Lambda cloud computing power
chain was announced, which means that when the Huobi chain goes online in 2020, the Huobi token will be upgraded to a global token based on
Huobi chain
HT is applicable to: opening VIP, margin of certified merchants, airdrop of points exclusive activities, etc. HT will launch usdt, BTC and eth trading pairs online, and the platform will also buy back regularly.
cloud game platform can play both computer games and mobile games on mobile phones, which is suitable for most people. The development prospect is not bad. All major companies have similar works. But to be honest, it can't develop in a short time
the feature of cloud game platform is that it can be played directly through the platform without downloading. Play large-scale computer games with mobile phones, and even double open mobile games with mobile phones. I've tried several platforms before, and I feel it's OK. But there's one drawback that's hard to ignore, and that's carton. If the mobile phone or computer is not good, the whole game will become extremely stuck. Looking at the game interface is like looking at a mosaic
although the market has not risen, it is undeniable that cloud game platform has developed rapidly< it's good to let people experience all kinds of large-scale games on the platform in a few years cloud computing is not as simple as we think. Maybe in a few years, the platform will become popular
because AWS lambda only needs to create, destroy and schele containers, and external S3, RDS, dynamodb and other services are used for data storage, a CAAS service that can automatically schele containers can be implemented based on LxC or docker. In addition to the container scheling system developed by AWS, kuberntes, mesos and Docker swarm can also be considered in the open source community.
Hello, Xiaohuang Journal Ynn 45.. C o m
mobile phone file encryption method:
the first method: using mobile phone lock encryption
you have to use the mobile phone lock to lock the program that opens the file. If you don't have a password, you can't open the program, so as to achieve the purpose of file encryption
the second method: encryption by shift
is to put the folder you want to hide, such as hidden folder, such as system, so that your files will not be displayed
it's easy to use this method to hide files, but if you want to find this hidden file, it's very boring. Of course, if you have a computer, it's another matter
