WELCOME EVERYONE

This blog will focus on computer science and statistics.

Thursday, September 19, 2013

Time to Extend Your Circle!

What is the most important thing to sell youself and find a job? Not only the knowledge, but also the people you know. Maybe your friend, your professor or someone you talk in a party will have a good impression and offer a good opportunity. So it is time for every student who is seeking a job to extend your circle!


Many members of the professional circles stable relationship usually means human resources. Join in some elite circles sometimes meaning opportunities to succeed.

Therefore, one who wants to expand their circle of radius and exchanges, there can be three ways: First, if you have a good circle platform, you can proactively share with your profession or industry knowledge and unique experience, feather flock together, people in groups, so you can quickly expand your contacts and have the desired radius of the circle.

Second, through a variety of relationships, the initiative to participate in a number of influential organizations and circles, circles actively participate in the activities, serving as the backbone or backbone role.

Third, initiate or organization in the circle of various social activities, and even spend a lot of time and effort, you can make more friends, you can also win everyone's approval.

Any of a circle of existence and development, must be someone dedicate a lot of time and even money. To expand its influence in the circle, the circle must be actively involved in the construction, enthusiastic organize various activities.

The circle will not only offer benefit on job seeking, but also help you success in your life. Don’t wait, start to extend your circle now.

Friday, September 13, 2013

QR Code: Why and How?


When you try to fill some forms online, are you tired of remembering the long URL address? When you walk around on campus and suddenly see a post, do you want to see the promotions in details as soon as possible? QR code is the fastest and coolest way to save your time and ignore the annoying typing problems.

Here is a very simple and nice picture to show how QR code works.



How to quick build a QR code? It is really easy. A lot of free Apps are provided online. The easiest way is downloading one and them and input the address that you want to show. Here I will give some recommendations by my own experience.

After building a QR code, how to make it unique become the next question. nEO iMAGING is a nice software to insert a beautiful picture to the center of your QR code and make it unique. Unlike the Photoshop, this is much smaller and totally free. You can find most of general functions and it is easier to use. It may not offer you advanced function like multiple effects, but it is enough to deal with normal photos.

If you want to make it show at the right top so that everyone can use their smartphone to catch your blog. You can add garget to your blog, just under the layout options.

 

Friday, September 6, 2013

What is the potetial effect if lack of social network security when promoting your brand?


Social networking is been used by people from the entire world these days – Facebook, MySpace, LinkedIn, Twitter, and even sites we may not familiar. These social networks are so popular that people spend countless hours on them.

Social network offer efficient and powerful ways for people to communicate, at the same time, it also increases the risk of personal information security. We can take the most popular one – Facebook as our example. People can easily update their photos and position with only one click. The mutual friend function will help to expose all these things to a complete stranger. If combine all the information on timeline, it is easily for criminal to kidnap or blackmail.

from
The lack of social network security could be even worse when people try to promote their brand, because the promotion means more communication and more exposure. One weak point would cause unimaginable effect, like the butterfly effect. If your click on untrusted links or use easily-guessable passwords to protect your personal data, hackers could use your weakness and easily get access to your account, impersonate you and send your clients messages that appear to originate from you. And all the bad influence will count to you, because your client don’t know there is a hacker behind your account.