Changsha Hunan De door official website officially launched! Welcome to the official website: http://www.csxdmy.com
City Federation of industry and commerce to carry out special inspections of fire, fire doors, to remind consumers to look for the &ldquo &rdquo certification; Core tip in recent years, firefighters found in fire products special rectification actions, spot check of fire protection products especially fire door industry results are not optimistic, unlicensed, shoddy, deceptive, selling counterfeit and shoddy products in the fire doors, fire engineering bidding competition and other bad behavior have occurred, disrupted the market of fire protection products normal operation order, brought great risks to the fire safety. The thickness of steel plate is not enough, and the fire insulation performance can not meet the fire safety requirements. Such a fire door, used in the building, can not protect the safety of the masses. According to the provincial fire brigade, the provincial quality and Technical Supervision Bureau and the Provincial Administration for Industry and Commerce decided to combine 3· 15 International Consumer Protection Day theme activities jointly launched a special law enforcement inspection activities of fire products. On the morning of 11, the city fire brigade, the chamber of Commerce and industry to carry out supervision and inspection of construction fire door usage, the sampling results show that the fire door quality uneven in quality worrying. The fire door is cut down the middle Substandard products are now prototype An underground parking lot in Lake Road, fire, and supervisory staff randomly selected a safe exit of the steel fire door, steel plate thickness, the fire door is tested. Through the infrared display feedback data show that the fire door plate thickness of 0.68mm, the door frame thickness of 1.163mm. Check for accurate data acquisition, supervision personnel use cutting machine, cut down the middle of the door. Supervisory personnel, the thickness of the data shown by the instrument, the actual thickness of the coating contains the paint, after cutting with a tool measurement, the error value will be smaller. The supervision personnel to check the door after the incision, the internal fire doors fire materials Perlite filling is complete, with the file will be rolled up after flash Hsiuping, then use vernier caliper to measure the thickness of the steel plate, the actual is only 0.52mm, and the requirements of the national standard fire door steel door leaf plate thickness should be anti ≥ 0.8mm the thickness of the steel plate, the door should be ≥ 1.2mm too much difference, and with the manufacturer Dongguan Yongan fire equipment factory provides product testing report does not match. According to the results of the inspection, the supervision of the site to determine: the use of the project in Dongguan, Yongan fire equipment factory production of steel fire doors for substandard products, must be replaced within a specified time. Doubts about the authenticity of materials The fire door is sealed Subsequently, the inspection team came to the lake in the construction of a project, then extracted the east block of 4 fire door products used for spot checks. Inspectors on the Xiamen copper industry and Trade Co., Ltd. production of wood fire doors to be checked, the product is consistent with the test report for qualified fire doors. On the export of a safety door was conducted after cutting by Shenzhen, with Industrial Co. B wooden fire door manufacturers in the door, to add a layer of lauan, does not match the description and test report. But the inspectors were unable to confirm the authenticity of the eucalyptus wood material. As a precaution, supervision personnel on the spot to seal the sample of the product, the inspection requirements. Subsequently, found in the engineering equipment room fire door inspection, by the Zhangzhou “ Jie Cheng ” production of steel fire door is also problematic, door plate thickness of the door frame, for the unqualified products. On the two floor of a home engineering steel fire door inspection, representatives of the manufacturers to send materials did not show up, check the personnel on the spot and the fire door seals. It is understood that the business sector will also be found in the random sampling of substandard fire doors for investigation and evidence collection, and in accordance with the relevant laws and regulations to deal with. Quality problems rectification Check to ensure safety 11, the city fire brigade, joint inspection of industrial and commercial personnel visited a fire door production enterprises in Jimei. It is understood that in February this year, the fire department found in the factory inspection, the use of the building more than 80 Shenzhen zetoms “ Xing Dong ” lack of steel fire door thickness of the steel plate production technology, substandard products, the fire department ordered its rectification. Found in the inspection visit, factory construction has the unqualified fire door to replace all on-site detection of fire supervision and inspection report of the fire door and the manufacturer with the door leaf, the plate thickness of the door frame reached the fire door requirements of the national standard for qualified products. Check the site, the construction side of the representative said, was found to use substandard fire door, Party A to replace him within a time limit, or a fine of 1 million yuan. Fire supervisors, production, sale, use of qualified fire doors, fire safety is to ensure that the fundamental. Not long ago, 488 Tang Xiamen a fire door fire door production was detected substandard, the enterprises active rectification, the replacement of the unqualified fire doors, and strengthen the quality management. (reporter correspondent Ceng Yanyan Chen Rongliang) Fire door classification Fire door is one of the facilities of the building fire separation, usually used in the firewall, the entrance to the stairwell or the opening of the pipe well, which plays an important role in reducing the fire damage. There are many types of fire doors, for example, according to the material points, there are wood fire doors, steel fire doors, steel wood fire doors, fire doors, etc.. Fire door features Fire door with smooth surface, beautiful appearance, flexible, durable, easy to use, safe and reliable, etc.. There are a variety of specifications of the fire door, windows and doors in addition to the national unified modular system of building the provisions of the door opening size (GBJ273 "building unified modular system"), also according to the user requirements and customized. Fire door and anti-theft door The difference between the anti-theft door and fire door is the main function of the anti-theft door is tamper proof sealing performance is better, the general closed door without a key to open the door, the door filler is fireproof material. The anti-theft door must have “ FAM” mark, and refer to the anti-theft security door general technical conditions GB175652007. Although the fire door is also made of steel, but the door is filled with fireproof materials, door plate thickness also has different requirements. Steel door is ordinary steel, also has anti-theft function but the anti prizing performance is poor, the general Street factory is this kind of product. Warm reminder 5“ list ” fire door Consumers should be cautious From the beginning of December last year, the city fire brigade to carry out a six-month special inspection in the construction of fire doors, fire doors from the inspection results, the quality problem is not optimistic, especially the appearance of no nameplate, no production date, no identity identification; leaf thickness, width, to the fire door side wall surface fire prevention board thickness lack of the measured value is not consistent with the difference type test report describes; loose not tight filling the door core material; insufficient thickness of the steel plate steel fire door. According to the previous stage special inspection results, city fire brigade fire doors fire products special rectification office issued a Notice No. “ ”, 5 units of social advice with fire door products list ” &ldquo. Are: Nanchang Hongdu fire fighting equipment Co. Ltd production of B wooden fire door, there is no fire board surface fire door frame, two layers of fireproof plate only one layer, and the test report does not match the description; Dongguan Yongan fire equipment factory steel fire door, steel door core, insufficient thickness of pearl rock wool filled; Shenzhen “Hexing East ” science and technology production of steel fire door, steel plate thickness, unqualified products; Chongqing and Shenzhen have two Maxim fire doors, fire doors will be sent to the national quality supervision and Inspection Center for testing of building materials. According to the results of the inspection, the fire department will promptly notify the fire door inspection. Unable to produce “ type authentication ” The fire door will be tricky &rdquo “ “ those who find the use of fake and shoddy products, will not be accepted by the fire; to find out the existing problems of construction quality, in order to correct quality problems within a prescribed period of time, correct the illegal behavior, and to the competent department of construction units and construction administration informed, recommended a ban to undertake fire door business; detection of poor quality or test report and the actual quality of the project is not consistent and practise fraud enterprises, in accordance with the relevant provisions of the thorough investigation of responsibility, serious processing. ” reporters from the city fire brigade was informed that the fire department as the subject of law enforcement supervision and management of fire protection industry, often regularly carry out supervision and inspection of fire doors, production, sales, maintenance is not in line with the market access system of fire protection products or counterfeit enterprises shall be handled according to law. At the same time, industry and commerce, fire alert fire door, construction project, must be the fire door to buy the regular manufacturers, to produce suppliers issued by the Ministry of public security fire product evaluation center &ldquo certification before buying; ”, cannot produce “ &rdquo certification; fire doors must have Maoni “ ”. Absolutely can not use. Construction unit installation of fire doors, we must control the type of certification of technical indicators, test reports and physical to be consistent. Supervision units should be carefully checked, if not allowed to grasp, can be brought to the scene of the fire department for public security. Construction of the use of the installation of substandard fire doors, fire engineering acceptance shall not pass. On the sale of substandard fire door merchants, the business sector will be given a severe blow.
Recently, the company's independent IP virtual host products formally launched, each IP requires only a very low price can apply! Traditional virtual host, there are hundreds of users to use the same server resources, including hardware, network and other resources, each server is assigned a IP address. Because the IPv4 address resources are not inexhaustible, many users share a single IP address of the virtual host products, has become the best product cost effective control. However, with the rapid development of the network, the site of the main demand for resources increases, the demand for independent IP address is also more urgent. At the beginning of 2012, the IPv4 address pool have no redistribution of resources, so the IP address becomes more tight.Currently, the industry's independent IP address costs have reached 300 yuan / year. Even now has risen to such a high price, but a lot of IDC companies have also been able to sell the status quo.In today's network environment, the independent IP address and shared IP address in the process of running the site, which will be the difference between those aspects?IP is a IP corresponding to a website, so the search engine will assess the site of higher quality, more easy to grab the web page, so as to improve the collection level, to SEO, website promotion and Internet marketing not only reduce the cost, the effect will be more guaranteed, while sharing under the condition of IP will be reduced site level. Independent IP virtual host in addition to improve the site's collection level, there is an important point is to avoid joint risk. When the same server other site for the attack, because of illegal content is IP under such circumstances, the use of independent IP site can avoid being implicated.Baidu encyclopedia on the inside of the “ IP address ” using such an example to understand: in the telephone communication, telephone users are identified by telephone number. Similarly, in the network in order to distinguish between different computers, also need to specify a specific number connected to the computer, this number is “ IP ”.Currently IP address resources are very scarce, the industry has only a few service providers to provide independent IP virtual host, and IP address charges more expensive. The Western Digital large-scale introduction of cheap independent IP host, so that the majority of owners to obtain a large number of low-cost IP resources, but also highlights the status of the Western Digital Industry and reserves of resources.
Mobile web site has become a global standard for accessing wireless information services through mobile phones or other wireless terminals. The development and application of it is unlimited, can be said that the only limit is your imagination, mobile phone website makes many existing applications have been rapidly changing, while also spawned more new value-added services.Ministry data show that as of the end of May 2011, the total number of China's mobile phone users exceeded 900 million, 3G network, intelligent mobile phone, mobile Internet has become a major factor driving the growth of mobile phone users; at the same time, the scale of China's Internet users reached 457 million of mobile phone users is about 300 million, the number of intelligent terminals and mobile phone Internet has exceeded the number of the notebook and the fixed PC machine on the internet. Mobile phone site five advantages:1 cross platform, saving development costs Do not need to apple, Android, Microsoft Windows, blackberry and other mobile platforms developed separately, a development, all platforms can be used.2 no need to download, instantly browse Users can instantly open the phone site, without spending a lot of time, traffic from the APP store to download, greatly reducing the use of the threshold.3 the effective use of the search engine promotion Mobile site can be Baidu, Google and other search engines to search, import a lot of traffic.4 for network marketing Web pages can be promoted in a variety of channels, such as text messaging, micro-blog, forums, email, etc..Easy access to
2013 the company will develop cloud computing platform enterprise website management systemCloud computing is now developing very rapidly, because in the development of enterprises if the use of cloud computing will help you gain greater competitive advantage. In the business competition, if the competitors take the lead, then the enterprise will be threatened. Here, 3 points to facilitate enterprise website management system of cloud computing will bring us based on 1 cost savings, reduce IT management costs, create price advantage.Some companies can sell products at cost price, but still profitable, why? By using cloud based services, the cost can be reduced by half, while before the company to invest $50 million annually in the IT field. Or you can abandon the original plan to invest in the construction of a new data center, but the enterprise through the use of cloud computing, cost savings, lower prices, thereby expanding sales, access to higher profits. 2 better use of commercial data.Cloud computing makes it easy to handle large data, and traditional methods usually have to pay a high cost. With cloud computing, many enterprise wide access to information, determine the direction of development of enterprises and opportunities, and they often suffer from the lack of prior information. Through cloud based large data systems, they are able to gather resources more rationally and use them to create revenue. If your business is doing so, you can bring greater threat to your competitors. 3 make full use of IT technology to expand the scale of the new enterprise flexibility.Now, many companies want to expand the size of the enterprise through mergers or acquisitions, but had to give up because of the time required to change the existing IT facilities. This is rather disappointing. Cloud computing has better flexibility to quickly build infrastructure, applications, and business data. Using this, companies can expand the scale faster, and the cost will be lower, the risk will be smaller. More conducive to the development of enterprises.
The new version of the mobile phone website, subdomain binding, website optimization and other functions.The system is developed by PHP+MySQL, it has the advantages of simple operation, strong function, good stability, easy expansion, high safety and convenient maintenance, can help you quickly and easily build a strong professional business website. The system supports multi language website, mobile phone, custom model, SEO optimization, static page generation, comments, orders, membership, advertising, recruitment, statistics, and other basic functions of the common form of self-help business website, but also through a flexible plug-in mechanism to expand more applications. With the company's team accumulated rich experience in Web development and innovation in the pursuit of the perfect design concept, the product has been recognized by many enterprises, and more and more applied to the large and medium-sized commercial websites.
Warmest congratulations on enterprise website management system 3 release The new added feature phone website, domain name, website optimization. The friends of the enterprise website management system using PHP+MySQL development, it has the advantages of simple operation, powerful function, good stability, easy expansion, high safety, convenient maintenance, can help you quickly, easy to build up a strong professional business website. System support for mobile phone website, language, custom model, SEO optimization, static page generation, comment, ordering, membership, advertising, recruitment, statistics, self-help form and other basic functions of common enterprise website, through can plug-in mechanism flexibility to expand more applications. By virtue of the company team accumulated rich experience in Web development and innovation in the pursuit of the perfect design concept, the product is supported by many enterprises, and has been used in more and more large and medium-sized commercial website.
Warmest congratulations on blog system 6.3 release blog system of building software, search engine optimization (SEO) tool of choice. Support smart account registration, article management, publishing history, pseudo original, automatic release, custom web site, a variety of ways to release. There are some functions: 1 Intelligent account registration: only need to enter the code can continue to register an account (similar products almost all to open the webpage) 2 Account management: account grouping web site management and display, universal import and export, automatic IE login 3 Simple article management: fool acquisition method, various forms of other mass (acquisition) software the data import 4 Convenient and flexible pseudo-original: pseudo original function rules of preservation, convenient access, advanced keyword management page 5 Automatic release: send the article completely unattended, need artificial auxiliary will give tips (automatic processing after the timeout) 6 A variety of ways to release: the article sent to all account can also be sent to the random account etc.... 7 A custom web site: to support a variety of mainstream site program backstage release, convenient to your website and blog integration. 8 History: History sent send grouped into account, the convenience of your group call, a set of software to manage multiple promotion plan.
The finished website is the subdivision of all walks of life on the website, by professional personnel of careful planning, design and production, a large number of ready-made site, site classification in supermarket display and packaged for sale, the user can be finished web site to install their own hosting space. Design style, each finished the section of the web site layout planning, test contents are referring to the industry's actual site requirements and case to make, so that final demand closer to industrial users. Each a product websites offer online demo and trial experience, let users fully understand the design and functions of the website. WYSIWYG web, fast, convenient maintenance, high ratio of performance to price...
Baidu officially recognized as a plain text link URL Baidu crawl, network of Baidu reptiles be plain text on the link to crawl from Baidu owners club Lee Reply! 1 text link url address, Baidu will find he is a url address and crawl up this address to the url address. 2, whether the link should be passed weights only criteria: whether the user or other sites in this link really recommend your site to this recommendation, whether Users valuable. Note: plain text link that is to remove the hyperlink URL majority Contributions will be removed hyperlink, which is undoubtedly good news, but can not confirm whether passing weight.
In May 2012, the the Godaddy main station from China resolution is very unstable, parsing is masked normal, Railway line, basic telecommunications masked more and more GoDaddy DNS server regional interference can notthis Godaddy own domain name can not be resolved, the large number of sites can not be accessed, especially in Godaddy registered domain name owners. Beginning in July last year, some of the telecom operators in China began to shield part Godaddy's DNS service, leading to large-scale use Godaddy DNS website can not be accessed from China, such a direct shielding NS (DNS) service approach, a very bad influence one or two so-called "harmful information" in order to "punish" a direct result of the thousands of innocent sites can not be accessed, can be described as "rather kill a thousand, can not let go of a" less extreme means. Godaddy is the world's largest domain name registrar, Godaddy domain name registration fee is very low in the same industry, the average price is only half of the domestic domain name service, is a very good domain name service provider, for example, the year of 139 million net registered com domain name yuan, Godaddy minimum is only $ 50. Many site owners are using Godaddy Domain Name Service. Network service providers of this well-known domain registrar illegal shielding alleged unfair competition. Godaddy accounted for nearly 32% of global market, with other causes of shielding domestic, overseas Sancheng website in the country can not be normal visit. Any use of the GoDaddy DNS server, there may be the wall. Fortunately, only DNS shield, can be switched from Godaddy to DNSPod host unknown during a few minutes. Domestic DNS manner. Other normal access to modify the local DNS, try Google dns: 8.8.8.8.
Recently, Baidu large-scale upgrade of the algorithm and revision, engage in panic. First, the failure of Baidu news search, Baidu search engine, frequent errors, especially slightly longer text each will wrong. Which one is clicking on the class of the more popular software algorithm adjustments at running events from the most recent such software provider, can say with certainty that the clicker market. Baidu click software popular in the country, starting in 2009, also known as analog click, P2P technology and agent technology to the realistic simulation of user click behavior to affect search engine rankings. Baidu Union ad interaction point Union, cross-point group and so the nature of the mutual click advertising on Baidu Union conduct penalty. I also received the e-mail notification of Baidu Union, all Baidu Union websites, Reward Report, click visible human use software simulation behavior has touched the fundamental interests of Baidu, Baidu, of course, can not be tolerated. User feedback: it took 598 to buy a one-click software originally ranked 15 words, click afternoon clicker analog results gone the next day, not only the word ranking, the most angry, the other keywords ranking disappeared, and worked hard to optimize the site for six months, just search the title search, the company commander Suffix not search.
Netease science and technology news on January 4th message, according to foreign media reports, before the news Qihoo 360 and Google is expected to reach a search deal, may have on the Chinese search giant Baidu threat, but Qihoo has to ZDNet officially confirmed the news, said that the agreement with the Google does exist, but declined to give further details. Bloomberg news earlier this week quoted the analysis of investment firm WedgePartners said, Qihoo and Google will collaborate in early 2013. Qihoo chief executive Zhou Hongyi said before, Qihoo to Google, Microsoft, Sogou search engine service companies have cooperation. After the United States independent analyst ABR InvestmentStrategy also reported the upcoming Qihoo and Google cooperation. ABR said: "given the Qihoo and Google expected cooperation, we will search revenue in fiscal year 2013 is expected to increase to $90000000 from $62000000." When ZDNet Asia linked to Qihoo aspects of the interview, Qihoo said: "between Qihoo can only confirm and Google cooperation does exist, but can not disclose any details of the information." Citibank analyst Lee Act (Lee, Muzhi) to (RaviSarathy), and Ravi Saladi said, Qihoo and Google cooperation is bad news for Baidu is concerned. They reaffirmed Baidu sell rating, said this is because cooperation Qihoo search monetization and service and Google keyword. If everything goes smoothly, Qihoo on Google cooperation for the first time. Qihoo has in their browsers before using Google search service, now it has been replaced by its own search service. Qihoo has established itself in the field of software safety, the company has operations will be extended to other Internet services, such as browsers and search engine service. (West)
Dispatch of sina science and technology on January 4th afternoon message, security issues feedback platform clouds (wooyun.org) today through the micro-blog said in a news release, network security vulnerabilities can lead to register a domain name hijacking is malicious. Wu Yun said in the micro-blog, "the network be proof of the existence of security vulnerabilities, can be hijacked in the network domain name registration malicious users, completely repair loopholes in the nets suggest you Adsense and enterprises to increase monitoring of domain name". In fact, the clouds are victims of this vulnerability. According to the micro-blog has revealed, this vulnerability to the attack, "and a long time cannot access and creates the actual loss of interest". The official further said, as network users will retain the right to prosecute. In this regard, the lawyer Zhao Zhanling pointed out: if its loopholes instead of the user causes the domain name hijacking, 10 thousand nets should ask users to compensate for the losses. Otherwise, the user can through legal channels for all responsibility. To date, all did not respond.
The previous day legend tiger 360 to push its own search engine, today, 360 of the search engine quietly on the line, some in the industry have been hearsay and start trial. 360 search enable domain so.360.cn two. At present, 360 search interface is also very simple, subscript red below to design similar to "Youdao search". In addition, in addition to webpage search by 360 search provides search results, news search, MP3 search, image search, map search, ask search are directly linked to the corresponding classification of Baidu search, video search link to 360 of the original "360 video search". In view of the line just 360 possible search, search technology and experience is still not perfect, so the 360 search is still retained the Baidu and Google search, the two search are integrated into the 360 search page, if the user feel dissatisfied with 360 search results, can be directly click switch to Baidu search or Google search. From the micro-blog everyone to the 360 search engine test results, the 360 search may go is route Blekko (personal speculation), is also the only index authority sites to ensure that the garbage station authority and removing search results. In August 10th, Cheng Lingfeng said in the micro-blog: I heard that the general search 360 is about to launch its own domain name. Was supposed to launch the browser information recommendation based on, but not mature. Also heard on other search engine results in the "illegal" content or ads to remind users tagging. At present, it said non-trivial, according to another Fenng in the micro-blog sources: More hearsay about 360 search: everyone knows the address, now in the first test of water, its search results is not good enough, may and Bing do first cooperation. Real maturity in his own. 360 the stock price to rise. In the afternoon there will be a small noisy can see: Sogou CEO Wang Xiaochuan said in the micro-blog: By three stage rocket model, the 360 finally released universal search. Internet users have more choice is a good thing. But the search technology need long time of accumulation, we have to worry about the poor quality of the use of improper means to hurt the user. I'd heard the development process there are some extreme means to go beyond the bottom line "". Sogou search team will make a general evaluation on the 360 search quality, afternoon for everyone to send report. At present the 360 official and Zhou Hongyi have not been disclosed more information.
One way of Thai embarrassed embarrassed at the end of 2012 under the bed to the Chinese film box office record, but also refresh the record. But in IT, data center security failure events erupt frequently, also the impact of enterprise user's psychological line of defense in a meeting. Only look, the security problems of the data center, don't be embarrassed again. "Tai embarrassed". Cloud computing service is touted to be the IT saints in this era, all services can be "cloud". However, when many companies to be the first to eat crab, but found that often the most vulnerable is their. In recent years, emerge in an endless stream of cloud services broken network events, so that the industry could appall. People gradually return to the ideal, to more clearly see the true face of cloud computing. It can be said, no matter how lofty dream or to find a secure foothold, cloud services eventually from one data center to be transmitted to a data center, and in the process still could not escape the need, computer, network, power, storage, etc. between collaborative work. As a result, the entire process error and loopholes in the offing, coupled with natural disasters. So, enabled cloud services, you must have a certain amount of mental preparation, but also with a second-hand solutions to deal with. Editor here, look at the reasons behind a series of broken network events that occurred in recent years. Between from 2009 to 2012. Perhaps make you see: even if the computer error seems inevitable, reinsurance measures seem only security event control in a small probability range. The off network types: system failure Typical event 1: Amazon AWS Christmas Eve off network The cause of the malfunction: Elastic Load Balancing service failure December 24, 2012, Christmas Eve just past, Amazon did not let their customers have had peace. Amazon the AWS located in the eastern United States data center fails, the Elastic Load Balancing service (Elastic Load Balancing Service) interrupt, sites such as Netflix and Heroku affected. Which, Heroku in the AWS eastern United States regional service before failure has also been influenced. However, some coincidence Netflix rival Amazon's own Amazon Prime Instant Video is not affected because of this failure. December 24, Amazon AWS interrupt service event is not the first time, of course, will not be the last time. October 22, 2012, Amazon AWS network services in Northern Virginia interruption. The reason is similar to the last. The effects of the accident including Reddit, Pinterest and other well-known websites. Interrupt affect the elasticity of magic beans, followed by flexible magic beans console, relational database services, flexible cache, Elastic Compute Cloud EC2, cloud search. This accident made a lot of people believe that Amazon should to upgrade North Pooh the Ghia data center infrastructure. April 22, 2011, a large area of the Amazon cloud data center server downtime, this event is considered to Amazon the most serious in the history of cloud computing security event. Amazon downtime cloud computing center in Northern Virginia, including answer service Quora, the news service Reddit, Hootsuite and location tracking service FourSquare, some sites have been affected. Amazon's official report claims that the incident is due to the presence of its EC2 system design vulnerabilities and design flaws, to improve the EC2 (the Amazon ElasticComputeCloud service), competitive and continue to fix known vulnerabilities and defects. In January 2010, almost 60,008 thousand Salesforce.com users experienced at least one hour of downtime. Salesforce.com "systematic errors" due to their own data center, all services, including backup, including a brief paralysis. It also exposed the Salesforce.com do not want to open the lock strategy: its PaaS platform, Force.com Salesforce.com outside the. Once Salesforce.com problems, Force.com the same problems. Interrupt service occurred a long time, the problem will become very tricky. The broken network inducement: natural disasters Typical event: Amazon Northern Ireland Berlin data center downtime The fault reasons: lightning struck a transformer of the data center in Berlin August 6, 2011, caused by lightning in Northern Ireland, Dublin Amazon and Microsoft cloud computing network in Europe, large-scale data center power outage downtime. The lightning struck a transformer near Dublin data center, leading to its explosion. The explosion triggered a fire, so that the work of all public service agencies to temporarily halt the entire data center downtime. This data center is the Amazon, only for data storage and in Europe, that is, EC2 cloud computing platform customers during the accident no other data center for temporary use. Downtime event makes the length of the Amazon EC2 cloud service platform many websites to interrupt a long time up to two days. Typical event: Calgary data center fire accident Failure reasons: data center fire Calgary data center fire accident July 11, 2012: Canadian communications service providers ShawCommunicationsInc in Calgary the A Er Bota's data center, a fire occurred, resulting in hundreds of local hospital surgical delay. Manage the data center to provide emergency services, the fire affected the the main backup systems to support critical public services. The event as a series of government agencies sounded the alarm, you must ensure the timely recovery and have failover system, combined with the introduction of disaster management plans. Typical event: Hurricane Sandy attacks data center The cause of the malfunction: storms and floods led to the data center to stop running October 29, 2012, super hurricane Sandy: data center in New York and New Jersey are subject to the impact of the hurricane, including the adverse impact for the Lower Manhattan area flooding and the shutdown of some facilities, the surrounding area data center generators run disorders. Impact in hurricane Sandy and beyond the general single disruptions brought disaster of unprecedented scale in the data center industry in the affected areas. In fact, the diesel has become the lifeblood of the data center recovery, to take over the entire load as a backup power system, prompting the special measures to keep the generator fuel. With the immediate focus gradually shifted to the post-disaster reconstruction, we need long-term engineering and disaster recovery data center location, explore this topic may last for months, or even years. The off net incentive III: human factors Typical event 1: Hosting.com service disruptions The cause of the malfunction: the service provider implementation of the circuit breaker operating sequence is incorrect due to UPS Close July 28, 2012 the Hosting.com outage event: human error is often considered one of the dominant factors in the data center downtime. July the Hosting.com interrupt events caused the 1100 Customer Service interruption is an example. Shutdown accident is being carried out due to the company's data center in Newark, Delaware, UPS systems preventive maintenance, service provider implementation of the circuit breaker operating sequence is not correct to cause the UPS shut down is caused by the data center suites facilities the loss of one of the key factors. "CEO of ArtZeile Hosting.com. "There is no failure of any important power system or standby power systems, is entirely caused by a human error." Typical event: Microsoft outbreak of the BPOS service interruptions event The cause of the malfunction: Microsoft data centers in the United States, Europe and Asia, a determined set error In September 2010, Microsoft hosting services at least three times in the western United States within a few weeks time interrupt event to apologize to the user. This is Microsoft's first major cloud computing events broke. The accident, the user access BPOS (Business Productivity Online Suite) service, if you use Microsoft's North American facilities access service customers may encounter a problem, this failure lasted two hours. Although Microsoft engineers later claimed to have solved the problem, but did not solve the fundamental problem, which is also produced September 3 and September 7 service interrupted again. Microsoft's Clint Patterson said this data breaches are caused by errors due to Microsoft data centers in the United States, Europe and Asia, a determined set. BPOS software in the offline address book in the "very special circumstances" available to unauthorized users. The address book contains the contact information. Microsoft said that this error fixed two hours after the discovery. Microsoft said it has tracking facilities, to enable it to get in touch with people who download these data errors in order to clear these data. Off network incentives: system failure Typical event 1: GoDaddy the website DNS server interrupt The fault reasons: data table within a series of routers in the system caused by network outages The GoDaddy website DNS server interrupts: September 10, 2012 the domain name giant GoDaddy DNS server is one of the most important suppliers, which has 5,000,000 websites and manages over 50 million domain names. This is why the disruptions will be the most devastating event in 2012 on September 10. Some speculation even to the interrupt events for up to six hours is the result of denial of service attacks, but GoDaddy later said, this router table corrupted data. Service interruption is not caused by external influences. "GoDaddy interim CEO 史葛瓦格纳 said. "This is not a hacker attack is not a denial of service attack (DDoS) We have determined that the service interruption is due to damage to the network event caused by the series of routers internal data table." Typical event: Shengda Yun stored off network The fault reasons: data center physical server disk is damaged August 6, 2012 8:10 pm Shengda Yun due to cloud host failure caused by the loss of user data events public statement published on its official microblogging. The statement said: August 6, Shengda Yun data center in Wuxi, because a single physical server disk is damaged, resulting in the loss of individual users' data. Shengda Yun has to make every effort to assist the user to recover data. Lead to individual users' data lost because of a physical server disk is damaged, Shengda Yun technicians are given their own interpretation: the virtual machine's disk, there are two modes of production, a direct host the physical disk. This case, if the host's physical disk fails, the cloud host will inevitably result in the loss of data, which is generated by the incident reasons; another is to use remote storage is grand hard disk products, this way the actual is to save the user's data to a remote cluster, and at the same time do multiple backups, and even host a failure will not affect a the Cloud host of data. Difficult to avoid because the physical damage to the machine, in order to avoid accidental loss you are experiencing, we recommend that you also do data backup to cloud host. Typical events 3: Google App Engine interrupt service The cause of the malfunction: network delay Google App Engine: GAE WEB application development and hosting platform, data center management by google interrupt time is October 26th, and lasted 4 hours, because suddenly become slow to respond, and an error. Affected, 50% of the GAE request fails. Google said that there is no loss of data, application behavior also have backup can be restored. Apologize, google announced Nov. user can google said they are strengthening their network services to cope with the problems of network delay, "We have enhanced the flow routing capabilities, and to adjust the configuration, these will effectively prevent such problems from happening again. The off net incentive Five: System Bug Typical Event 1: Azure global interrupt service The cause of the accident: Software Bug calculated incorrectly result in a leap year time February 28, 2012, due to the leap year bug "causing Microsoft Azure service a large area on a global scale to interrupt, the interrupt time over 24 hours. Although Microsoft said the software bug is incorrect leap year calculation of time lead, but the incident provoked a strong reaction in many users, many people asked Microsoft to make more reasonable explanation for this purpose. The typical event 2: Gmail e-mail the outbreak of a global failure The cause of the accident: data center routine maintenance, the side effects of the new code February 24, 2009, Google's Gmail e-mail to the outbreak of the global failure service interrupted time up to 4 hours. Google explained the cause of the accident: when routine maintenance of the data center in Europe, some of the new program code (trying to geographical proximity data focus on all of the body) some side effects, leading to another data center in Europe to overload, so The knock-on effect on the expansion and interface to other data centers, and ultimately lead to the disconnection of the global and other data center does not work. Typical event: "5.19 off network events The cause of the accident: the client-side software Bug, internet terminals frequent DNS requests, triggering DNS congestion May 19, 2009, 21:50, Jiangsu, Anhui, Guangxi, Hainan, Gansu, Zhejiang and other six provinces user declaration to access the site slow or inaccessible. Unit investigating after the Ministry of Communications, said the national six provinces network disruptions, because a company launched the client software defects, resulting in the installation of the software of the Internet, in the case of abnormal work of the company's domain name authorization server terminal frequently initiate DNS request triggered DNS congestion, resulting in a large number of users access the site slow or page can not open. Which the, DN SPod is the leading DNS service provider one N SPod company service DNS service for a number of well-known websites. The attack resulted in paralysis the 6 units dns the DN SPod belongs DNS server, a direct result of the DNS system paralyzed STORM, including a number of network service providers, and thereby lead to network congestion, resulting in a large number of users can not be normal Internet. The Ministry of Industry and pointed out that this incident exposed the Domain Name Service to become the weak link in network security, instructed all units to strengthen the security of the Domain Name Service. Summary Enable cloud services company, a large extent, is considering such a service can be more editing, cost-effective. However, such considerations if it is based on reducing the cost of security as, it is estimated that the boss will not agree with a lot of companies. Cloud services off the endless stream of events caused by concerns about the safety of the cloud. Now, the solution can proceed from several angles, sure cloud services for enterprise-class customers, regular backups of the data of the cloud, with the second set of solutions, in order to prepare for contingencies. For cloud service providers, since a variety of off-network event is inevitable, it must consider a countermeasure to minimize the loss of their users, improve response efficiency off network events. Government departments have responsibilities of oversight and remind legal legal cloud services were introduced and constantly improve, and to remind the user to one hundred percent reliable cloud computing services do not currently exist.
Sohu IT, said sources from the investment community, Baidu is accelerating capital negotiations with gifted as (UCweb), to controlling or strategic investment UCweb. "Investment in Jinshan, UCweb series of negotiations are conducted by Li himself with people is expected to be reached soon." In June 2012, there had been Baidu $ 400 million acquisition of UC49% stake. But the transaction has not been reached. Baidu internal sources said, Baidu recently stepped up investment in all defense and mobile end, and to accelerate the process of investment, but the investment and M & A, by Robin Li personally intervene. "Baidu lack of moving side entrance, holding UCweb is the best choice." Analysts said the investment community. Internet analysts had the Keso also said, "If this message (Baidu acquisitions UCweb) is confirmed, it will be Baidu defensive acquisition, the main purpose is to prevent the UC acquisition of other Internet giants." However, Baidu transactions acquisitions UCweb ability to achieve and there are many factors in the left and right. The source said that contact in June last year, Baidu valuation of $ 816 million to UCweb the UCweb aspects of their own valuation of 10 billion dollars, the final price of the two sides did not agree. The valuation of UCweb may be higher, Baidu need to pay more cash, Baidu can accept is a problem. Meanwhile, UCweb the founding team as well as Alibaba, Nokia and other strategic investors is whether they can accept a Baidu acquisition is also variable. As of press time, Baidu and UCweb, not yet to comment on the two sides to discuss the issue.
WeChat scan concerns us
Contact:Miss Cheng Telephone:86-010-12345678
Email:12345@qq.com
Address:Room 906, 8th Building Garden, XueYuan Road HaiDian District Beijing China