Fake Foreign Brands Are No Longer Pretending

“Fake foreign brands” refer to disguising their origin to mislead people into thinking they are not domestic brands. For example, “Da Vinci Furniture”, “Mona Lisa Tiles”, and “Marco Polo Tiles” are all domestic brands, but they use foreign names and use foreigners in advertising to mislead people.

There are several reasons why “fake foreign brands” can successfully occupy the market, including trust. Commodities have different standards to comply with in different regions. Relatively speaking, local standards are not as strict as those in Europe, America, and Japan. Therefore, “fake foreign brands” and commodities that claim to have passed safety tests in Europe, America, and Japan gain a competitive advantage.

However, “pseudo-Japanese brands” are not obviously related to quality and safety. Their core competitiveness is to attract “Japanophiles“, who are interested in Japanese culture, especially popular culture.

However, this group has now become a politically incorrect group, and “pseudo-Japanese brands” are also politically incorrect, so they need to transform. For example, brands such as “Genki Forest“, “Miniso“, and “Nayuki” have all been de-Japanized.

Source: You can visit ggame to view it.

Computer Security and Efficiency

Two years after the release of 《Resident Evil Village》, Denuvo was removed from the game. According to tests by Starstream Gamer, Denuvo did have some performance impact.

Denuvo is a scheme that protects existing DRM and has multiple anti-tampering features. One method is to use Virtualization-Based Security (VBS) resource protection, which is a security feature of Windows, but it also has a performance impact. If the CPU does not support MBEC, it will encounter a higher performance loss, which can reach 10%.

Flash was once an important part of web pages, but since 2010, due to various security issues, Flash has gradually been regarded as insecure software. Therefore, Chrome launched sandboxed Flash PPAPI to alleviate users’ security concerns, but Flash PPAPI has efficiency problems.

In 2017, the CPU Spectre vulnerability was discovered. Although system and microcode updates can prevent the vulnerability from being exploited, it also affects performance. At that time, the latest Intel Core 8th generation CPU had an average performance reduction of 6%, and older CPUs were greatly affected.

From software to hardware, software makes DRM secure and not tampered with; the system virtualizes for machine security; the CPU changes functions to fix its own vulnerabilities. These changes or functions will reduce efficiency. In this way, computer performance may never be excessive.

The Novel That Sparked a Civil War

1851 年, Harriet Elizabeth Beecher Stowe , based on slaves’ autobiographies, research on slavery and other materials, wrote the novel “Uncle Tom’s Cabin“, which was initially serialized in newspapers and subsequently published in book form in 1852.

The main theme of the novel is only one : to tell the evil and immoral of slavery. Although the First Amendment to the Constitution clearly states freedom of publication, publishers are still more concerned about political correctness. Publishing abolitionist novels is still politically incorrect and may cause trouble, so Stowe made a lot of efforts to get the novel published successfully.

If novels can be used to oppose slavery, then novels can also be used to support slavery. After that, writers who supported slavery began to write works with the view that “without slave owners, there would be no guaranteed life for slaves”, and “slaves lacking education need the paternalism implemented by slave owners to survive” and other views. This type of work is called Anti-Tom literature.

“Uncle Tom’s Cabin” was so influential at the time that there were rumors that Lincoln said to Stowe : “So you’re the little woman who wrote the book that started this great war.” (So you are the little woman who wrote the book that started this great war). Because most people recognize the influence of the novel, this rumor can be widely spread.

Emoticons: Faces and Characters

mz_0

“233” and “bgm38” are both characters related to emoticons originating from online communities. Among them, “233” comes from Mop. When users post emoticons, they can enter 233 in the insertion bar below to quickly post the emoticon.

“bgm38” is the same. This is Bangumi’s No. 38 emoticon. You can enter “(bgm38)” in the text box to call the corresponding emoticon image.

Because these characters themselves have no meaning, but only because their serial numbers can point to emoticon images, they have become emoticons with the same meaning as the emoticon images. Therefore, “233” and “bgm38” are referred to here as “borrowed character emoticons”.

Now online communities are popular with sorting by usage frequency or collection functions, so there are almost no emoticon serial numbers, and it is difficult for the above-mentioned “borrowed character emoticons” to appear again.

General Writing Laws》 now includes “borrowed character emoticons” as part of the emoticon writing system, with the characteristic of being the end of a sentence.

Universal Laws of Writing

Chinese Copywriting Guidelines》is a well-known Chinese copywriting typesetting scheme. The main content includes spaces and the norms for mixed Chinese and English typesetting. However, there are still some ambiguous rules, and everyone has their own habits and aesthetics. It is unrealistic to require others to use a certain fixed specification.

Therefore, gledos wrote 《General Writing Laws》, which modularizes the rules of writing, and carefully selects suitable modules according to their own needs or habits. And 《Laws》 itself has the function of priority sorting, which greatly reduces ambiguous situations.

For example, “Language Space” is a tool used to divide the rules for using different texts. Most texts in the same direction can be mixed and arranged, and then the spaces in each part can follow the principle of belonging and use their own grammar.

To some extent, it can be said that 《Laws》 is a superset of various typesetting rules, so you can also enable some modules in 《Laws》 to implement the rules of 《Chinese Copywriting Guidelines》.

Currently, 《Laws》 is in a very early stage and can only be regarded as a draft, so there may be contradictions and omissions, which will be tried to be resolved in the future.

Note: The naming of 《Laws》 refers to the “Golden Order” of 《Elden Ring》.

The Details of FFmpeg’s Wall of Shame

FFmpeg once displayed a Wall of Shame page on its official website. The reason I say “once” is because this page has long been disabled. The reason seems simple: no one maintained the interface, so it was abandoned by Compn in 2011.

In short, these software programs did not comply with FFmpeg’s distribution agreement. For example, they used the GPL-licensed FFmpeg, but did not open source the software due to the infectious nature of the GPL.

FFmpeg has many distribution agreements, including multiple versions of GPL and LGPL, because different codecs themselves also have different agreements. The LGPL version of FFmpeg is weakly infectious and can be bypassed by using dynamic link libraries (DLLs), but the functionality is not complete. This is because if you want to include libavcodec, libx264 codecs, and built-in GPL software, it will be infected with the GPL protocol, requiring the entire software to be open sourced under the GPL protocol.

The case of QQ Player is interesting because it provided the source code download of the FFmpeg LGPL version, claiming to have used the LGPL version. However, someone discovered that QQ Player actually used ffdshow’s code, and ffdshow is software based on FFmpeg that integrates multiple GPL libraries, so it is under the GPL protocol. This means that QQ Player did not turn a blind eye to the problem, but tried to muddle through and deceive.