More About the Author "jojo"

Author Nick: jojo
Site:


Articles by jojo :

Sort by:

Accessories traditional festivals and cultural origin of the Chinese knot conten

A red string, tied to such a three-two around; a blessing, so knitting is made.   Reinforced Cement Modern jungle, the way people express wish more modern: the phone call, send a E-MAIL, gift telegraph, gifts of flowers, etc., so that the pursuit of light and breezy style, pay attention to the efficiency of modern […]

Safe room – china Multifunctional Drilling Rig – Mud Pump

Construction techniques Grillwork Safe-Haven This file is a candidate for speedy deletion. It may be deleted after seven days from the date of nomination. The simplest safe room is simply a closet with the hollow-core door replaced with an exterior-grade solid-core door that has a deadbolt and longer hinge and lock plate screws. More expensive […]

What advantages network video surveillance cameras and application trends – Netw

System Advantages Based network camera system has the following advantages: Nature: use of the existing cabling network transmission of images, real-time Monitoring System Front-end equipment needed for less connection simple, back-end software system can be set only; Reliability: Major equipment network camera using embedded real time operating system, simple equipment, and image transmission through the […]

Stone informed: advanced packaging products and technologies, significant progre

Recent years, the global Semiconductor Giant almost all of mainland China established its own package production lines, international semiconductor packaging and testing companies in the mainland, production line, in general, in two ways, one is IDM (vertical integration model) Holding joint venture IC packaging and testing plant, such as Shenzhen STS , Infineon Suzhou, Shanghai […]

Chinese hackers Trojan chain forming the Revenue Chaobai Yi Yuan – hackers, blac

HC Network Security  November 25, 2009 CCTV "economic half-hour" broadcast "Trojan forming industry in 2009 revenue Chaobai Yi", the following is the program Record: The most recent period, the implementation of the network computer Trojans Crime Cases emerging, such as stealing banking account passwords, game equipment and even personal privacy, and many, makes hard to […]