Monday, October 25, 2010

Proper way to make money: to be a know how to "lose money," the dealer



Chu Lu'an City of Anhui Province, is a dealer engaged in food operations, introduced by someone else, he knew the food company A company's chairman Yang. A company is an enterprise instant noodles just start soon. After the exchange, Mr Chu is determined to make A's distributor.

Soon, as a quality accident, A company dealing in the market for the products in question, all of a sudden huge loss occurs. For a fresh start for a company not long, the loss of almost fatal: many dealers saw something bad, have chosen to give up, A company once almost lost all the dealers.

At this critical moment the most difficult, Mr Chu has chosen to stand together and A company, not only did not give up the right to operate the company's products, but their money to deal with market problems, the company has not made any demands.

Zhu This mainly for two reasons: first, through the distribution period of time, he found A company's products have a broad market. Business enterprises with competitive products when compared to clear differentiation and competitive, and business-to-market product development concept to grasp, and can do a good grasp.

Second, A's market is mainly in Henan, Anhui, products after a problem, put a lot of money and manpower to solve the problem. The problem occurred two months, Mr. Zhu A company estimates at least 500 million yuan investment funds dealing with the aftermath. 5 million yuan, not only shows a certain strength of the company A, but shows good market A company is sincere.

Zhu won the support of A's trust in the delivery, he has been even greater concessions from the A's. Over the past six months after the storm died down, A company's rapid sales growth, has now reached more than 3,000 yuan a month in sales. Chu Although only a small distributor, sales of 4 500 thousand yuan per month, but in the preferential policies, the profits can still be considerable.

Since then, Mr. Zhu has repeatedly put forward reasonable suggestions to help A Company management, to improve it. In order to continue to make A's management close to the market, Mr. Zhu proposed to set up distributors in politics committee, was quickly adopted by the company A, he also became the Chairman of the Committee not take a salary.

Comments

Although start looking at some "stupid", but the reality proved that Zhu's choice is correct. A continued increase in post-market investment, maximize the benefits of him in the company's products in short supply, Mr. Zhu has also been a variety of benefits A company.

Dealers in the choice of objects, both on the market in which to make judgments, but also the strength of enterprises, strategic planning to make judgments, so that can help you see the face of difficulties, or difficulties in respect of the termination of a business co-operation , then the business after the recovery and growth will not be thinking of you.

In addition, make reasonable suggestions to the company, not only can help the enterprise, more importantly, can help to their own.







Recommended links:



Delphi and mixed programming language FORTRAN



Simple News Servers



3G MARKET to look forward to



Want A Gold Metal Detector You Re Not Alone



The First CSS World Series Winning Works



What the recent DVD-ROM to buy a good brand?



Yuan Meng: Ubuntu 9.10 new version of the debut



New Business Databases And Tools



The first donation to the Sichuan Kaspersky 1.2 million yuan in cash



OGM to AVI



MP4 to 3GP



Capital Tangle 3G



MKV to MOV



New E-Commerce



Monday, October 18, 2010

Export and the introduction of the registry


Export and the introduction of the registry
Registry is stored in binary on the hard disk. When we modify the registry will inevitably cause problems, even fatal failure. Then back up the registry file and restore the very significance. In addition, you can be in the registry of a primary key or subkey is saved as a text file, and print it out, to study the structure of the registry.
Export Registry File
As a backup, we can Regedit Editor, click "Registry" menu under "Export Registry File" command, and select the Export range "All", will back up the registry file on your hard disk. As a general back-up, in Regedt32 be completed on, such as saving a root key, or a primary key (a key).

In the Registry Editor Regedt32 to save data within the registry, you can save root key, primary key or a subkey. First choice to save the primary key or subkey, and then click the "Registry / Save Key" command, as shown:


Then pop-up "Save Key" dialog box, where you want to save the registry file input file name, extension generally use the REG, shown in Figure:


As some of the primary key or subkey, and because different users use, or is the primary key or subkey is used by the system will be prompted to disable access to the warning, as shown:


If you are a system administrator, for some primary key or subkey can give permission for, such as editing the registry settings for a user permission to modify the printer. Operation, please click the "security" menu under "permissions" command, as shown:


A "registry key permissions" dialog box, select the name of a particular user, and then in the "Access Type" drop-down list, select the access type, as shown:


There are three access types, namely: "read", "Full Control", "selective access." Selected the options and then click Full Control "OK" button.
If you want to view to modify a primary key or a subkey of the owner's name, in the "Security" menu, select "owner" command, will pop up a dialog box as shown below, if you are using the system of permissions than the user higher authority, click the "take ownership" button to the primary key or subkey to modify, as shown:


Otherwise, the owner can only view, and then click "Close" button?.

We can also export the registry file as a text file, the operation of the method is to use the mouse to select "Registry / subdirectory tree will save as" command, and name it as TXT file extension, then click " Save "button. So that we can use WordPad or Notepad Windwos view.

The introduction of the registry file
There are two ways to introduce the registry file, one is available to restore a primary key is the use of previously backed up registry files or other sources through the registry file to overwrite the existing primary key.

Operation, please click the "Registry" menu under "restore" command, and "restore item" window, select to restore the registry files (note the selected file is now selected the contents of the same primary key), Finally, click "Open" button, as shown:


Will bring up a "warning" dialog box, shown in Figure:


The dialog box asking whether to overwrite the existing primary key of the operation, attention is to restore the currently selected item, the two elements must be consistent.
Another method is to load into the hive, please use the mouse to select a primary key, then select "Registry" menu under "Load Hive" command (and restore the difference is that it introduces the primary key may be registered table does not have, please note the difference between the two), as shown:


Then in the "Load Hive" dialog select the registry file to load, as shown:


Click "Open" button, a "Load Hive" dialog box, in the dialog box "item name" text entry box enter the name of the new primary key, as shown:


Then click "OK" button, so you find the primary key of the following in the current emergence of a new primary key (. NEWUSER), shown in Figure:


In order to unload the hive is very simple (note that before uninstalling the primary key for backup), select the primary key, click the "Registry / Unload Hive" command, as shown:


Editing program will prompt you to uninstall operation, as shown:


Click "Yes (Y)" button on the primary key will be deleted from the registry (but note that some important software, hardware, information can not be unloaded off of).








Recommended links:



Infomation Accounting And Finance



Wi-Fi Access Points At Most Per Capita The United Kingdom Ireland



Simple Telephony



AVI to MPEG4



Looking for a Breakthrough signing strangers



for YOU Games Sports



3G: meat and potatoes or hot Potato



Teaching And Training Tools Catalogs



Huawei: "Heroes" behind the "survival anxiety"



how to find your wep key



Find out the psychological make promotions



Jiang Qiping Family Laboratory of Beijing University speech sounded "New Life Movement" horn



MPEG to 3GP



HR HR in the eyes of men and women



XviD To MP4



How to improve the agency's initiative



Tuesday, September 28, 2010

Half an hour to teach you learn regular expressions


Must have a lot of people have headaches on a regular expression. Today, I am in my understanding, with some articles online, hoping to use ordinary people can understand the expression. Come and share learning experiences.

Opening, still have to talk about the ^ and $ that they were used to match the beginning and end of the string, the following are examples of

"^ The": there must be the beginning of "The" string;
"Of despair $": the end must be "of despair" in the string;

Then,
"^ Abc $": that is demanded by abc abc at the beginning and end of the string, in fact, only matches abc
"Notice": matches a string that contains notice

You can see that if you do not use our two characters (the last example), that mode (regular expressions) can be tested in the string anywhere, you do not lock into either side of him

Then, talk about''*'',''+'', and''?'',

They can be used to indicate the number of occurrences of a character or sequence. They said:
"Zero or more" equivalent to (0,)
"One or more" equivalent to (1,),
"Zero or one." Equivalent to (0,1), here are some examples:

"Ab *": and ab (0,) synonymous, matching with a beginning, followed by 0 or N can take a b a string ("a", "ab", "abbb", etc.);
"Ab +": and ab (1,) synonymous, ibid article like, but there is at least one b ("ab", "abbb", etc..);
"Ab?": And ab (0,1) synonymous, can not, or only one b;
"A? B + $": matches a 0 or a combined more than one b-terminated string.

Points,''*'',''+'', and''?'' simply ahead of it that character.

You can also brace which limits the number of characters appear, such as

"Ab (2)": requests a later must be used with two b (Not One Less) ("abb");
"Ab (2,)": requirements must be behind a two or more b (such as "abb", "abbbb", etc..);
"Ab (3,5)": can be requested a behind 2-5 b ("abbb", "abbbb", or "abbbbb").

Now we must put parentheses in a few characters, such as:
"A (bc) *": matches a followed by 0 or a "bc";
"A (bc) (1,5)": 1-5 "bc."

There is also a character''鈹?#39;', equivalent to OR operation:

"Hi 鈹?hello": matches with "hi" or "hello" string;
"(B 鈹?cd) ef": match with "bef" or "cdef" string;
"(A 鈹?b) * c": This match contains a number (including 0) a or b, followed by a string c;

A point (''.'') can represent all the single characters, not including the "n"

If, to match including the "n" including all the individual characters, how do?
By the way, with''[n.]''this pattern.

"A. [0-9]": one a plus one character plus a number from 0 to 9
"^. (3) $": any characters at the end of the three.

The content enclosed in brackets matches only a single character

"[Ab]": matches a single a or b (and "a 鈹?b" the same);
"[Ad]": matches the''a''to''d''of a single character (and "a 鈹?b 鈹?c 鈹?d" are "[abcd]" the same effect); general we all with [a-zA-Z] to specify the character as a case in English
"^ [A-zA-Z]": matches a string beginning with uppercase and lowercase letters
"[0-9]%": match with a string of the form x%
", [A-zA-Z0-9] $": matches a comma plus a string of numbers or letters at the end of

You can also put you do not want to quest for the characters listed in the brackets, you only need to use''^'' inside brackets in the total as at the beginning of "% [^ a-zA-Z]%" matches with the two percent No. There is a non-letter string.

Highlights: ^ used in brackets at the beginning of time, it means rule out the characters in parentheses

For PHP to explain, you have added in front of these characters and some of the characters escape'''',.

Do not forget that the characters in the brackets which are exceptions to this rule the road - in the brackets which all the special characters, including (''''), will lose their special properties "[*+?{}.] "matches a string containing these characters.

Also, as regx manual tells us: "If the list contains'']'', best to list it as the first character (possibly with the''^'' back). Where it''- '', the best place it in front or end face, or a second or a range of end point [ad-0-9] the middle '-' will be effective.

Read the example above, you are (n, m) should understand it. Should be noted that, n and m can be negative integers, and n is always less than m. Thus, to match at least n times and the maximum matching m times. such as "p (1,5)" will match "pvpppppp" in the first five p

Talk to at the beginning of the following

b book that he is used to match a word boundary, that is ... such as''veb'', can match the love in the ve not match there very ve

Just above the b B and the opposite. I do not cite the example of

Well, we have to make a application:

How to build a model to match the quantity of input

Build a matching model to check whether the information entered, said money for a number. We think that the amount of money there are four ways: "10000.00" and "10,000.00", or no fractional part, "10000" and "10,000". Now let's start building that matches the pattern:

^ [1-9] [0-9] * $

This is the variable must be non-0 digit. But this also means that a single "0" also can not test. The following is the solution:
^ (0 鈹?[1-9] [0-9] *) $

"Only 0 to 0 at the beginning and not the number of matching", we can also allow a minus sign before the figures:
^ (0 鈹?-? [1-9] [0-9] *) $

That is: "0 or 1 to 0 at the beginning and may have a negative sign in front of the figure." Okay, now let us do so strict, allowing for 0 at the beginning. Now let us give up a negative sign, as we said When money does not need to use. We now specify the model used to match the fractional part:
^ [0-9 ]+(.[ 0-9 ]+)?$

This implies that the string must have at least matched by an Arabic numeral at the beginning. But note that in the above model "10." Does not match, only "10" and "10.2" can. (You know why right)

^ [0-9 ]+(.[ 0-9] (2))? $

We specified above must have two decimal places behind the decimal point. If you think this is too harsh, you can change:
^ [0-9 ]+(.[ 0-9] (1,2))? $

This will allow one or two behind the decimal point character. Now we add to increase the readability of the comma (every three), we can be said:
^ [0-9] (1,3) (, [0-9] (3 })*(.[ 0-9] (1,2))? $

Do not forget''+'' can be''*'' alternative if you want to allow empty string is entered, then (why?). Do not forget the anti-diagonal''string in the php error may occur (very common error).

Now, we can confirm that a string, we now have removed all the commas str_replace (",", "", $ money) and then type as in the double and then we can do through his mathematical the.

Encore:

Construct a regular expression check email

In a complete email address has three parts:
1. User name (all in''@'' left),
2 .''@'',
3. Server name (the part that is left).
User name can contain uppercase and lowercase letters digits, periods (''.''), minus (''-''), and underlined (''_''). server name is consistent with this rule, of course, the next except crossed.

Now, the beginning and the end user name can not be the end. Server as well. There you can not have two consecutive periods at least one character between them, well now we look at how to write a user name match pattern:

^ [_a-ZA-Z0-9-] + $

Now allow the existence of a full stop. We put it together:
^ [_a-ZA-Z0-9-]+(.[_ a-zA-Z0-9-]+)*$

The above would mean: "to regulate at least one character (except.) At the beginning, followed by 0 or more a point to the beginning of the string."

Simplification that we can use eregi () replaced ereg (). Eregi () are case insensitive, we do not need to specify the two range "a-z" and "A-Z" - only need to specify a on it:
^ [_a-Z0-9-]+(.[_ a-z0-9-]+)*$

Behind the server name is the same, but remove the underscore:
^ [A-z0-9-]+(.[ a-z0-9-]+)*$

Good. Now just use "@" to connect two parts:
^ [_a-Z0-9-]+(.[_ a-z0-9-]+)*@[ a-z0-9-]+(.[ a-z0-9-]+)*$

This is the complete email authentication matches the pattern, and only need to call
eregi ('^[_ a-z0-9-]+(.[_ a-z0-9-]+)*@[ a-z0-9-]+(.[ a-z0-9-]+)*$ ', $ eamil)
Whether email can be a

Other uses of regular expressions

Extract string
ereg () and eregi () has a feature that allows users to extract regular expressions as part of the string, for example, we would like from the path / URL extracted file name - the following code is what you need:
ereg ("([^ \ /]*)$", $ pathOrUrl, $ regs);
echo $ regs [1];

Advanced substitution
ereg_replace () and eregi_replace () is also very useful: If we want all the intervals are replaced with a comma minus sign:
ereg_replace ("[nrt] +", ",", trim ($ str));

Finally, I check the other strings EMAIL regular expression to see the article for you to analyze.
"^[-!#$%&''*+ \ ./0-9 =? AZ ^ _ `az {|}~]+''.''@''.''[-!#$ %&''*+ \ / 0-9 =? AZ ^ _ `az {|}~]+.''.''[-!#$%&''*+ \ ./0-9 = ? AZ ^ _ `az {|}~]+$"
If you can easily read, that the purpose of this article reached.






相关链接:



News About Languages Education



A flash drive to buy the real Experience



AVI To MOV



Authorware make poetry OF the sentence



Jinshan valve management upgrade erp sweet taste



In October 2007 The Sixth New York International Outsourcing Exhibition



3GP to FLV



REVIEWS Covert Surveillance



On the memory LEAK (1)



DV to AVI



Graphic Editors introduction



Clever and FTP PERMISSIONS under control related forums



Expert Vehicles - Screen Savers



JSF To Pass Parameters Via URL



Pocket Baidu claims 10 MILLION downloads have been pushed Android version has expired



BI The New World: Semi-finals Games, Who The Winner?



3% discount notebook supplier return profits BEHIND



Tuesday, September 14, 2010

IDC how to charge only reasonable



The Internet is an innovative, industry, and it can change each to the customer, to the end consumers more benefits. Data center industry as Internet infrastructure builders and operators, one of the pace of its more representative and forward-looking. Wind at the end of Qingping, pricing model indicates the transition bandwidth of our previous views on the need to rewrite.

Actual use of resources to pay

We face from everyone I start charging for telecommunications, which in fact has been a matter of common concern in recent years, the hot, like the way the phone charges, mobile and fixed phones, etc. to determine the minimum billing unit of time, such as that the use of fixed phones, why are they only say 1 minute, or even only a few seconds, 3 minutes have to pay the money? That which must exist irrational factors.

In fact, unreasonableness not only seen in the voice communications, data communications, there is the same, or even more serious. Bandwidth of the hire, the common unit charges generally 2M, 10M and 100M of three grades, which means that one would like to use the 15M bandwidth, customers will have to buy 100M. Although many consumers a few dollars, dozens of dollars unreasonable tariff and the cry for justice, but in data communications, the user has paid much more should not pay the cost, however, no doubt sound, this is really a bit strange. As the century, vice president of Internet Data Center Co., Ltd Chang Chun by analogy, the fixed bandwidth rental costs as phone users than the number of actual telephone call payments, but must choose to play 100 or 1000 phone; in order to prevent possible The telephone service was terminated embarrassing situation, he might have to buy their own business needs above telephone number, and to pay a lot of money. So why not use the basis of his actual phone number of charges?

Width does not equal fast

At present, the telecommunications industry with CKS surging tide of change. Advances in technology to promote the traditional circuit-switched to packet-switched transfer of pace. This change is comprehensive, it also brings the telecommunications business model and fee adjustments. We are now facing some of the irrational factors that are actually content with the old rates of new business caused by incompatible way.

The current telecom operators, especially Internet data center operators usually 2M, 10M and 100M bandwidth unit receives a fixed fee per month. These figures actually refer to the server from the client to the operator connected with the backbone network bandwidth between routers, rather than any visitor can enjoy bandwidth. Some customers may have felt was not proportional to the bandwidth and access speed, this is because the Internet is a shared network, numerous nodes, the network users to access a company's Web site actually been a lot of packet nodes , any node of the delay will allow users to find the site to respond fast enough, and this delay is beyond the control of a single operator's. From this perspective, the width does not mean fast, simple bandwidth charges to the user or data center in terms of the perspective of both the existence of certain one-sidedness.

Long overdue attempt

In fact in the world, at all levels of telecom operators are trying to use the new pricing model to give customers more transparency, more flexibility and more fair price, while leading a more rational purchase and use of bandwidth. But in China, due to the lag of awareness, technical power shortages and restrictions 缃戠粶 hardware environment, pricing model of transition Cai just Kaishi, Qizhongdongzuo of a century faster Internet network Shuju 涓績. They have begun to recommend their clients use the new pricing model, that is not simply buy bandwidth based on customer receives a fixed monthly fee, but by the Shiji of data traffic charges. This requires a considerable foundation.

First, from the technical point of view, charging a fixed monthly fee simple and direct, while data traffic charges by means of the continuous flow of customers to monitor and measure, technical requirements greatly increased. But the point is still worth the trouble, because that their customers can have a clear understanding traffic, but also can know Liuliang time and space distribution of the business development and market strategy adjustment of great significance. Century is connected with MRTG (Multiple Router Traffic Grapher) software for data traffic statistics. It is a 5-minute sampling interval, and then generate a detailed chart, intuitive and clear. Some of the world famous Internet data center operators, such as AboveNet and Exodus, adopted the software for monitoring and billing. Century, while Internet use MRTG statistics also adopted the principle of the customer 5% of the peak traffic out of the baseline beyond the billing, so customers need not worry about traffic accidents caused by large transient rise in the price.

In addition to technical means to ensure network resources are also affected by the charging method in which one of the determinants. A data center operator may own the hardware environment is very advanced, fiber optic cabling used in all interior rooms, routers and switches is also the top, but it also depends on the final speed of access and backbone networks, export-bandwidth Internet connection. It's a bit like Beijing's Third Ring Road, the road itself is very good condition, light on the fast track is the four-looked, but because of the narrow exit, poor traffic flow, affecting road capacity. This network data center may prefer a fixed rate pricing model, because it can not guarantee that the final speed of access. The Century Internet bandwidth resources fairly obvious advantages, it is first approved by Ministry of Information Industry access to the national Internet Exchange (NAP) of professional IDC company, broadband access NAP with nine state-owned public peering backbone ( Public Peering). It also with China Telecom, China Unicom and China Netcom signed a commercial peering (Private Peering) agreement and the agreement with ChinaNet Internet bandwidth 922M, is by far and ChinaNet peer networking connectivity and bandwidth of the IDC's largest companies buy .

Responsibility for the data center

Chang Chun-century Internet that the Internet does not exist a real exclusive bandwidth, everything is shared, and customers are most concerned about is speed rather than "exclusive" or "shared" bandwidth. Exclusive distribution of the bandwidth speed is only one way to ensure it can not effectively control costs. Another way to non-full-bandwidth. With the highway, for example, enjoys a bandwidth as the four loop are assigned to a customer to use, although the speed is faster, but the customer has to pay the huge independent expenditures occupy four loop. In the new model, all customers can use the Fourth Ring Road, the customer traffic over the network once the peak capacity of 60% of the road will be widened. Thus, not only the customer can be assured the server response time and reduce costs.

"The new pricing model enable service providers to assume more responsibility," Chang Chun said, "It also advocates user scientific, planned use of network bandwidth, according to the actual amount paid, less pay less, use more, pay. For customers, the payment will be according to actual use of savings, and to more efficient use of bandwidth. "







相关链接:



windows media player m4v



wmv PS3



WINDOWS 7 rmvb



Ps3 Rmvb



Wednesday, August 4, 2010

BT has been closed, we see what?



Used to download movies to see the users, the latest face "Duandun" crisis: "BT China" in jail, long a bird to be transformed, and is vividly called "eMule" the VeryCD suddenly could not open the ... ...

The site is closed first, because they do not have administrative permission, further view, they are more widespread piracy was criticized by the industry. Industry to a large number of these free BT web site traffic as "industrial waste", because all of their content direct to steal from.

With the resurgence of the copyright for their rights awareness and increasingly stringent government regulation, BT and other video sharing download model found to depend on the policy gap "gray space" growth plan be completely aborted. After continuing this year, industry-wide anti-piracy activities, BT industry has been severe standards in governance is an inevitable trend.

From a positive sense, "BT-China" closure, greatly encouraged by the insistence on the legitimate operation of the video film and television drama website. Watch for music, for example, nearly a week, traffic and the number of registered users has increased dramatically.

There is no free lunch, low-cost model will ultimately decline piracy, we would have expected this. From its inception, the music network on the stick Genuine line of royalty and the overall operating costs of the 1 / 3 or more, sometimes a single TV show put on over 1 million yuan of copyright over. But then the difficulties we have not given up because of short-term interests of the genuine strategy, because the video sites around the copyright issue is the key to success.

China are pirated lessons, but on the international market we learn from. Hulu website leading U.S. network TV advertising revenue in the first half of this year about 75 million U.S. dollars, accounting for U.S. video ad market share of nearly 20%, while the flow rate is almost 10 times the Youtube site of its still huge loss. Analysis pointed out, Hulu share of advertising revenue share is much higher than the user, which indicates that advertisers are increasingly alienated from the user original content-based video sharing websites, instead of genuine popular online video platform. Hulu's success in the United States, is considered the traditional date, television, film industry to the Internet, the most successful case of integration.

Domestic video sites have been exploring their own profit model, both the video sharing or video search, so far have not been widely recognized. Recent years, the continuous video site copyright dispute has even pushed the air waves, the determination of reasonable profit model becomes more important. Hulu is actually a successful example for reference. Adhere to genuine advertising strategy to attract more precise, is the road to profitability. Despite the huge flow of the Youtube, but the content quality are not guaranteed to advertisers who are willing to vote in such a website? Not to mention those pirated site. For advertisers terms, BT only the value of the site traffic, BT site CPM advertising (cost per thousand impressions) or even much lower than market pricing spam traffic.

Video site not only profitable power, more regulatory pressure. This year, the domestic video sites lawsuits continue, the government's attention and supervision, in some insist on legitimate websites, driven by the video industry in China will be more robust. I believe no one pirated video sites can be successful in the market.







Recommended links:



Top Religion



Avc Converter



In 2010, Desktop Sales Will Reach 26.002 Million



Xu Xiangchun: long and short term iron ore negotiations, And Worry



HP'S new CEO took office claiming to be unwilling to Hollywood star



Easy Flash Tools



Make a IPhunter



Dealers also need to plan



convert mp4 TO 3gp free



What is mkv



J2me In any angle image rotation (1)



Regal DDR400 memory trial REPORT



Mars text input text input V2.7.2 Version of Easy Fun



Convert .mov to .avi



DB2 AGENT works in depth with the connection process



Basic Or VB Or VB DotNet Specialist



Thursday, July 22, 2010

Difficulties in the implementation of anti-monopoly law



"Antitrust Law" into effect on August 1 has aroused widespread concern and discussion. This "economic constitution" China's current economic situation will have much impact? "Market News" interview of the Capital University of Economics economic legal experts, Beijing law firm asked the days Xing.

Some scholars believe that the recent economic situation has little effect on

銆怋ackground Information銆?br />
"The People's Republic of China anti-monopoly law" (the "Antitrust Law") since August 1, 2008 shall come into force, is divided into eight chapters 57, including: General, monopoly agreements, abuse of dominant market position, business concentration abuse of administrative power to exclude, restrict competition, the investigation of the alleged monopolistic behavior, legal liability and supplementary provisions.

"Antitrust Law" and has four major tasks in respect of the prohibition of abuse of dominant market position, and second, merger control, three are against cartels (agreements restricting competition), four anti-administrative monopoly. Its purpose is to prevent and stop the monopoly and protect fair competition, improve economic efficiency, protect consumer interests and public interests, promote the healthy development of socialist market economy.

"Antitrust Law" has become the world market to maintain fair competition and economic order of the cornerstones of nearly 90 countries around the world have enacted and implemented the "anti-monopoly law."

Matching rules are important

"Anti-monopoly law," legal provisions are very broad, principled, and easy changes, the real guide is the matching requirements of law enforcement. The matching requirements of the development will be a long and continuous process of adjustment.

Many scholars believe that China's "anti-monopoly law" is overly simple. But Zhang is not the case that economic law expert, told the "market report" describes the U.S. anti-trust law.

From the United States the world's first anti-monopoly law is enacted and implemented in 1890 the Sherman Act. 1865 After the Civil War, the establishment of a unified national market and promote the emergence and development of monopolies, so that the general loss of vitality of the market. In 1914, the United States enacted the Clayton Act and the Federal Trade Commission Act as a supplement the Sherman Act. The three laws established the basic framework of American antitrust.

U.S. antitrust law enforcement agencies initially the Ministry of Justice Antitrust Division, established in 1914 the Federal Trade Commission, Antitrust Division, together with an anti-monopoly law enforcement subjects. Although there are two different functions, but not for special distinction between the functions.杩欎簩鑰呬腑鐨勪换浣曚竴涓満鏋勯兘鍙互鍗曠嫭瀹炴柦璋冩煡鍜屽缃氾紝鑰屼笖涓?釜鏈烘瀯涓?棪鍙楃悊涓?釜鐗瑰畾妗堜緥灏卞繀椤诲瀹冭礋璐e埌搴曘?鏍规嵁缇庡浗鐨勮瀹氾紝鍙嶅瀯鏂湁涓ょ閫斿緞锛屼竴鏄彲浠ラ?杩囩浜烘皯浜嬭瘔璁奸?寰勮繘琛岋紝杩欑鎯呭喌涓嬩笉闇?缁忚繃鍙嶆墭鎷夋柉灞?垨鑱旈偊璐告槗濮斿憳浼氥?鍙︿竴绉嶅父鐢ㄧ殑鏂瑰紡灏辨槸鍚戜笂杩颁袱涓富绠℃満鏋勪腑鐨勪换浣曚竴涓妇鎶ワ紝鐢卞彈鐞嗙殑鏈烘瀯瀹炴柦璋冩煡鍜屽缃氱殑鑱岃矗锛屼篃鍙彁璧锋皯浜嬭瘔璁笺?

銆??鐢变簬鍗忚皟鑳藉姏寮猴紝鍙嶆墭鎷夋柉灞?拰鑱旈偊璐告槗濮斿憳浼氬緢灏戜骇鐢熷啿绐侊紝鍚屾椂锛屽畠浠仈鍚堣捣鏉ュ埗瀹氣?鎵ф硶鎸囧崡鈥濓紝浣滀负瀵规硶寰嬫潯鏂囩殑鍏蜂綋鍒板疄闄呰繍鐢ㄤ腑鐨勮ˉ鍏呫?缇庡浗鍙嶅瀯鏂硶鈥滄潯鏂囩敋鑷虫瘮涓浗杩樿绠?崟鈥濓紝鍦ㄥ疄闄呰繍浣滀腑浣滀负纭畾鍨勬柇鏍囧噯鐨勪緷鎹?瑙勫畾闇?鐢虫姤瀹℃牳鐨勪紒涓氳妯¢搴︾瓑閮芥槸鐢扁?鎵ф硶鎸囧崡鈥濈‘瀹氱殑銆?br />
銆??8鏈?鏃ワ紝鍥藉姟闄㈠彂甯冧簡銆婂弽鍨勬柇娉曘?鐨勯涓厤濂楄瀹氥?鍏充簬缁忚惀鑰呴泦涓敵鎶ユ爣鍑嗙殑瑙勫畾銆嬶紝纭珛浠ョ粡钀ヨ?钀ヤ笟棰濅负鐢虫姤鏍囧噯銆傚紶鍏存寚鍑猴紝鎴戝浗鐨勯厤濂楄瀹氬拰缇庡浗鐨勨?鎵ф硶鎸囧崡鈥濋兘鑳借捣鍒板湪鎵ф硶杩囩▼涓‘绔嬫墽娉曟爣鍑嗙殑浣滅敤锛屸?娉曞緥鏉℃枃瑙勫畾鏄緢姒傛嫭鐨勩?鍘熷垯鎬х殑銆佷笉鏄撴敼鍔ㄧ殑锛岀湡姝g敤鏉ユ寚瀵兼墽娉曠殑鏄厤濂楄瀹氥?鑰岄厤濂楄瀹氱殑鍒跺畾灏嗘槸涓?釜婕暱鐨勫拰涓嶆柇璋冩暣鐨勮繃绋嬨?鈥?br />
銆??鈥滅壒鎬р?瀵艰嚧鎵ц鏍囧噯妯$硦

銆??銆婂弽鍨勬柇娉曘?鐨勫鏉傛?鍐冲畾锛屽畠鐨勬墽琛屾爣鍑嗚瀹氭槸妯$硦鐨勩?鎴戜滑瑕佸叏闈㈠湴鐞嗚В銆婂弽鍨勬柇娉曘?锛屽氨瑕佸瑙傚湴鐪嬪緟杩欑妯$硦鏍囧噯鐨勫繀鐒舵?銆?br />
銆??寮犲叴鍚戣鑰呬粙缁嶏紝銆婂弽鍨勬柇娉曘?鐨勬墽琛屽叿鏈夌浉褰撳ぇ鐨勯毦搴︼紝鍥犱负瀹冩墍娑夊強鐨勯棶棰橀潪甯稿鏉傦紝寰堝娉曞緥姒傚康闅句互鐣屽畾锛屾瘮濡傛渶甯哥敤鐨勨?鐩稿叧甯傚満鈥濄?鈥滃競鍦烘敮閰嶅湴浣嶁?鍜屸?鎴愭湰鈥濓紝鐪嬩技鍙槸绠?崟浜嬪疄锛屽叾瀹為兘鏆楄棌鐜勬満銆?br />
銆??鈥滅浉鍏冲競鍦衡?鐨勭‘鏄?鍙嶅瀯鏂硶銆嬩腑鐨勪竴涓叧閿瘝銆傛墍璋撯?鐩稿叧甯傚満鈥濇槸鎸囧瀯鏂湴浣嶁?瀛樺湪浜庡摢涓?釜甯傚満鈥濅腑锛岃繖涓競鍦虹殑纭畾闈炲父澶嶆潅锛屽苟涓嶄粎浠呮槸涓?釜娉曞緥姒傚康銆傛瘮濡傦紝瀵逛簬涓?楗枡鍒堕?鍟嗘潵璇达紝瀹冨彲鑳芥棦鐢熶骇鐭挎硥姘达紝鍙堢敓浜х函鍑?按銆佺⒊閰搁ギ鏂欏拰鏋滄眮绛夈?閭d箞锛屾寚鎺ц浼佷笟鍨勬柇鍦颁綅搴旇鍦ㄥ澶х殑鑼冨洿鍐呰繘琛屽憿?鍦ㄤ簨瀹炰腑锛岃浼佷笟寰堝彲鑳藉湪鐭挎硥姘村拰绾噣姘寸殑甯傚満涓崰鏈夊緢澶у競鍦轰唤棰濓紝鍚屾椂鍦ㄥ叾鎵?敓浜х殑鍏ㄩ儴鍟嗗搧甯傚満涔嬪唴浠呭崰鏈変笉瓒充互鏋勬垚鍨勬柇鐨勪唤棰濄?鈥滄墍浠ワ紝鐩稿叧甯傚満鐨勭‘瀹氬線寰?湪鏌愮绋嬪害涓婂喅瀹氱潃鍨勬柇鏄惁鎴愮珛銆傗?寮犲叴鍛婅瘔璁拌?锛氣?鍏蜂綋鍦板垽鏂浉鍏冲競鍦鸿繕闇?鑰冭檻鍦板尯鑼冨洿銆佷骇鍝佺绫汇?浜у搧闂寸殑鏇夸唬鎬х瓑闂銆傗?姣斿锛岀編鍥解?甯冩湕闉嬪叕鍙告鈥濆氨鏄?鐩稿叧甯傚満鈥濆垝鍒嗙殑鍏稿瀷妗堜緥銆傚竷鏈楅瀷鍏徃鐢熶骇鍜岄浂鍞敺闉嬨?濂抽瀷鍜岀闉?绉嶄骇鍝侊紝璇ュ叕鍙告兂瑕佹敹璐竴涓粎鍗犵害2%闆跺敭甯傚満浠介(鐢烽瀷銆佸コ闉嬪拰绔ラ瀷鍒嗗埆涓?.5%銆?.6%鍜?%)鐨勪紒涓氾紝鏈?粓鍥犳湭鑳介?杩囧徃娉曢儴鍚堝苟銆侀泦涓殑璋冩煡鑰屽憡鍚广?鍦ㄨ繖涓渚嬬‘瀹氱浉鍏冲競鍦虹殑杩囩▼涓紝闄や簡涓婅堪鍥犵礌涔嬪锛岃繕鑰冭檻鍒版暣涓瀷涓氱殑闆嗕腑搴︺?鐢熶骇涓庨攢鍞袱涓幆鑺傚尯鍒嗙瓑鍚勭鍥犵礌锛岀患鍚堝悇涓洜绱犮?鏈?粓灏嗙浉鍏冲競鍦虹‘瀹氫负鍖呮嫭鐢烽瀷銆佸コ闉嬪拰绔ラ瀷鐨勬暣涓競鍦恒?

銆??鍐嶆瘮濡傘?鍙嶅瀯鏂硶銆嬬鍗佷竷鏉¤瀹氾紝鈥滅姝㈠叿鏈夊競鍦烘敮閰嶅湴浣嶇殑缁忚惀鑰呬粠浜嬫互鐢ㄥ競鍦烘敮閰嶅湴浣嶇殑琛屼负鈥濓紝鍏朵腑鈥滄互鐢ㄥ競鍦烘敮閰嶅湴浣嶇殑琛屼负鈥濆寘鎷?娌℃湁姝e綋鐞嗙敱锛屼互浣庝簬鎴愭湰鐨勪环鏍奸攢鍞晢鍝佲?銆傝?浜嬪疄涓娾?纭畾鍟嗗搧鐨勬垚鏈槸鍥伴毦鐨勨?銆傛瘮濡傦紝浜у搧鎬绘垚鏈寘鎷笉鍙樻垚鏈拰鍙彉鎴愭湰锛屼笉鍙樻垚鏈寘鎷簡鐢熶骇鍘熸潗鏂欏拰鐢熶骇鍘傛埧銆佹満姊板拰宸ュ叿绛夌殑鎴愭湰锛岃?鍙彉鎴愭湰浠呰绠楀師鏉愭枡鍜屼汉宸ョ殑鎴愭湰銆傛澶栬繕鏈夌煭鏈熸垚鏈笌闀挎湡鎴愭湰銆佸钩鍧囨垚鏈笌杈归檯鎴愭湰锛屽簲璇ョ敤鍝浠锋牸鏉ヤ綔涓烘垚鏈紝鏄湪娉曞緥鎵ц杩囩▼涓?杩囩患鍚堣?铏戝悇涓柟闈㈠洜绱犲悗纭畾鐨勩?

銆??寮犲叴鍛婅瘔璁拌?锛氣?銆婂弽鍨勬柇娉曘?鏈韩鍏锋湁澶嶆潅鎬э紝杩欑澶嶆潅鎬ф槸銆婂弽鍨勬柇娉曘?涓庡叾浠栨硶寰嬫渶澶х殑鍖哄埆銆傚彲浠ヨ锛屻?鍙嶅瀯鏂硶銆嬬殑澶嶆潅鎬у喅瀹氾紝瀹冪殑鎵ц鏍囧噯瑙勫畾鏄ā绯婄殑銆傛垜浠鍏ㄩ潰鍦扮悊瑙c?鍙嶅瀯鏂硶銆嬶紝灏辫瀹㈣鍦扮湅寰呰繖绉嶆ā绯婃爣鍑嗙殑蹇呯劧鎬с?鈥?br />
銆??涓ゅぇ闂鏄棁缁?br />
銆??闄や簡鍙楃粡娴庢?娼奖鍝嶄互澶栵紝鐢变簬澶繃澶嶆潅锛屻?鍙嶅瀯鏂硶銆嬫墽琛屾垚鏈繃楂樸?

銆??寮犲叴璁や负锛屻?鍙嶅瀯鏂硶銆嬫湁涓ゅぇ鍩烘湰闂鏄棤娉曡В鍐崇殑锛屸?涓嶄粎浠呮槸鍦ㄤ腑鍥藉垰鍒氳捣姝ョ殑鎯呭喌涓嬶紝鍗充娇鏄湪鏈?棭浜х敓鍙嶅瀯鏂硶鐨勭編鍥斤紝涔熸湭鑳芥妸杩欎袱澶ч棶棰樿В鍐冲ソ銆傗?杩欎袱澶ч棶棰樺垎鍒瓨鍦ㄤ簬銆婂弽鍨勬柇娉曘?鏈韩鐨勬?璐ㄥ拰瀹冪殑鎵ф硶鎴愭湰涓ゆ柟闈?

銆??銆婂弽鍨勬柇娉曘?浣滀负涓?儴缁忔祹瀹硶锛屽畠涓庛?鍒戞硶銆嬨?銆婃皯娉曘?绛夌殑涓嶅悓鍦ㄤ簬锛屽叾鏈夊緢澶х殑涓嶇‘瀹氭?锛屻?鍙嶅瀯鏂硶銆嬬殑鎵ц鍔涘害鏇村鍦板彈鍒颁笉鍚屾椂浠gぞ浼氱粡娴庢?娼殑褰卞搷銆傗?浠庡巻鍙蹭笂鍥為【锛屽悇绉嶆?娼互鍙婂嚭鐜板湪銆婂弽鍨勬柇娉曘?涓殑鎵ц缁嗗垯閮芥湁鍓嶅悗涓嶄竴鑷寸殑鎯呭喌锛岀敋鑷虫湁浜涗簰鐩稿啿绐併?鈥濇瘮濡傚竷鏈楅瀷鍏徃鐨勫悎骞舵渚嬶紝鍦ㄥ綋鏃舵姷鍒剁粡娴庨泦涓?鎭㈠甯傚満娲诲姏鐨勫ぇ鑳屾櫙涓嬶紝瀹℃煡鐨勭粨鏋滄槸涓嶅厑璁稿崰鍏ㄥ浗闉嬩骇閲?%鐨勫竷鏈楅瀷鍏徃涓庝竴涓粎鍗犳湁0.5%浜ч噺鐨勫叕鍙稿悎骞?涓よ?鍚堝苟鍚庡崰闆跺敭甯傚満鐨?.3%)锛屼絾鍦?0涓栫邯80骞翠唬鏀炬澗鏍囧噯鍚庯紝绫讳技甯冩湕闉嬪叕鍙哥殑鎯呭喌灏卞嚑涔庝笉鍙兘鍐嶅彂鐢熶簡銆?br />
銆??鈥滈殢鐫?斂娌诲拰绀句細鐘跺喌鐨勬敼鍙橈紝銆婂弽鍨勬柇娉曘?鎵?拷姹傜殑姝d箟鐨勬爣鍑嗘槸涓嶇‘瀹氱殑锛屸?寮犲叴璇淬?閫氬父鎯呭喌涓嬶紝鏀厤鐫?粡娴庢?娼殑鏈変袱绉嶄富瑕佹?鎯筹紝涓?璁や负鍙嶅瀯鏂殑浣滅敤鍦ㄤ簬浠庣粡娴庤鑼冧笂骞宠 鏀挎不绀句細鍙戝睍鐨勫け琛°?姣斿缇庡浗寮?鍙嶅澶т紒涓氱殑鍨勬柇锛屽叾娣卞眰鐨勫師鍥犳槸澶у瀷浼佷笟閫氳繃閲戦挶鏀挎不鐨勬墜娈靛奖鍝嶅埌浜嗙編鍥界殑姘戜富鏀挎不锛屼负浜嗘姂鍒剁粡娴庢潈鍔涘悜鏀挎不娓楅?锛屽湪鐜版湁鍒跺害妗嗘灦鍐呮崓鍗斂娌绘皯涓讳笌涓汉鑷敱锛屽弽鍨勬柇鎴愪负涓?蹇呰鑰屼笖鏈夊姏鐨勭粡娴庢墜娈碉紝骞朵笖浠ユ硶寰嬪舰寮忓浐瀹氫簡涓嬫潵銆?br />
銆??鍦ㄦ垜鍥斤紝鎸佽繖绉嶈鐐圭殑瀛﹁?鍜屽悇鐣屼汉澹篃涓嶅湪灏戞暟銆備粬浠涓猴紝鍙備笌涓?釜鐩稿叧甯傚満鐨勭珵浜夎?鏁伴噺浠ュ強杩涘叆璇ョ浉鍏冲競鍦虹殑闅炬槗绋嬪害锛屾棦鏄槸鍚﹂?杩囧競鍦虹珵浜変績杩涜祫婧愬悎鐞嗛厤缃殑閲嶈琛¢噺鎸囨爣锛屽張鏄 閲忕粡娴庡仴搴枫?绀句細缁撴瀯绋冲畾鐨勯噸瑕佽 閲忔寚鏍囥?

銆??闄や簡鍙楃粡娴庢?娼奖鍝嶄互澶栵紝銆婂弽鍨勬柇娉曘?鐨勫彟涓?釜鐥囩粨鍦ㄤ簬瀹冪殑鎵ц鎴愭湰杩囬珮銆傜敱浜庡お杩囧鏉傦紝銆婂弽鍨勬柇娉曘?鎵ц鐨勬垚鏈篃灏辫繃楂樸?渚嬪锛岀編鍥藉徃娉曢儴瀵笽BM鐨勮瘔璁间粠1969骞存寔缁埌1982骞达紝鏈?粓浠ュ徃娉曢儴鎾よ瘔缁撴潫(鍏堕棿杩樻湁涓?簺鍏徃瀵笽BM鎻愯捣姘戜簨璇夎)銆傚崄浣欏勾鐨勮皟鏌ユ椂闂翠腑甯傚満鏍煎眬宸茬粡鍑虹幇浜嗗法澶х殑鍙樺寲锛屽師鍏堝彲鑳芥瀯鎴愬瀯鏂殑浼佷笟鐨勫競鍦轰唤棰濆凡缁忓嚭鐜颁簡宸ㄥぇ鍙樺寲銆傜敱姝ゅ彲瑙侊紝銆婂弽鍨勬柇娉曘?鐨勮皟鏌ヨ繃绋嬩箣澶嶆潅鍜屾垚鏈箣楂樻槀銆?br />
銆??鈥滄爣鏉嗕綔鐢ㄢ?褰卞搷鏇存繁杩?br />
銆??涓浗灏界鍒氬垰瀹炴柦銆婂弽鍨勬柇娉曘?锛屼絾鍙嶅瀯鏂殑鏂椾簤鍗翠笉鏄垰鍒氬紑濮嬨?

銆??寮犲叴璁や负锛屻?鍙嶅瀯鏂硶銆嬪湪鐭湡鍐呴璁′笉浼氬鎴戝浗鐜拌缁忔祹閫犳垚澶ぇ瀹炶川褰卞搷銆傚彲浠ョ湅鍒帮紝銆婂弽鍨勬柇娉曘?瀵瑰ぇ鍨嬪浗鏈変紒涓氬苟涓嶅叿鏈変粈涔堢害鏉熷姏锛屸?鎴戝浗鐨勬墍鏈夊埗鏄浗鏈変紒涓氫富瀵肩殑锛屽儚鐭虫补銆侀搧璺竴绫荤殑鍥芥皯缁忔祹鍛借剦锛屼互鍙婂浗瀹剁壒璁哥粡钀ョ殑浜у搧锛屽鐑熻崏绛夐兘鏄敱鍥芥湁浼佷笟鐢熶骇鍜岀粡钀ョ殑锛岃繖鏄鍚堜腑鍥藉埗搴﹀熀纭?殑锛屽綋鐒朵篃涓嶆槸涓?儴銆婂弽鍨勬柇娉曘?浼氭敼鍙樼殑銆傗?

銆??姝ゅ锛屼腑鍥藉敖绠″垰鍒氬疄鏂姐?鍙嶅瀯鏂硶銆嬶紝浣嗗弽鍨勬柇鐨勬枟浜夊嵈涓嶆槸鍒氬垰寮?銆傛棭鍦ㄣ?鍙嶅瀯鏂硶銆嬩箣鍓嶏紝銆婂弽涓嶆褰撶珵浜夋硶銆嬬瓑娉曞緥灏变竴鐩磋捣浜嗗弽鍨勬柇鐨勬硶寰嬫?鏂囦欢鐨勮鑹诧紝鑰屻?鍙嶅瀯鏂硶銆嬩腑鐩稿綋澶т竴閮ㄥ垎鐨勫唴瀹逛笌銆婂弽涓嶆褰撶珵浜夋硶銆嬩腑鐨勫唴瀹规湁鎵?噸鍚堬紝鎵?互鏂版硶寰嬬殑瀹炴柦鏈変竴瀹氱殑杩炵画鎬э紝鍦ㄧ煭鏃舵湡鍐呬笉搴旇閫犳垚寰堝ぇ鐨勫疄闄呭奖鍝嶃?

銆??浠庢潯鏂囧唴瀹规潵鐪嬶紝鈥滀腑鍥界殑銆婂弽鍨勬柇娉曘?姣旇緝骞宠 鍜屽叏闈紝鏃㈤潪淇濆畧涔熶笉婵?繘锛岃兘鍙嶆槧鍑哄綋浠婅緝杩涙鐨勫弽鍨勬柇鎬濇疆銆傗?浣嗘棤璁烘槸涓浗涔熷ソ锛屽彂灞曚簡鐧句綑骞寸殑瑗挎柟鍙嶅瀯鏂枟浜変篃濂斤紝閮藉悓鏍烽潰涓寸潃鎵ф硶閰嶅娉曡鍒跺畾鐨勫洶澧冦?杩欐槸鐢便?鍙嶅瀯鏂硶銆嬫湰韬秹鍙婇鍩熷拰闂澶嶆潅鎬у喅瀹氱殑锛屽敖绠″畠鐪嬩笂鍘讳粎浠呮槸涓?釜娉曞緥闂锛屼絾浜嬪疄涓婂嵈涓庣粡娴庡浠ュ強鍚勭绀句細鏀挎不闂浜ゆ潅姣楄繛銆傝繖浜涢棶棰樺湪鐭湡涔嬪唴閮戒笉鑳藉緱鍒版敼鍠勶紝蹇呴』绾冲叆鑰冭檻鐨勮寖鍥达紝鎵?互銆婂弽鍨勬柇娉曘?鐨勬墽琛屽疄闄呬笂鏄竴涓洶闅鹃噸閲嶇殑浠诲姟銆傝瀹㈣鍜屽叏闈㈠湴鐪嬪緟銆婂弽鍨勬柇娉曘?锛屽簲璇ラ鍏堣璇嗗埌锛屽弽鍨勬柇鏂椾簤鏈韩鏄竴涓笎杩涚殑杩囩▼銆傞殢鐫?弽鍨勬柇鐨勬瀛愪笉鏂嚭鐜帮紝浼氬浼佷笟閫犳垚蹇冪悊涓婄殑褰卞搷锛岃瀹冧滑鎶婄害鏉熻嚜韬殑琛屼负鎻愪笂鏃ョ▼锛岃?鍙告硶娓犻亾鎵?捣鐨勪綔鐢ㄥ彲鑳借繕娌℃湁杩欑娉曞緥濞佹厬鐨勫奖鍝嶅箍娉涘拰蹇?銆?br />






相关链接:



8-year Restructuring Neusoft normalized



Jiangmin response to the letter, said attorney Alibaba China lagged far behind the law



Learning the basic concept of the nine JSP implicit objects



Bliss Sound WAV To M3U Creator



PMP Exam Questions



Convert mkv to avi free



I have fish and bear's paw: MSNPLUS make better use of MSN



how to convert FLV to 3gp



CPU chip with independent INTELLECTUAL property rights through the acceptance of Godson 2E



AAC to MP3 Mixer



Convert flv to 3gp



Career Planning: Attitude is everything



Ad Blockers INFOMATION



avc-free



Teaching And Training Tools Guide



Friday, May 14, 2010

MMLIB / Multimedia Library

Turn your PC into an Electronic file storage by MMLIB. We are surrounded by voluminous documents: newspapers, articles, memos, photos, Web pages. Once those documents are stored in the image database, they can be easily searched, printed, or e-mailed. Data are imported from image scanner, digital camera/video, or PC's clipboard. Important data is protected with a password.

MMLIB is in cooperation with our acoustics measurement softwares, DSSF3, RAL, RAD, and RAE. Measurement data and graph image is easily stored to construct a measurement database.
With cooperation with MS outlook, OCR software, translation software.
Number of pages can be saved into one file, so a newsletter or a community paper is easily edited. You can distribute them by the Internet (E-mail news, or Web publishing). Readers can read them easily only by downloading a MMLIB viewer (free software).