涓庨潰鍚憐/OS鐨凞B2涓?牱锛屾墍鐢ㄧ殑鏄疞empel-Ziv鍘嬬缉绠楁硶鐨勪竴绉嶅彉浣撱?


CREATE TABLE鍜孉LTER TABLE璇硶鍖呭惈涓?釜鏂扮殑COMPRESS NO/YES瀛愬彞锛岀敤浜庤缃強鍙栨秷琛ㄧ殑琛屽帇缂╁睘鎬с?璁剧疆COMPRESS YES锛屼箣鍚庢墽琛岀绾跨殑琛≧EORG锛屽氨鍙互瀵硅〃涓墍鏈夌鍚堟潯浠剁殑琛岃繘琛屽帇缂┿?涓?棪璇嶅吀宸茬粡瀛樺湪銆丆OMPRESS YES宸茶璁剧疆濂斤紝鎻掑叆鎴栬?瑁呭叆鍒拌〃涓殑鎵?湁鏂拌灏卞彲浠ヤ娇鐢ㄨ繖涓瘝鍏歌繘琛屽帇缂┿?

鍘嬬缉璇嶅吀鏄?杩囨壂鎻忔暣涓〃锛岀劧鍚庢牴鎹〃鍊煎缓绔嬭?鎴愮殑銆傝繖绉嶆柟娉曟湁鍒簬涓烘瘡涓〉寤虹珛鍘嬬缉璇嶅吀鐨勫叾浠栨暟鎹簱鍘嬬缉鎶?湳銆傞?杩囧湪琛ㄥ眰闈㈣?涓嶆槸鍦ㄩ〉灞傞潰寤虹珛鍘嬬缉璇嶅吀锛屽氨鍙互鍒嗘瀽鏁翠釜琛紝浠庤?璇嗗埆妯″紡锛岃?涓嶆槸灞?檺浜庡垎鏋愬崟涓〉銆?br />
鍩轰簬鏍囩鐨勬帶鍒?br />
鏁版嵁搴撻潰涓寸殑鍐呭濞佽儊鍦ㄤ笌鏃ヤ勘澧炪?鍏徃浼佷笟鍜屾斂搴滅洃绠¢儴闂ㄩ兘鎵胯闇?鍔犲己瀵规暟鎹簱鐨勪繚鎶わ紝骞朵笖瑕佹眰杩欐牱鍋氥?DB2 Viper鍒╃敤鍩轰簬鏍囩鐨勮闂帶鍒讹紙LBAC锛夋潵瑙e喅杩欎簺瀹夊叏闂銆侺BAC鍦ㄥ崟涓鍜屽崟涓垪灞傞潰涓婃彁渚涗簡缁嗗寲鐨勮鍐欒闂帶鍒躲?

鍙皟鏁碙BAC鐨勫姛鑳戒粠鑰屾弧瓒虫瘡瀹跺叕鍙哥壒瀹氱殑瀹夊叏闇?眰銆侷BM寤鸿锛氭墍鏈塋BAC閰嶇疆搴旂敱鍏徃瀹夊叏绠$悊鍛樻潵鎵ц銆侱B2 Viper鍒涘缓浜嗘柊鐨凞B2瀹夊叏绠$悊鍛樿鑹诧紙SECADM锛夛紝瀹冨叿鏈夌壒瀹氱殑瀹夊叏鐗规潈銆?br />
瀹夊叏绠$悊鍛橀?杩囧垱寤哄畨鍏ㄧ瓥鐣ユ潵閰嶇疆LBAC绯荤粺銆傚畨鍏ㄧ瓥鐣ユ弿杩颁簡灏嗙敤鏉ュ喅瀹氳皝鍙互璁块棶鍝簺鏁版嵁鐨勬爣鍑嗐?鍒涘缓浜嗗畨鍏ㄧ瓥鐣ヤ箣鍚庯紝瀹夊叏绠$悊鍛樺垱寤哄悕涓哄畨鍏ㄦ爣绛剧殑瀵硅薄锛屽畠浠槸绛栫暐鐨勪竴閮ㄥ垎銆傚彈瀹夊叏鏍囩淇濇姢鐨勬暟鎹О涓哄彈淇濇姢鏁版嵁銆傚畨鍏ㄧ鐞嗗憳閫氳繃鍚戠敤鎴锋巿浜堝畨鍏ㄦ爣绛炬潵鍏佽鐢ㄦ埛璁块棶鍙椾繚鎶ゆ暟鎹?濡傛灉鐢ㄦ埛璇曞浘璁块棶鍙椾繚鎶ゆ暟鎹紝璇ョ敤鎴风殑瀹夊叏鏍囩鍜屼繚鎶ゆ暟鎹殑瀹夊叏鏍囩闇?杩涜瀵规瘮銆傚鏋滅敤鎴疯瘯鍥捐鍙栦粬浠殑LBAC璇佷功涓嶅厑璁歌鍙栫殑鍙椾繚鎶よ锛孌B2 灏变細琛ㄧ幇鎴愯繖浜涜涓嶅瓨鍦ㄤ竴鏍枫?涓嶈兘閫夋嫨杩欎簺琛屼綔涓轰换浣?SQL璇彞鐨勪竴閮ㄥ垎锛屽寘鎷琒ELECT銆乁PDATE鎴栬?DELETE璇彞銆傝繛鑱氬悎鍑芥暟涔熶細蹇界暐鐢ㄦ埛鐨凩BAC璇佷功涓嶅厑璁哥殑琛屻?璀璇达紝COUNT(*) 鍑芥暟鍙細杩斿洖鐢ㄦ埛鎷ユ湁璇诲彇璁块棶鏉冪殑琛岀殑鏁伴噺銆?br />


Taobao Alipay Betrayal?

Firefox in hidden page 7

3gpp to avi

matroska file

Interpretation Serv-U user attributes "ACCOUNT"

Hot Standby Knowledge

3gpp2 Converter

convert M2ts to mov

BenQ CD-R/RW discs identify the true and false

Zhou Chengyu Court hematemesis: die IN the end to fight a lawsuit

Comment FOOD And Drink

Review File Compression

50% Stake In MSN China, The Main Message Would Be Easy To Pass And Then Mad

IP And MAC Binding Of Crack

Job interviews when the topic of 15 "Forbidden Zone"

Wednesday, July 28, 2010

E world "means the consumer through a" good financial management easy

"E world platform" is "Chinese industrial clusters," in today's information age created specifically for businesses and consumers a platform. It is built between consumers and businesses a more convenient and efficient information access. So that they are no longer in the interests of the opposing ends, but in harmony with the platform.

Free to join business platform and won the "letter of trade through an integrated application management system." The system consists of online fingerprint payment system, promotion management systems, online ordering systems, billing systems and other components. Analysis of consumer behavior can help businesses to maintain customer loyalty; effectively locking customers, new customers doubled; optimization services, and enhance core competitiveness; but also enable businesses reduce operating costs, expansion of living space; platform for business gifts customer authentication system, allowing business is not a single business model, but equal participation in all walks of life. In order to achieve maximum business benefits.

For consumers, it is a good platform for free access. Application platform for financial management of consumption to the overall management of consumer spending plan, so that each of them a consumer can get the corresponding points of consumer stored value, stored-value points will continuously add value as platform, it can always exchange cash equivalents used system configuration fingerprint consumption patterns (consumption of a means through) so that consumers safe, convenient, fast and good taste to consume. Platform features the idea of "Lucky Day" (for the lucky day one day a month, spending a full refund) to attract consumers to actively participate.

"E world platform" to achieve the most advanced in human history, most scientific, most comprehensive solution to the supply and demand. Through social practice, resulting in extensive and positive social and economic effects, users and the community has been highly recognized.

And lead a group of sociologists, economists and state legal workers are highly valued. It represents the standard of the age of information platform, turned out to epoch-making significance.

Recommended links:

If The Day That Wal-Mart Has ". CN" The

[Modeling] Modeling and Agile Unified Process (2)

Video formats


Evaluate Java And JavaScript

Articles about Desktop

WiMax to Japan side LENGTH

avi Converter

how to convert mp3 to mp4

Step by step with me to learn X-Spaces personal space template changes

Job interviews when the topic of 15 "Forbidden Zone"

Struts framework beginners how-

Hands was a small component (COMPONENT entry) _asp

Monday, July 12, 2010

Multimedia courseware in teaching and learning and its correction

Today, the rapid development of information technology for education and teaching means, and methods to provide the conditions for change. Use of multimedia courseware teaching, has become a modern teaching a new teaching method. However, I know by observation found in the majority of educators to actively explore the use of multimedia courseware for teaching science at the same time, there are some parts of Multimedia Courseware into the misunderstanding, if not corrected, will certainly affect the development of information technology education and teaching quality improved. I talk a superficial understanding of this and recommendations.

1, multimedia courseware in teaching and learning

Misunderstanding one: courseware universal, stylish with courseware. Only use of multimedia teaching course is a good lesson, not by holding classes of multimedia teaching is not power plate, especially in the opening of public courses such as teaching classes to observe activities especially. Multimedia courseware for teaching is not to the actual needs of teaching, some lessons can and should use more direct means of teaching is not intuitive, but turning it into a virtual means, the truth is in front, swing show, the multimedia courseware understanding of the nature of the role of knowledge into the errors.

Misunderstandings 2: Courseware inclusive, all-encompassing. The teaching materials, information, writing on the blackboard all move into the multimedia content, teach those who just knocked on the keyboard in class, little mouse, waved his wand e-education, and some even operate the entire class does not leave the projector unit half a step, at best show only one electronic lesson plans, became a full house "electric irrigation", which is into the use of multimedia courseware diagram easily, effort and the error.

Misunderstanding number three: courseware design limitations, one-sided. Class Design and emphasis on technical aspects of information operations, neglect pedagogical level. Some people do not produce their own courseware and invited others to help create, the lack of communication and integration, the results of the courseware system and the professional, the subject is far from teaching objectives and requirements, can not reflect the religion's teaching ideas, teaching intentions, teaching literacy and style. This is the idea of formation of multimedia courseware links misunderstanding.

Misunderstandings 4: Courseware Hu in fancy. Add items caught up, easy to operate, interface display clear, custom design, background music set off so overwhelming and color scheme improperly, less than dynamic, interactive, intelligence is not strong, and so on, are not fully reflect the characteristics of multimedia teaching and advantages. Obviously, this is step into the production technology of Multimedia Courseware, methodological errors.

Second, correction of errors Multimedia Courseware

A clear understanding of the nature of multimedia courseware, role, and actively teaching appropriate use of multimedia courseware.

Multimedia Courseware large, with information on the comprehensive, dynamic and interactive, have become a new bright spot in the classroom teaching. However, the use of courseware teaching practices from the level of theory, after all the problems, not an end in itself, but rather a means of teaching, is teaching the carrier and manifestations, therefore, can not use the courseware as universal subjects Division, were prepared panacea. Whether the use of multimedia courseware teaching, should be considered the needs and possibilities of teaching decisions and should not be made under the provisions of certain lack of, or made unrealistic demands. In general, large amount of multimedia information, the information integrated and interactive, able to complex things simple, the abstract into concrete, is more suitable for liberal arts and basic theory of science and engineering research. But science and engineering, apart from some of the unsafe and difficult to operate a successful experiment, in the case to the professional teaching practice that is part of the operation of a switch virtual link, use the courseware teaching the blind pursuit of the "new" and "strange "" fashionable ", it is not proper

In the current teaching, there does not consider the use of multimedia courseware for teaching the practical needs of teaching is only window dressing to create the surface effect of the tendency of formalism is entirely due to a number of local educational administration, the availability of multimedia courseware as a measure of a class an important basis for the scientific success of the evaluation-oriented mechanism. Teaching in all subjects, teaching effectiveness should be based on the principles and purposes of the application of advanced technology, the reality of teaching, actively teaching appropriate use of multimedia courseware. Should have a positive use of multimedia and traditional teaching media relations, to overcome the courseware universal, multi-media monopoly class phenomenon, so a variety of teaching methods, methods of application to achieve a harmonious and efficient.

2, specifically the use of multimedia courseware for teaching purposes, improve teaching efficiency and quality efforts.

Courseware for teaching purpose is to make students more relaxed, happy, motivated to learn, access to integrated information services, accelerate the learning process, stimulate creativity, enhance learning efficiency. As informative multi-media teaching, teaching rhythm to speed up, thinking of the students small space, and how to solve the transmission of information to receive additional information and the conflict between ease the burden on students, teaching more work pressure faced by the task more difficult.

To grasp the multi-media courseware is the presentation of some teaching content, and text, graphics, images, animation, voice combine the characteristics of a variety of media, in line with teaching the idea of reform, in order for teaching to do, "focused, decentralized and difficult , stimulated interest in teaching activities, improve efficiency, "and targeted use of a variety of media, to enhance the performance of multimedia courseware and affection. Multimedia courseware in teaching, we should pay attention to interactive control by computer to receive information on the initiative, dynamic characteristics, creating an interactive learning system, the introduction of research in teaching learning, hierarchical learning, and other modern teaching ideas and methods so that students can take the initiative active learning, change "learn" to "learn" to develop their innovative spirit and ability. After the introduction of the multi-media, with the update teaching methods, teaching media, the increase in teachers mechanism should be more flexible. Education should not be bound courseware, constraints, and should help courseware form, the effort to explain, analyze, temper art of teaching, improve teaching quality, and guide the students thinking to teaching teachers and students greater freedom. To prepare lessons carefully and fully understand the students, the problems of the class to grasp, control, firmly reject the kind of full house "electric irrigation," the negative tendency graph easy effort to ensure that students learning.

3, operating at the technical level to strengthen information and communication links between the disciplines of teaching, on the courseware designed.

Multimedia courseware is the teaching of modern information technology, combined with the subject product. Courseware for the formation of the current emphasis appears in information technology operations, ignoring bias pedagogical content, and want to grasp the overall courseware, teaching staff and information for professional technicians with good communication, through joint research, carefully planning, so that the system software in the academic performance of teaching content and form of vector integration, unity, to overcome the gap between the two, to conform to the characteristics and requirements of teaching subjects. If conditions, the parties should strive to overcome the courseware, insisting on their own multimedia courseware designed to make their own teaching ideas, teaching quality and style perfectly accurately reflected in the courseware.

4, to carry out courseware production technology, methods and research, so the correct information expressions, manifestations and reasonable standard.

The complexity of the requirements of multimedia technology to enhance the multimedia courseware production technology, methods of research. Courseware General to go through topics, write scripts, to collect material, select the software production, adjustment, packaging and a series of procedures, steps. Courseware should pay attention to the process of overcoming the scattered and isolated phenomenon, and the use of courseware to strengthen the centralized and unified leadership and management to give full play to the overall synthesis of all the professional functions of all departments to improve courseware utilization. To implement the principle of effectiveness of courseware, adhere to each production step, link quality, technical standards, to ensure correct information expressions, manifestations and reasonable standard.

A good courseware should have the following characteristics: to help classroom teaching or student learning; knowledge accurate; a map, sound, text interaction effect; picture vivid and interesting; operating flexibility; courseware package can run on different post-operation platform. Deviate from the students to change the dominant position of courseware, deviate from the key and difficult to solve each class, the content of exhaustive, interface bells and whistles, the students perceived a strong stimulus, confuse the overwhelming and affect the student attention, reduce the multimedia effects of the status quo multimedia courseware to embody the teaching of its ancillary features and advantages.

Recommand Link:

Moyea YouTube Downloader

WorldCup SWF to DVD

DVD ripper

video formats

Christmasgift DVD to MPG

Server Applications Report

Premier Backup And Restore

Lohan IPhone Converter

Bliss DVD-AUDIO VQF CD to M3U Editor

Bliss CDA OGG CD-R to Midi Copier

Articles about Site Administration

Youtube Video to PDA Home

How to convert m4a to m4r


Mp4 To 3gp Converter

AllRipper DVD to PS2