Tag: 上海水磨实体店


GeForce Now levels up for Android and RTX servers


first_img Preview • Nvidia Shield microconsole streams PC games via Nvidia’s Grid, runs Android apps The latest information on Google Stadia Post a comment 4:48 Nvidia Shield Android TV The gaming experience isn’t complete without a good chair Now playing: Watch this: Nvidia Computers Gaming Mobilecenter_img 56 Photos Tags 0 GeForce Now has been steadily adding games since its original Nvidia Shield launch four years ago. Screenshot by Lori Grunin/CNET With Google’s Stadia cloud-gaming service launch only months away, it shouldn’t surprise me that Nvidia’s almost ready to release its big competitor, GeForce Now, into the wild. In one of its many announcements at Gamescom on Monday, the company revealed “the sun is starting to set on the free beta period.” It’s possible that the company’s been waiting for one of the heretofore big missing pieces, Android support, to be put in place, and now the beta app for the beta service is rolling out to beta subscribers. The RTX Blade servers Nvidia announced last March are also coming online to (hopefully) bring better scalability, quality, performance and stability to the service, starting with Germany and California.Nvidia highly recommends using a Bluetooth controller for Android, since “some games will be unplayable on an Android phone without a gamepad.” Of course, we still don’t know how much it will be when people have to start ponying up or if Nvidia will stick to its “for x hours of gaming” model, two of the huge unanswered questions.GeForce Now, which lets you play games on a relatively low-power local device by rendering them in the cloud and “streaming” the frames to you while sending your input back, is unusual in that you can’t buy games through it, nor is it an all-you-can-play vault service. The app is essentially a hub for games you already own (that have GFN support), and when you hit “play” it runs the relevant launcher for a particular game, such as Steam. Review • Nvidia Shield review: A gamer-friendly 4K streamer in search of mass appeal Share your voicelast_img read more


Impressions that linger on


first_imgKorean Culture Centre has organised an exhibition titled Hanji Impression that  introduces ‘hanji’ to India by Korean and Indian artists Park Yeo-Sang and Sharmi Chowdhury that commenced on January 15. Hanji literally means ‘the paper of Korea’. The main material is the fibrous skin of the mulberry.Hanji is not simply paper. It is used in a variety of ways, and has a different name according to its use. Both the artists uses Hanji as the base for their artistic interpretations.  Even with changing times and the dominance of smart phones and digital culture, nothing can completely replace paper. As a medium of expressing emotions, the artists hope that hanji undergoes a transformation at the hands of the artists to become a valuable piece of artist. As a part of exhibition, workshops on Hanji making, Hanji book making and Hanji calendar making also took place. Also Read – ‘Playing Jojo was emotionally exhausting’Taking a look back at the history of mankind, one can say that the invention of paper marked the beginning of civilization. It is on paper that letters and characters were carved and books written and this material has been a source of progress for man. Through the invention of paper, man was able to leave behind wonderful works of art instead of leaving artistic imprints only in caves. Korea’s traditional hanji boasts a history of over a thousand years. The world’s oldest book printed with a metallic printing type was printed on hanji. This book was published in the 14th century and has been preserved for over 600 years in its paper form to exhibit the high preservation quality of hanji. The hanji that is produced traditionally and the type that is machine-produced both have a soft and warm quality. Hanji has the unique feature of being able to transmit the emotive qualities and thus provides attraction to today’s artists.When: On till February 5 Where: Exhibition Hall, Korean Cultural CentreTiming: 10 am – 5 pmlast_img read more


Building a Profitable Wearable Device May Depend on Who You Partner With


first_img Opinions expressed by Entrepreneur contributors are their own. Hear from business owners and CEOs who went through a crippling business problem and came out the other side bigger and stronger. Problem Solvers with Jason Feifer Apple scores big in marketing, channel and brand, and has the best chance to take a product mainstream. Just look at how the iPad overtook a decade’s worth of tablet PCs in less than a year.Google’s open Android platform enables a product to be built on top of its code and offers access to Android apps.Microsoft has the best depth sensor, and its operating systems have already proven themselves in a number of products. What the company currently lacks is the ability to attract experienced and new developers, but by ‘acquhiring’ a tech startup, that problem will be easily solved.Amazon is now the go-to source for product searches, offering access to more than 100 million products — and their potential buyers. It’s more of a partner than a manufacturer of wearables.Facebook brings to the table 850 million people, making it the partner of choice for any wearable that aims to leverage facial recognition or social sharing.Do you think its possible to build a mainstream tech offering in the wearable category without the assistance or partnership of Apple, Google, Microsoft, Amazon or Facebook? Let us know in the comments below.  min readcenter_img Wearable electronic devices have moved beyond the pages of comic strips like Dick Tracy and have appeared in everything from eyeglasses that incorporate GPS to running shoes that pinpoint their wearer’s immediate location and bracelets that tabulate one’s exercise efforts.But wearables are still far from mainstream, and the next round of product engineering will require exploiting the relative strengths of the “big five platforms” — i.e., Apple, Google, Microsoft, Amazon and Facebook.So says a new report from Forrester Research Inc., adding that without these Blue Chip Companies, wearables — defined as “devices worn on or near the body that sense and relay information” — are just another passing fad.According to the Forrester report, five platforms are the only game in town — each with its own specialty: April 19, 2012 Listen Nowlast_img read more


11 Tips to Secure Mobile Devices and Client Data


first_img You have employees. They bring smartphones to work. All is fine, right? Wrong.Related: Meet the Cybersecurity Startup That’s Caught the Eye of Google’s Eric Schmidt First of all, the second an employee brings a personal mobile device to work, you can bet on a fusion of personal and business affairs occurring. This was evident when 2,000 office workers were surveyed as to:How many downloaded personal apps to tablets issued by their employer: 73 percentHow many did this with smartphones their company issued: 62 percentHow many did it with company-issued notebooks: 45 percentThe age group most guilty of this: 25 to 38 years oldThe number who used their smartphones and other mobile units to conduct company business: over 50 percentThat last percentage was slightly better news. But it hardly canceled out the aforementioned misuse, which may result in who-knows-how-much company business leaking outside the building to who knows where. That “50 percent” also raises the question: Have you, a decision-maker at your company, devised any plans to prevent or minimize how much company data leaves your building, in the form of storage inside your employees’ smartphones and other mobile devices?The solutions may lie in the strategies that company decision-makers and IT managers can draw on to control data leakage. These strategies fall under something called enterprise mobile management. But cooperation is required from both parties: the company and the employees.As a decision-maker, then, you’d be smart to think: “We’ll just never know, will we, where an employee’s smartphone ends up on the weekends — a device loaded with our most sensitive data!”Solutions for businessesBusiness owners and other company decision-makers should regard the personal smartphone as a potential company diary. You don’t want this diary going all over the place after hours. You don’t want it easily opened for all to see what’s written on the pages.Related: 4 Essentials to Secure Your Business Even From State-Sponsored Online ThreatsSo, try consider these strategies:1. Teach employees about phishing scams.Phishing maneuvers are a leading way that cybercriminals steal data. Research shows how easy it is to get employees to fall for these scams: The worker receives an email that has an urgency to it (e.g., subject line: “Get back to me asap”). Inside the mail is a link that the sender urges the recipient to click on. The link takes the user to a fake website that lures him or her into revealing sensitive company information.2. Inform employees that the sender may pose as the company’s bank or as someone from the board of directors.Even after being taught about phishing, employees may still be suckered into clicking on a link inside an email — as staged phishing attacks have shown. To make things simple and to avoid confusion, simply demand that employees not click on any links inside emails. No exceptions. Tell them that nobody will be penalized for not clicking on a link inside an email.3. Employees should be suspicious of free download offers. Clicking on these could activate a computer virus.4. Employees should buy applications from a trusted app store rather than from third-party sources.It’s hard to know what those third parties’ true motivations are.5. Employees should be sure to protect all their devices with passwords.If an employee leaves a device unattended, or it’s lost, could the finders get into any documents, or have to type in a password (which they don’t know, of course)?6. All devices used for business should have a “wipe” function.The more employees you have, the harder it will be to get every single one to password-protect his or her devices. Another layer of protection, then, is to require a “wipe” function. If the device is lost or stolen, all the data on it can be eradicated — remotely.7. All devices used for business should erase their data automatically after a set number of password attempts. This will discourage hackers.8. All devices, especially Androids, should be required to have anti-virus software.This protects the device from malware that comes with an app that’s downloaded.9. Employees should never “jailbreak” or “root” a mobile device.Malware can infiltrate if the walled garden of the device is broken down because the user has manipulated the device’s factory-installed operating system.10. Employees should activate their update alerts immediately rather than opt for “remind me later.” These updates patch up security holes so that evolving cyber-pathogens do not gain entry.11. Employees should be made aware that Wi-Fi in public is not secure.Even though connections to public Wi-Fi will say they’re not secure, not all users notice this alert; and some may not even know what it means. Instead, using a virtual private network (VPN) will significantly boost security for your company’s sensitive data. A VPN service, such as Hotspot Shield VPN, encrypts all cyberspace transmissions, scrambling them so that hackers can’t make sense of them.Certainly it’s true that employees themselves may be crooks working from the inside to commit cybercrime. But a significant volume of data leakage still stems from simple carelessness by employees — and a lack of information and knowledge about security. What have you done about this threat at your own company?Related: Password Statistics: The Bad, the Worse and the Ugly (Infographic) Opinions expressed by Entrepreneur contributors are their own. 5 min read June 11, 2015 Hear from Polar Explorers, ultra marathoners, authors, artists and a range of other unique personalities to better understand the traits that make excellence possible. How Success Happens Listen Nowlast_img read more