Sunday, October 24, 2010

Use photoshop to do simple picture dissolved map



Effect Picture






Material A:






Material B:






1. Open the material A, material B and drag, will be placed in the A, B above

2. To material B, add a mask layer, which pulled in a black and white gradient mask, the effect shown in Figure






3. Add a Levels adjustment layer






4. The overall color. Add a color balance adjustment layer. Levels values were: -37, -74, -6, and the remaining to keep the default

5. Create a new layer, set foreground color to red, the background color is green, the implementation of filter - render - clouds command, a total of two. Mixed layer model will be changed to soft, the filling degree of 53%

6. In all layers above the new layer, hold down the CTRL + ALT + SHIFT at the same time by E, the implementation of stamp this layer, copy the layer, 4 pixel Gaussian blur, mixed-mode soft , then fill the appropriate degree of change like the next

Obtained results as shown below










Recommended links:



Illustrator9.0 and Golive5.0



Shop Chat And Instant Messaging



Expert Audio Video Tools



Accepted in principle the draft Anti-monopoly law by removing sections of administrative monopoly



OGM Converter



CLR 4.0 new content in abnormal state of confusion



MOV to MP4



About Password Psychology



SWF to MP4



How to draw background image CAknGrid



Shanghai IDC room SEVERAL real bandwidth of more



Lists Trace And PING Tools



how to resolve bad superblock At error message



UC: A Master Of A MS



Let Your XP Into A Mac OS X



Tuesday, October 19, 2010

Closing the tenth sign Zhongguancun Computer Festival 27.7 billion Big One



Yesterday, Haidian District, held its tenth Haidian Zhongguancun Computer Festival Closing Ceremony & investment promotion conference. Learned from the Haidian District Government's preliminary statistics, the current computer festival amounted to 27.7 billion contract.

This computer festival opened on September 5, a period of 5 days, including Zhongguancun Development Forum and the parallel forums, exhibitions and trade fairs and investment promotion activities, scientific and cultural information dissemination and other activities from all round view of the world demonstrated the vitality and Zhongguancun charm.







Recommended links:



Intrusion DETECTION (ID) FAQ (on)



Procurement into the decision-making problems faced in China



Single-core Conroe two series were named Pentium, Celeron



SWF to MPEG4



3GP to MOV



Free Registry Fix For All Concerned Computer



Introduction Automation Tools



Maxthon filter floating Flash ads all captures



Why Engage In Career Planning?



To expose the FRAUD: WinRAR to compress 775MB 13.4MB



GDI Graphics Rendering With VB.NET



Contribute something to Do on the sales



FLV to M4V



New Hobby



Tuesday, October 5, 2010

Introduction and Context Servlet container



Servlet container start to create a number of objects, such as Servlet, filter, listener, spring, etc. So how do these objects?

Here in the Servlet (or Filter, or Listener) in the spring of the IOC to use the container create the default Servlet container spring container object, injected into the Servlet Context in, Servlet Context object is injected into the session object, session object is injected into the request object, request object is injected into the Servlet object, (the injection is not very standard, is mass parameters, or directly pay the value of the property). Layers can be dependent on spring container object.

WebApplicationContext webApplicationContext = WebApplicationContextUtils.getWebApplicationContext (request.getSession (). GetServletContext ());

So you can directly remove the Web Application Context Servlet Context object:

WebApplicationContext webApplicationContext = (WebApplicationContext) servletContext.getAttribute (WebApplicationContext.ROOT_WEB_APPLICATION_CONTEXT_ATTRIBUTE);

In fact Web Application ContextUtils.getWebApplicationContext is to use the above code to achieve, recommended above, the static method above

Note: use the web Application Context.getBean ("ServiceName") when, in front of forced conversion to use interface, if the implementation class will be reported using the type conversion error. Such as:

LUserService userService = (LUserService) webApplicationContext.getBean ("userService");







Recommended links:



Backup AND Restore Expert



Fireworks in the production of glass jar



Switch to the best period of 2 to 3 years



BOE Holdings East TPV regulators have not yet Ratified Difficult



AVI to MPEG4



Shenzhen Julong year launched China's first six-generation LCD line



XviD to MP4



Brief Firewall And Proxy Servers



P2P operators transform their billing through traffic into the regular army



China's attitude towards certain of HL7



Cult3D Animation with 3DMax DEFAULT works



Top Mail Servers



MPEG to 3GP



Mito Xiu 1 minute to create non-mainstream days



How Do Wireless Networks Work



Wednesday, September 29, 2010

Why do bad distributor pipe factory?



"Managing dealer" is a slogan, or a wish. From a practical point of view. Production enterprise marketing management personnel at all levels almost every day for this dealer management and headache. This distributor tube is not good, the negative consequences are obvious, for example, sales of market implementation in place, the slow pace of sales. Market dynamics in a timely fashion. Enterprise security can not protect the assets, selling expenses continued to increase, good dealers often poached by competitors ~~~~~~

The reason why good tube manufacturers distributors, the problem is with the four

First, the dealer is not enough understanding

All the contradictions in the world comes from understanding the asymmetry, the asymmetry comes from understanding each other's do not understand the contradiction between the true manufacturer, manufacturers of the dealer's knowledge and understanding is very limited, Since very few manufacturers in the staff had experienced dealer of practitioners, that is not true understanding and knowledge of dealers, and more just by virtue of their subjective understanding to analyze the dealer. Or is relative of course to look at dealers. Many manufacturers of senior staff or the dealer as a simple and backward self-employed, or the dealer as the same with their own businesses, and even culture are not upstarts. Calling the shots, manufacturers of front-line operational staff also would look at the dealer, in fact, dealers are neither self-employed, not the enterprise, but a situation in between, has its own unique form of organization, profitable, and values. The point is, many dealers and manufacturers actually thinking the opposite, for example:

Manufacturers hope that the dealers do specialize in fine, the market for specific input. The dealer wants not be deemed as a profession or trade in too deep, do not be put on the market too much, to facilitate small boat U-turn.

Manufacturers hope that the dealer will make the market the first performance, then consider giving a certain market policy and resource support, and dealer wants manufacturers to market first, policy and resource support, and then come back and improve on market performance.

Manufacturers want products distributors can profit due to play thin, so help lower channel members, in order to increase sales, while dealers will want to increase the profits of a single product, and to some extent control the overall product sales, which a large amount of , occupied by the working capital are very high, and management costs will also be increased simultaneously.

Manufacturers hope that the dealer market, given the costs of manufacturers and channel policies for market development and channel relationships established, long-term market operations to establish a strong foundation, while the dealer is considered for short-term benefits, often the manufacturers costs and channels to market policies to retain, and directly into the profits of the dealers themselves.

Manufacturers believe that innovation is the soul of enterprise development, so keep models in the product and marketing innovation, and the dealer is out of business security and income stability considerations, but preferred the traditional marketing model and mature and old products .

Manufacturers in accordance with the trend of doing work, such as industry trends, market trends, market space and so forth, and this trend is the guiding principle, but the dealer is doing work in accordance with the results, the result is often the intention of this month how much money, how much money this quarter plan, how much this plan and so on, in determining the outcome of the premise, again to determine the current orientation of the development objectives and benefits.

In addition, the factory is mainly in contact with dealers line business, in general, manufacturers of front-line operations officer of the level of quality and professional range, and even sometimes very difficult to guarantee the level of communication, and, manufacturers of front-line business personnel and distributors in the process of communication and cooperation, there are still many unequal congenital deficiencies, such as manufacturers of front-line operational staff who belong to the wage, while the dealer owner is the boss of all sense; factory line operational staff level of education generally higher than the dealer boss to small business people, but manufacturers of commercial experience but generally a lot lower than the dealer, this would be of great communication between the inevitable obstacles and difficulties, such as this Many examples can be cited, in short, vendors, etc. for various aspects of the right, leading to difficulties in mutual understanding, which naturally has led to difficulties in understanding many contradictions and disputes arise.

Empathy can indeed solve many problems, but, really and indeed empathy is not easy to do. After all, most people are still subjective, and habits from their own selfishness considerations apply. Manufacturer's operational staff is so, so dealers are the boss, everyone is waiting for the other to understand their own initiative.

Second, only concerned with the future of distributors, dealers without regard to the background of the basic

From the top manufacturers, to manufacturers of front-line business, the dealer's concerns, manufacturers focused largely on their own product sales, due to issues related to extension of opening are:

Dealers on the degree of concern of the manufacturers of products;

The progress of the marketing plan;

The manufacturers use market costs;

The manufacturers and end product performance in the channel conditions;

Other similar manufacturers are trying to dig pry existing dealers;

The factory product in dealer inventory and adjust the delivery;

These issues, which we call the front desk between manufacturers and dealers, in fact, these problems are all on the starting point for the interests of manufacturers point of view, the core is to maximize the benefits of manufacturers, distributors and rarely to consider their own interests, or the interests of the dealer unitary, and that their product is factory has brought benefits to the distributors, in fact, the interests of dealers must be whole, and is of a global nature, not just through the distribution of a particular manufacturer's product benefits, as a dealer, he had the problem to be considered must be global, overall, from the inside out, for example, dealer's own development problems within the company's personnel management issues, new manufacturers develop new products and market issues, offline channels and terminal management, cash flow problems, operation and management cost control, the face of peer competition, etc., etc. these are the holistic benefits and distributors are closely related, these problems, we call back-issues dealers, these dealers boss really cares about the background of the problem, there are several manufacturers of high-level or business staff concerned? Furthermore said, even some relationship to the boss can help dealers effectively address those back problems?

Third, pay attention to the status of the competing parties and interests of the dispute

Vendors, on the surface is a community of interests, the pursuit of win-win, in fact, is among firms competing interests between manufacturers seeking distributors for their products, focusing on investment, up more distributors for the purchase of funds and market resources, and dealers are also constantly try to get more market manufacturers took out the cost and policy support to them, manufacturers and distributors are trying to operate more cost and risk transfer to the other head, this is a matter of fact we did not Law evade reality, but who is not willing to put these issues on the table, and no serious consideration to the problem spread, to find the balance between the interests of both sides. As manufacturers, on the one hand trying to pocket from the dealer more money out of the other, but also claim to dealers obedient, easy to manage, this dealer is not a fool, to obediently money or, have to obediently obedient? this how can!

Fourth, the homogeneity of the management ideas

Most manufacturers are on the dealer's management thinking about, and management thinking, like, will inevitably lead to the same behavior, this behavior as a result of the dealer's management situation we are about the same, then good management and cooperation Once widely copied and general use, the value also much to complain, and many manufacturers in product innovation, marketing models has been some innovation, but, in dealing with distributors, and dealers to promote the issue of cooperation rarely with innovations, in reality, we can easily find a little attention, the manufacturers of business people actually do are similar, or even see the dealer, speak out the words are similar, this dealer also may control how good?








Recommended links:



STORM infringement advice to the court sentenced the company abandoned online play



The NATIONAL rate of 99.5% administrative villages



Simple Flash Tools



Transport Stream converter



Production activities yourself menu bar



"Tomato Garden" case of first instance pronounced loss of Chengdu, a total of over 10 million soft



RM to MPEG4



Audio Video Tools Evaluation



SIMPLE Business



Baidu in the mad hope and HARDSHIP



SCO UNIX Learning Collection



overall budget management of domestic software



AVI To Zune



Easy Icon Tools



Paladin 4, the efficiency of the most rapid Kill BOSS



Tuesday, September 14, 2010

The basic principles of SSL


0 Introduction

Three years ago, my company has established and suppliers B2B e-commerce sites, I participate in this project to understand the network traffic encryption and SSL-related knowledge. With my knowledge and understanding of e-commerce continued to deepen, with the current continual emergence of various e-commerce platform, I stepped up on the SSL's learning and understanding. This will combine to present my understanding of the basic principles of SSL, considering most of those who read this article for the security and encryption has some understanding and awareness of this paper is as follows:

1 first introduced the SSL communication diagram, relevant background knowledge of network security people can read about the plan's basic principles of SSL.

2 on the SSL communication on the diagram to explain the text and description here will involve a number of encryption and security terms, so people who read for understanding this can be encrypted.

3 on some of the terminology involved a brief presentation and explanation, the need to understand the terminology of some encryption can be used as a brief reference to the reader.

The purpose of this paper is to explain in concise summary SSL principle, the need for readers to learn more about SSL theory can further read the relevant books and papers.

1 SSL communication diagram

SSL communication diagram shown in Figure 1:




2 SSL communications description

In this section, the schematic shown in Figure 1 will be explained. To illustrate the convenience of the client in this paper that for the B, the server side for the S.

STEP 1: B -> S (initiated dialogue, consultation transmission encryption algorithm)

Hi, S! I want you to security dialogue, my symmetric encryption algorithms are DES, RC5, I have RSA key exchange algorithm and DH, with MD5 digest algorithm and the SHA.

STEP2: S -> B (sending server digital certificate)

Hello, B! Then we use DES-RSA-SHA This combination of communication, in order to prove I was indeed S, now send me the digital certificate to you, you can verify my identity.

STEP 3: B -> S (send this dialogue of the key)

(Check S's digital certificate is correct, the certificate issued by CA agencies verify the validity of S after the real certificate. Generated by using S's public key encryption key to send this dialogue to the S)

S, I have confirmed your identity, now we have this communication in the symmetric key encryption algorithm to send to you.

STEP4: S -> B (for key)

(S to obtain their private key to decrypt the key in this newsletter).

B, I have access to the keys. We can start correspondence.

STEP5: S <-> B (for communication)

Note: In general, when B is confidential information during transmission by, B does not require digital certificates verify the authenticity of his or her identity, such as e-banking application, customers need to send your account number and password to the bank, the banks of the Fu Wuqi need to install the digital certificate to show the effectiveness of their own identity. In some B2B applications, server-side also needs to verify the identity of the client, then the client also need to install a digital certificate to ensure communication when the server can identify a client's identity, the identity verification process is similar to server authentication process.

Also need to note that in some e-commerce applications, may also be used to e-signatures, or to more secure information exchange, will increase the electronic signature and message check code (MAC).



3 describes the knowledge

With the continuous development of e-commerce, SSL protocol has been more widely used. SSL protocol is between the HTTP protocol and an optional layer between the TCP can be expressed as




Here we have an example to explain the how the SSL protocol to access the secure website, if we buy in the online game cards in the game click on the payment page, we will enter the following interface:



Then we note that in the browser's address bar begins with HTTPS rather than HTTP, the browser's bottom right corner there is a lock, indicating SSL encrypted channel has been established. As layer in the process of HTTP request into a first HTTP request, then SSL TCP and IP layer by layer to achieve the browser and server handshake (HANDSHAKE), the server level access to the key, the last TCP layer of encryption between the server channel to achieve the objective of both sides to exchange information security.

In order to facilitate understanding of SSL, the following information in a brief overview of encryption-related knowledge. Encrypted information using the key type of encryption algorithm can be divided into the following categories: HASH coding, symmetric encryption and asymmetric encryption categories.

HASH HASH algorithm coding is to use the length of the message from any calculation of the value of a process HASH, HASH value can be said that the fingerprint information, as any different messages, almost always have different values HASH. Therefore, in the process of SSL communications, messages can be encrypted HASH value to ensure the delivery of the message has not been altered during transmission.

Called public key encryption or asymmetric encryption uses two mathematically related values to encode the information (encrypted), in which a number called the public key, and the other called the private key. Public key encryption private key can decrypt the information, private key encryption public key can decrypt the information. As the public key can be issued a large area, so public-key encryption in the SSL encrypted communication used on the encryption keys or digital signatures.

Symmetric encryption and asymmetric encryption is the difference compared to symmetric encryption, the encrypted information and decrypt information using the same key, so the key can not open. But it has the encryption, decryption rapid.

In SSL communication, the first non-symmetric encryption exchange of information, so the server provides browser access to the symmetric encryption key, and then communicate using the key information in the process of encryption and decryption. To ensure the message has not been tampered with during transmission can be encrypted HASH code to ensure the integrity of information.

Server digital certificate issued to the main Web site or other server requires a secure identification to prove identity of the server information, the same client-side digital certificates used to prove the identity of the client. In Guangdong Electronic Certification Authority Web site, you can see all the digital certificates issued by the agency detailed description of the function.






Recommended links:



ps3 Flv



wmv ps3



Matroska video



online wav to mp3 converter



Wednesday, August 4, 2010

Toshiba to pay for dedicated HD-DVD format, Paramount has been criticized



August 27, according to foreign reports, Paramount Pictures and DreamWorks Animation company received 150 million U.S. dollars to encourage their money do not use Blu-ray technology. Blu-ray founders were severely criticized this practice.

It is reported that Toshiba and other HD-DVD supporter Paramount to pay for the specialized production of HD-DVD format, content.

Including Sony Pictures, Disney, Fox and MGM, including a number of Hollywood studios to use only Blu-ray format. Warner Bros. still use both formats. The Universal (Universal) the film company, now Paramount, will only use the HD-DVD format.

Founder Erick Hansen says Blu-ray technology, Toshiba and HD-DVD offer than the transactions because they desperate. The public has chosen Blu-ray technology. Blu-ray and HD-DVD this year, sales ratio is 2 to 1.

Hansen said that for retailers, this is like a DVD in the public choice after forced to save up VHS tapes. For consumers, this will transition the industry to create more high-definition confusion. He pointed out, DVD Blockbuster and major retailers, Target will only be able to Blu-ray products stored on the shelf.

Hansen asked Paramount to accept the money can get? If Steven Spielberg and Michael Bay and other directors have billions of dollars to support Blu-ray technology, then the deal is a double-edged sword.

Spielberg's film company not included in the Paramount and DreamWorks Animation's deal, the two formats will continue to sell products. The Bay in their own Web site said in a statement he issued only HD-DVD format, "Transformers I" and "Transformers II" dissatisfied.

Hansen said that, I told them this than the transaction were not surprised. However, the deal is like paying them not to plant crops as they are. If they accept this little money to prevent the growth of Blu-ray, the film industry to continue to the next generation of technology?








Recommended links:



"Wall Street Journal": out Of mouse traps



Giant Imperial Shi Yuzhu set foot on "the journey"



Guide Games Sports



youtube to MPG



Expert Games Card



Ape files



Shady Operators Battles Executives Jie Mi



For Unix Terminal As The User Moving



mkv video Format



[Aion] Korean Clothing And Equipment Leveling Frenzy 1.2 Perfect



Comparison Graphic Editors



Photoshop pumping effect of the new line Of thinking



Paladin 4 solved the copy protection



251 hospitals and Receive paperless



Converting Mp3 To Aac



Monday, July 26, 2010

Photoshop mouse painted illustration major combat (3): Draw Butterfly


Section III: Butterfly Drawing
63, to open a file for the new butterfly wings it. Pen sketch of a butterfly wings (if not allowed to grasp, it is recommended to use reference chart), as shown.



64, converted into constituencies, padding is black, then the new layer, outline the scope of butterfly wings internal color, first fill of white. Since then a new layer in preparation for painting the wings of the skeleton.



65, a skeleton with a pen to sketch out some of what? Pen to outline the line does not automatically end? Under the second point and press ESC, the line will end this paragraph. Figure distribution.



66, those skeleton only path, the path. To become a line. Select brush tool, select an ordinary brush, the size of 2px.



67, the path panel, select the path with the current brush painted. Can see that skeleton out.



68, select the upper part of the original is white, used yellow gradient.



69, the same treatment the rest of the initial Shanghao wing color.



70, the skeleton copy layer.



71, will copy the good white skeleton RP changes, as shown.



72, to the Gaussian blur ~ can see the light of the transition effects.



73, more layers can be replicated to enhance the effect.



74, the framework that combined several layers of white, mixed-mode stack to adjust, and then make a black frame is not hidden, the effect is as follows.



75, began painting the white spots on their wings.



76, see the distribution of spots.

77, filling a good white effects shown.



78, and the background to hide, merge copy the entire wing.

79, pulls the main background. Course to transform the.



80, the initial transformation, and then copy the multi-layer, forming a pair.



81, the front wings with masks, then brush (remember the lower the opacity of the brush) brush with a few, faintly translucent wings arises.



82, with a pen to outline the butterfly body, check the back of the stomach, adjust the color to distinguish between the chest and abdominal (insects in three parts: head, thorax, abdomen).






[Next]



83, the top elected body by the smooth, extremely important to remember the emergence action!



84, HSB go again ... ... I remember the same time increase the brightness to increase saturation, so the color will not gray, but appear bright, colorful.



86, with a pen to outline the stomach of the stripes, and then into constituencies and emergence, and then adjust the hue, good effect, and Figure.



87, Butterfly add a shadow below to see results.



88, the head drawn with a round black piece, now painted with a pen shape antenna.



89, fill in more than a black copy, see the effect.



90, the same drawing feet. With six in the chest (right? Entomologists do not hit me, huh, huh)



91, again the effect. Shadow abrupt point.

92, according to the direction of light, the shadow of the thumb piece of that piece should not be like projection. Amplified the changes!

93, adjust the thumb of color, will reduce shadows.



94, complete the drawing! Now we have to do post-processing: the effect of creating depth of field.

Select the entire canvas, press CTRL + SHIFT + C to copy the entire screen merge.



95, the same size to create a new document, paste, and copy the new layer, then layer the larger the new Gaussian Blur, then hides.



96, then the bottom of the screen and then copy the new layer on top of the screen placed in the clear.



97, on which a small degree of Gaussian blur, plus mask.



98, on the black and white radial gradient mask, butterfly center, look, the initial depth of field simulation results have emerged, butterfly is clear, while other parts of the vaguer and vaguer.



Click on the picture to enlarge

99, the same deal with the largest layer fuzzy head. However, to increase the radius of the gradient.



100, to see two fuzzy Mask What is the difference between it. This operation is similar steps to simulate the lens focal point, clearly, other features blurred, in general, blurring will produce different changes with distance. This two-story, on the simulation of this effect. Of course, if you really want to study, close to the truth is not possible ... ...



101, and finally add the title to complete the effect!



Click thumbnail for larger view

Tutorial Electric.






Recommended links:



Email Will Be Transferred To Other Mailboxes In Gmail



Password Managers evaluation



Mkv video format



Charles Zhang: Sohu Is Looking For The Next Opponent



avi To mpeg



ape Files



youtube video format



PS Production pearl necklace



Job 10 kinds of unhealthy Attitude towards students



Eight high-risk incident RESPONSE IDS



"Mom" To Baidu Was "angry"



How To Quick Cash Flow Statement The Two Main Forms



In 2006, China CMM / CMMI Consulting Agency Announced The Top Five



Investment Tools For You