Monday, March 19, 2012

Programmable LED remote controller

this well-designed remote led controller's manufactured by shenzhen sunricher, the following is some details of its specifications, you know more info about this led remote controller,visit sunricher led lighting *Programmable LED remote control with wireless *Programmable remote control *4zones control with wireless *LED strip control led controller

Tuesday, March 6, 2012

Wireless RF rgb remote controller

wireless RF rgb remote control


Place of OriginGuangdong, China (Mainland)
Brand Namesunricher
Model NumberSR-2806
TypeRemote Control
Operation Frequency868MHZ/915MHZ
colourBlack / white
matchingRGB cocntrollers

Detailed Product Description

rgb remote control
(1) 10 ZONES remote control by 1 remote
(2) matching with SR-1003RC/1012RC/1022R
rgb remote control
Matching with 1003RC/ 1012RC/1022RC RGB controller.
Working frequency: 868MHZ or 915MHZ, conform to Local Europe and US laws
Comply to R&TTE and FCC
Touch sensor technology Color is applied to color SR-2806, easy to operate
Neat design, high performance and durable,
  By selecting switch state, you can set the system as RGB 3-channel output, or RGBY 4-channel output. Use Easy RGB(Y) remote controller, you can get whatever color you want; you can choose any color from RGB(Y) to adjust so as to mix more than 100 million kinds of colors.  With built-in 10 kinds of color moving modes, you can easily switch moving modes and adjust moving speed and brightness. When mode is changing, you can use pause function, let the RGB (Y) light to stay at your favorite color. All operation is very simple, but function is powerful.
There are three working frequencies for option: 434MHZ,868MHZ or 915MHZ, they are suitable for Europe, Americas and all global market demands .All product completely comply with European CE regulations and American FCC regulations

Wednesday, February 29, 2012


译者 财富中文网

作者: Brian Dumaine    来源:led controller

版权声明:本文内容版权属于时代公司(Time Inc.),并经过时代公司许可由香港中询有限公司出版和发布。版权所有,未经书面许可,任何机构不得全部或部分转载。 

       十年前,施正荣博士前创办尚德电力(Suntech)时,他做梦也没想过自己的太阳能电池板公司这么迅速就能达到现在这样的高度。尚德电力位于中国无锡,制造的高质低价太阳能电池板远销全球80个国家。作为行业龙头,尚德在2011年的销售额大约为31亿美元,同比增长了7%。不过,尚德遇到的阻碍也不少。激烈的成本削减已经对所有太阳能股造成了损害,尚德也无法幸免。此外,美国商会(The US Chamber of Commerce)最近指称,中国的太阳能公司存在倾销行为。即便如此,施正荣博士仍看好太阳能产业的发展前景,尤其是在中国国内市场不断升温的情况下。这次瑞典达沃斯的世界经济论坛(WEF)期间,他接受了《财富》杂志(Fortune)布莱恩•杜梅因的采访,跟我们分享了他的看法。




Saturday, February 18, 2012

Google Public DNS 成为世界最大 DNS 服务商,每天请求超过 700 亿次

Google Public DNS 成为世界最大 DNS 服务商,每天请求超过 700 亿次:

Google官方宣布他们的Google Public DNS自2009年12月发布以来,已经成为世界上最大的DNS服务商,每天请求超过 700 亿次。

Google还宣布目前有超过1000万人才使用Google Public DNS服务,70%的DNS流量来自美国境外,其最大的几个请求地区包括北美、南美、欧洲和新兴的亚洲国家。

最后再提醒一下,Google Public DNS有两个DNS地址,分别是8.8.8.8和8.8.4.4,他们也支持IPv6,地址分别是2001:4860:4860::8888和2001:4860:4860::8844。

Via 9to5google

© musiXboy 发表于 谷奥——探寻谷歌的奥秘 ( ), 2012. |
9 条评论 |
永久链接 |
关于谷奥 |

Post tags:

Thursday, February 9, 2012

A Look at Steve Jobs’ FBI File

A Look at Steve Jobs’ FBI File:
fbi-seal.pngYes, it's true. The FBI had a file on Steve Jobs. It's not what you might think, though. The FBI performed a "level III" background investigation on Jobs as a potential presidential appointee in 1991. He was described by most witnesses as an "individual of good character and integrity" that would be suitable for a "position of trust and confidence with the Government." Jobs also had a brush with the FBI when Apple received a bomb threat in 1985.

According to one of the filings, Jobs was being considered for an appointment to the President's Export Council in early 1991. This was while Jobs was president of NeXT computer. (This would have been during George H. W. Bush's term.)

The file is 191 pages (as a PDF) and was requested by Michael Morisy of MuckRock. Morisy says that he became curious about Jobs' "behind-the-scenes" interactions with government after Jobs' death. "He was a famously private man, and almost apolitical in a lot of ways, but regularly courted for his opinion and advice.

"Government documents are also just generally a great way to get a look at public figures' lives: You can get a behind the scenes view that's otherwise not available, whether that's past legal trouble, quietly helping the feds or receiving death threats, and I think all of that is a valuable part of the story."

What the Documents Reveal

According to the memo outlining the investigation (page 160), Jobs would have been in a position to "make decisions concerning policy and personnel matters." The questions about Jobs related to drug use, whether he lived within his means, his trustworthiness and whether there was evidence of prejudice or bias on his part. According to the memo "the last 10 years of appointee's life must be accounted for."


Almost all of the people interviewed by the FBI seemed to give Jobs high marks, though there's at least one individual (name redacted) interviewed on March 11, 1991 who said Jobs was "not totally forthright and honest" and "has a tendency to distort reality in order to achieve his goals." (Perhaps that's where the phrase "Jobs Reality Distortion Field" came from...) Also interesting, the same individual said that Jobs was suitable for a "high level political position" in government because "in his opinion, honestly and integrity are not prerequisites to assume such a position."

The last section of the document details a bomb threat to Apple in February 1985 that turned out to be a hoax. The FBI doesn't seem to have found the caller.

It might sound like 191 pages would contain a wealth of information. However, much of the documents consist of government paperwork and coversheets that convey very little. (They do reveal that being in the FBI does not actually require neat penmanship.) The file also contains records of suits Jobs was involved with when with Apple and NeXT. There's very little in the document that's not already public knowledge.

But it's interesting to comb through and see what kind of information the FBI had on Jobs, and likely has on a number of other public figures. If you want to do your own Freedom of Information Act (FOI) requests, you can use MuckRock as a tool to do so. Morisy says that MuckRock tries to make "a really important, but really tedious, part of journalism and make it fun, social and easy for both journalists and regular users. For the first time, anyone can request almost any government document with just a few clicks and we think that's a really powerful tool for transparency。

Saturday, February 4, 2012

Things you should avoid

Things you should avoid:

As you go about working on your websites, optimizing things and managing your social media programs, it’s easy to lose track of information, or overlook something. In this post we’ll take a look at some things you want to avoid doing. It may also be worth taking a look through your site and your programs to make sure you’re not doing any of these things moving forward.


Cloaking is the process where you determine who the visitor is coming to your website, then show content depending on who that visitor is. Typically, the system detects a search engine crawler, and swaps more search-friendly content in place for them. Human visitors would then see a different content page. Taken to the limit, the content is completely different. This is an obvious problem for the engines, as we expect to see the same content as anyone else would. Showing us one piece of content and other visitors a different piece of content is misleading. You want to avoid this.

Link buying

It’s no secret that inbound links play a role in ranking. It’s also no secret that we don’t want you buying links. There are a lot of services out there pitching this service, and calling it anything but “link buying” these days. The bottom line is this: you are taking a big risk if you are buying links.

If we discover the link is purchased, at best we’ll simply ignore it and not pass any value, which is what happens in most cases. This is still pretty bad for you, though, as you paid money for something that now gives you no value. At worst, if it gets to be problematic for us, we’ll take action against the sites involved.

Link farms

Links to your content should grow organically. Link farming essentially involves a network of sites which all link to your content. On paper this would seem to create the impression that a bunch of sites now link to your content. In reality, we see link farms and dismiss their value. Again, you’ve paid money and will receive no value for it. Given “link farms” are typically deemed to be more problematic than random buying of links across websites, you want to avoid associating your domain with these sorts of places. Read more about building links the right way in this article.

Three-way linking

Site A links to Site B. Site B links to Site C. Site C links to Site A. This may seem to be preferable to reciprocal linking, but it’s not, really. Reciprocal linking can not only introduce us to your newest content or site, but can also deliver direct traffic to your website. True, it doesn’t carry the same value as a straight one-way link, but you’ve got to start somewhere.

Three-way linking is often an attempt to avoid being seen building reciprocal links. Don’t sweat reciprocal links and avoid three-way linking.

Duplicating content

We recently wrote and in-depth post on article site sourced content. Duplicating content is a pretty simple concept. You’re posting content which already appears somewhere online. Using articles from third-party sources, copying and pasting from another source and using standardized product descriptions for items you’re selling all fall into this category. Your content should be unique and not appear anywhere else online. Building unique content takes work.

Another form of duplication can happen when you fail to manage permutations of your URLs. When you attach a tracking code to your URL, for example, you create two versions of a URL, both of which will return the same content. You can help guard against this by managing the issue through the use of the rel=canonical attribute.

Like farms

Like farms are similar to link farms. In this instance, you’re essentially trying to manipulate the “likes” you receive by agreeing with others to like each other’s’ content. These types of approaches are very obvious to a search engine, and we simply ignore the data we see. It wastes your time and does nothing to help your rankings. Read more here about like farms (and link farms, too).


Using an auto-follow service to help grow the number of followers you have on Twitter is another dead end. You essentially end up following as many people as follow yourself. To Bing this looks non-authoritative. If, however, you have 4,000 followers and follow only 100 people yourself, this reflects a situation that many people want to hear what you have to say; a sign of authority. Learn more about what it takes to be an authority here, and how to grow your social following the correct way, here.

The thin content approach

Thin content can describe many approaches to producing content. To help you understand what it is, we’ll explain how to produce content which is not “thin” in nature. When producing content, your goal should be to provide deep details. Enough information that anyone who arrives on your website would need no further sources to feel they have everything they need to understand what they were searching for.

We covered how to build quality content in a previous article, so check that out for more information. Just remember to avoid trying to take short cuts when you produce content. The search engines need good quality content to return worthwhile results for searchers. If you fail the quality content test, you simply won’t rank and drive traffic.