IPad killer Pro Surface Book open all channel reservation

Microsoft today announced that starting from January 1, 2016, 0 o'clock Beijing time, Chinese users from Microsoft Official cat Mall flagship store Tesco, Jingdong Mall, suning, GOME, sundan He Meicheng online channels as well as Microsoft shop shop offline retail channels such as stores and Microsoft reserve Surface Book.  Surface known as "ultimate laptop", detachable keyboard, supports two models of notebooks, Tablet, Microsoft said, hat Surface twice times the Book is Apple MBP.  Microsoft writes on its website, new Surface Book redefined the laptop. As the Surface like other series products, Surface Book strong performance, with amazing technology. New Surface Book 6th generation Intel Core TM i5 processors and core TM I7 processors, as well as solid state drive storage space of up to 512GB, some models using integrated Intel Core HD graphics 520, and equipped with a NVIDIA GeForce video models to choose from.  In addition, Surface Book also has an integrated backlit keyboard, glass trackpad response, as well as the supported notebook/tablet mode switch of the 13.5-inch PixelSenseTM display. As a high performance notebook, Surface Book of battery capacity, fully functional, you can meet various needs of users. Surface Book sale in the Chinese market for 11088.Alt  IPad killer Pro Surface Book open all channel reservation  For different user needs, Surface Book 4 configuration is provided in the Chinese market, are as follows:  Developed using the Intel Core i5 processor with the 8GB memory 128GB, priced at RMB 11088;  Developed using the Intel Core i5 processor is equipped with 8GB and 256GB powered by NVIDIA GeForce video cards, priced at RMB 14088;  Developed using the Intel Core I7 processor is equipped with 8GB, 256GB and powered by NVIDIA GeForce video cards, priced at RMB 15588; Victorias Secret iPhone 6  Developed using the Intel Core I7 processor is equipped with 16GB, 512GB and powered by NVIDIA GeForce video cards, priced at RMB 20088.  Surface Book was Microsoft's first notebook, Microsoft said, Surface Book born to creative work, suitable for the most demanding creative tasks. Use the very high standards for image display program for photo and video editing, you can get a very smooth smooth experience.Alt  IPad killer Pro Surface Book open all channel reservation  In terms of battery life, Surface Book provides up to 12 hours of battery life, so long battery life to the user to complete the day's work.  In terms of operating systems, Surface Book runs the full Windows 10 Professional Edition operating system, compatible with almost all of your favorite software, such as Windows applications, Microsoft Office3 (free Office 3,651 month trial) desktop and professional-grade software (including the Citrix3 and Visual Studio3 software) and so on, all the working software to meet the user requirements.[Article correction] Victorias Secret i6 CaseCollection is the collection of 1542Tags:PC and hardware , TabletAlt Victorias Secret iPhone 6

How dirty is the subway? These pictures could not be more intuitive

Everybody knew but ignored is the fact that, everything on the subway is dirty, especially the seat and armrests. Just so there is no immediacy, it's eyes and take a look. leather iPhone 6Alt How dirty is the subway? These pictures could not be more intuitive  An artist named Craig Ward whim, decided to collect bacteria in the subway, and then see what we can produce. So he put on sterile sponges, then subway to wipe a variety of handrails and seats.  After the completion, he collected these samples to let it grow in a culture dish. Finally, Ward "gains a full measure", petri dish filled with a variety of different styles of bacterial colonies, that strange shape people is a scalp tingling.Alt iPhone 6 leather  You may feel that the situation is not that serious after all these dense colonies quite cultivate a culture dish to discernible to the naked eye, but Ward found these harmful bacteria Escherichia coli, salmonella, the threat is there.  Although it is certain that these public transport inside the dirty, but we use it every day, there is no way. Get off the bus, in bare-handed touch food before you put into his mouth or hand, or the best wash your hands again.Alt How dirty is the subway? These pictures could not be more intuitiveAlt How dirty is the subway? These pictures could not be more intuitiveAlt How dirty is the subway? These pictures could not be more intuitiveAlt How dirty is the subway? These pictures could not be more intuitiveAlt How dirty is the subway? These pictures could not be more intuitive[Article correction] iPhone 6 leatherCollection is the collection of 1542Tags: Science and technology And anecdotesIf you need to reprint, you want the E-Mail authorization. annotated "source Yu Weifeng network", an unauthorized reprint, lost chapter reprinted, and this website will be held accountable by law! E-Mail: QingXing@office.feng.com

Apple system seriously flawed because \"data exchange between applications\"

Editor's Note: recently, serious vulnerabilities of Apple system press attention. May refer to specific news events of Lei feng's network news: comparable to iCloud scandal, exposed serious vulnerabilities Apple systems. Lei feng's network had invited expert analyses in the area of security. Phosphor e active defense lab, Seattle 0xid team, an advisory to track and analyze the whole thing. Here, say their analysis of the situation.Alt Apple system seriously flawed because "data exchange between applications"For the Apple system a serious vulnerability, hackers to bypass sandbox, steal data from thousands of applications. Is not so simple.Based on currently available information, this vulnerability for unauthorized cross-app resource access (XARA), "unauthorized access across application resource attacks", namely: fraudulent APP can allow an attacker to trick users to steal user passwords and other sensitive information within the application. For Mac OS, then there are further modified the user key chain and may hijack network traffic.Why do we need to access application resources?As we all know, Apple's sandboxing mechanism is enabled by the operating system.So-called sandbox/sandbox/Sandbox is a security mechanism, which is an application running in a separate and enclosed environment, are not able to access data from other applications or system (memory, disk, hardware, and so on). Sandbox can effectively protect the application from other malicious programs steal or tamper with sensitive data, so as to guarantee the user's safety.Modern operating systems, especially the mobile phone operating system, whether it is Apple or Google or Microsoft, provide similar security mechanisms.Sandboxing mechanism, an application running in a separate memory space, use a different data storage area, complete isolation between each other, although this is a feature of Apple has often been criticized for, but to a large extent ensures the safety of users.And the problem is not the sandbox security, but outside of the sandbox security. Is opened a hole in order to share data. For example: a concrete wall between the two rooms cut off thieves corridor a success and then went to another room, actually problem is lack of access control systems and cameras in the corridors, not concrete walls were breached. In this case, concrete wall is Apple's sandbox does not go wrong, and the data shared between applications is corridor connecting two rooms.So it is more accurate to say that Apple's lack of data sharing between appropriate access controls, can be used by an attacker to conduct fishing fraud private data and unauthorized access.But we often need to access other applications from an application, or for data exchange between applications, such as Sina weibo clients share a micro-blogging to micro-circle of friends, or jump from app to chat to a browser to a Web page. Like this:Alt Apple system seriously flawed because "data exchange between applications"Apple access across applications is designed to perform this function, similar URL can be passed between applications and application sharing, interprocess communication, and so on for data sharing and call each other. For example when we share article from Sina weibo to the app when Sina weibo will through a data-sharing mechanisms related to the micro-client:Alt Apple system seriously flawed because "data exchange between applications"What's wrong with access across applications?Apparently Apple resource access across applications and are not doing authorization checks and access control, newly installed applications can override/tamper with the cross-application resource access Exchange list, disguised as other applications, read sensitive data of the original application, or trick the user to enter a password.How large is the impact of this problem? Cath Kidston note 4 casesNow, the problem has not caused widespread safety issues because it also bound by multiple criteria.These conditions include the following:1, the first line of Defense: the attacker can upload a fake APP to Apple's app store. We know that Apple has more stringent auditing, which has a great probability of fraudulent applications intercepted by Apple. Of course, attackers can use the certificate to sign the application, but this cost is too high, and if discovered would have been revoked certificates and blacklisted.2, users need to download the application. (Malicious application because there is no traffic, it's hard to be seen by the user, once visited high and easily discovered and blocked by Apple)3, when attackers hijacked a application, will jump to the fake APP, when authorized by the malicious APP can access the APP data, such as local files, and so on, but only the users in to the fake APP interface causes passwords input password theft.4, and this vulnerability on Mac OS (Apple computer) of effect to far than iOS (Apple phone) more big, currently seems, Apple phone of problem main is application between of URL (address) hijacked and fishing fraud, other against compared big of consequences, including: key key chain of steal, and network connection of hijacked, are only on Mac OS effective, temporarily also no effect to Apple phone.Alt Cath Kidston note 4 casesOrdinary Mac users should pay attention to? Cath Kidston galaxy note 41, try to download the application (personal or small business development, application downloads at very low), because in this case, is more likely to be a fake application APP;2, as far as possible not to use cross-application data exchange (such as the jump from app to browser, you can choose to copy the link, then open the paste into the address bar of your browser).3, try to maintain the privacy of the data in the APP, as far as possible using a similar function of burn after reading APP4, when using cross-application Exchange, as far as possible not to jump, enter your passwordWinodws and Android Phone has a similar problem?Yet found similar Windows Phone, Android, cross-application data sharing when the user is able to see all of the optional list of applications, does not preclude an attacker can by way of deception, tricking a user into choosing the wrong application for data sharing. Android users also need to be careful.Additional considerationApple of iOS and Mac OS has always been to closed security and known, but in recent years to, with related research of increased, some security vulnerability gradually was exposure, from iCloud data stolen, and to 360 investment of malt to manufacturing virus, again to this times of across application data exchange attack, these event of occurred description iOS/Mac OS has no longer on information security problem immune, Apple user need change past inattention to of mentality, improve alert, Apple company also should more attention information security problem, Introduce third party professional information security team to help Apple improve the security of the system.Limited information at present, Venus Chen this event team will also continue to conduct further analysis and tracking, follow-up will be given more specific details and accurate judgment.Alt Apple system seriously flawed because "data exchange between applications"2166 votesLumia 940XL\rLumia 940XL as Microsoft Windows 10 ultimate models will be equipped with mycophenolate mofetil 810 processor, with 3GB memory and 32GB storage space, 20 million + 5 million before and after camera configuration and 2K screen meaning 940XL will become the next generation of hardware monster, while supporting the 3D interactive is its unique highlights.\rView details of the voting »

May be soaking in the Carnival of entrepreneurship/technical too long, often heard people ask, how do we not panic? Boy, if you've had too much to drink chicken soup, then eat some chicken, somehow a bit dry. Come with small series brings calming medicine. No point has forced dry, too shy to winnow them down. Boy, if the finish is still panic, please disregard this:1, if only to play the game live (click title to view article) Moschino Samsung Note 3 case"Recommended reading" most of the people on Earth will ever rely mainly on playing live? If you can, that game is a sunrise industry, still have a long way to go, all VR/AR it will be the wings. Transactions can be generated in the game, it can absorb unlimited time. Well, this brain-hole is very large.Alt This week's column selection: If humanity by playing games live, do you think mark it?2, Google chrome against Flash? Boy, you can't be serious, right? (Click title to view article)"Recommended reading" asked: "how to evaluate Google's browser to prohibit running Flash?" well, teenagers don't panic, blend the CTO of Opera browser for ten years will tell you, browser plug-in development history, by the way, it's really just a mistake.Alt This week's column selection: If humanity by playing games live, do you think mark it?From No 3, bike chain (click title to view article)Alt Moschino Samsung Note 3 case"Recommended reading," Zhang 700bike, throw the product itself, but full of feeling, and belt drive back to our vision. And let the experienced cycling enthusiasts talk about chain drive and belt drive the things.Alt This week's column selection: If humanity by playing games live, do you think mark it?4, the chain behind the clouds "reading eye" technique is not that good implementations (click title to view article)"Recommended reading" media say, depending on the chain of great stuff! That so many entrepreneurs was in uproar! How not to panic? Come, calm, with young talent behind "read eye consciousness" of those technologies. Moschino Galaxy caseAlt This week's column selection: If humanity by playing games live, do you think mark it?TipsAlt This week's column selection: If humanity by playing games live, do you think mark it?Micro sweep sweep, author tips bar -231 votes700bike street bike\rFrame Shang, used double conduction structure and "h" shaped not symmetric Hou Shang fork design; seat pad Shang, using Super fiber leather, increased has seat wide, upgrade riding line comfortable degrees; selection automatically within speed drum, can according to riding line speed automatically switch document bit; custom of cave pulled anti-puncture tire, solution glass, and nail caused of tied tire and burst tire problem; put State location used embedded type display, through and 700Bike App connection, achieved\rView details of the voting »

Baidu\'s \"funny face\" behind what is black technology?

Editor's Note: the author of Gong Yazhuo, poly-founder of Rainbow optical, Shanghai Jiao Tong University, Dr. Biometrics research, especially in the field of Iris recognition has over 15 years of research.Alt Baidu's "funny face" behind what is black technology?On September 8, 2015, by many geeks dubbed the "world's raffish" "Baidu deep learning laboratory", was officially released worldwide Face funny face APP–face It.On this APP, user self portrait or upload any photos of faces, you can automatically generate materials. "The face" can be either using the front-facing camera on the material attached to the user's face, real-time interpretation; you can also use a rear-facing camera, different faces and posters, film and TV picture fitting, no traces of PS. By "click Photo" or "recording 20 second video" share to micro-credit, micro-blogging, Qzone. VERUS iPhone 6 Case"No surgery no scars, face a key big Lady" behind the face from this interesting application, is face recognition technology.Face recognition technology, consists of three key components: detection, feature extraction, matching face recognition.1, the background scenery for face detectionIn other words, face first to determine user uploaded photos in there face, if there are, then use left-right symmetry of the face position face and determined by characteristics such as skin color, eye color, hair race.2, to preprocess the face, extraction of facial featureOnce a face is defined, it can spread from the center using human characteristics that the gray complexity, depth and matching algorithm to detect a number of key points. VERUS iPhone 6 CaseAlt Baidu's "funny face" behind what is black technology? (Face: cute dog)Face "image mosaic" function is to find key points such as the mouth, nose, eyes, eyebrows, and integrate the user selected picture material. Key points of human face can be divided into different classes, such as 5, 252, which correspond to different adjustment needs. Under normal circumstances, eyes, nose, mouth on both sides which is detected 5 key points, you can do step 1 locate the face.Alt Baidu's "funny face" behind what is black technology? (Tom Cruise 5 facial key points)If 25 people face a critical point in entertainment applications can be adjusted for more facial details, such as artifact "Mito" familiar "faces with big eyes" aesthetic, lock eyes, mouth, jaw and other key points, female goddess in one second.2015 hot global Microsoft "guess the age How-Old.net", are based on the face with age 27 distinct facial features, such as eyes, mouth, nose, and other key points, determine the user's gender and age. "Time is butcher knife" as time goes by, abrasion, the skin appears dark brown spots and wrinkles, drooping eyes and mouth will, age is the key factors affecting the accuracy of face recognition.Alt Baidu's "funny face" behind what is black technology? (25 key points corresponding to the face area)3, matching recognitionFace recognition (Face Identification) is the identification of human faces in a database of known face match, determine the user's identity. Domestic matchmaking jiayuan, using facial recognition technology, from massive amounts of data screened most similar face with users to upload photos for single men and women "matchmaker", in essence, is what a young man with "husband". Baidu's magic map, has launched a new HTML5 games, user self portrait or upload photos, games will tell you which stars and is similar to how much similarity percentage.Face recognition technology for "marriage", "celebrity" this type of entertainment applications for recognition accuracy is not high, it can meet the requirements of. However, once used for high security level and accuracy of face recognition is not ideal. The most dramatic case is that Australia Sydney Airport was set to have the highest accuracy of face recognition systems, hopes to identify terrorists in passengers, and the precision of the face recognition system is disappointing, drove the United States famous actress mistook Winona-Winona Ryder Reid Genben-Osama bin Laden Osama bin Laden of terrorism.Alt Baidu's "funny face" behind what is black technology?(Face recognition errors: Winona-Rhett did bin Laden really like? )Spending huge sums to purchase face-recognition system, why I made such a stupid mistake?The most important reason is that face "of non-rigid" feature."Non-rigid" mainly for the face image lighting, posture, facial expressions and other differences under the different conditions, hair, beards, makeup, jewelry, clothing changes, and the impact of factors such as age, disease, injury. Congenital instability of facial features, along with the changing external conditions, this is leading to root causes of face recognition accuracy is not high.In high security applications, the face recognition technology is not used independently, often used in conjunction with the other biometric recognition more accurate, for multimodal recognition. The most common multi-modal combinations, that is, "face + IRIS".Alt Baidu's "funny face" behind what is black technology? "Face + IRIS" multimodal recognition systemAlt VERUS iPhone 6 Case"People face + IRIS" of more die State recognition system, General using process is: used monitoring camera on from people for precision lower of people face recognition (errors general rate about 1/1000), once found and police provides of suspects facial similar of people, will will issued alert, again used precision more high of Iris recognition (errors general rate about 1/1 million), further precision judge criminals of identity.Faces can be collected without user matching case photos, little invasive user experience, making it "has the highest ease of use" biometric and IRIS, is recognized as having "high precision" biometrics. Therefore, the "face + IRIS" multimodal applications, the advantages of both (j. w. Cowie, high accuracy) set in one, is the current biometric applications in the most advantageous technical solution.Alt Baidu's "funny face" behind what is black technology?3701 votesiPhone 6s Plus\rIn actual use, Plus feel just like an iPad Mini–, especially in landscape mode, Plus cross-screen keyboard or directly join the cut, copy, paste, and the arrow keys, and then create a new note and email are suspended like a piece of paper on top of the entire interface, very unique. It seems that Apple is great at screens of different sizes have different characteristics of the interface.\rView details of the voting »

Baidu\'s \"funny face\" behind what is black technology?

Editor's Note: the author of Gong Yazhuo, poly-founder of Rainbow optical, Shanghai Jiao Tong University, Dr. Biometrics research, especially in the field of Iris recognition has over 15 years of research.Alt Baidu's "funny face" behind what is black technology?On September 8, 2015, by many geeks dubbed the "world's raffish" "Baidu deep learning laboratory", was officially released worldwide Face funny face APP–face It.On this APP, user self portrait or upload any photos of faces, you can automatically generate materials. "The face" can be either using the front-facing camera on the material attached to the user's face, real-time interpretation; you can also use a rear-facing camera, different faces and posters, film and TV picture fitting, no traces of PS. By "click Photo" or "recording 20 second video" share to micro-credit, micro-blogging, Qzone. VERUS iPhone 6 Case"No surgery no scars, face a key big Lady" behind the face from this interesting application, is face recognition technology.Face recognition technology, consists of three key components: detection, feature extraction, matching face recognition.1, the background scenery for face detectionIn other words, face first to determine user uploaded photos in there face, if there are, then use left-right symmetry of the face position face and determined by characteristics such as skin color, eye color, hair race.2, to preprocess the face, extraction of facial featureOnce a face is defined, it can spread from the center using human characteristics that the gray complexity, depth and matching algorithm to detect a number of key points. VERUS iPhone 6 CaseAlt Baidu's "funny face" behind what is black technology? (Face: cute dog)Face "image mosaic" function is to find key points such as the mouth, nose, eyes, eyebrows, and integrate the user selected picture material. Key points of human face can be divided into different classes, such as 5, 252, which correspond to different adjustment needs. Under normal circumstances, eyes, nose, mouth on both sides which is detected 5 key points, you can do step 1 locate the face.Alt Baidu's "funny face" behind what is black technology? (Tom Cruise 5 facial key points)If 25 people face a critical point in entertainment applications can be adjusted for more facial details, such as artifact "Mito" familiar "faces with big eyes" aesthetic, lock eyes, mouth, jaw and other key points, female goddess in one second.2015 hot global Microsoft "guess the age How-Old.net", are based on the face with age 27 distinct facial features, such as eyes, mouth, nose, and other key points, determine the user's gender and age. "Time is butcher knife" as time goes by, abrasion, the skin appears dark brown spots and wrinkles, drooping eyes and mouth will, age is the key factors affecting the accuracy of face recognition.Alt Baidu's "funny face" behind what is black technology? (25 key points corresponding to the face area)3, matching recognitionFace recognition (Face Identification) is the identification of human faces in a database of known face match, determine the user's identity. Domestic matchmaking jiayuan, using facial recognition technology, from massive amounts of data screened most similar face with users to upload photos for single men and women "matchmaker", in essence, is what a young man with "husband". Baidu's magic map, has launched a new HTML5 games, user self portrait or upload photos, games will tell you which stars and is similar to how much similarity percentage.Face recognition technology for "marriage", "celebrity" this type of entertainment applications for recognition accuracy is not high, it can meet the requirements of. However, once used for high security level and accuracy of face recognition is not ideal. The most dramatic case is that Australia Sydney Airport was set to have the highest accuracy of face recognition systems, hopes to identify terrorists in passengers, and the precision of the face recognition system is disappointing, drove the United States famous actress mistook Winona-Winona Ryder Reid Genben-Osama bin Laden Osama bin Laden of terrorism.Alt Baidu's "funny face" behind what is black technology?(Face recognition errors: Winona-Rhett did bin Laden really like? )Spending huge sums to purchase face-recognition system, why I made such a stupid mistake?The most important reason is that face "of non-rigid" feature."Non-rigid" mainly for the face image lighting, posture, facial expressions and other differences under the different conditions, hair, beards, makeup, jewelry, clothing changes, and the impact of factors such as age, disease, injury. Congenital instability of facial features, along with the changing external conditions, this is leading to root causes of face recognition accuracy is not high.In high security applications, the face recognition technology is not used independently, often used in conjunction with the other biometric recognition more accurate, for multimodal recognition. The most common multi-modal combinations, that is, "face + IRIS".Alt Baidu's "funny face" behind what is black technology? "Face + IRIS" multimodal recognition systemAlt VERUS iPhone 6 Case"People face + IRIS" of more die State recognition system, General using process is: used monitoring camera on from people for precision lower of people face recognition (errors general rate about 1/1000), once found and police provides of suspects facial similar of people, will will issued alert, again used precision more high of Iris recognition (errors general rate about 1/1 million), further precision judge criminals of identity.Faces can be collected without user matching case photos, little invasive user experience, making it "has the highest ease of use" biometric and IRIS, is recognized as having "high precision" biometrics. Therefore, the "face + IRIS" multimodal applications, the advantages of both (j. w. Cowie, high accuracy) set in one, is the current biometric applications in the most advantageous technical solution.Alt Baidu's "funny face" behind what is black technology?3701 votesiPhone 6s Plus\rIn actual use, Plus feel just like an iPad Mini–, especially in landscape mode, Plus cross-screen keyboard or directly join the cut, copy, paste, and the arrow keys, and then create a new note and email are suspended like a piece of paper on top of the entire interface, very unique. It seems that Apple is great at screens of different sizes have different characteristics of the interface.\rView details of the voting »

Don\'t touch me, somebody else shame shame da

Alt Don't touch me, somebody else shame shame daAlt Don't touch me, somebody else shame shame daOn supermarket shelves, a tender skin, the line curves, tactile items like new born babies, you couldn't help but reach out to touch – Hey! Hand place, like a flush–it turned out to be shy! With their hands, well, whole body pink, seductive yet? iPhone 5 Disney case Disney caseSir, please calm down! This hungry screws product designers Neretin Stas as a makeup and interactive new concepts of nursing brand design packaging. Imagine, when you use the packaged product, hearts will be filled with, what kind of mood? Is a treat or a treat or a treat? Dark, please go to the wall!Okay, now to tell you the truth it will shame shame – lateral packaging used thermochromic paints and coatings, so as soon as you touch it is shy, this intimate and affectionate feeling, do you like it?Alt iPhone 5 Disney caseAlt Don't touch me, somebody else shame shame daAlt Don't touch me, somebody else shame shame daAlt Don't touch me, somebody else shame shame da[via]

Quick upgrade now! AMD is announcing the end of a video card support

Yesterday AMD officially released the new Radeon Crimson drive, another important message coming soon: AMD announced an end to a large number of the video card driver support. Spigen iWatch cover  AMD announced on its official website a series of graphics products into "legacy (Lagacy)" category, which includes the HD5000 series following HD7000, HD6000 series, HD7600 series, HD8400 HD8000 series.  "Legacy products" means AMD driver upgrades will no longer be their existing Radeon Crimson will be their highest version of the driver. In response, AMD officially "on November 24, 2015 these products has reached the pinnacle of performance optimization".  Need to be aware of is that these products are non-GCN framework graphics card means full AMD today research and development centers to the GCN architecture. Spigen iWatch Case  If you are a player that used to play the latest masterpiece, certainly know how important drive for new results. AMD move means more new works, people with these video cards don't optimization to expect. Then, you will choose to upgrade?[Article correction]Alt Spigen iWatch CaseCollection is the collection of 1542Tags:PC and hardware\r Science and technology DesignIf you need to reprint, you want the E-Mail authorization. annotated "source Yu Weifeng network", an unauthorized reprint, lost chapter reprinted, and this website will be held accountable by law! E-Mail: QingXing@office.feng.com

Quick upgrade now! AMD is announcing the end of a video card support

Yesterday AMD officially released the new Radeon Crimson drive, another important message coming soon: AMD announced an end to a large number of the video card driver support. Spigen iWatch cover  AMD announced on its official website a series of graphics products into "legacy (Lagacy)" category, which includes the HD5000 series following HD7000, HD6000 series, HD7600 series, HD8400 HD8000 series.  "Legacy products" means AMD driver upgrades will no longer be their existing Radeon Crimson will be their highest version of the driver. In response, AMD officially "on November 24, 2015 these products has reached the pinnacle of performance optimization".  Need to be aware of is that these products are non-GCN framework graphics card means full AMD today research and development centers to the GCN architecture. Spigen iWatch Case  If you are a player that used to play the latest masterpiece, certainly know how important drive for new results. AMD move means more new works, people with these video cards don't optimization to expect. Then, you will choose to upgrade?[Article correction]Alt Spigen iWatch CaseCollection is the collection of 1542Tags:PC and hardware\r Science and technology DesignIf you need to reprint, you want the E-Mail authorization. annotated "source Yu Weifeng network", an unauthorized reprint, lost chapter reprinted, and this website will be held accountable by law! E-Mail: QingXing@office.feng.com

This is a travel blog

This is a travel blog. I will share many travel tips in next blog.