Thursday, October 14, 2010

Waterproof Wall - terminology to explain



In the field of computer security, firewall and waterproof walls are a very similar name. Firewall is installed in different networks (such as a trusted internal network and the untrusted public network) or network security domain combinations between the number of components. It can monitor, limit, change the data flow across the firewall, as far as possible within the network on the external screen of information, structure and operating conditions, in order to achieve network security. Logically, a firewall is a separator, a limiter, is a parser to effectively monitor the internal network and the Internet between any activities to ensure that the internal network security.

As a result, we know that a firewall to prevent external network through the isolation of the internal network to attack, it passively inspect all network packets flow through to block the communication security policy violations. Firewalls are based on the work of a basic assumption: it is located inside and outside the network access point, and there is no other bypass external gateway is based on this assumption, the firewall within the network became the protector. But, obviously, for internal security, the firewall can do nothing.

Waterproof wall thus came into being, and the traditional firewall concept is completely different, waterproof wall design to prevent leakage of internal information like water. The birth of a firewall is to prevent outside intrusion. It is a monitoring system within the network, at the internal network, at any time monitor the security situation within the host. If the fire is to prevent the spread of external threats to internal, then water is the means to prevent the leakage of internal information. Visible, waterproof wall is a network monitoring system within this very image of a call.

Simple waterproof wall by the probe and the monitoring center. In general, which consists of three structures: high-level user interface layer, real-time updates based within the network topology to provide system configuration, policy configuration, real-time monitoring, audit reports, security alarm and other functions; low-level modules layer, the distribution of the probe in the composition of each host; middle layer of the security services, real-time information collected from the lower to the senior report or alarm, and record the whole system of audit information, to prepare for queries or generate reports.

Waterproof wall generally has the following major functions: information leakage prevention, to prevent the internal network host, network, storage media, printers and other media, intentionally or unintentionally Kuosan local confidential information; system user management system records the user login information for the provide the basis for future safety audits; system resources, security management, limited hardware and software installation, uninstall, control the operation of a specific procedure to restrict the system into Safe Mode, rename the control file and delete operations; real-time health monitoring system, through the Intranet real-time capture and record screen host, to monitor internal security personnel to deter malicious insiders, and after the issue of security and provide the basis of its source, when necessary, can also be involved in direct control security of the host I / O devices such as keyboard, mouse, etc.; information security audit, network security audit record information, and provide the host within the network usage, security event analysis report.

In summary, the water wall is a firewall, virtual private networks, intrusion detection systems and other safety equipment, security services provided by an effective complement. On the overall security system, it is also an integral part. Although information security products, including encryption, antivirus, firewall, anti-electromagnetic radiation, platform systems, electronic authentication, vulnerability scanning, intrusion detection, identification authentication, physical security protection system and other ten series, but these products can only be part of the solution , not the whole problem.

According to international authorities CSI / FBI statistical data provided, and aggressive behavior in many cases, the most important time is the most secure information leakage; attacks were mainly from within, not from outside hackers. Well, there is no readily available information technology or products can block the leakage of the tap it? Waterproof wall system, such a system is adopted.

Waterproof wall system is composed of Internet access security control, computer control port security, procedures, use of safety control, safety control file copy, CD burner safety control, file and print security control, illegal invasion of security control, security control hardware resources, operating behavior management, remote surveillance, immunization and virus hackers trojan from a centralized management platform.







Recommended links:



ASP script Timeout problem when running the ultimate solution



SIMULATION using Flash MX stage 5 Lantern



MP4 to WMP



Custom FTP Enjoy The Thrill Of Speed Of Downloads



Sichuan Instrument flow meters: precision production of personalized QUOTE



Bai-Hua Wang nice view here



theoretical knowledge MANAGEMENT and enterprise



Netac flash news Huaqi patent dispute SETTLEMENT reached in equal



Wizard Encryption Tools



Recommend Audio CD Burners



FLV to VOB



3 years 68 million PHS users delisting where flow (Figure)



ASF to AVI



Tuesday, October 12, 2010

P2P operators transform their billing through traffic into the regular army



The most hot as the last two years is also one of the most controversial technology, P2P technology revolutionized the traditional telecom model of centralized control, the development of the traditional telecommunications network had a huge impact.

In the September meeting held in the Internet, P2P once again become the focus of public attention, but different from the past that are in contradiction whirlpool carriers showed an extremely calm and rational, China Telecom and China Netcom in charge were invariably shown on the P2P-minded attitude.

China Telecom chief engineer Wei Leping clear that China Telecom will provide the media with a P2P service, and applications for legal P2P traffic to divert to accelerate local service. China Netcom (Group) Co., Ltd., deputy chief engineer left the wind even more bluntly, P2P is a good model, telecom operators should consider using this model.

Under such a change, we now see is that carriers bearer network transformation, and through technical means to strengthen control of P2P services, and then to traffic accounting based on the direction of change.

Abnormal input-output ratio

Resulting input-output ratio is mainly due to lower carrier has not been found more responsive to the P2P model.

BT download, online video, instant messaging, ... ..., these take up a lot of bandwidth to P2P service users to experience the pleasure, and gradually become the killer application of next-generation Internet, but the operator has little revenue from; the same time, P2P caused by network congestion also affects the critical links to other Internet business. From a fixed network operators, data show that, P2P traffic generated from operations of individual links in the individual time slots occupied by the operator's network 80% of the bandwidth, but do not bring their earnings to 20%. The iResearch Consulting statistics showed that in normal circumstances, P2P network operators to take up 40% to 60% of the bandwidth, the peak occupancy rate even as high as 70% to 90%, but revenue is only P2P service 5% of its total revenue.

Resulting input-output ratio is mainly due to lower carrier has not been found more responsive to the P2P model. To charging, for example, according to Ministry of Planning and Design Institute of the telecommunications and data exchange, deputy director of the Department of Lin-xiao, at present domestic operators mainly for broadband services such as monthly and monthly fee model, these models aimed at ordinary rates Internet business and design. As the ordinary business of the Internet bandwidth consumption is relatively small, and flow rates in a relatively balanced state, input-output ratio is relatively reasonable. However, the emergence of P2P allows users to flow substantially faster than the general Internet business (some calculations, 1 hour video take up the equivalent of an electronic mail network resource consumption of the year). In this case, still using the original charging mode, naturally will cause a decline in input-output ratio.

Moreover, while the traditional C / S structure than, P2P is high on the other, extensibility, robustness, high, cost-effective as well as load balancing and other advantages, P2P applications business also faces a lack of control, no guarantee of quality , piracy and other issues.

For taking up a lot of bandwidth and resources, many companies have to P2P software to disable the method; operators for P2P is showing a strong "ban" attitude, some operators have also adopted restrictions on P2P traffic means control of users.

Rational Transformation Network

The rapid decline in fixed voice and broadband boost for P2P applications, forcing operators to have a more rational treatment of P2P, and start thinking of the bearer network transformation.

Despite the impact of the P2P operators build enthusiasm, Internet users and carriers intensified the conflict between, but the rapid decline in fixed voice and broadband boost for P2P applications, forcing operators to have a more rational treatment of P2P, and start thinking transformation of the bearer network.

Recently, renowned Internet expert Professor Hou Ziqiang said the General Assembly on the Internet, China Telecom, China Netcom and China Mobile and other operators have begun to transform CDN network, transformed the network can support, including BT and P2P streaming media category, including download. "Currently, China Telecom megaupload, Netcom CNCMAX have been able to apply P2P. Monternet China Mobile also began to explore applications for the Internet, and has already set the wireless IP and Internet business environment, the idea to support the P2P service. "

Concern is that many problems faced in the P2P, the growth of video content to be a very prominent contradictions, some people even call it P2P, "knot."

Statistics show that, in the domestic Internet market, the Web content is more than 10% increase in annual growth, which is the fastest growing video content. If you rely only on hardware investment to increase bandwidth, not only will lead to rising costs, will create security problems. Hsu, CEO ChinaCache four young that, CDN (content distribution network) is the key to solve this problem, "If we need to use the Internet compared the P2P transfer of resources copy of the film, CDN service is set up one by one cinema. If there is only on the Internet a cinema, then go to the cinema when a large number of users to watch, they will form a congestion situation; even into the cinema, the audience can not have a good viewing environment. And if the film was made into copies are shown in different theaters, This congestion situation would not exist. This is the CDN works. "

Qing Xu four that does not use CDN impact the overall performance of the network, and video content providers can help significantly reduce overall operating costs. "After the way with CDN, the operation between the independent cinema, including a theater problem does not affect the work of other theaters. He also presented a set of data: in the United States, 80% of users use the CDN services and, in China the figure is only 5%.

Lin-xiao that, CDN and P2P integration is a good idea, but combined in different ways, and now appears there are some problems.

Apart from the introduction of P2P CDN business, there are experts on the future of P2P services network carrying the new ideas presented.

Wu Hequan Chinese works that overlap in the CNGI network based on technology developed intelligent points of P2P, better utilization of the Internet resources.

In fact, operators are also changing for the P2P network equipment manufacturers to bring opportunities and challenges. On the one hand, P2P services to enable operators to increase the demand for equipment, for manufacturers to provide more market opportunities; while on the other hand, operators are implementing sophisticated operation, do not blindly expansion.

In this regard, ZTE Intelligent Network Products Network Systems Division, Senior Engineer, Director of Dong Zhenjiang that P2P's impact in the telecommunications industry has been the traditional focus on service model is difficult to effectively support the rapid development of broadband applications and users growing needs, who can provide operational, can be managed P2P network equipment solutions will be operator of all ages.

P2P technology used to control business

According to estimates, as have the ability to distinguish between business, the backbone of the Internet bandwidth management costs per 10G to increase around 1.5 million yuan; the end of the deployment of service differentiation in the ability to access higher costs, assessed to each user's bandwidth costs would increase accordingly Great.

In addition to the network transformation, the current operators have also adopted a number of technical means to realize the P2P services classification and scheduling, enhance the ability of the control of P2P services. Early applied to the corporate market DPI (deep packet inspection) technology is increasingly being used to distinguish P2P service operators.

It is understood that many U.S. carriers in the deployment of IPTV, we began large-scale adoption in the business hub of DPI equipment. This trend is also stimulating a focal point for equipment manufacturers in the data device to increase the functions of DPI or DPI board. Carrier IP network technology consulting Xiangdong that the focal point of the DPI equipment and data equipment integration will be the future trend of development, such as the Cisco 7600 series and Alcatel-Lucent 7750SR features are available in the DPI.

Typically, Cai Yong DPI technology products of the main features include: using real-time user Shuojufenxi, Zhuangtai Xieyishibie, Ye Wu Liu Jian Kong, Yingyongchengxu monitoring, Hui Hua control, business strategy deployment, use and control, operational quality, safety, traffic management. According to Zhang Xiangdong introduction, although DPI technology for the mitigation of P2P services to the network congestion caused by very effective, but the domestic carriers should be combined with the domestic status of DPI technology, and combined with actual test results to select the DPI product. In the promotion of foreign firms, it should highlight the status of those applications for the Chinese product features. For example, domestic operators MAN exports, net exports are mostly provincial, 2.5G POS link, but most foreign companies are mostly foreign to provide the 10G interface DPI product.

Broadband network by upgrading the quality of services and the business of perception, classification, scheduling capabilities, making P2P services have become able to "control", but also for traffic accounting by operators to achieve possible, but it will also lead to increased costs. According to estimates, as have the ability to distinguish between business, the backbone of the Internet bandwidth management costs per 10G to increase around 1.5 million yuan; the end of the deployment of service differentiation in the ability to access higher costs, assessed to each user's bandwidth costs would increase accordingly Great. Therefore, there are some other new operators tend to carry a large number of networks for business customers, the existing network will continue to carry, including P2P services, including general application.

P2P speed up the transformation operator

For those who can not tolerate their marginalization of the value of operators, service providers need to transition to the information to provide more value-added services, and P2P operators will become an integrated information service provider to the transformation of the accelerator.

In the transformation of the network and through technical means to enhance operational control of the P2P capabilities, operators can not ignore a crucial question is: to explore a reasonable profit model, the formation of healthy industrial chain, P2P industry to promote healthy, positive development, but the basis of this development to be able to ensure the continued construction of the network.

As Hou Ziqiang said, the attitude of P2P operators for the change is only a matter of time, "used to be thinking about how to make more money, and now must consider the needs of users. Broadband is the operator that the ultimate solution, but it's broadband users to download a P2P strong demand, operators must strive to do this ecosystem. "Recently, the Ministry of Information Industry Institute of Telecommunications Planning and Design Institute, Deputy Director Hu Jian Bo also said that" the user needs to download BT very strong, certain points of view , operators should lead to this need, and use the model to achieve a reasonable profit. "

Traditional telecom operators to provide users with service model is controllable, high-quality service and charge accordingly. But with VoIP, as represented in free Internet service intervention, operators of traditional profit models are being challenged. For those who can not tolerate their marginalization of the value of an operator, information service providers need to transition to provide more value-added services, while P2P Ze become the operator to integrated information services business transformation accelerator.

Represented by the Chinese telecom operators are trying to use its technological advantage and operational advantages, the scale of development of P2P applications. It is reported that last year, China Telecom, Guangzhou Institute of CNGI successful demonstration project in the "P2P-based digital media business development and application of experimental" project, Guangdong Telecom is developing P2P-based security integrity of the on-demand, live, downloads and other digital media business.

While the huge user base allows operators to have a good basis for operating P2P services, but in the information services, telecom operators to provide capacity information and other media can not be compared with the broadcast. In this regard, Hu Jianbo that telecom operators and content providers need to adopt a collaborative model to bring this piece of business done.

In addition to file download, video, instant communications with external, standardized P2P 鎶?湳 is also widely used in IPTV, streaming media services, video storage and other fields, Li Yong P2P 鎶?湳 also Keyi 浜や粯 build new media, distribution of Ji Tong. Therefore, in addition to the scale of development of the P2P applications, P2P provide differentiated services for carriers is also an option. From this point, Guizhou, China Netcom and Shanghai used together to build a network of "Netcom Watch" is very representative.

As the first test the water P2P streaming media operators, Guizhou, Shanghai Netcom network by using a new generation of P2P technology platform to provide - SNS network, has created a telecom operator and ISP P2P networks as a dominant industry chain. Analysis, advertising revenue will account for dominance of P2P streaming media to build new media platforms, advertising revenue will become dominant. According to iResearch statistics, in 2006 the Chinese P2P streaming media market, advertising revenues of 0.1 billion, is expected to reach 070 million yuan in 2007, reached 480 million yuan in 2010.







相关链接:



Easy Change Vob To 3g2



Expert Games Card



Ma Left Here Mind: To Be The Only Child



Alternative: FrontPage also play Image format conversion



Digital TV Chunjiang Plumbing



Hot Firewall AND Proxy Servers



MPG to 3GP



Followed by a variety of patches manually clear the new "Annie"



Fraud warning: Fishing the latest plot and potential threats



M2TS converter



C # And Class Differences In The Structure



DreamweaverMX Build Guestbook (4)



ASF to MOV



Comments Inventory And Barcoding



Infomation Audio Players



Bohai Shipbuilding Heavy Industry under the overall management PLANNING branch of the digitization p



Tuesday, September 21, 2010

Fireworks in the production of glass jar


Take a look at this effect the following diagram



The following step by step, let us make it come out, not hard, rest assured.

1. New File, 300 * 300, transparent color.



2. In the editing area with a rectangle tool and drag to draw a rectangle about the size of editing area. Open the fill fill panel, fill mode option linear (linear gradient), click on the panel on the edit, we set the gradient in Fig.



3. Hold down the shift key and dragging in the editor to draw a perfect circle, open the fill fill panel, fill pattern for the radial, the color chosen as white, black, results shown in Figure



4. Draw an ellipse, it moves to the top of the circle, fill the circle opposite direction, as shown.



5. edit --- clone clone the oval, leaving a spare, in the Layers panel in front of the midpoint of its eyes to this hidden back-oval. Another sacrifice to do it right,:). also select the oval and round, modify --- combine --- punch hole. feeling is not right, this round of the upper left part of the province, with the rectangle tool to draw a rectangle, drag the figure location, and select the circle and rectangle, modify --- combine --- punch, so we put a circle on the parts removed.



6. Cloning of an ex-convict out to the oval, in the layer to open it in front of the eye point, clone it twice again, point it in front of the eye icon to hide it. For ease of explanation, we rename the following elliptic as a, oval above named b, (you can double-click the layer panel, to rename them). select a, the fill color set to none (in the fill panel, set to none), open storke panel, set the figure



7. Select b, fill color set to none, open storke panel, set the following diagram, the computer keyboard, double-click the upward direction key, and then double-click to the left direction key. Also select a and b, modify- - group them in groups. to rename it to c. results are shown in Figure






8. Select the missing upper part of the circle, to rename it to d, clone it, edit --- clone, a cloned circle with the Ellipse tool named e. drag in the editor to draw an ellipse, the size and location are as follows shown below, to the oval renamed f, clone it, edit --- clone cloned oval named g.






[Next]



9. Select the g and d, modify --- combine --- punch, the results shown in Figure



10. Then in front of said method, the rectangle tool to drag a rectangle, and select the chart and rectangular, with a combine --- punch, to rename it to h. (For ease of observation, I plan to hide other ), then results in Figure




11. Select h, open the fill fill panel, select the solid, filled with color set to light blue. Guankou eyes open icon, transparency set to 16, the top-level e onto the transparency set to 16, f 13 transparency , c of the transparency 40, h of the transparency 8. results in Figure



12. We add to the glass jar on the reflective, enhancement. In the editor hold down the shift with the ellipse tool and draw a white circle, then the ellipse tool to draw a large oval spots, move the circle above, their position shown in Figure.



13. Also select the circle and ellipse, modify --- combine --- punch, so we got a circular arc, select the arc, open effect panel, shadow and glow --- glow, as shown in the pop-up box Settings, and then put it in the Layers panel, set the transparency 80. It to the left. Reflective glass effect came out.



14. For appearance, we give the glass jars with a bracket, the editor and drag to draw a glass jar about the size of the circle, then draw a rectangle, the location shown below to select them both at the same time, modify --- combine --- punch, so we get a bracket,



15. Under this bracket moved to h, which is the penultimate layer, open the fill panel, fill mode selected pattern, shown in Figure Set



16. Select the tray, open the effect panel, shadow and glow --- drop shadow in the pop-up panel, set the following



Effect of out it!
Then shiver 2, the instance is mainly focused on the use of combine --- punch, skilled use of it, can be a lot of wonderful graphics.

If you have any questions, please go to the design situation eye www.websheji.com the forums, we will be in time for you to solve.






Recommended links:



Brief Puzzle And Word Games



Charles Zhang Said Sohu Sogou Do Not Intend To Use The Input Method Earnings



My Favorite ASP And PHP



China has announced measures in the United States blocked WAPI appeal to the international organizat



Audio Video Tools Expert



free mkv to avi converter



Free Mkv Converter



BenQ compete in, with a hope that the road



CEO Online: Yan Huang star CEO Chang on August 15 Guest Sina



M2ts to vob



f4v converter



"Grey Dove" into a small penguin confuse users into a "chicken"



Northern Rock's Instant Messaging



Assembly Language of high-level language features



Report Games And Entertainment



Thunder push download genuine risk of transfer of copyright infringement



Tuesday, August 3, 2010

DB2 on the machine operating instructions guide



1. Start an instance (db2inst1):

db2start

2. Stop the instance (db2inst1):

db2stop

3. List of all instances (db2inst1)

db2ilist

5. Lists the current instance:

db2 get instance

4. This sample configuration file:

db2 get dbm cfg | more

5. Update the database manager parameter information:

db2 update dbm cfg using para_name para_value

6. Create database:

db2 create db test

7. This database configuration parameter information

db2 get db cfg for test | more

8. Update the database configuration parameter

db2 update db cfg for test using para_name para_value

10. Delete the database:

db2 drop db test

11. Connect to the database

db2 connect to test

12. List of all table space for more information.

db2 list tablespaces show detail

13. Query data:

db2 select backup bin conf config data eshow_sitemap.html generate.sh log maint sitemap.html svn tmp from tb1

14. Data:

db2 delete from tb1 where id = 1

15. Create Index:

db2 create index idx1 on tb1 (id);

16. Create a view:

db2 create view view1 as select id from tb1

17. Query view:

db2 select backup bin conf config data eshow_sitemap.html generate.sh log maint sitemap.html svn tmp from view1

18. Node cataloging

db2 catalog tcp node node_name remote server_ip server server_port

19. This port number

db2 get dbm cfg | grep SVCENAME

20. Test node then attached

db2 attach to node_name

21. Look at the local node

db2 list node direcotry

22. Node anti-cataloging

db2 uncatalog node node_name

23. Database catalogs

db2 catalog db db_name as db_alias at node node_name

24. This database cataloging

db2 list db directory

25. Connect to the database

db2 connect to db_alias user user_name using user_password

26. Database anti-cataloging

db2 uncatalog db db_alias

27. Export Data

銆??db2 export to myfile of ixf messages msg select backup bin conf config data eshow_sitemap.html generate.sh log maint sitemap.html svn tmp from tb1

銆??28.瀵煎叆鏁版嵁

銆??db2 import from myfile of ixf messages msg replace into tb1

銆??29.瀵煎嚭鏁版嵁搴撶殑鎵?湁琛ㄦ暟鎹?br />
銆??db2move test export

銆??30.鐢熸垚鏁版嵁搴撶殑瀹氫箟

銆??db2look -d db_alias -a -e -m -l -x -f -o db2look.sql

銆??31.鍒涘缓鏁版嵁搴?br />
銆??db2 create db test1

銆??32.鐢熸垚瀹氫箟

銆??db2 -tvf db2look.sql

銆??33.瀵煎叆鏁版嵁搴撴墍鏈夌殑鏁版嵁

銆??db2move db_alias import

銆??34.閲嶇粍妫?煡

銆??db2 reorgchk

銆??35.閲嶇粍琛╰b1

銆??db2 reorg table tb1

銆??36.鏇存柊缁熻淇℃伅

銆??db2 runstats on table tb1

銆??37.澶囦唤鏁版嵁搴搕est

銆??db2 backup db test

銆??38.鎭㈠鏁版嵁搴搕est

銆??db2 restore db test

銆??399.鍒楀嚭瀹瑰櫒鐨勪俊鎭?br />
銆??db2 list tablespace containers for tbs_id show detail

銆??40.鍒涘缓琛?

銆??db2 ceate table tb1(id integer not null,name char(10))

銆??41.鍒楀嚭鎵?湁琛?br />
銆??db2 list tables

銆??42.鎻掑叆鏁版嵁:

銆??db2 insert into tb1 values(1,鈥檚am鈥?;

銆??db2 insert into tb2 values(2,鈥檚mitty鈥?;







相关链接:



convert mp4 avi



.ape files



Ten Rational Unified modeling elements [3]



Ts Format



Recreation brief



Big Dragon: China's PR industry subversion



"Two-way referral" good MEDICAL care recovery mode



"To 3Hmis take a Chinese name" 4999 yuan Prize Zhengminghuodong



2006 China's First Three-dimensional Digital Modeling Contest Grand Start



Neat Old Photographs - Photo Repair With Image Doctor



No drag and drop the title of the window



BI's salvation



[Modeling] Rose2001 new FEATURES



M4a To M4r



Help Tools STORAGE



Thursday, July 15, 2010

Digital board reshuffle: Chairman Guo Wei



Dec. 20 message, distribution and IT services provider Digital China (0861.HK) announced yesterday its latest board structure, including the third-largest shareholder, president and CEO, replacing Li Qin Guo Wei, Chairman, including two " Old Legend ", including the resignation of four non-executive directors, four representatives of the new investors took over.

4 on looked

Digital bulletin released last night showed that since December 19, 2007 began, representatives of major shareholders Legend Holdings, the former Chairman of the Board of Digital China Li Qin resigned due to retire and the post of director, while no longer serve as Chairman of the Board; major shareholders The second representative of Legend Holdings, the former chairman of Lenovo, the former director of the Institute of Computing Technology Chinese Academy of Sciences has Maochao also due to retire and has resigned as a Director of; also resigned as a director include the current executives of the China Digital Zhinian .

In addition to this announced the resignation of three directors, the Digital 17, the evening also announced that the original investors cash out now General Atlantic Partner's Managing Director William O. GRABE has resigned from the Digital China's non-executive director. Yesterday evening bulletin with the resignation of three directors, board of directors of this adjustment total of 4 Digital outgoing directors.

In the four new directors, the former largest shareholder, holding 16.23% is the second largest shareholder of Legend Holdings shares reduced by two directors from the Tang Xudong, vice president of reassigning a person as a director; new investment Fang Hongyi Investment send as its Managing Director, Hong-Yu Digital Director; the other two directors from the current 18.35% shareholding of the largest shareholder of SAIF, the Fund's directors in Taipei, and Andrew Yan joined the Digital Board of Directors.

In addition to adding four new non-executive directors, the original two executive directors continue concurrently. Lin, executive vice president of Digital China as Yang Guo Wei's old partner, continues to serve as Executive Director, Vice Chairman, President and CEO, Guo Wei's third-largest shareholder to continue as an executive director and Chairman of the Board.

Digital China's four independent directors Hu Zhaoguang, Wu Jinglian, WZ, and KWAN Ming Heung Peter remains unchanged.

Code fully into the era of God, Guo Wei

As the holdings of Legend Holdings to become the second largest shareholder, the fund investors to become the largest shareholder, the management team on behalf of Guo Wei became the third-largest shareholder, with the announcement of new equity program, replacing Li Qin Guo Wei had served as its Chairman in the industry expected.

This change, there are clear indications in the month before. In mid-November, Digital China held the most important annual events - Science and Technology Innovation Week, and as Chairman of the Board of Li Qin did not attend. In a press meeting held during the conference, Guo Wei also specially convened group's new management team debut, this all indicates that Digital China will have new changes.

With Digital MBO (management buyout) of the complete structure of the company as a whole shares a great deal of change, institutional holdings, cash and the entry of new shareholders, are harbingers of a comprehensive re-election today, the board of directors is expected.

In addition to the management of two executive directors and independent directors, the whole party on behalf of shareholders, all non-executive director of the team change, Guo Wei also the third largest shareholder, chairman, president and CEO of the identity of the absolute core of the company, which means Digital China entered the era and Guo Wei Guo Wei advocated service transformation era.







Recommand Link:



Mpeg4 to avi



Youtube Video To PPC Now



Notation Composer



4Media Video Converter Standard for Mac



Wondershare PPT to Apple TV



Christmas-Idea VCD M4V Convert



MATROSKA video



Apolo DVD COPY + Clone DVDs Suite



MKV files



Youtube Movie to iphone Gold



Compare People - Screen Savers



How-to FLV Converter



convert mp3 TO m4a



Youtube to TV Mixer



Office Suites And Tools Catalogs



Thursday, July 8, 2010

Ever MP3 CDA RA to M3U Editor

Ever MP3 CDA RA to M3U Editor contains seventeen lessons. Each lesson has one or two demo-scripts. The lessons sequentially describe all process of melody creation. Ever MP3 CDA RA to M3U Editor has an option that exports the melody to a midi (*.mid) file. The exported file consists of three tracks: melody, chords, bass. You can import this file to any midi sequencer. This audio file conversion software is a sound file format converter for Windows or Mac. It can convert audio files from many different file formats into mp3, wav or wma files including wav to mp3, mp3 to wav, wma to mp3 and much more (eg. CD, CDA, CD-R, DVD-Audio, AAC, AC3, ID3, M3U, M4A, M4P, MP3 ID3 Tag, OGG, RA, WAV, WMA, MP2, APE, VQF, MPC, AMR, Midi, WAVE, and RM). This audio file converter is very easy to use. Just add the files you want to convert to the list, select the format you want to use, and then click the convert button. Now start converting!



Recommand Link:



How-to PDA Converter



Ultra MP3 To CD Burner



My favorite Trace And Ping Tools



Youtube SAVE + Player Pro



AVS Video Editor windstorm



Avi To 3gp Converter Free Download



Youtube to Pocket PC Plus



Mp4 3gp Video Converter



Youtube Movie To MAC Freeware



Free Download Wmv To 3gp Converter



COMMENT Font Tools



Font Tools Specialist



H.264/avc To Ts



ApecSoft RMVB WMV to AVI Converter



ColeSoft DVD to IPOD Video Converter



Mixere



PROFESSIONAL MP3 Sound Midi to RA Copier



Wednesday, July 7, 2010

Happiness MP2 CD-R to RA Maker

Happiness MP2 CD-R to RA Maker - You can edit the title, artist, album, year, genre and comment information of your files. Happiness MP2 CD-R to RA Maker is an easy-to-use tool to convert your audio CD to MP3, WAV, WMA and OGG file. Happiness MP2 CD-R to RA Maker copies the audio digitally-not through the soundcard-which enables you to make perfect copies of the originals. Happiness MP2 CD-R to RA Maker support FreeDB function and you can get track title, artist, and album information. It is very easy to use. It can Convert WAV files to MP3, CD, CDA, CD-R, DVD-Audio, AAC, AC3, ID3, M3U, M4A, M4P, MP3 ID3 Tag, OGG, RA, WAV, WMA, MP2, APE, VQF, MPC, AMR, Midi, WAVE, and RM. It makes direct digital copies from audio CDs and saves them as MP3s, WMAs, OGGs, or WAVs. It have fast speed. It can Convert WAV files to WMA. Just click on one button a CDs will be extracted.