Wednesday, August 6, 2014
Xiaomi had a vision to overtake Apple in China. However, they didn't just overtake Apple they also challenge Samsung by taking a lot on their market share.
China is the top single smartphone market in the world. Canalys research indicated that 37% (108.5 million handsets) of all smartphone shipments globally went to China. And with a high demand on advanced phone that caters 4G/LTE connectivity, Samsung got the top spot. However, not this time Xiaomi a newbie in smartphone industry have overtaken Samsung, they shipped 15 million units against Samsung's 13,200,000 units. Xiaomi eating 14% of the marketshare in China.
With a lot of Chinese smartphones to choose from (Huawei, Lenovo and ZTE) why Xiaomi? Lei Jun of Xiaomi said that their secret is they built up massive customer loyalty by letting their users involve in the development of features and software. Selling Xiaomi phones with very low margin also helped them since it lessen the cost of the phone that is easier to the consumer's pocket.
Jingwen Wang a research analyst said, "This is a phenomenal achievement for Xiaomi. Undoubtedly this was helped by an anticipated, temporarily under-strength Samsung performance during the quarter. But that is only half the story Xiaomi has also executed on its strategy to grow volume shipments. It has delivered compelling products at aggressive price points, focused chiefly on its locally relevant MIUI software features and services, backed by effectively targeted marketing.
As for exporting of Xiaomi's phones, only 3% are exported to other countries. However, this will not stay that way since the company is aiming to conquer other emerging market like India. The 15,000 units of Mi3 were sold in just 2 seconds in India.
No Contract Plans.com - find the best no-contract plans for your phone.
Monday, May 5, 2014
When you want to create a meme we scan the web for the image we like then save it, then edit the picture to add text. Want to make things easier? Use the browser extension Project Naptha developed by Kevin Kwok. Project Naptha lets you copy and paste text on images and translate it into any language. Once you install it on your browser you can choose any text on an image online and select it and paste it on another image.
Project Naptha is a text detection program that is designed to fit into a browser as extension. It is based on OCR functionality that first optimizes the image for the block of text.
First you will need to optimized the text,then select the text on the image and right click and select the "Copy text" from the menu option.
Once you copy the text, the program will translate your selected text, it will be digitized and then you can paste it anywhere.
You can also change the language of the text on the image that you have selected. Just use the translate menu, and choose any language. Then just copy and paste, no need to use Google translator.
Sunday, April 20, 2014
Here are some Methods you can follow:
- Location Data: Most websites employs location data to identify your location so that they can use advertisement that within your area. So it will be best if you turn it off on your browser. You can also set it as "prompt me when necessary." You can also use Proxies or VPN server that would help you in hiding your IP and location.
- Third Party Cookies: using this online marketers or webmasters can easily track your identity and identify your browsing habits. This is the strategy used by online advertisers like Google to track your searches and where you have been. If you turn it off, they will not be able to track them.
- Plugin Access: Installing plugins on your browser will give them access your computer, that may also be use to get your identity. You can easily turn off your plugin access.
- User Agent Spoofing: Keep your identity safe by using "User-Agent Switcher" or "User Agent Over rider" extensions.
- Do not Track: You can use the option "Do not Track" on your browser setting to keep your browsing private.
Using these methods you can protect your identity online and prevent identity theft. You can also use "https" instead of "http".
Thursday, April 10, 2014
There are a lot of things happening on the internet right now, from funny videos, to finance, and some illegal stuff. There are also a lot of pirated musice, movies, and TV shows on the internet sometimes when you view them your data becomes unsecure and it compromise your online security that increases the illegal activities. There are also pornography that not only cater to ordinary people but also sick and demented people who likes child pornography.
Researchers at the University of Twente found out that there are ways to scan the internet traffic and track illegal photographs which is really important to stop child pornography.
However, even though the intentions of this system is to scan the Internet traffic for illegal photographs it might also be considered as an intrusion of privacy by some people. The research team who created the system said that the privacy of the owner of the photographs will remain secure. It would seem that the system allows the police only see the number of illegal photographs on the internet and not the actual photographs themselves.
The police databases has no illegal photographs, they just contain features of the photos that are expressed in numbers or known as hash values. If the police confiscate computers and memory sticks, the database is use to compare known hash values with those of the photographs on the devices. However, for security reasons, these databases cannot be used to scan the Internet. It will require an encryption system, and this is precisely the gap that the new system wants to bridge.
Researcher Andreas Peter says: “You can compare it with a sort of safe, the contents of which you cannot see but in which you can place photographs. Subsequently, it is the ‘safe’ alone that scans the photographs and then sends a confidential report to the police. The police can open this report with a special key. The report indicates how many illegal photographs are in the safe.”
Using the new system, internet users are also able to track their network using the police database.