In the daily link to the Silicon Valley, the most fresh information! The "Silicon Valley" here refers to the typical and innovative business representatives abroad.
1. Tesla wants to build a super factory to open the history of the largest robotic orders
Http://tech.ifeng.com/a/20150202/40967163_0.shtml
Tesla always seemed to be a constant surprise. From the world's first luxury electric sports car, to the direct sales model of the car, from the world's largest car electric factory, to 90 seconds to change the battery Dafa; the car layman from Silicon Valley emerged from the outset as a subversive, giving the traditional car industry a great admiration.
While the recent slump in sales in China has dragged down its share price, Tesla is still on the subject. Recently, it signed with the company's largest robot purchase order--100 Taiwan painting Robot, 48 open/cover robot and 26 sealed robot. DuPont is a leading manufacturer of machinery and equipment for the automotive industry.
2. WhatsApp open Test free voice call Telecom faces shock
Http://tech.qq.com/a/20150201/023254.htm
WhatsApp, which has been bought by Facebook for $22 billion, is now the world's largest mobile chat tool with 700 million active users. Earlier last year, WhatsApp executives said WhatsApp would launch a free voice call function. According to the latest report, WhatsApp has launched the call function test, the relevant screenshots have been sent to the network users.
3. U.S. military in GitHub open source Dshell Security Code: Actively respond to network attacks
<http://www.cnbeta.com/articles/367375.htm>
The U.S. military recently open its security code through GitHub, so that it can become more aware of the problem when it is attacked by the Internet. For the past five years, this code called Dshell has been used to analyze attacks against the U.S. Department of Defense Network. The U.S. Army Research Laboratory (ARL) argues that these cyber attacks against the government are similar to those directed at the general public. Therefore, they would like to hear feedback from non-governmental users in order to better understand and prevent future attacks.
4. Google's agreement will change privacy policy
<http://news.ccidnet.com/art/1032/20150202/5755197_1.html>
February 2 News, Google and the UK data regulator agreed to change its privacy policy. Google has agreed to revise its privacy policy to ensure that information processing is more transparent, informing users of how they will be treated and protected. Google has signed a letter of commitment to guarantee a new privacy policy by June 30 this year and will continue to make changes to individual privacy policies over the next two years. Google's current privacy policy, made in March 2012, is used in more than 70 of the services Google has launched, including YouTube, Gmail and Google +, among others. In the process, ICO will monitor Google's personal information processing.
5. Google to increase the vulnerability of mining incentives: 30,000 dollars prepaid for researchers
<http://news.ccidnet.com/art/1032/20150202/5755209_1.html>
U.S. time Friday, Google announced that to further encourage outside researchers to find loopholes in their software and services, some experienced researchers will advance more than 30,000 dollars in fees.
For years, security researchers who have found loopholes in Google's software and services can get rewards from companies. Rewarded under the courage, Google's path has played a good effect. Google's disclosure of data shows that since 2010, the company has been "leak" to pay more than 4 million of dollars.
6. Microsoft: Super computer for several 1 billion years to crack OneDrive encryption
<http://www.cnbeta.com/articles/367319.htm>
Microsoft uses two types of encryption techniques: Disk encryption and file encryption. Microsoft's BitLocker Disk encryption technology has no need for much technical depth, which allows disk encryption to ensure that files on the physical hard disk reach the 256-bit Advanced Encryption Standard (AES 256-bit homeowner). It takes billions of years for a modern supercomputer to crack a file under this level of encryption.
Another encryption method mentioned by Microsoft is file encryption, where each file is protected by AES level 256, and each file larger than 64KB is split into several parts, each of which is encrypted and stored in a different Microsoft Azure server. Similarly, each server is highly encrypted.
7. Google Microsoft Amazon "bribery" Adblock: Bypass advertising shielding
<http://tech.sina.com.cn/i/2015-02-02/doc-ichmifpx6504047.shtml>
The Financial Times reported that Google, Amazon, Microsoft and Taboola had quietly paid for the development of Adblock Plus's German start-up companies, making Adblock Plus no longer blocking ads on its website. Adblock Plus is currently the world's hottest advertising shielding tool.
The transactions are still in secrecy, but the Financial Times has confirmed the existence of the deal. This shows that the Internet advertising giant has been the emerging advertising shielding tool as a major threat. At present, the global network advertisement market scale reaches 120 billion dollars.
8. Famous BT website Pirate Bay Saturday back online
<http://tech.sina.com.cn/i/2015-02-01/10319991230.shtml>
The Pirate Bay, a well-known BT share site, was raided by police early last December, and the site was then rolled off. January 31, the site again online.
Previously, the Pirate Bay's servers were located in a mountainous area near Stockholm to withstand nuclear attacks at a data center. In early December last year, police raided the Pirate Bay servers here, and the Pirate Bay website was subsequently forced offline. But two weeks later, the Pirate Bay built a temporary home page showing a flying pirate flag.
(Responsible editor: Mengyishan)