<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Code &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/code/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Sun, 27 Jun 2021 07:45:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>Auction at Sotheby&#8217;s www source code will be auctioned It is basically the founding document of the World Wide Web: 9550 lines of programming code. Now the original files of the inventor Tim Berners-Lee come under the hammer. From Peter Mücke.</title>
		<link>https://en.spress.net/auction-at-sothebys-www-source-code-will-be-auctioned-it-is-basically-the-founding-document-of-the-world-wide-web-9550-lines-of-programming-code-now-the-original-files-of-the-inventor-tim-berners/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Sun, 27 Jun 2021 07:45:08 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Auction]]></category>
		<category><![CDATA[auctioned]]></category>
		<category><![CDATA[basically]]></category>
		<category><![CDATA[Berners Lee]]></category>
		<category><![CDATA[BernersLee]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Document]]></category>
		<category><![CDATA[files]]></category>
		<category><![CDATA[founding]]></category>
		<category><![CDATA[German]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[hammer]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[Inventor]]></category>
		<category><![CDATA[lines]]></category>
		<category><![CDATA[Mücke]]></category>
		<category><![CDATA[Original]]></category>
		<category><![CDATA[Peter]]></category>
		<category><![CDATA[programming]]></category>
		<category><![CDATA[Sotheby s]]></category>
		<category><![CDATA[Sothebys]]></category>
		<category><![CDATA[source]]></category>
		<category><![CDATA[Source code]]></category>
		<category><![CDATA[The world]]></category>
		<category><![CDATA[Tim]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Wide]]></category>
		<category><![CDATA[World]]></category>
		<category><![CDATA[World wide web]]></category>
		<category><![CDATA[www]]></category>
		<guid isPermaLink="false">https://en.spress.net/?p=27632</guid>

					<description><![CDATA[Auction at Sotheby&#8217;s www source code will be auctioned Status: 23.06.2021 12:35 p.m. It is basically the founding document of the World Wide Web: 9550 lines of programming code. Now the original files of the inventor Tim Berners-Lee come under the hammer. From Peter Mücke, ARD Studio New York &#8220;This changed everything&#8221; is what Sotheby&#8217;s [&#8230;]]]></description>
										<content:encoded><![CDATA[</p>
<h1> Auction at Sotheby&#8217;s www source code will be auctioned </h1>
<p> Status: 23.06.2021 12:35 p.m. </p>
<p><span id="more-27632"></span></p>
<p><strong> It is basically the founding document of the World Wide Web: 9550 lines of programming code. Now the original files of the inventor Tim Berners-Lee come under the hammer. </strong> </p>
<p> From Peter Mücke, ARD Studio New York </p>
<p>&#8220;This changed everything&#8221; is what Sotheby&#8217;s calls the auction quite immodestly. Which, for once, shouldn&#8217;t be an exaggeration &#8211; because who would deny that the World Wide Web has actually changed almost everything. Even if its inventor Tim Berners-Lee was probably not aware of this when he presented his proposal for a system for the exchange of information on March 12, 1989.</p>
<h2> It started at CERN</h2>
<p>At that time, the British computer scientist was working at the European nuclear research center CERN and had the problem that parts of the laboratories are located on Swiss territory and other parts on French territory. Because the two countries had different network infrastructures, he developed a system that was supposed to facilitate the exchange of information across borders. This original programming code comprises 9550 lines and has since dictated the basic structures of the Internet: the page description language HTML and the transfer protocol HTTP and the identifier URI. A revolution &#8211; not just for the scientific world for which the project was actually intended. </p>
<p> Invented the Internet code: the British computer scientist Tim Berners-Lee. Image: picture alliance / dpa</p>
<h2> Digital collector&#8217;s item </h2>
<p>Even if the code has long been &#8220;open source&#8221; &#8211; that is, freely accessible to everyone &#8211; it is now going under the hammer: the original files, provided with a time stamp and a signature from Berners-Lee, together with a digital poster that visualizes the source code and a letter from the scientist from 1989 in which he describes his project. Everything is conveniently packed in a so-called NFT &#8211; a &#8220;non-fungible token&#8221;. This is a kind of digital certificate of authenticity that is stored on a so-called blockchain. It should prove that the virtual object is unique &#8211; even if any number of digital copies can exist. The collector&#8217;s item of the digital age, so to speak. </p>
<p> <a   class="teaser-absatz__link" href="https://en.spress.net/wp-content/plugins/wp-optimize-by-xtraffic/redirect/?gzv=H4sIAAAAAAACAxXIMQ7AEAAF0LvYUauzWFQpoQhfpGl69-r43kMGkcQDtUvFFZ9zMujT9m68Huywq0LDLwfFY7srShy5g-6pmLg-ZJodqNgE87gSeT9sQGS3VAAAAA.." target="_blank" rel="nofollow noopener"> </p>
<p>
</p>
<p>
<p> <strong> </strong> 04/24/2021 </p>
<p> Digital images &#8220;Crypto Art&#8221; makes millions </p>
</p>
<p><p> A digital work of art was auctioned for a record $ 69 million.</p>
</p>
<p> </a></p>
<h2> Minimum bid $ 1000</h2>
<p> As a computer scientist, it is only logical to auction his invention as such an NFT, says Berners-Lee. It feels right to put your signature under an all-digital artifact. The online auction lasts a week and starts with a minimum bid of $ 1000. The proceeds will go to a foundation.</p>
<p>After the auction houses had long blocked the auctioning of such NFTs, they have been doing this for some time <a   href="https://en.spress.net/wp-content/plugins/wp-optimize-by-xtraffic/redirect/?gzv=H4sIAAAAAAACAxXIMQ7AEAAF0LvYUauzWFQpoQhfpGl69-r43kMGkcQDtUvFFZ9zMujT9m68Huywq0LDLwfFY7srShy5g-6pmLg-ZJodqNgE87gSeT9sQGS3VAAAAA.." class="textlink" target="_blank" rel="nofollow noopener"> good sales with digital art</a> . Most recently, the auction of works by crypto artist Pak at Sotheby&#8217;s raised $ 17 million. At Christie&#8217;s, an NFT of a collage by digital artist Beeple changed hands for just under $ 70 million</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">27632</post-id>	</item>
		<item>
		<title>Microsoft announces end of support period for Windows 10</title>
		<link>https://en.spress.net/microsoft-announces-end-of-support-period-for-windows-10/</link>
		
		<dc:creator><![CDATA[Theo The Verge]]></dc:creator>
		<pubDate>Mon, 21 Jun 2021 09:37:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Announced]]></category>
		<category><![CDATA[announces]]></category>
		<category><![CDATA[Cease]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Display]]></category>
		<category><![CDATA[Duration]]></category>
		<category><![CDATA[Fixes]]></category>
		<category><![CDATA[giant]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Operating system]]></category>
		<category><![CDATA[Overhaul]]></category>
		<category><![CDATA[patch]]></category>
		<category><![CDATA[people]]></category>
		<category><![CDATA[Period]]></category>
		<category><![CDATA[step]]></category>
		<category><![CDATA[Suggestions]]></category>
		<category><![CDATA[Sun]]></category>
		<category><![CDATA[Support]]></category>
		<category><![CDATA[version]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Windows 10]]></category>
		<category><![CDATA[Windows 11]]></category>
		<category><![CDATA[Windows Store]]></category>
		<guid isPermaLink="false">https://en.spress.net/microsoft-announces-end-of-support-period-for-windows-10/</guid>

					<description><![CDATA[Recently Microsoft has officially announced the time to stop supporting the Windows 10 operating system. Perhaps this is a new step for Microsoft to focus on developing their new operating system. Photo: The Verge Microsoft will end support for Windows 10 on October 14, 2025. That marks more than 10 years since the operating system [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Recently Microsoft has officially announced the time to stop supporting the Windows 10 operating system. Perhaps this is a new step for Microsoft to focus on developing their new operating system.</strong><br />
<span id="more-26199"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_15_309_39190027/e4c8a9d4a6964fc81687.jpg" width="625" height="413"> </p>
<p> <em> Photo: The Verge </em> Microsoft will end support for Windows 10 on October 14, 2025. That marks more than 10 years since the operating system was first introduced. This is the first time Microsoft has officially confirmed the end of support for Windows 10. <strong> Microsoft keeps giving hints about Windows 11</strong> Microsoft has made many hints that it is ready to launch Windows 11. The software giant is holding a special Windows event to reveal the &#8220;next generation&#8221; of this operating system next week. The event started at 11 a.m. ET or around 10 p.m. the same day in Vietnam. Microsoft executives have also been making announcements about the &#8220;next generation of Windows&#8221; for months, and one CEO even described it as a &#8220;new version of Windows&#8221; recently. Microsoft also introduced Windows 11 in an 11-minute video last week. Many users expect Microsoft to announce a new version of Windows with significant user interface changes and an overhaul to the Windows Store. Microsoft has been working on a new code called &#8220;Sun Valley&#8221;, perhaps this is a new version of the operating system that the company has called &#8220;a complete visual rejuvenation of Windows&#8221;. Microsoft originally scheduled the end of support for Windows 10 to be October 13, 2020. However, Microsoft said this is the period when the company does not add new features to the operating system and only maintains support with those. bug fixes and security patches. Windows 10 is an unusual version of the operating system for Microsoft because it has fallen outside the cycle of releasing new operating system versions every few years like other companies. Instead, Microsoft has been updating Windows 10 continuously twice a year with new features. Microsoft used to call Windows 10 the &#8220;final version of Windows,&#8221; but it&#8217;s been almost six years since its release and Microsoft seems ready to move on to something new.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">26199</post-id>	</item>
		<item>
		<title>Quang Ninh: Effective application of IT in the prevention and control of Covid-19</title>
		<link>https://en.spress.net/quang-ninh-effective-application-of-it-in-the-prevention-and-control-of-covid-19/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Mon, 21 Jun 2021 02:05:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Bach Dang Bridge]]></category>
		<category><![CDATA[BLUEZONE]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Contact]]></category>
		<category><![CDATA[Control]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[COVID19]]></category>
		<category><![CDATA[Department of Information and Communications of Quang Ninh]]></category>
		<category><![CDATA[Effective]]></category>
		<category><![CDATA[Electronic]]></category>
		<category><![CDATA[Infection]]></category>
		<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[NCOVI]]></category>
		<category><![CDATA[Ninh]]></category>
		<category><![CDATA[Notice No 137 TB VPCP]]></category>
		<category><![CDATA[Pham Minh Chinh]]></category>
		<category><![CDATA[Prevention]]></category>
		<category><![CDATA[QR code]]></category>
		<category><![CDATA[Quang]]></category>
		<category><![CDATA[Quang Ninh]]></category>
		<category><![CDATA[setting]]></category>
		<category><![CDATA[Total attack]]></category>
		<category><![CDATA[Tracing]]></category>
		<category><![CDATA[Translate]]></category>
		<category><![CDATA[Vietnam health declaration]]></category>
		<guid isPermaLink="false">https://en.spress.net/quang-ninh-effective-application-of-it-in-the-prevention-and-control-of-covid-19/</guid>

					<description><![CDATA[Strengthening the application of information technology (IT) to quickly capture information, assist in tracing, zoning and handling arising situations related to the prevention and control of the Covid-19 epidemic has contributed to important to help Quang Ninh always take the initiative in all situations. People in the province are increasingly interested in regularly using IT [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong> Strengthening the application of information technology (IT) to quickly capture information, assist in tracing, zoning and handling arising situations related to the prevention and control of the Covid-19 epidemic has contributed to important to help Quang Ninh always take the initiative in all situations. People in the province are increasingly interested in regularly using IT applications to protect their health and their families against the risk of disease.</strong> </p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_15_448_39189065/ecbf56b459f6b0a8e9e7.jpg" width="625" height="428"> <em> Officials of the Provincial Center for Disease Control apply IT in investigating and tracing cases with epidemiological factors related to the Covid-19 epidemic.</em> In the face of complicated developments of the Covid-19 epidemic, Prime Minister Pham Minh Chinh directed to make a full-scale, stronger and more effective offensive with more active, comprehensive and more appropriate solutions. , more effectively in the spirit of &#8220;fighting the epidemic like fighting the enemy&#8221;. In particular, attention must be paid to epidemic prevention and control from early, remotely, from before the epidemic with the motto 5K + vaccines and technology solutions. Following the direction of the Government and the Prime Minister, during the past time, especially the 3rd and 4th Covid-19 epidemics in 2021, Quang Ninh has always focused on applying IT in work. epidemic prevention and control, has brought effective, such as: NCOVI voluntary health declaration for people; online medical declaration at tokhaiyte.vn (VietNam Health Declaration application); Bluezone detects close contact with sick people, suspected infected people through Bluetooth of smartphones; anti-epidemic map system at antoancovid.vn for service establishments, accommodation, crowded public places such as schools, medical examination and treatment facilities&#8230;; The system records people coming and going to public places through scanning QR codes at smartphone applications such as NCOVI, VietNam Health Declaration, Bluezone&#8230; <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_15_448_39189065/0124b42fbb6d52330b7c.jpg" width="625" height="396"> <em> Electronic medical declaration and QR code scanning are applied at Bach Dang Bridge epidemic prevention and control checkpoint.</em> Concretize Notice No. 137/TB-VPCP dated May 30, 2021 of the Government Office “Notifying the conclusion of Prime Minister Pham Minh Chinh at the nationwide online meeting on the prevention and control of Covid-19 epidemic. -19&#8243;, the provincial directives related to the mandatory application of technology in the prevention and control of the Covid-19 epidemic, Quang Ninh Department of Information and Communications has actively implemented many solutions. In which, strengthening propaganda, guidance and supervision of localities and units throughout the province on installing Bluezone application; urgently research and build the province&#8217;s own website on the prevention and control of the Covid-19 epidemic, providing useful and necessary information to serve the direction and operation of the steering committees at all levels and serve people look up information; integrating the province&#8217;s Covid-19 map, connecting with central database systems and synchronizing electronic medical declaration data to serve the direction, administration and tracing; Build your own mobile app… <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_15_448_39189065/a63914321b70f22eab61.jpg" width="625" height="416"> <em> Provincial General Hospital staff update hospital information on the National Covid-19 Safe Coexistence Map.</em> Through the IT and telecommunications foundation infrastructure of the province&#8217;s e-Government system such as: Provincial public service portal, official email system, public Wi-Fi system&#8230; Department of Information and Communications is the focal point. broadcast messages and developments in epidemic prevention and control as well as the direction and administration of the province; provide information on epidemic prevention and control to press agencies, media as well as basic information systems, including information related to tracing work. At times with special factors, the Department produces newsletters or informational content to provide timely, fastest and absolutely accurate information to the press and the grassroots information system. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_15_448_39189065/b9ba14b11bf3f2adabe2.jpg" width="625" height="466"> <em> Information in the province&#8217;s epidemic prevention and control is updated on the provincial portal and the provincial e-Government page on the Zalo platform.</em> Most of the departments, branches, localities and units in the province currently have fan pages on facebook; All information on the prevention and control of the Covid-19 epidemic is gathered and posted on the e-Government page of Quang Ninh province on the Zalo platform… This is an important part of helping the province to spread messages to the people in the public sector. disease prevention and control, so that every citizen knows and proactively prevents and effectively prevents epidemics at all times and places. Minh Ha</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">26103</post-id>	</item>
		<item>
		<title>Building a trusted foundation for product traceability</title>
		<link>https://en.spress.net/building-a-trusted-foundation-for-product-traceability/</link>
		
		<dc:creator><![CDATA[MĐ]]></dc:creator>
		<pubDate>Sat, 19 Jun 2021 21:42:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Barcode]]></category>
		<category><![CDATA[Bring]]></category>
		<category><![CDATA[Building]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Communication]]></category>
		<category><![CDATA[Consumers]]></category>
		<category><![CDATA[Draft]]></category>
		<category><![CDATA[Foundation]]></category>
		<category><![CDATA[Goods]]></category>
		<category><![CDATA[GS1]]></category>
		<category><![CDATA[Input]]></category>
		<category><![CDATA[Labels]]></category>
		<category><![CDATA[Portal]]></category>
		<category><![CDATA[Product]]></category>
		<category><![CDATA[QR code]]></category>
		<category><![CDATA[Science and technology]]></category>
		<category><![CDATA[Semi automatic]]></category>
		<category><![CDATA[source]]></category>
		<category><![CDATA[Standardized]]></category>
		<category><![CDATA[traceability]]></category>
		<category><![CDATA[Trust]]></category>
		<category><![CDATA[trusted]]></category>
		<category><![CDATA[TXNG]]></category>
		<guid isPermaLink="false">https://en.spress.net/building-a-trusted-foundation-for-product-traceability/</guid>

					<description><![CDATA[Currently, the traceability (TXNG) of products and goods is done through barcodes, or QR codes. However, the TXNG in these forms has not brought confidence to consumers because the information about TXNG in it is incomplete, especially there is no information about the &#8216;input&#8217; stages of the production process &#8211; determining product quality. Standardizing product [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Currently, the traceability (TXNG) of products and goods is done through barcodes, or QR codes. However, the TXNG in these forms has not brought confidence to consumers because the information about TXNG in it is incomplete, especially there is no information about the &#8216;input&#8217; stages of the production process &#8211; determining product quality. Standardizing product TXNG codes and putting into operation the National Product and Goods TXNG Gateway will contribute to solving this situation.</strong><br />
<span id="more-25652"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_146_39200675/5ce14e8f46cdaf93f6dc.jpg" width="625" height="424"> </p>
<p> <em> Illustration</em> In Decision 100/QD-TTg dated January 19, 2019 of the Prime Minister approving the &#8220;Project on implementation, application and management of the traceability system&#8221;, the Ministry of Science and Technology is responsible for building Build and put into operation the National Product and Goods Export Portal. At present, the Ministry of Science and Technology has developed and published 20 national standards in the field of NR. It is expected that in the fourth quarter of 2021, the National Product and Goods Trade Portal will come into operation. National standards are the basis for businesses to standardize TXNG activities, in which information about products and goods is fully collected in all stages of the supply chain, instead of only information. of farming and production as it is today. The TXNG portal will store this information to serve the advertising needs of businesses and to manage and supervise the implementation of TXNG by the State. A product is considered traceable through an electronic label using barcodes or QR codes according to the standards of the GS1 global bar code organization, when using scanning software or applications. The QR code must display all information about the product chain, from purchasing supplies, monitoring the care process, spraying, fertilizing, harvesting, preliminary processing, and transportation. This information is collected automatically or semi-automatically and is exploited and shared. The National Center for Codes and Barcodes (Ministry of Science and Technology) &#8211; the unit authorized to assume the prime responsibility for implementing Decision No. 100/QD-TTg &#8211; is coordinating in developing a draft Circular on electrical labels. to issue a uniform regulation on stamps and labels using barcodes and QR codes to meet the above requirements. According to the National Center for Codes and Barcodes, the comprehensive implementation of such stages brings benefits to businesses and people. Enterprises have tools to manage and publicize product quality, increase competitive value in the market. Consumers know product quality through information about the entire process of formation and path of a product before it goes on sale. Management agencies will accurately and promptly determine the cause of product quality problems as well as the roles and responsibilities of the parties involved. When the information about TXNG products and goods is uploaded by businesses to the TXNG Portal, it will create a data warehouse to serve the needs of transparent export product information and e-commerce of enterprises.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25652</post-id>	</item>
		<item>
		<title>What are the advantages of the source code of the mini program for educational institutions?</title>
		<link>https://en.spress.net/what-are-the-advantages-of-the-source-code-of-the-mini-program-for-educational-institutions-2/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Wed, 16 Jun 2021 09:55:11 +0000</pubDate>
				<category><![CDATA[World]]></category>
		<category><![CDATA[Advantages]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[educational]]></category>
		<category><![CDATA[Institutions]]></category>
		<category><![CDATA[Mini]]></category>
		<category><![CDATA[Program]]></category>
		<category><![CDATA[source]]></category>
		<guid isPermaLink="false">https://en.spress.net/what-are-the-advantages-of-the-source-code-of-the-mini-program-for-educational-institutions-2/</guid>

					<description><![CDATA[With the continuous development of technology today, all walks of life are linked to the Internet, especially the penetration of big data and cloud services, which has made the connection between technology and life closer. Today&#8217;s industries have already had a clear trend of intelligent informationization. , Especially the emerging industry of online education. It [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>With the continuous development of technology today, all walks of life are linked to the Internet, especially the penetration of big data and cloud services, which has made the connection between technology and life closer. Today&#8217;s industries have already had a clear trend of intelligent informationization. , Especially the emerging industry of online education. It is not accurate to describe online education in terms of practical emerging industries. In fact, online education has been developed in my country for nearly ten years. In these ten years, online education has undergone innovation and exploration time and time again, and now has a mature set of Online teaching systems, various educational systems have also been developed by institutions, such as education APPs, online learning websites and other different teaching channels. The continuous expansion of these new channels has brought more convenience to users. Users are choosing channels that suit them. Recently, another learning channel is slowly emerging. It is characterized by lighter weight and more convenient. Some friends have guessed that it is a WeChat learning applet created using the source code of the applet of educational institutions. The following editor will tell you about the advantages of the source code of the applet of educational institutions.</strong></p>
<p><span id="more-23669"></span> <img fifu-featured="1" decoding="async" src="https://p3.itc.cn/images01/20210615/fe583417d19040e192c8ae2efd66b81f.jpeg" max-width="600"></p>
<ol>
<li>Convenience
<p>You may be relatively unfamiliar to hear about the source code of the applet of educational institutions, but everyone knows the WeChat applet. After all, almost everyone has downloaded and used WeChat. The feature of the WeChat applet is that it is free to download and can be used by searching. , This is extremely convenient. The educational institution applet is the WeChat online learning applet created by educational institutions. Users can use the WeChat search applet to learn instantly. This method is extremely convenient and does not require cumbersome downloads or input URLs.</p>
</li>
<li>
<p>Low cost</p>
<p>Secondly, the cost of developing the source code of small programs for educational institutions is relatively low, which is cheaper than the development of educational apps and educational websites.</p>
<p>Three, large flow</p>
<p>The traffic of WeChat users is extremely scary. Almost everyone downloads WeChat on their mobile phones. The establishment of WeChat applets by educational institutions can make the name of the institution to a greater extent. Compared with the traditional offline teaching and training methods, WeChat applets In terms of attracting traffic, publicity, and customer acquisition, it is a win, and it can also be combined with offline simultaneous development. The two complement each other, which can better promote educational products and reduce the cost of institutional publicity.</p>
<p><img decoding="async" src="https://p9.itc.cn/images01/20210615/9b05c30caed74f6ea40c64540bbb6969.jpeg" max-width="600"></p>
<p>Four, more benefits</p>
<p>The WeChat applet created by the source code of the applet of educational institutions provides itself with a larger resource platform. Owning traffic means owning users, and owning users means owning revenue. The continuous conversion and fission of traffic brings more to the organization. Large profits, while also attracting some advertisers to settle in, to achieve the fastest profitable income.</p>
<p>All in all, under the current trend of Internet +, educational institutions must keep up with the changes of the times and user needs, always stand on the user&#8217;s point of view, and bring users more convenience and high-quality services, so as to achieve a win-win situation.</p>
</li>
</ol>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23669</post-id>	</item>
		<item>
		<title>Warning: Hackers take advantage of the Covid-19 epidemic to spread malicious code</title>
		<link>https://en.spress.net/warning-hackers-take-advantage-of-the-covid-19-epidemic-to-spread-malicious-code/</link>
		
		<dc:creator><![CDATA[Hà Thanh]]></dc:creator>
		<pubDate>Wed, 16 Jun 2021 06:15:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[advantage]]></category>
		<category><![CDATA[Attach]]></category>
		<category><![CDATA[Campaign]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Contain]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[COVID19]]></category>
		<category><![CDATA[Document]]></category>
		<category><![CDATA[DOCX]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[epidemic]]></category>
		<category><![CDATA[FAKE]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Install]]></category>
		<category><![CDATA[malicious]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Penetrate in]]></category>
		<category><![CDATA[Spread]]></category>
		<category><![CDATA[Take advantage]]></category>
		<category><![CDATA[Title]]></category>
		<category><![CDATA[Translate]]></category>
		<category><![CDATA[trick]]></category>
		<category><![CDATA[Vaccines for COVID 19]]></category>
		<category><![CDATA[Warning]]></category>
		<guid isPermaLink="false">https://en.spress.net/warning-hackers-take-advantage-of-the-covid-19-epidemic-to-spread-malicious-code/</guid>

					<description><![CDATA[Fake emails with content related to the Covid-19 vaccine sent to users. If you click on the document, the user will be attacked by the hacker. Warning: Hackers take advantage of the Covid-19 epidemic to spread malicious code. Illustration Taking advantage of the complicated development of the Covid-19 epidemic in many countries around the world [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Fake emails with content related to the Covid-19 vaccine sent to users. If you click on the document, the user will be attacked by the hacker.</strong><br />
<span id="more-23498"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_11_39141171/2965abeaa6a84ff616b9.jpg" width="625" height="327"> </p>
<p> <em> Warning: Hackers take advantage of the Covid-19 epidemic to spread malicious code. Illustration</em> Taking advantage of the complicated development of the Covid-19 epidemic in many countries around the world and even in Vietnam, hacker groups have opened many cyberattack campaigns through fake emails with documents containing malicious code. , with titles and content related to the Covid-19 epidemic to trick users into opening documents. As noted by experts of CyRadar Information Security Joint Stock Company, the hot topic of the Covid-19 epidemic and the Covid-19 vaccine has continued to be exploited by many hacker groups in their campaigns to defraud Vietnamese users. Nam through the form of sending fake emails with attached document files containing malicious code. Specifically, two cyberattack campaigns in the form of sending fake emails with attached documents related to the Covid-19 epidemic, including &#8220;Jam Gia Dien dich Covid-19.docx&#8221; and &#8220;Covid-19&#8211; Vaccines.xlsm”. The above docx and xlsm file formats, according to experts&#8217; analysis, have malicious code installed. When the user opens the document file, the malicious code will penetrate the computer, allowing the remote hacker to control the computer through commands. From there, hackers can also order to download many other malicious codes, steal data, passwords, screenshots&#8230; Currently, as noted by CyRadar, the number of cases where users are tricked into downloading and opening fake documents related to the Covid-19 epidemic and the Covid-19 vaccine are not many. However, in the context of a complicated epidemic and a growing remote working model, experts predict that in the coming time, there may be more hacker groups that continue to take advantage of the Covid-19 epidemic to attack scams. user island. Therefore, in addition to recommending the use of protection software, experts also recommend that organizations, businesses and users need to be careful and consider carefully when downloading email attachments.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23498</post-id>	</item>
		<item>
		<title>Behind the story of Sun Wukong being ordained to the Bo Ma On</title>
		<link>https://en.spress.net/behind-the-story-of-sun-wukong-being-ordained-to-the-bo-ma-on/</link>
		
		<dc:creator><![CDATA[Lục Tiểu Linh Đồng / ChiBooks / NXB Lao động]]></dc:creator>
		<pubDate>Wed, 16 Jun 2021 02:40:09 +0000</pubDate>
				<category><![CDATA[Cinema & TV]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[contemporary]]></category>
		<category><![CDATA[Dong Hai Long]]></category>
		<category><![CDATA[eunuchs]]></category>
		<category><![CDATA[Fleer]]></category>
		<category><![CDATA[Fruit mountain]]></category>
		<category><![CDATA[Homophones]]></category>
		<category><![CDATA[horse]]></category>
		<category><![CDATA[Jade Emperor]]></category>
		<category><![CDATA[Journey to the west]]></category>
		<category><![CDATA[Ngo Thua An]]></category>
		<category><![CDATA[Officials]]></category>
		<category><![CDATA[Ordain]]></category>
		<category><![CDATA[ordained]]></category>
		<category><![CDATA[paradise]]></category>
		<category><![CDATA[Review translation]]></category>
		<category><![CDATA[Story]]></category>
		<category><![CDATA[Sun]]></category>
		<category><![CDATA[Sun Wukong]]></category>
		<category><![CDATA[Thai Bach Kim Tinh]]></category>
		<category><![CDATA[Thai bodhisattva]]></category>
		<category><![CDATA[Ton Thai]]></category>
		<category><![CDATA[Turn on]]></category>
		<category><![CDATA[Wukong]]></category>
		<guid isPermaLink="false">https://en.spress.net/behind-the-story-of-sun-wukong-being-ordained-to-the-bo-ma-on/</guid>

					<description><![CDATA[In &#8216;Journey to the West&#8217;, Ngo Thua An uses this story to satirize the contemporary ruling class that doesn&#8217;t know how to use people. From the moment he learned the bravery of the seven decades and the miraculous powers of incarnation from the Bodhi Patriarch, he robbed the &#8220;Ru Y Kim Co Bang&#8221; of the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In &#8216;Journey to the West&#8217;, Ngo Thua An uses this story to satirize the contemporary ruling class that doesn&#8217;t know how to use people.</strong><br />
<span id="more-23304"></span> From the moment he learned the bravery of the seven decades and the miraculous powers of incarnation from the Bodhi Patriarch, he robbed the &#8220;Ru Y Kim Co Bang&#8221; of the Dong Hai Long King, and made a big mess of Sam La Dien, self-corrected the book of life and death, causing the Jade Emperor to panic.</p>
<p> Jade Emperor then followed the advice of Thai Bach Kim Tinh, sent a holy order, conferred Ton Ngo Khong the title of &#8220;Bot Ma On&#8221;, invited the King to come to Thien Cung, hoping to use this to bind the US. Monkey King. In the ancient Chinese fairy genealogy, including the officials of the gods, there are many things that are made up of imagination &#8211; the world does not have this official. Although <em> Journey to the west</em> is a mythological novel, the duties of the official are thus fictitious, there are many positions borrowed using the mandarin of the Ming Dynasty. &#8220;Turn Ma On&#8221; is not without reason, so in history there is an official &#8220;Boat Ma On&#8221; or not? During the Ming Dynasty, there was the position of Ngu Ma Giam, starting from the year of Hong Vo &#8211; Thai To Chu Nguyen Chuong, the deacons were all in charge of the eunuchs. The eunuchs as Ngu Ma Giam, the official must be the fourth grade, those who belong to the fourth or fifth grade are not selected. But if they don&#8217;t take good care of the horse, let the horse die, they will be punished very severely. Just like in <em> Journey to the west</em> In heaven, the eunuchs Ngu Ma Giam used to say: “If a horse is weak and weak, it will be punished. If the horse is injured, it will be compensated and questioned.&#8221; There was an official Ngu Ma of the Ming dynasty called Thai tu tu, starting in March 1371, the fourth year of Hong Vo, the main position was called Thai bo tu khanh, the secondary position was called Thieu khanh. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_15_119_39195119/715a3b2d356fdc31857e.jpg" width="625" height="527"> The Marquis at that time was called &#8220;Ton Thai Tu Tu&#8221;. Why is it called &#8220;Turn on Code On&#8221;? Don&#8217;t say it&#8217;s the Ming Dynasty, all the mandarins of other dynasties don&#8217;t have a position called &#8220;Bot Ma On&#8221;. According to a record of ancient monsters, during the time of Tong Jin, the horse of the Trieu country suddenly fell dead, someone used an animal similar to a monkey (ape) to save them. Therefore, later people often locked a monkey in a stable and thought that by doing so, the horse would not be infected with plague. Traditional Chinese medicine also has a similar view of this. For example, books <em> Sacrifice Essential Art</em> by Jia Tu Hiep, who lived in Northern Wei, wrote: &#8220;Usually forcing the maid to go to the stables, it can prevent the horse from panicking, and also ward off evil, and cure all diseases.&#8221; In the Ming Dynasty, Ly Thoi Tran, in the draft outline, it was also mentioned that &#8220;The female monkey kept in the stable can help the horse avoid plague&#8221;. “Turn Ma On” (transliteration: Bi Ma Wen = Turn on code on) and “Tí Ma On” (transliterated: Bi Ma Wen = Ti Ma On) are homonyms with different meanings. So in <em> Journey to the west</em> Emperor Ngoc of Thien Cung chose a relatively beautiful official named &#8220;Bot Ma On&#8221; to let Ton Hau Vuong take over. Obviously, &#8220;Boat Ma On&#8221; is just another homonym with the same meaning as Ti Ma On. In the work <em> Journey to the west</em> By author Ngo Thua An, he gave the male breed Ton Hou a very strange nickname, which is certainly a very humorous description. Under his pen, &#8220;Bot Ma On&#8221; was directed by Emperor Jade Emperor himself. This is a poignant satire of the emperor in heaven and the emperor on earth. Their way of domination, if not concealment, is deceit. The Jade Emperor let the Hou King act as &#8220;Boat Ma Wen&#8221;, just one of the many examples of deception and hiding. Later, Sun Wukong learned the truth from someone else&#8217;s mouth. Bu Ma Wen is not only the smallest official but also &#8220;unofficial&#8221; among the officials. Therefore, Sun Wukong suddenly became angry, gritted his teeth and rolled his eyes, saying: &#8220;Dare to despise old Ton, old Ton I live in Hoa Qua Son, claiming to be King and claiming to be Patriarch, but dare to trick me into going to heaven to raise horses? Horse-keepers are just juniors, low-class people, why should it be my turn? He did not do! He didn&#8217;t do it!&#8221;. So, Ton Ngo Khong shouted, broke the koan, beat the Heaven Gate, and returned to Hoa Qua Son. The monkeys came to meet the Hou, and they were also angry and said, &#8220;The king is the king in this heavenly paradise, so respected and happy, why do you want to be a groom for people?&#8221; If you discuss with Sun Wukong&#8217;s bravery, you can&#8217;t be as majestic as the position of Marshal Thien Bong of Tru Bat Gioi, and you can&#8217;t call it Sa Tang&#8217;s official Quan Liem General, no wonder the Marquis is angry. . Moreover, in this story, Ton Ngo Khong shows a very strong self-esteem. When we went to get the scriptures, we still hated that other people called us &#8220;Boat Ma On&#8221;. If there is any goblin who does not know or deliberately rubs salt into the old wound, it will certainly be avenged by the monkey twice by destroying the entire lair. Work <em> Journey to the west</em> showed a very clear social meaning. Ngo Thua An was the one who understood it best and used this story to satirize the contemporary ruling class that did not know how to use people. Ngo Thua An was once a &#8220;famous&#8221; writer, but it was not until he was over 40 years old that he got the title of Tue Cong born, more than 60 years old, he was allowed to do Truong Hung district. Ngo Thua An borrowed the story of Ton Ngo Khong treason with the implication for his thoughts, and also wanted to regain some justice for all the amateurs in the world who had no time to study but did not meet the time.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23304</post-id>	</item>
		<item>
		<title>BTS: We had a hard time, especially during the &#8216;3 dark years&#8217;</title>
		<link>https://en.spress.net/bts-we-had-a-hard-time-especially-during-the-3-dark-years/</link>
		
		<dc:creator><![CDATA[Khánh Ngọc - CTV]]></dc:creator>
		<pubDate>Tue, 15 Jun 2021 20:29:11 +0000</pubDate>
				<category><![CDATA[Music]]></category>
		<category><![CDATA[A period of time]]></category>
		<category><![CDATA[Army]]></category>
		<category><![CDATA[BTS]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Dark]]></category>
		<category><![CDATA[Experience]]></category>
		<category><![CDATA[Extreme]]></category>
		<category><![CDATA[Festa 2021]]></category>
		<category><![CDATA[Hard]]></category>
		<category><![CDATA[Hardship]]></category>
		<category><![CDATA[Key word]]></category>
		<category><![CDATA[Leader]]></category>
		<category><![CDATA[Oppressive]]></category>
		<category><![CDATA[recall]]></category>
		<category><![CDATA[SHOULD]]></category>
		<category><![CDATA[Song]]></category>
		<category><![CDATA[SUGA]]></category>
		<category><![CDATA[Talk]]></category>
		<category><![CDATA[Three]]></category>
		<category><![CDATA[time]]></category>
		<category><![CDATA[TWO]]></category>
		<category><![CDATA[wings]]></category>
		<category><![CDATA[Years]]></category>
		<guid isPermaLink="false">https://en.spress.net/bts-we-had-a-hard-time-especially-during-the-3-dark-years/</guid>

					<description><![CDATA[Leader RM confided about the hard time that BTS and fans went through. As part of the Festa 2021 series of activities to celebrate their 8th debut anniversary, BTS uploaded a video ARMY Corner Store on personal Youtube, sharing happy &#8211; sad memories that the group has experienced throughout their career. When it comes to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Leader RM confided about the hard time that BTS and fans went through.</strong><br />
<span id="more-22953"></span> As part of the Festa 2021 series of activities to celebrate their 8th debut anniversary, BTS uploaded a video <em> ARMY Corner Store</em> on personal Youtube, sharing happy &#8211; sad memories that the group has experienced throughout their career.</p>
<p> When it comes to keywords <em> Two! Three!</em> (the name of a song by the group), the members suddenly remembered how special this song became to both them and their fans. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_15_329_39192167/886c138e1bccf292abdd.jpg" width="625" height="350"> <em> Video sharing BTS&#8217;s feelings about the past time.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_15_329_39192167/dd6a42884acaa394fadb.jpg" width="625" height="350"> <em> The members happily reminisced about the past.</em> Suga revealed that all the hardships they went through were with ARMY: <em> &#8220;We had a hard time but ARMY was also hurt a lot. We should have shielded all the oppression but ARMY has endured it with us. Through this song, I feel it has become a &#8216;secret code&#8217; for ARMY and us.&#8221;</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_15_329_39192167/74c4e526ed64043a5d75.jpg" width="625" height="350"> <em> Suga thanked fans for always accompanying the group.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_15_329_39192167/714ae2a8eaea03b45afb.jpg" width="625" height="350"> Leader RM shared about the group&#8217;s toughest years and how those moments made them who they are today. <em> &#8220;This is what I think. During the three years of 2015, 2016, 2017, it was difficult for us and the fans because there were so many haters. ARMY tried so hard to protect us and the group. tried harder than anyone else when it came to creating new products and doing other things. When I look back on those three years, they mean a lot to me.&#8221;</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_15_329_39192167/efd9793b71799827c168.jpg" width="625" height="350"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_15_329_39192167/6189f66bfe2917774e38.jpg" width="625" height="350"> Song <em> Two! Three! </em> in the album <em> Wings</em> , released in 2016. The song became a comfort to the members and fans. The members also always thank ARMY for always supporting and protecting BTS against everyone&#8217;s attacks.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">22953</post-id>	</item>
		<item>
		<title>The yellow code of Yuekang code in Foshan area turns into green code, and the nucleic acid test result will be released in 10 hours</title>
		<link>https://en.spress.net/the-yellow-code-of-yuekang-code-in-foshan-area-turns-into-green-code-and-the-nucleic-acid-test-result-will-be-released-in-10-hours/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 10 Jun 2021 03:44:08 +0000</pubDate>
				<category><![CDATA[World]]></category>
		<category><![CDATA[acid]]></category>
		<category><![CDATA[area]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Foshan]]></category>
		<category><![CDATA[green]]></category>
		<category><![CDATA[hours]]></category>
		<category><![CDATA[nucleic]]></category>
		<category><![CDATA[released]]></category>
		<category><![CDATA[result]]></category>
		<category><![CDATA[test]]></category>
		<category><![CDATA[turns]]></category>
		<category><![CDATA[Yellow]]></category>
		<category><![CDATA[Yuekang]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-yellow-code-of-yuekang-code-in-foshan-area-turns-into-green-code-and-the-nucleic-acid-test-result-will-be-released-in-10-hours/</guid>

					<description><![CDATA[The yellow code of Yuekang code in Foshan area changes to green code, and the nucleic acid test results are available in 10 hours. These are all you want to know. During this period of time, many people found that their Yuekang code had become a yellow code for no reason, and they consulted through [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The yellow code of Yuekang code in Foshan area changes to green code, and the nucleic acid test results are available in 10 hours. These are all you want to know. During this period of time, many people found that their Yuekang code had become a yellow code for no reason, and they consulted through private messages. In fact, if you have been active and staying in the area near the key places where confirmed cases or asymptomatic infections have stayed (this stay time is not clearly stated, some sources of information say it is 20 minutes, and some say it is 30 minutes), then you The Yuekang code may become a yellow code. Some people say that I have responded to the government&#8217;s call to go to the collection point for nucleic acid testing, but the test results have not been displayed. In fact, the government is now adopting a &#8220;mixed collection&#8221; model, that is, five-in-one or ten-in-one, that is, collecting swabs from 5 or 10 individuals in a collection test tube for testing. If you have any questions, find these 5 or 10 people. Due to the large number of people, the amount of uploaded data is too large, so the test results are displayed slowly. However, if there is a problem, people from the CDC will find you within 24 hours. If no one is looking for you after 24 hours, you can rest assured. In order to solve this yellow code problem, Foshan City designated 9 hospitals to set up green channels to detect nucleic acids for residents in need, and promised to issue nucleic acid test results within 10 hours. As long as the &#8220;two inspections in three days&#8221; are completed, that is, two nucleic acid tests have been done, and the results are all negative, the yellow code can be converted to the green code.These 9 hospitals are:[Chancheng]Foshan Maternal and Child Health Hospital, Foshan Second People&#8217;s Hospital, Foshan Fosun Chancheng Hospital (formerly Foshan Chancheng Central Hospital)[Nanhai]Nanhai District Fourth People&#8217;s Hospital, Nanfang The Seventh Affiliated Hospital of Medical University[Shunde]Southern Medical University Shunde Hospital, Jinan University Affiliated Shunde Hospital[Gaoming]Gaoming District People’s Hospital[Sanshan]Foshan Traditional Chinese Medicine Sanshui Hospital</strong></p>
<p><span id="more-22149"></span> <img fifu-featured="1" decoding="async" src="https://p5.itc.cn/images01/20210608/dcd33bfca0554fb4b9b514708b0c6864.jpeg" max-width="600"></p>
<p><img decoding="async" src="https://p4.itc.cn/images01/20210608/d68d4d11f4fc431b9f34017debe77d72.jpeg" max-width="600"></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">22149</post-id>	</item>
		<item>
		<title>BTS&#8217;s dress code for dance practice</title>
		<link>https://en.spress.net/btss-dress-code-for-dance-practice/</link>
		
		<dc:creator><![CDATA[Thiên An]]></dc:creator>
		<pubDate>Mon, 31 May 2021 20:13:06 +0000</pubDate>
				<category><![CDATA[Fashion]]></category>
		<category><![CDATA[BTS]]></category>
		<category><![CDATA[BTSs]]></category>
		<category><![CDATA[butter]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Dance]]></category>
		<category><![CDATA[Dress]]></category>
		<category><![CDATA[Fear Of God]]></category>
		<category><![CDATA[HANNA]]></category>
		<category><![CDATA[J HOPE]]></category>
		<category><![CDATA[JIMIN]]></category>
		<category><![CDATA[JIN]]></category>
		<category><![CDATA[JUNGKOOK]]></category>
		<category><![CDATA[JW Anderson]]></category>
		<category><![CDATA[MYDAILY]]></category>
		<category><![CDATA[OFF WHITE]]></category>
		<category><![CDATA[Practice]]></category>
		<category><![CDATA[Pull]]></category>
		<category><![CDATA[Rule]]></category>
		<category><![CDATA[Skin]]></category>
		<category><![CDATA[SUGA]]></category>
		<category><![CDATA[TNP]]></category>
		<category><![CDATA[Training session]]></category>
		<category><![CDATA[Vans Old Skool]]></category>
		<category><![CDATA[wash]]></category>
		<guid isPermaLink="false">https://en.spress.net/btss-dress-code-for-dance-practice/</guid>

					<description><![CDATA[During dance rehearsals, BTS members chose comfortable but outstanding outfits. According to Mydaily, before the release of MV Butter, BTS spent many days practicing choreography. To stay comfortable, the band chooses loose, comfortable clothing during rehearsals. However, even when wearing loose and seemingly simple clothes, BTS members still coordinate according to the rules. RM chose [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>During dance rehearsals, BTS members chose comfortable but outstanding outfits.</strong><br />
<span id="more-19615"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_26_119_38974257/2383a180b4c25d9c04d3.jpg" width="625" height="480"> </p>
<p> <em> According to Mydaily, before the release of MV Butter, BTS spent many days practicing choreography. To stay comfortable, the band chooses loose, comfortable clothing during rehearsals. However, even when wearing loose and seemingly simple clothes, BTS members still coordinate according to the rules. </em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_26_119_38974257/688ae189f4cb1d9544da.jpg" width="625" height="351"> <em> RM chose shorts with khaki material belonging to the high-end streetwear brand Fear of God. The pants cost $495. As a lover of simple-toned outfits, RM teamed shorts with a white t-shirt and Vans Old Skool shoes for about $90. </em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_26_119_38974257/3bfbb3f8a6ba4fe416ab.jpg" width="625" height="351"> <em> V is quite prominent when wearing JW Anderson&#8217;s bright shirt priced at 696 USD. The highlight of the outfit lies in Chanel brand shoes worth nearly 1,000 USD. In addition, the male singer wears a TNP beanie with a fairly affordable price &#8211; 17 USD. </em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_26_119_38974257/47edcceed9ac30f269bd.jpg" width="625" height="351"> <em> During the rehearsal, J-Hope wore a long sleeve knitted shirt from Cactus Plant Flea Market. This is a street fashion brand with a rather eccentric design style, which is commented to match J-Hope&#8217;s personality. The male singer&#8217;s shirt costs about 180 USD. J-Hope with red Needles track pants for $275 and Off-White checkered shoes for $559. </em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_26_119_38974257/d49f5e9c4bdea280fbcf.jpg" width="625" height="351"> <em> Jungkook wore Andersson Bell denim jeans, paired with a blue sweater, priced at $178 and $97, respectively. The highlight of the outfit lies in Versace&#8217;s black Trigeca sneakers priced at $775. </em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_26_119_38974257/b9602c633921d07f8930.jpg" width="625" height="351"> <em> Jimin is simple when matching Séfr&#8217;s sweater for $ 330. Like Jung Kook, the male singer also wore Andersson Bell&#8217;s denim wash, combined with a $75 Hanna necklace. </em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_26_119_38974257/9aee0eed1baff2f1abbe.jpg" width="625" height="351"> <em> Suga wears an oversized long-sleeved T-shirt from menswear brand Wooyoungmi. Originally, the shirt cost 330 USD but now it is only 238 USD. Suga&#8217;s outfit features Vans&#8217; New Varsity Era shoes. </em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_26_119_38974257/5cebcbe8deaa37f46ebb.jpg" width="625" height="351"> <em> Jin was commented by the audience as a student when he wore a white shirt and dark trousers. The highlight of the male singer&#8217;s overall outfit lies in Off-White&#8217;s Out of Office sneakers priced at $515. </em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19615</post-id>	</item>
		<item>
		<title>Audiobook with QR code in China</title>
		<link>https://en.spress.net/audiobook-with-qr-code-in-china/</link>
		
		<dc:creator><![CDATA[Quý Phái]]></dc:creator>
		<pubDate>Sun, 30 May 2021 22:16:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[audiobook]]></category>
		<category><![CDATA[Book]]></category>
		<category><![CDATA[Bookstore]]></category>
		<category><![CDATA[Bridge]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[EBooks]]></category>
		<category><![CDATA[Excerpts]]></category>
		<category><![CDATA[Huzhou]]></category>
		<category><![CDATA[I like]]></category>
		<category><![CDATA[In which]]></category>
		<category><![CDATA[Listen to books]]></category>
		<category><![CDATA[New method]]></category>
		<category><![CDATA[Publications]]></category>
		<category><![CDATA[QR code]]></category>
		<category><![CDATA[Readers]]></category>
		<category><![CDATA[scan]]></category>
		<category><![CDATA[Tablet pc]]></category>
		<category><![CDATA[To scan]]></category>
		<category><![CDATA[You read]]></category>
		<category><![CDATA[Zhejiang]]></category>
		<guid isPermaLink="false">https://en.spress.net/audiobook-with-qr-code-in-china/</guid>

					<description><![CDATA[A small bookstore located in an old house in Huzhou city (Zhejiang, China) allows readers to scan a QR code to listen to book introductions, as well as check for updates. Customers can scan the QR code on their phone or tablet to listen to any excerpt of the book, before deciding to buy. According [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>A small bookstore located in an old house in Huzhou city (Zhejiang, China) allows readers to scan a QR code to listen to book introductions, as well as check for updates.</strong><br />
<span id="more-19373"></span> Customers can scan the QR code on their phone or tablet to listen to any excerpt of the book, before deciding to buy.</p>
<p> According to the site&#8217;s analysis <em> Dosdoce</em> , putting this method into pilot at bookstores not only opens up a &#8220;trick&#8221; to attract readers, but also contributes to increasing book sales. After listening to an excerpt, if interested, readers can buy the book right there. Especially, for those who &#8220;love&#8221; audiobooks, this is the bridge that &#8220;pulls&#8221; them to experience with the latest audiobooks. That also increases the number of potential bookstore customers. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_119_38992129/e328336d252fcc71953e.jpg" width="625" height="376"> <em> With a phone or tablet, readers can scan QR codes to listen to books. Photo: Sznews.com </em> With this new method, the approach to books becomes more relevant to modern life. Customers who come here only need to select the publication they want to listen to. The headset will be made available after scanning the code. In case you want to listen to that publication the next time you come back, you just need to scan the QR code directly on your phone or tablet (the system will break the paragraph and display the QR code for you to save for your return). next). <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_119_38992129/59cf828a94c87d9624d9.jpg" width="625" height="402"> <em> Readers can listen to the audio version and browse the book at the same time. Photo: Sznews.com </em> Another advantage is that customers can listen to and browse through the actual bookstores, or online books, ebooks. This is a combination form (scan the code &#8211; listen to the book &#8211; buy the book) that pulls readers to the bookstore. This once again shows that the support of electronic devices is an effective bridge in attracting book lovers. Above all, using QR codes to listen to books helps promote new publications, promote reading culture during the epidemic season, in the context of China where the outbreak of Covid-19 with many peaks.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19373</post-id>	</item>
		<item>
		<title>Hoai Linh&#8217;s suspected bank statement case spreads online: The distributor has been found</title>
		<link>https://en.spress.net/hoai-linhs-suspected-bank-statement-case-spreads-online-the-distributor-has-been-found/</link>
		
		<dc:creator><![CDATA[Long Quyền]]></dc:creator>
		<pubDate>Fri, 28 May 2021 16:33:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[App MB]]></category>
		<category><![CDATA[Artist]]></category>
		<category><![CDATA[Bank]]></category>
		<category><![CDATA[Bank account]]></category>
		<category><![CDATA[case]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Comedian]]></category>
		<category><![CDATA[Digital OTP]]></category>
		<category><![CDATA[Discipline]]></category>
		<category><![CDATA[Distributor]]></category>
		<category><![CDATA[Dynamic Key]]></category>
		<category><![CDATA[EMB]]></category>
		<category><![CDATA[Hoai]]></category>
		<category><![CDATA[Hoai Linh]]></category>
		<category><![CDATA[investigative agency]]></category>
		<category><![CDATA[Linhs]]></category>
		<category><![CDATA[MB Bank]]></category>
		<category><![CDATA[MBB]]></category>
		<category><![CDATA[Military joint stock commercial bank]]></category>
		<category><![CDATA[Online]]></category>
		<category><![CDATA[Revealing]]></category>
		<category><![CDATA[Singapore Government]]></category>
		<category><![CDATA[Spread]]></category>
		<category><![CDATA[spreads]]></category>
		<category><![CDATA[statement]]></category>
		<category><![CDATA[Suspected]]></category>
		<guid isPermaLink="false">https://en.spress.net/hoai-linhs-suspected-bank-statement-case-spreads-online-the-distributor-has-been-found/</guid>

					<description><![CDATA[Military Commercial Joint Stock Bank (MB – code: MBB) has just announced an incident related to the suspected bank statement of comedian Hoai Linh spreading on social networks, believed to be by &#8217;employees of the bank. posted goods&#8217;. According to a notice issued by Military Commercial Joint Stock Bank (MB &#8211; code: MBB), in the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Military Commercial Joint Stock Bank (MB – code: MBB) has just announced an incident related to the suspected bank statement of comedian Hoai Linh spreading on social networks, believed to be by &#8217;employees of the bank. posted goods&#8217;.</strong><br />
<span id="more-18827"></span> According to a notice issued by Military Commercial Joint Stock Bank (MB &#8211; code: MBB), in the past few days, public opinion continues to be interested in information reflecting the incident of artist Hoai Linh in charity work and Account statements posted on social media are said to have been posted by “Bank employees”.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_329_38989787/54cd15410003e95db012.jpg" width="625" height="831"> <em> The suspected bank statement of comedian Hoai Linh was released.</em> Immediately after receiving the feedback, MB checked and verified the above incident, discovered that an individual working at the bank had leaked customer information, this individual had seriously violated regulations. of the bank. “In the spirit of respecting the law, the Bank is committed to taking strict measures to ensure absolute compliance with the provisions of the law on protecting customer information. The Bank will take appropriate disciplinary measures for individuals who disclose/leave information, do not comply with professional ethics regulations, do not comply with the Laws and regulations of the bank,&#8221; the notice stated. Before the above incident, the bank suspended the work of the violating individual and will organize disciplinary action with the highest form, at the same time, the bank has transferred the file to the investigation agency for handling. In addition, the bank confirmed that the above information disclosure was not caused by a breakdown in the bank&#8217;s information technology system or a hacker attack. The bank&#8217;s IT system is built on the most advanced technology and security platforms in the world today, the bank&#8217;s online transaction rate reaches 90% with 100 million safe transactions. According to the bank, for the APP MB product, the bank has brought financial experiences beyond expectations to customers. Transaction information is protected by 3 layers of fences including: The first is the eMB application protection system with the feature of refusing to install with unsafe devices; Anti-decompile code and locking protect sensitive data. The second layer of encryption protects when the application transmits information to the service server at the bank, ensuring data integrity and inviolability; The final barrier of protection is built on each feature provided by Ebank (when applying Smart eKYC technology to identify customers, additional AI is used for face and voice authentication; using Generation Digital OTP. 3.0 with the addition of Dynamic Key security technology being used by the Singapore government&#8230;). According to MB, in order not to let similar incidents happen again, and to keep customers&#8217; information and transaction data secure, the bank has also reviewed the working processes, strictly decentralized and stricter work discipline.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18827</post-id>	</item>
		<item>
		<title>Instructions on how to install VssID application for students</title>
		<link>https://en.spress.net/instructions-on-how-to-install-vssid-application-for-students/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Wed, 26 May 2021 10:40:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Card]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Deal]]></category>
		<category><![CDATA[Declaration]]></category>
		<category><![CDATA[Electronic]]></category>
		<category><![CDATA[Guardians]]></category>
		<category><![CDATA[Health Insurance]]></category>
		<category><![CDATA[ID CCCD]]></category>
		<category><![CDATA[Install]]></category>
		<category><![CDATA[instructions]]></category>
		<category><![CDATA[Log in]]></category>
		<category><![CDATA[Official Dispatch 702 BHXH CNTT]]></category>
		<category><![CDATA[PDF]]></category>
		<category><![CDATA[Search]]></category>
		<category><![CDATA[setting]]></category>
		<category><![CDATA[Social insurance]]></category>
		<category><![CDATA[students]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Vietnam Social Insurance]]></category>
		<category><![CDATA[VSSID]]></category>
		<guid isPermaLink="false">https://en.spress.net/instructions-on-how-to-install-vssid-application-for-students/</guid>

					<description><![CDATA[Currently, many schools across the country are implementing VssID &#8211; digital social insurance account registration. To install VssID application, many students and parents will install this application to monitor and use electronic services related to health insurance. To install the VssID application, on March 23, the Vietnam Social Security Administration issued Official Letter 702/BHXH-CNTT guiding [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Currently, many schools across the country are implementing VssID &#8211; digital social insurance account registration. To install VssID application, many students and parents will install this application to monitor and use electronic services related to health insurance.</p>
<p> To install the VssID application, on March 23, the Vietnam Social Security Administration issued Official Letter 702/BHXH-CNTT guiding the registration of electronic transactions with the social insurance agency for individuals under 18 years old who do not have an ID card/CCCD. According to the guiding document, the installation of VssID application will be done in the following steps. <strong> Step 1:</strong> Visit the Public Service Portal of Vietnam Social Insurance at: <em> https://dichvucong.baohiemxahoi.gov.vn.</em> <strong> Step 2:</strong> On the home screen, select “Login” to display the public service portal login screen. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_24_114_38950925/8b6bc17ed53c3c62652d.jpg" width="625" height="290"> <em> Home screen</em> <strong> Step 3:</strong> Select “Personal” and log in information. On the login screen, select “Personal”, enter “Username” (the username is the social insurance number of the registered parent or guardian), “Password” and “Check code” after Then select “Login”. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_24_114_38950925/27b473a167e38ebdd7f2.jpg" width="625" height="495"> <em> On the login screen, select &#8220;Personal&#8221;</em> <strong> Step 4: </strong> After successfully logging in, go to the account information section, select the function: &#8220;Register for children&#8221; to perform. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_24_114_38950925/e8c0bed5aa9743c91a86.jpg" width="625" height="270"> <em> Screen after successful login</em> <strong> Step 5</strong> : Declare information for individuals under 18 years old. The child&#8217;s social insurance number is the last 10 digits of the child&#8217;s health insurance card number. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_24_114_38950925/ac21fc34e87601285867.jpg" width="625" height="291"> <em> Child registration selection screen</em> <strong> Step 6</strong> : Select “Select” to display the list of social insurance agencies and select the receiving social insurance agency. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_24_114_38950925/1fc94ddc599eb0c0e98f.jpg" width="625" height="287"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_24_114_38950925/a091fc84e8c6019858d7.jpg" width="625" height="309"> <em> Select the social insurance agency to receive the registration application</em> <strong> Step 7</strong> : Select &#8220;Recognize&#8221; so that the system automatically outputs a pdf file according to the declaration form and sends the information to the receiving Social Insurance Agency. After the system receives the registration declaration, it will automatically send a notification message to the individual&#8217;s phone number. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_24_114_38950925/a8f7f6e2e2a00bfe52b1.jpg" width="625" height="403"> <em> Screen to open registration form file file</em> <strong> Step 8:</strong> Go to the nearest social insurance agency to complete the registration of electronic transactions with the social insurance agency. <strong> Note: </strong> Parents bring the child&#8217;s birth certificate, ID card/CCCD/passport to the nearest social insurance agency or the Vietnam Social Insurance Customer Care and Support Service Center to complete the registration process. Look up the address of the nearest Social Insurance agency at https://baohiemxahoi.gov.vn/tracuu/Pages/tra-cuu-co-quan-bao-hiem.aspx or look it up on the VssID app. Parents are not required to print the declaration form when coming to the social insurance agency to complete the procedure, instead just provide the case number or the social insurance number in the message sent by the Vietnam social insurance agency after submitting the application. successful registration. People go to any social insurance agency to complete the registration procedure. To assist parents in creating a VssID account for their child, parents can send the registration form to the school for the school to assist in completing the registration of electronic transactions with the social insurance agency.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18325</post-id>	</item>
		<item>
		<title>Russia equips armor-piercing pistols</title>
		<link>https://en.spress.net/russia-equips-armor-piercing-pistols/</link>
		
		<dc:creator><![CDATA[Thùy Dung]]></dc:creator>
		<pubDate>Wed, 26 May 2021 00:27:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Ammo type]]></category>
		<category><![CDATA[Amount]]></category>
		<category><![CDATA[armorpiercing]]></category>
		<category><![CDATA[Army]]></category>
		<category><![CDATA[Characteristics]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Dedicated]]></category>
		<category><![CDATA[Equipment]]></category>
		<category><![CDATA[equips]]></category>
		<category><![CDATA[Feature]]></category>
		<category><![CDATA[Firepower]]></category>
		<category><![CDATA[Force]]></category>
		<category><![CDATA[Guns]]></category>
		<category><![CDATA[IZVESTIA]]></category>
		<category><![CDATA[Ministry of Defense of Russia]]></category>
		<category><![CDATA[Pistols]]></category>
		<category><![CDATA[Popular]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Special force]]></category>
		<category><![CDATA[TSNIITOCHMASH]]></category>
		<category><![CDATA[version]]></category>
		<category><![CDATA[Weapons]]></category>
		<category><![CDATA[Xuyen]]></category>
		<guid isPermaLink="false">https://en.spress.net/russia-equips-armor-piercing-pistols/</guid>

					<description><![CDATA[The Ministry of Defense has just decided to spend $ 5.2 million to buy a large number of new generation pistols Udav. The statement of the Russian Army said that, when received, these Udav guns will be prioritized to equip special forces, units on duty on the border or hot spots prone to conflict. According [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The Ministry of Defense has just decided to spend $ 5.2 million to buy a large number of new generation pistols Udav.</strong><br />
<span id="more-18235"></span> The statement of the Russian Army said that, when received, these Udav guns will be prioritized to equip special forces, units on duty on the border or hot spots prone to conflict.</p>
<p> According to Izvestia, the Udav pistol purchased by the Russian Ministry of Defense includes two main versions: a mass-use version for the army with code 6P72 and a specialized version with code 6P72-1. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_24_132_38949987/4db626b532f7dba982e6.jpg" width="625" height="351"> <em> Udav gun. </em> Talking about the need for a new gun model, Albert Bakov, general director of the Central Research Institute of Precision Mechanics of Russia (TsNIITOCHMASH, part of the state-owned high-tech corporation Rostec) said that Udav first and foremost needs it. Essential for mobile forces, the users of the Makarov pistol (K-59) were no longer suitable both in terms of firepower and ammunition reserves to carry. &#8220;When bad actors have access to a weapon, even if it&#8217;s illegal, so there are situations like when a law enforcement officer encounters an 18-round gun object. while this employee only has 8 bullets,&#8221; said general manager TsNIITOCHMASH. In order to increase the power of each shot of the Udav, the company has now successfully developed the most powerful ammunition model in the world for the 9x19mm pistol &#8211; the caliber of the Udav. This ammunition has the ability to penetrate level 2 bulletproof armor and at a greater range than other similar ammunition. Reliability, ease of use, and power are the main advantages of Russian pistols, and the new 9x19mm pistol also converges these characteristics, but at a higher range, according to a review from the US site National Interest. The American newspaper said that, along with the new 9x19mm gun, most experts have recognized the Udav pistol of TsNIIITOCHMASH as an invention with a number of technical improvements applied in this project. The first improvement, the design features of the barrel ensures that the &#8220;closed shutter&#8221; cannot move backwards on its own, the trigger rod cannot be moved, and the trigger is locked. The second improvement, the frame of the gun is made in the form of a special stamping die. The result is an increased product life. Next, the fact proved the high accuracy of the gun. The next revolutionary of the gun is the opening of the safety pin that ensures complete safety when handling the weapon. Even if the loaded pistol is directly hit with the trigger, no &#8220;trigger snatching&#8221; will occur. In particular, the gun is very convenient in close combat, ensuring maneuverability and fast reloading. The gun can be held securely with wet hands, when wearing gloves and allows comfortable shooting with either right or left hand. The Udav gun reloads very quickly: as soon as the cartridge is empty, the barrel lock is retained and the empty magazine is ejected with the push of a button on the handle. As soon as the new magazine is inserted, the first bullet will automatically reload and can be fired immediately. In addition, special patents are granted for silencers with replaceable heat-absorbing modules (special forces version), for cartridges and ammunition. The Udav pistol is capable of using all 9x21mm ammunition.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18235</post-id>	</item>
		<item>
		<title>The $32 million scam cryptocurrency project provokes investors</title>
		<link>https://en.spress.net/the-32-million-scam-cryptocurrency-project-provokes-investors/</link>
		
		<dc:creator><![CDATA[Thùy Trang]]></dc:creator>
		<pubDate>Tue, 25 May 2021 05:29:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Binance Smart Chain]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[D100]]></category>
		<category><![CDATA[Decentralized]]></category>
		<category><![CDATA[DeFi]]></category>
		<category><![CDATA[emulator]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[escape]]></category>
		<category><![CDATA[Financial market]]></category>
		<category><![CDATA[investors]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[Money scam]]></category>
		<category><![CDATA[Pool]]></category>
		<category><![CDATA[Project]]></category>
		<category><![CDATA[Provocative]]></category>
		<category><![CDATA[provokes]]></category>
		<category><![CDATA[Public sale]]></category>
		<category><![CDATA[Pull]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[sign]]></category>
		<category><![CDATA[Tom]]></category>
		<category><![CDATA[trick]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-32-million-scam-cryptocurrency-project-provokes-investors/</guid>

					<description><![CDATA[After fleeing, the leaders of this project also left provocative messages for those who were scammed. The DeFi100 cryptocurrency project, which went public this past February, appears to have turned into a $32 million scam. On the evening of May 22, many visitors to the DeFi100 website received a message that they had been scammed. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>After fleeing, the leaders of this project also left provocative messages for those who were scammed.</strong><br />
<span id="more-18043"></span> The DeFi100 cryptocurrency project, which went public this past February, appears to have turned into a $32 million scam. On the evening of May 22, many visitors to the DeFi100 website received a message that they had been scammed.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_23_119_38941870/8e2ab34da70f4e51171e.jpg" width="625" height="378"> <em> Scam notice on DeFi100 website. Screenshots. </em> &#8220;We fooled everyone and nobody could do anything about it,&#8221; said the statement, signed by Devsin, who is said to be the head of the DeFi100 project. According to the above information <em> Coinmarketcap</em> , DeFi100 is a project to create a simulated value fund, that is, the value of D100 issued will depend on the total value of the decentralized financial market (DeFi). The team that developed this project took the name Wrapp3D, but all members hid their true identities. This project&#8217;s D100 coin has been released on the Binance Smart Chain network since February. After that, some users warned about the dangers of DeFi100. On Twitter, user Tom suggested that DeFi100 was originally intended to issue a token with a price-adjusted supply (rebase token). However, when this plan failed, they planned to switch to the liquidity pool model. &#8220;This whole project is a scam. Devsin manipulates and deceives investors,&#8221; user Tom asserts. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_23_119_38941870/87078c609822717c2833.jpg" width="625" height="375"> <em> The price of D100 coin has been decreasing steadily over the past week, and dropped sharply after the scam information. Screenshots.</em> According to the account Mr. Whale on Twitter, who claims to be a crypto analyst, total scams from the DeFi100 project amounted to $32 million. &#8220;When the market is no longer going up, many projects will disappear. Don&#8217;t be surprised that many scam projects will be reported in the next few months. Never invest in projects that are too new, with development teams. anonymous development, created as a joke and has no real purpose&#8221;, account Mr. Whale warned. According to the <em> CoinDesk</em> , does not rule out the possibility that DeFi100&#8217;s website was hacked to post the aforementioned notice. By the morning of May 23, the notice on the DeFi100 website had been removed. The value of the D100 coin has fallen nearly three times in the past week, from $0.2 to $0.077. DeFi100&#8217;s Twitter account has had no new announcements since March. In the crypto world, a developer scam is also known as a &#8220;rug pull&#8221;. This is a fairly common form of fraud, especially with decentralized finance (DeFi) projects, when all transactions are conducted by code, not by an organization.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18043</post-id>	</item>
		<item>
		<title>Apple hid the fact that 128 million iPhone users were exposed to malicious code</title>
		<link>https://en.spress.net/apple-hid-the-fact-that-128-million-iphone-users-were-exposed-to-malicious-code/</link>
		
		<dc:creator><![CDATA[CTV Kiến An/VOV.VN (biên dịch) Theo 9to5Mac]]></dc:creator>
		<pubDate>Fri, 21 May 2021 02:18:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[App store]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Copy]]></category>
		<category><![CDATA[Dale Bagwell]]></category>
		<category><![CDATA[Developers]]></category>
		<category><![CDATA[Download data online]]></category>
		<category><![CDATA[EPIC]]></category>
		<category><![CDATA[Epic Games]]></category>
		<category><![CDATA[exposed]]></category>
		<category><![CDATA[fact]]></category>
		<category><![CDATA[hid]]></category>
		<category><![CDATA[Hide]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[Ipad]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[Localization]]></category>
		<category><![CDATA[Mac App Store]]></category>
		<category><![CDATA[malicious]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[Matt Fischer]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[Opposite]]></category>
		<category><![CDATA[Toxic]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Web]]></category>
		<guid isPermaLink="false">https://en.spress.net/apple-hid-the-fact-that-128-million-iphone-users-were-exposed-to-malicious-code/</guid>

					<description><![CDATA[A modified copy of Xcode appeared on the web in 2015 responsible for injecting malware into some iPhone and iPad apps, which were then uploaded to the App Store. Thanks to the lawsuit between Epic Games and Apple, internal Apple email content has revealed that more than 128 million iOS users have been affected by [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>A modified copy of Xcode appeared on the web in 2015 responsible for injecting malware into some iPhone and iPad apps, which were then uploaded to the App Store.</strong><br />
<span id="more-16757"></span> Thanks to the lawsuit between Epic Games and Apple, internal Apple email content has revealed that more than 128 million iOS users have been affected by malware called XcodeGhost.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_65_29141883/4f331b6d062fef71b63e.jpg" width="625" height="416"> This information was confirmed by the iTunes Customer Experience Manager at the time, Dale Bagwell, on Motherboard in an email that 128 million consumers downloaded more than 2,500 apps infected with malware that came from fake copies. Xcode&#8217;s appearance. In total, these 2,500 infected apps were downloaded more than 203 million times in the App Store. Another Apple recruiter mentioned that “China represents 55% of customers and 66% of downloads”, also referring to the malware “XcodeGhost”. According to multiple internal Apple emails, about 18 million affected users are based in the US. Notably, Apple has had many internal discussions about how to send warnings to affected developers and users because the number of customers potentially exposed to malicious code is quite high. Even so, App Store VP Matt Fischer notes that this will pose some challenges in terms of localization of the email&#8217;s language, since downloading these apps takes place in the App Store. all over the world. As a result, Apple failed to send warnings to users and developers. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_65_29141883/7dc22f9c32dedb8082cf.jpg" width="625" height="417"> Even popular apps like WeChat and Angry Birds 2, designed for the Chinese market, are on the affected list, the report said. As soon as the malware was identified, Apple asked developers to immediately recompile their apps with a genuine version of Xcode. Lookout explains that &#8220;developers are drawn to downloading this fake version of Xcode because it will download much faster in China than the official version of Xcode from Apple&#8217;s Mac App Store.&#8221; Following this incident, Apple increased the security of Xcode installation and malware scanning when submitting apps to the App Store. In testimony from one of the heads of the App Store at the trial of the lawsuit between Epic and Apple, this person said the iOS app review process is part of Apple&#8217;s charge for the App Store.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16757</post-id>	</item>
		<item>
		<title>More than 31.6 million installs of Bluezone, recommend to checkin QR Code</title>
		<link>https://en.spress.net/more-than-31-6-million-installs-of-bluezone-recommend-to-checkin-qr-code/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 20 May 2021 18:17:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Bkav]]></category>
		<category><![CDATA[BLUEZONE]]></category>
		<category><![CDATA[checkin]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[Declare]]></category>
		<category><![CDATA[F1]]></category>
		<category><![CDATA[Install]]></category>
		<category><![CDATA[installs]]></category>
		<category><![CDATA[medical]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[Obligatory]]></category>
		<category><![CDATA[Offer]]></category>
		<category><![CDATA[operate]]></category>
		<category><![CDATA[Outbreak]]></category>
		<category><![CDATA[Public]]></category>
		<category><![CDATA[QR code]]></category>
		<category><![CDATA[Ratio]]></category>
		<category><![CDATA[recommend]]></category>
		<category><![CDATA[setting]]></category>
		<category><![CDATA[To scan]]></category>
		<category><![CDATA[Tracing]]></category>
		<category><![CDATA[Translate]]></category>
		<guid isPermaLink="false">https://en.spress.net/more-than-31-6-million-installs-of-bluezone-recommend-to-checkin-qr-code/</guid>

					<description><![CDATA[Currently, there have been 31.6 million installs of Bluezone, the application operator also recommends that checking in QR Code in public places is mandatory during the outbreak. According to the operator (Bkav) of Bluezone application (close contact detection application), as of May 10, there have been more than 31.6 million Bluezone applications. Besides, Bluezone also [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Currently, there have been 31.6 million installs of Bluezone, the application operator also recommends that checking in QR Code in public places is mandatory during the outbreak.</strong><br />
<span id="more-16655"></span> According to the operator (Bkav) of Bluezone application (close contact detection application), as of May 10, there have been more than 31.6 million Bluezone applications.</p>
<p> Besides, Bluezone also added many useful features related to epidemic prevention and health such as: QR code scanning, medical declaration, domestic movement declaration&#8230; In addition, Bluezone also regularly updates information. about the epidemic and the notes for everyone to monitor and prevent Facing the complicated epidemic situation, Bkav has set a goal of all people installing and using Bluezone. According to Bkav, the effectiveness of Bluezone is proportional to the number of people who install and use it. The more Bluezone enters the epidemic, the more effective it is, in the epidemic center more effective than in other areas, due to the increased awareness of installation and use of people in the epidemic area. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_114_38792908/354f627b7f399667cf28.jpg" width="625" height="468"> <em> User successfully installs Bluezone application on smartphone. Photo: HOANG GIANG</em> Bluezone application is promoted to propagate and deploy during the second outbreak of COVID-19 in Vietnam from July 25, 2020. In Hai Duong, with a 27% installation rate since August 16, 1,035 F1 and F2 have been identified. The second outbreak in Hai Duong broke out from January 27, 2021, on February 24, with the installation rate reaching 43%, the system traced 1993 cases of F1, F2. Of which, 17 positive cases were traced outside the traditional epidemiological investigation list. In addition, Bkav also recommends that checking in QR Code in public places is mandatory during an outbreak. The public check-in method helps to quickly track down outbreaks such as restaurants and markets. Regularly checking in QR Code on Bluezone also helps the application operate in priority mode to increase the efficiency of contact recording.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16655</post-id>	</item>
		<item>
		<title>US &#8216;red alert&#8217; after malicious code attack on fuel system</title>
		<link>https://en.spress.net/us-red-alert-after-malicious-code-attack-on-fuel-system/</link>
		
		<dc:creator><![CDATA[Ngọc Hà (TTXVN)]]></dc:creator>
		<pubDate>Thu, 20 May 2021 12:44:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Alert]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Colonial Pipeline Company]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Joe Biden]]></category>
		<category><![CDATA[malicious]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Malware Mã]]></category>
		<category><![CDATA[Net]]></category>
		<category><![CDATA[Operating]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[red]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[System]]></category>
		<guid isPermaLink="false">https://en.spress.net/us-red-alert-after-malicious-code-attack-on-fuel-system/</guid>

					<description><![CDATA[America&#8217;s largest fuel pipeline system, operated by Colonial Pipeline, was forced to shut down its entire network after a cyber attack. Colonial Pipeline had to shut down the entire network after a cyber attack. Photo: wsj.com The administration of President Joe Biden said it was making every effort to restore the company&#8217;s operations and avoid [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>America&#8217;s largest fuel pipeline system, operated by Colonial Pipeline, was forced to shut down its entire network after a cyber attack.</strong><br />
<span id="more-16577"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_294_38793245/cd9b8e6093227a7c2333.jpg" width="625" height="416"> </p>
<p> <em> Colonial Pipeline had to shut down the entire network after a cyber attack. Photo: wsj.com</em> The administration of President Joe Biden said it was making every effort to restore the company&#8217;s operations and avoid disruption to supply. Experts say gas prices will not be affected if the company resumes normal operations in the next few days. However, this cyberattack, rated as the worst ever for the US infrastructure system, should be a warning bell for other companies about the risk they will become the next target of similar attacks. According to Colonial Pipeline, the company&#8217;s pipeline carries gasoline and other fuels from Texas to the Northeast, providing nearly 45 percent of the fuel for the East Coast of the United States. Although Colonial Pipeline has not revealed who is responsible for the cyber attack, an unnamed person on the team investigating the incident confirmed that the culprit was a hacker group nicknamed Darkside. This group has been spreading ransomware since August 2020 and is classified as one of the most attackable groups. Over the past 3 years, Darkside has become more and more professional and has caused Western countries tens of billions of dollars in losses. Ransomware attacks are malicious code designed to lock down computer systems using encrypted data and demand a ransom to restore access. US Commerce Secretary Gina Raimondo on May 9 warned US businesses to be wary of ransomware attacks. The female minister affirmed that she would work closely with the Department of Homeland Security to handle the issue, considering this a top priority of the government. Reuters news agency, citing a notice from the White House, said the administration was working to help Colonial Pipeline company resume operations to avoid supply disruptions. According to sources, before activating ransomware, hackers often steal data, which is used to blackmail businesses or distort the truth. Sometimes stolen data is more valuable to hackers than the benefit they get by disrupting business operations. Security experts say the attack is a warning to operators and managers of essential infrastructure in the US such as electricity, water, energy and transportation facilities that have long been built. do not update the method to ensure security against the risk of being attacked. Mr. David Kennedy, a senior security consultant and founder of the security consulting firm TrustedSec, admitted that ransomware attacks have spiraled out of control in the US and are currently under development. is one of the greatest threats facing the United States. However, most American companies lack the ability to prepare for such threats.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16577</post-id>	</item>
		<item>
		<title>Scanning the QR code on the CCCD card, what information do citizens get?</title>
		<link>https://en.spress.net/scanning-the-qr-code-on-the-cccd-card-what-information-do-citizens-get/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Tue, 18 May 2021 06:39:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Address]]></category>
		<category><![CDATA[Barcode]]></category>
		<category><![CDATA[Card]]></category>
		<category><![CDATA[CCCD]]></category>
		<category><![CDATA[Chip mount]]></category>
		<category><![CDATA[Circular 06 2021 TT BCA]]></category>
		<category><![CDATA[Citizen]]></category>
		<category><![CDATA[citizens]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[ID]]></category>
		<category><![CDATA[ID card]]></category>
		<category><![CDATA[ID CCCD]]></category>
		<category><![CDATA[Identity card]]></category>
		<category><![CDATA[If]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[Old]]></category>
		<category><![CDATA[QR code]]></category>
		<category><![CDATA[Resident]]></category>
		<category><![CDATA[Right corner]]></category>
		<category><![CDATA[Scanning]]></category>
		<category><![CDATA[sex]]></category>
		<category><![CDATA[System software]]></category>
		<category><![CDATA[To scan]]></category>
		<guid isPermaLink="false">https://en.spress.net/scanning-the-qr-code-on-the-cccd-card-what-information-do-citizens-get/</guid>

					<description><![CDATA[Information on the QR code includes the CCCD number (12 digits); old 9-digit ID card number (if any); First and last name; Date of birth; Sex; Permanent address; Date of issue. Currently, the Ministry of Public Security and the Public Security of the country are still actively receiving applications for issuance of Citizen Identification Cards [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Information on the QR code includes the CCCD number (12 digits); old 9-digit ID card number (if any); First and last name; Date of birth; Sex; Permanent address; Date of issue.</strong><br />
<span id="more-15767"></span> Currently, the Ministry of Public Security and the Public Security of the country are still actively receiving applications for issuance of Citizen Identification Cards (CCCD) with chips to reach the goal of completing 50 million CCCD cards to citizens before July 1.</p>
<p> Since the implementation of the chip-based CCCD card, many citizens have received the card with the form and design, the features are said to be more beautiful and modern, and more convenient than before the ID card/CCCD card. that barcode. Notably, when citizens scan the QR code on the CCCD chip, a series of information will appear. Many readers wonder how to scan the QR code on the CCCD card? What is the meaning of the information obtained after scanning?&#8230; <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_114_38811358/2395dfd9c19b28c5718a.jpg" width="625" height="468"> <em> People can use the camera in their smartphone to scan the QR code. Photo: DANG LE</em> To be able to scan the QR code on the CCCD card, people just need to have a smartphone and use the QR Code feature (with a QR code icon) in the Zalo application, or use the camera on their phone to Point the camera at the QR code area on the CCCD card to be able to extract this data. According to the provisions of Circular 06/2021/TT-BCA regulating the CCCD card model, the QR code is printed on the front, top right corner of the CCCD card. After scanning the QR code, citizens will know the following information: CCCD number (12 digits); previous ID card number 9 (if any); First and last name; Date of birth; Sex; Permanent address; Date of issue. Thus, the old 9-digit ID card number has also been integrated in the QR code, so people when going to handle administrative procedures will not need to present a confirmation of the old ID number for comparison. However, now when citizens transfer from 9-digit ID card to CCCD, they are issued with a certificate confirming the old ID card number. According to Circular 40/2019 of the Ministry of Public Security, when citizens carry out the procedures for granting, changing or re-granting CCCD cards, the citizen identification management agency where the application is received is responsible for issuing a Certificate of ID number to all cases of transferring from 9-digit ID card to CCCD card. In addition, in the process of handling administrative procedures and civil transactions, agencies, organizations and units can also use the QR code scanning function to check personal information and old ID card numbers of customers. people as a basis for settlement. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_114_38811358/94ef62a37ce195bfccf0.jpg" width="625" height="907"> <em> The last sequence of numbers in the QR code scanning information of this CCCD card shows that this person is male, born on December 11, 1995, and the date of issue is February 27, 2021. Photo: DANG LE</em> However, in a few practical cases today, after scanning the QR code on the CCCD card of some citizens, there is no information about the old 9-digit ID card number. In this regard, citizens should not worry because according to the Ministry of Public Security, the reason is that citizens do not declare information about their 9-digit ID number in the residential information collection form, so there is no population database in the population database. this information. The solution for this is that for cases where there is lack of information about the 9-digit ID number in the national population database and CCCD application, the local police will conduct search, verification, and supplementation. supplement and update information. For cases where citizens change from 12-digit ID card to CCCD card, cases of changing or re-issuing CCCD card where citizens have previously declared information about 9-digit ID number, in the citizen identification data there is information. In this case, the National Population Data Center will adjust the system software to automatically update and supplement information.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15767</post-id>	</item>
		<item>
		<title>What is Tay Ninh&#8217;s landline code?</title>
		<link>https://en.spress.net/what-is-tay-ninhs-landline-code/</link>
		
		<dc:creator><![CDATA[H.A.H]]></dc:creator>
		<pubDate>Mon, 17 May 2021 10:58:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Area code]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Convert]]></category>
		<category><![CDATA[Homogeneous]]></category>
		<category><![CDATA[Information network]]></category>
		<category><![CDATA[Install]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[landline]]></category>
		<category><![CDATA[Landline phone]]></category>
		<category><![CDATA[Mobile phone number]]></category>
		<category><![CDATA[Ninhs]]></category>
		<category><![CDATA[Number head]]></category>
		<category><![CDATA[Permanent]]></category>
		<category><![CDATA[phone]]></category>
		<category><![CDATA[phone number]]></category>
		<category><![CDATA[Phonebook]]></category>
		<category><![CDATA[Press]]></category>
		<category><![CDATA[Prolonged]]></category>
		<category><![CDATA[subscribers]]></category>
		<category><![CDATA[Tay]]></category>
		<category><![CDATA[Tay Ninh]]></category>
		<category><![CDATA[Telecommunication]]></category>
		<category><![CDATA[Universes]]></category>
		<category><![CDATA[XXXX]]></category>
		<guid isPermaLink="false">https://en.spress.net/what-is-tay-ninhs-landline-code/</guid>

					<description><![CDATA[The landline area code has been transferred to the end of 02x, extending the number of subscribers to 10 numbers. So what is the current Tay Ninh phone area code? After the planning of telecommunications number warehouses, the conversion of landline telephone area codes across the country has been completed. Specifically, the landline telephone area [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The landline area code has been transferred to the end of 02x, extending the number of subscribers to 10 numbers. So what is the current Tay Ninh phone area code?</strong><br />
<span id="more-15428"></span> After the planning of telecommunications number warehouses, the conversion of landline telephone area codes across the country has been completed. Specifically, the landline telephone area codes are transferred to the end of 02x. What is the phone area code for Tay Ninh?</p>
<p> Basically, landline numbers are now extended to 10 numbers, equivalent to mobile phone numbers, creating uniformity. In addition to the area code, the customer&#8217;s fixed subscriber number does not change. Digital warehouse planning opens up conditions for the development of mobile communication networks and the Internet of Things. Of course, not everyone remembers the new landline code system of the provinces and cities. <strong> What is the phone area code for Tay Ninh?</strong> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_107_38862520/c4dbd3c3cb8122df7b90.jpg" width="625" height="421"> The landline area code has been transferred to the end of 02x, extending the number of subscribers to 10 numbers. As mentioned, the landline area code is transferred to the end of the 02x number. Previously, the landline code in Tay Ninh was 066, now using the area code 0276. Tay Ninh landline phone number has the form 0276xxx.xxxx, in which the last 7 digits are the customer&#8217;s unchanged fixed-line subscriber. To simultaneously convert these numbers in the smartphone directory, users can install supporting applications from the Android and iOS platform stores. Of course, if you call a landline in the same province, the user does not need to enter the area code.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15428</post-id>	</item>
		<item>
		<title>IOS users should immediately turn off AirDrop</title>
		<link>https://en.spress.net/ios-users-should-immediately-turn-off-airdrop/</link>
		
		<dc:creator><![CDATA[Nguyễn Hiếu]]></dc:creator>
		<pubDate>Thu, 06 May 2021 07:45:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Accuracy]]></category>
		<category><![CDATA[AirDrop]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Device]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Hashing]]></category>
		<category><![CDATA[Ignored]]></category>
		<category><![CDATA[immediately]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[MACOS]]></category>
		<category><![CDATA[MASHABLE]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[phone number]]></category>
		<category><![CDATA[Phonebook]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[Technical University of Darmstadt]]></category>
		<category><![CDATA[The attacker]]></category>
		<category><![CDATA[turn]]></category>
		<category><![CDATA[USB C]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<guid isPermaLink="false">https://en.spress.net/ios-users-should-immediately-turn-off-airdrop/</guid>

					<description><![CDATA[User&#8217;s phone number and email may be exposed because of security flaws in AirDrop. You should only turn it on when you need to transfer files and off by default to wait for the patch. According to the Mashable The Mobile Network Security Laboratory (SEEMOO) and the Crypto and Privacy Engineering Group (ENCRYPTO), at the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>User&#8217;s phone number and email may be exposed because of security flaws in AirDrop. You should only turn it on when you need to transfer files and off by default to wait for the patch.</strong><br />
<span id="more-11904"></span> According to the <em> Mashable</em> The Mobile Network Security Laboratory (SEEMOO) and the Crypto and Privacy Engineering Group (ENCRYPTO), at the Technical University of Darmstadt, have warned Apple about this dangerous vulnerability since May. 2019 but the company still ignored it. About 1.5 billion devices are still unpatched.</p>
<p> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_119_38622802/6f599621b063593d0072.jpg" width="625" height="351"> <em> Hackers can obtain sensitive user&#8217;s information through the vulnerability in AirDrop. Photo: TU Darmstadt. </em> &#8220;An attacker could obtain a user&#8217;s phone number and email through AirDrop,&#8221; the team said. &#8220;They just need to use a device with Wi-Fi capable, reach the target at close range to start the mining process by opening the sharing feature on iOS or macOS device.&#8221; According to the <em> 9to5mac</em> There are two steps in the mechanism of AirDrop action leading to this critical vulnerability. First, in order to provide users with the option &#8220;Contacts Only&#8221; in the AirDrop sharing feature, Apple devices silently collect information on devices within the connection range. To see if the &#8220;other party&#8221; is in the contacts list, AirDrop uses a mutual authentication mechanism, comparing the user&#8217;s phone number and email address with the entries in the address book. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_119_38622802/07bce1c4c7862ed87797.jpg" width="625" height="351"> <em> The device authentication step in the directory can be exploited to get information. Photo: Monica Chin. </em> In the next step, data is exchanged for both parties. Despite encryption, Apple uses a relatively weak hashing mechanism. Security experts can decompile the hash using a simple technique like a brute-force attack. The team addressed the AirDrop vulnerability with a more secure approach, they named PrivateDrop. However, Apple did not move after being warned of the risk of personal information leaks and privacy breaches. In the immediate future, experts from the Technical University of Darmstadt advise users to protect themselves by disabling AirDrop discovery in the system settings and not opening the share menu. The detailed results of the study will be presented at the USENIX security Symposium taking place in August. <em> <strong> Why does iPhone not have USB-C port?</strong> </em> <em> In the past 5 years, USB-C has become the suitable connector for a wide variety of devices such as Android phones, laptops and tablets. However, Apple still doesn&#8217;t make iPhones with USB-C ports.</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11904</post-id>	</item>
		<item>
		<title>How to check the process of paying social insurance via VssID application</title>
		<link>https://en.spress.net/how-to-check-the-process-of-paying-social-insurance-via-vssid-application/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Wed, 05 May 2021 22:00:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Card]]></category>
		<category><![CDATA[Check]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Declaration]]></category>
		<category><![CDATA[Electronic]]></category>
		<category><![CDATA[HCMC Social Insurance]]></category>
		<category><![CDATA[Health Insurance]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[Insurrance]]></category>
		<category><![CDATA[Log in]]></category>
		<category><![CDATA[OTP]]></category>
		<category><![CDATA[paying]]></category>
		<category><![CDATA[PLO]]></category>
		<category><![CDATA[Process]]></category>
		<category><![CDATA[setting]]></category>
		<category><![CDATA[social]]></category>
		<category><![CDATA[Social insurance]]></category>
		<category><![CDATA[Store]]></category>
		<category><![CDATA[Submit]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Vietnam Social Insurance]]></category>
		<category><![CDATA[VSSID]]></category>
		<guid isPermaLink="false">https://en.spress.net/how-to-check-the-process-of-paying-social-insurance-via-vssid-application/</guid>

					<description><![CDATA[Using the VssID software, people can monitor the time of participating in social insurance, track the usage of health insurance. The VssID application, also known as the digital social insurance (social insurance) is an application on a smartphone to serve the participants of all types of insurance of the Vietnamese social insurance industry. Recently, many [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Using the VssID software, people can monitor the time of participating in social insurance, track the usage of health insurance.</strong><br />
<span id="more-11804"></span> The VssID application, also known as the digital social insurance (social insurance) is an application on a smartphone to serve the participants of all types of insurance of the Vietnamese social insurance industry.</p>
<p> Recently, many people participating in social insurance and health insurance (health insurance) have installed and used the VssID application to check and monitor their participation in social insurance and health insurance. <em> PLO</em> Also, some readers have received questions about how to install and use the VssID application on smartphones. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_114_38623252/f729f55ed31c3a42630d.jpg" width="625" height="416"> <em> User is installing VssID application. Photo: HUUYNH TRUONG GIANG</em> <strong> How to install the VssID application</strong> According to the Ho Chi Minh City Social Insurance Agency, before installing the application, the insured needs to prepare information to declare such as ID card or CCCD, social insurance number or health insurance card code (the last 10 digits on the health insurance card). Then download the VssID application to your phone. For Android operating system: Go to Google Play icon / Play Store. For iOS: AndApp Store icon. Type in the search box for the keyword “VssID” and select Search. There are four steps to signing up for an account. The user enters the VssID icon on the mobile phone screen and performs the following steps: <strong> Step 1: </strong> Click &#8220;Register Now&#8221; and select &#8220;Continue&#8221; to display the registration screen. <strong> Step 2:</strong> Select the object for registration &#8220;Personal&#8221; and then click &#8220;Next&#8221;. <strong> Step 3:</strong> Declare the information of transaction registration with the social insurance agency electronically on the Declaration form. It should be noted, users must write the correct phone number to confirm registration information and OTP code. Users should choose the nearest social insurance agency to submit electronic transaction registration documents. Then click &#8220;Record&#8221; to complete the registration. <strong> Step 4:</strong> Bring your ID card / CCCD card to the nearest social insurance agency for personal electronic transaction account approval. The system will send SMS (account, password) to the registered phone number. User can change password after first login. <strong> How to use the VssID application</strong> To use the VssID di5ng application, users do two steps: <strong> Step 1</strong> : Enter the account (social insurance code) and password (previously sent to the registered phone number) into the corresponding boxes to log into the application. <strong> Step 2</strong> : After logging into the VssID application, users enter the Personal management function to display the user&#8217;s information such as: social insurance number, full name, date of birth, ID / CCCD / Passport, phone number phone calls, health insurance card functions, insurance participation process, information on entitlement to social insurance benefits, &#8230;</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11804</post-id>	</item>
		<item>
		<title>Diet affects the skin of Korean idols</title>
		<link>https://en.spress.net/diet-affects-the-skin-of-korean-idols/</link>
		
		<dc:creator><![CDATA[Ngọc Khánh]]></dc:creator>
		<pubDate>Mon, 26 Apr 2021 04:41:14 +0000</pubDate>
				<category><![CDATA[Beauty]]></category>
		<category><![CDATA[Acne]]></category>
		<category><![CDATA[affects]]></category>
		<category><![CDATA[Clinic]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Dermatology]]></category>
		<category><![CDATA[Diet]]></category>
		<category><![CDATA[Estrogen]]></category>
		<category><![CDATA[Han Seungyeon]]></category>
		<category><![CDATA[Hard]]></category>
		<category><![CDATA[Idol]]></category>
		<category><![CDATA[idols]]></category>
		<category><![CDATA[KOREABOO]]></category>
		<category><![CDATA[Korean]]></category>
		<category><![CDATA[ladies]]></category>
		<category><![CDATA[Menstrual cycle]]></category>
		<category><![CDATA[MISTER]]></category>
		<category><![CDATA[Moderate]]></category>
		<category><![CDATA[Red Velvet]]></category>
		<category><![CDATA[Regime]]></category>
		<category><![CDATA[Skin]]></category>
		<category><![CDATA[Stomach pain]]></category>
		<category><![CDATA[WENDY]]></category>
		<category><![CDATA[Work experience]]></category>
		<guid isPermaLink="false">https://en.spress.net/diet-affects-the-skin-of-korean-idols/</guid>

					<description><![CDATA[Some Korean stars come to the skin clinic and share that they are following a harsh diet, which affects their skin. We Chan Woo and Jeong Seon Mi &#8211; two dermatologists with long experience working with Korean idols &#8211; shared about celebrity skin conditions through the program AYO Comment Defenders , Koreaboo reporting. Working at [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Some Korean stars come to the skin clinic and share that they are following a harsh diet, which affects their skin.</strong><br />
<span id="more-8847"></span> We Chan Woo and Jeong Seon Mi &#8211; two dermatologists with long experience working with Korean idols &#8211; shared about celebrity skin conditions through the program AYO Comment Defenders<em> , </em> <em> Koreaboo </em> reporting.</p>
<p> Working at a clinic located in Gangnam (Seoul, Korea) and near the headquarters of major entertainment companies, they have the opportunity to welcome major artists for many years. Jeong Seon Mi shared, &#8220;Wendy (Red Velvet) is one of the female idols with natural beautiful skin with few defects. However, not all stars are so lucky&#8221;. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_25_119_38630538/39345328756a9c34c57b.jpg" width="625" height="652"> <em> Korean idols always appear on stage with beautiful skin and radiant looks. Photo: Wendydaily221. </em> In fact, a lot of artists have skin problems like acne. We Chan Woo revealed that a poor diet also negatively affects skin health. Two experts say that many idols come to the clinic and share that they are following a harsh diet. They even ate a little cherry tomatoes. When they see sweets on the table, the stars are very excited. K-pop idol&#8217;s harsh diet is well-known. Typically, Han Seungyeon (former KARA member) revealed that she did not eat or drink too much water during promotions. <em> Mister</em> . Meanwhile, IU&#8217;s daily serving is just one apple, two sweet potatoes and a protein drink. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_25_119_38630538/d0b0bbac9dee74b02dff.jpg" width="625" height="691"> <em> In order to have healthy shiny skin, Korean stars regularly visit dermatology clinics and skin care thoroughly. Photo: Moonshot. </em> In addition to the negative effects such as fatigue and stomach pain, idols also faced with acne due to the level of estrogen and androgen affecting the amount of oil that the skin excreted. Insufficient food and drink leads to a hormonal imbalance. Ashley Choi (Ladies&#8217; Code) says her menstrual cycle stops for a year because of weight loss. Even the injection of hormones did not help the female idol&#8217;s menstrual period return.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8847</post-id>	</item>
		<item>
		<title>&#8220;Study Code&#8221; officially launched, &#8220;upload&#8221;, &#8220;scan code&#8221; and &#8220;bright card&#8221; three functions to serve Shanghai citizens</title>
		<link>https://en.spress.net/study-code-officially-launched-upload-scan-code-and-bright-card-three-functions-to-serve-shanghai-citizens/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Sat, 24 Apr 2021 01:10:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Bright]]></category>
		<category><![CDATA[Card]]></category>
		<category><![CDATA[citizens]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[functions]]></category>
		<category><![CDATA[Launched]]></category>
		<category><![CDATA[officially]]></category>
		<category><![CDATA[scan]]></category>
		<category><![CDATA[Serve]]></category>
		<category><![CDATA[Shanghai]]></category>
		<category><![CDATA[Study]]></category>
		<category><![CDATA[upload]]></category>
		<guid isPermaLink="false">https://en.spress.net/study-code-officially-launched-upload-scan-code-and-bright-card-three-functions-to-serve-shanghai-citizens/</guid>

					<description><![CDATA[&#8220;Study Code&#8221; officially launched, &#8220;upload&#8221;, &#8220;scan code&#8221; and &#8220;bright card&#8221; three functions to serve Shanghai citizens Dongfang.com reporter Liu Xiaojing reported on April 22: Today, the &#8220;Shanghai Citizens’ Personal Learning Account (Study Code)&#8221; Alipay Mini Program was launched at the &#8220;14th Five-Year&#8221; Development Forum of Shanghai Lifelong Education Credit Bank, which also marks Shanghai. The [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>&#8220;Study Code&#8221; officially launched, &#8220;upload&#8221;, &#8220;scan code&#8221; and &#8220;bright card&#8221; three functions to serve Shanghai citizens</strong></p>
<p><span id="more-7282"></span> <img fifu-featured="1" decoding="async" src="https://p8.itc.cn/q_70/images03/20210422/11d838180fe2462ea7abf2ef99475873.jpeg" img_width="1596" img_height="828"></p>
<p>Dongfang.com reporter Liu Xiaojing reported on April 22: Today, the &#8220;Shanghai Citizens’ Personal Learning Account (Study Code)&#8221; Alipay Mini Program was launched at the &#8220;14th Five-Year&#8221; Development Forum of Shanghai Lifelong Education Credit Bank, which also marks Shanghai. The era of Credit Bank 2.0 is coming.</p>
<p>The reporter understands that Shanghai Lifelong Education Credit Bank (hereinafter referred to as &#8220;Shanghai Credit Bank&#8221;) is a learning achievement certification management center and conversion service platform for Shanghai citizens, with the identification, accumulation and conversion of learning achievements as the main function.</p>
<p>As the first provincial credit bank in China, Shanghai Credit Bank has continued to research, explore and practice without a ready-made model to learn from, established a credit conversion system and mechanism, created a talent training &#8220;overpass&#8221;, and initially achieved coverage Communication and convergence of various types of education in the city.</p>
<p>Since its establishment in 2012, Shanghai Credit Bank has established more than 4.3 million personal learning files for 15% of the city’s permanent population, accumulated more than 85 million learning achievements of various types, and accumulated more than 100,000 credit transfers among various types of education. , The effect of serving the construction of a life-long education system and the construction of a learning society has initially appeared.</p>
<p>&#8220;Personal learning account&#8221; is a personal account that links personal comprehensive learning results and experience, links personal educational learning results, professional experience, and social activities, and deposits various types, stages, and levels of learning to enhance the results of personal accounts through the credit bank.</p>
<p>With the increasing demand of learners for mobile learning, in order to solve the bottlenecks such as the inconvenience of real-name authentication, the lack of accumulation of learning achievements, and the low user activity in the operation, Shanghai Credit Bank developed the &#8220;Study Code&#8221; Alipay Mini The program lays the foundation for an inclusive personal learning account in the future.</p>
<p>It is understood that the &#8220;Study Code&#8221; Alipay applet is an entrance to a personal learning account. Learners can search for &#8220;Shanghai Credit Bank&#8221; through the &#8220;Alipay&#8221; public entrance interface.</p>
<p><img decoding="async" src="https://p8.itc.cn/q_70/images03/20210422/0140274ec71043f990ba35babbf3e85e.jpeg" img_width="828" img_height="552"></p>
<p>The mini program has three functions: &#8220;upload&#8221;, &#8220;scan code&#8221; and &#8220;bright certificate&#8221;: learners use the &#8220;upload&#8221; function to continuously enrich personal lifelong learning achievement information; through the &#8220;scan code&#8221; function, they can attend classes, listen to lectures, and visit venues. Checking in and clocking in and other scenes can record various learning activities in time; through personal authorization, learners can display their personal learning achievements in the form of two-dimensional codes to relevant personnel or institutions.</p>
<p>Next, the Shanghai Credit Bank will further connect with the Shanghai Municipal Government’s &#8220;One Internet Service&#8221; system, etc., to support the open application of educational data and make it easier for learners to inquire about learning data. Through the continuous accumulation of learners&#8217; learning achievements, &#8220;Study Code&#8221; will gradually expand the connotation and functions of personal learning accounts, and comprehensively display personal &#8220;learning ability&#8221; and &#8220;learning credit&#8221;. Through the big data analysis of learners&#8217; learning experience, it forms user portraits, provides learners with personalized learning consulting services, provides recruitment and human resource optimization services for enterprises and institutions, and provides data analysis and decision support services for the government.</p>
<p>In addition, in order to further stimulate the learning needs of learners, Shanghai Credit Bank will also rely on the &#8220;application code&#8221; to establish a lifelong learning points system for all levels of learning results, build a complete learning incentive system, and form a continuous The ecology of lifelong learning serves the construction of a learning society.</p>
<p><i> </i> Favorites</p>
<p><i> </i> Report</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7282</post-id>	</item>
		<item>
		<title>A close-up of the new chip-mounted citizen&#8217;s identity card: Colorful, more compact and modern</title>
		<link>https://en.spress.net/a-close-up-of-the-new-chip-mounted-citizens-identity-card-colorful-more-compact-and-modern/</link>
		
		<dc:creator><![CDATA[Sơn Trần - Ảnh: TGDĐ]]></dc:creator>
		<pubDate>Fri, 23 Apr 2021 13:06:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[ATM card]]></category>
		<category><![CDATA[Backside]]></category>
		<category><![CDATA[Broken corner]]></category>
		<category><![CDATA[Card]]></category>
		<category><![CDATA[chipmounted]]></category>
		<category><![CDATA[Citizen]]></category>
		<category><![CDATA[citizens]]></category>
		<category><![CDATA[Clean]]></category>
		<category><![CDATA[Close]]></category>
		<category><![CDATA[Closeup]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[color]]></category>
		<category><![CDATA[colorful]]></category>
		<category><![CDATA[Compact]]></category>
		<category><![CDATA[Edge]]></category>
		<category><![CDATA[Fingerprint]]></category>
		<category><![CDATA[ID card]]></category>
		<category><![CDATA[Identity]]></category>
		<category><![CDATA[Identity card]]></category>
		<category><![CDATA[Install the chip]]></category>
		<category><![CDATA[Layout]]></category>
		<category><![CDATA[Lively]]></category>
		<category><![CDATA[Modern]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[QR code]]></category>
		<category><![CDATA[shape]]></category>
		<category><![CDATA[Size]]></category>
		<guid isPermaLink="false">https://en.spress.net/a-close-up-of-the-new-chip-mounted-citizens-identity-card-colorful-more-compact-and-modern/</guid>

					<description><![CDATA[Wondering what the size, color, shape of the citizen ID card with a chip is? What will my new citizen&#8217;s ID card look like? The color of the chip-mounted CCCD card is somewhat more vivid. Cards have two main colors are blue and light yellow. The two sides of the card have traditional motifs, beautifully [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Wondering what the size, color, shape of the citizen ID card with a chip is?</strong><br />
<span id="more-6683"></span> <strong> What will my new citizen&#8217;s ID card look like?</strong> </p>
<p> The color of the chip-mounted CCCD card is somewhat more vivid. Cards have two main colors are blue and light yellow. The two sides of the card have traditional motifs, beautifully imprinted. In the middle of the card is a very sharp map of Vietnam drawn. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_20_105_38584797/b9dc5dd4799690c8c987.jpg" width="625" height="351"> <em> The new CCCD card has more vivid colors than the old card.</em> On the front side of the card includes basic personal information such as: photo card, identification number, first and last name, date of birth, gender, nationality, country of origin, place of residence. The most obvious change is the CCCD card with English attached. In addition, on the CCCD card also appears the QR code. When scanning this code, we will be able to look up personal information of ourselves such as old ID number, new ID number &#8230; So, in case it&#8217;s not necessary, people should cover this part of the code to avoid your important information being stolen. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_20_105_38584797/9ae976e152a3bbfde2b2.jpg" width="625" height="351"> <em> The QR code on the new CCCD card is a change from the old card.</em> The back of the CCCD card has the most obvious change in the layout as well as the above content. The old information still retained are identification features, card issuance time, fingerprints and red seal of the competent authority. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_20_105_38584797/5d05b40d904f7911205e.jpg" width="625" height="351"> <em> The back of the card has a clear change in content and layout.</em> The first difference is that the barcode printed on the old CCCD card header has now been replaced with a sequence of characters including both letters and numbers. This is also information that you should cover up. Besides, the position of the fingerprint has also been moved from the left edge (in the CCCD card, old ID card) to the right edge (in the new CCCD card). <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_20_105_38584797/aeb3b8bb9cf975a72ce8.jpg" width="625" height="351"> <em> The position of fingerprints has a change between the old and new versions.</em> The highlight on this year&#8217;s CCCD card is the chip attached to the back. This chip has a color, shape and size quite similar to the one on the phone sim card we often use. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_20_105_38584797/41275d2f796d9033c97c.jpg" width="625" height="351"> <em> The chip on the new CCCD card.</em> <strong> The size of the new CCCD card has similarities with many current hard cards</strong> In terms of shape, the new CCCD card will still have a rectangular design with 4 rounded corners, helping to limit the broken corner of the card when stored in the wallet. Thiet is quite similar to ATM cards of banks or membership cards of supermarkets. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_20_105_38584797/84109c18b85a5104084b.jpg" width="625" height="351"> <em> The CCCD card is shaped similar to an ATM card and other commonly used hardware cards.</em> If you often have trouble with the slightly larger size of an old 9-digit ID card, it will be resolved on the new CCCD card. The new card will measure 83.6 x 53.98 mm. In a way that is easier to understand, &#8220;it&#8221; will be the size of an ATM card. <strong> The convenience of the new CCCD card</strong> The first handy point that we can see from a chip-mounted CCCD card is that &#8220;its sister&#8221; will be more durable. Compared with the old ID paper material, the plastic material on the CCCD card with chips will provide a longer life time. Besides, conditions such as torn, mysterious marks on the card &#8230; will no longer appear on this new card. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_20_105_38584797/bcb8b9b09df274ac2de3.jpg" width="625" height="351"> <em> The new CCCD card is more compact than the old ID card.</em> The compact size on the new CCCD card is also a huge plus. If in the past, users often had to &#8220;headache&#8221; when searching for an empty compartment to store the old ID card, with this new CCCD card, you no longer have to worry about the above problem. This chip-mounted CCCD is almost able to fit in the usual card holders in today&#8217;s wallets. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_20_105_38584797/d091d099f4db1d8544ca.jpg" width="625" height="351"> <em> You can put your card in your wallet a lot easier.</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6683</post-id>	</item>
		<item>
		<title>How to limit losing money when using iPhone</title>
		<link>https://en.spress.net/how-to-limit-losing-money-when-using-iphone/</link>
		
		<dc:creator><![CDATA[MINH HOÀNG]]></dc:creator>
		<pubDate>Thu, 22 Apr 2021 07:20:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[App store]]></category>
		<category><![CDATA[App Store Purchases]]></category>
		<category><![CDATA[Apple ID]]></category>
		<category><![CDATA[ARE]]></category>
		<category><![CDATA[AVAST]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Credit]]></category>
		<category><![CDATA[DISABLE]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[ITunes]]></category>
		<category><![CDATA[Limit]]></category>
		<category><![CDATA[losing]]></category>
		<category><![CDATA[Lost money]]></category>
		<category><![CDATA[manipulation]]></category>
		<category><![CDATA[Miscarriage of justice]]></category>
		<category><![CDATA[money]]></category>
		<category><![CDATA[NOT]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Privacy Restrictions]]></category>
		<category><![CDATA[Screen Time]]></category>
		<category><![CDATA[Spend]]></category>
		<category><![CDATA[TIẾP TỤC]]></category>
		<category><![CDATA[Used Time]]></category>
		<guid isPermaLink="false">https://en.spress.net/how-to-limit-losing-money-when-using-iphone/</guid>

					<description><![CDATA[With just a few simple steps, you can completely limit the situation of losing money when using iPhone. What is Fleeceware? Fleeceware is a term used to refer to applications that trick users into trying it out for free within 3-7 days, after which time the application will automatically register (pay a fee) and charge [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>With just a few simple steps, you can completely limit the situation of losing money when using iPhone.</strong><br />
<span id="more-5874"></span> <strong> What is Fleeceware?</strong> </p>
<p> Fleeceware is a term used to refer to applications that trick users into trying it out for free within 3-7 days, after which time the application will automatically register (pay a fee) and charge the credit card. Many people believe that uninstalling the app before the trial period expires will not be charged, but this is completely wrong. In order not to be charged from the card, you need to unsubscribe from the app. However, many developers have intentionally failed to inform users about this. According to Avast statistics, 204 Fleeceware applications have been downloaded more than 1 billion times, earning $ 400 million in revenue through the App Store and Google Play. The purpose of these applications is to get users to try it for free for 3-7 days, after which time the app will automatically register (paid) for sometimes up to $ 3,432 / year. . To limit the loss of money, you just need to disable purchases on the App Store by going to Settings (settings) &#8211; Screen Time (time use) &#8211; Turn on Screen Time (turn on time usage) &#8211; Continue &#8211; Content &#038; Privacy Restrictions (restrictions enabled). <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_19_331_38570708/fe5b95f0b1b258ec01a3.jpg" width="625" height="555"> <em> How to enable screen time feature on iPhone. Photo: MINH HOANG</em> Next, users need to enable the Content &#038; Privacy Restrictions option &#8211; iTunes &#038; App Store Purchases &#8211; In-app Purchases (in-app purchases), then set it to Don&#8217;t allow. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_19_331_38570708/4593db39ff7b16254f6a.jpg" width="625" height="555"> <em> Turn off purchases on the App Store. Photo: MINH HOANG</em> From now on, every time a child or Fleeceware apps automatically subscribe to a premium, the iPhone will immediately show In-app purchases are not allowed. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_19_331_38570708/a5863e2c1a6ef330aa7f.jpg" width="625" height="676"> To increase security, you should set a time passcode by going to Settings (settings) &#8211; Screen Time (usage time) &#8211; Use Screen Time Passcode (use time passcode), next According to the user just set a passcode (different from the iPhone passcode). Finally, the iPhone will ask you to enter the Apple ID used to recover the passcode if you forget it.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5874</post-id>	</item>
		<item>
		<title>Granting specialized government digital certificates to agencies and organizations completely online</title>
		<link>https://en.spress.net/granting-specialized-government-digital-certificates-to-agencies-and-organizations-completely-online/</link>
		
		<dc:creator><![CDATA[M.T]]></dc:creator>
		<pubDate>Tue, 20 Apr 2021 11:15:11 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Administrative procedures]]></category>
		<category><![CDATA[Administrative reform]]></category>
		<category><![CDATA[agencies]]></category>
		<category><![CDATA[Central Military Commission]]></category>
		<category><![CDATA[Ceremony]]></category>
		<category><![CDATA[certificates]]></category>
		<category><![CDATA[Civil]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[completely]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[Deputy]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[E government]]></category>
		<category><![CDATA[Electronic authentication]]></category>
		<category><![CDATA[Explosive materials]]></category>
		<category><![CDATA[Goverment]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Granting]]></category>
		<category><![CDATA[In scope]]></category>
		<category><![CDATA[Interconnection]]></category>
		<category><![CDATA[Measure]]></category>
		<category><![CDATA[Nguyen Tan Cuong]]></category>
		<category><![CDATA[One door]]></category>
		<category><![CDATA[Online]]></category>
		<category><![CDATA[Opening]]></category>
		<category><![CDATA[organizations]]></category>
		<category><![CDATA[Specialized]]></category>
		<category><![CDATA[Upper Minister]]></category>
		<guid isPermaLink="false">https://en.spress.net/granting-specialized-government-digital-certificates-to-agencies-and-organizations-completely-online/</guid>

					<description><![CDATA[Procedures for issuing new digital certificates to agencies and organizations are one of the four public services that have been provided online at level 4 by the Ministry of Defense, through the Ministry&#8217;s Public Service Portal and on the National Public Service Portal. Deputy Minister of National Defense Nguyen Tan Cuong, Deputy Minister of Information [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Procedures for issuing new digital certificates to agencies and organizations are one of the four public services that have been provided online at level 4 by the Ministry of Defense, through the Ministry&#8217;s Public Service Portal and on the National Public Service Portal.</strong><br />
<span id="more-5251"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_17_107_38559709/ac13ea43c101285f7110.jpg" width="625" height="335"> </p>
<p> Deputy Minister of National Defense Nguyen Tan Cuong, Deputy Minister of Information and Communications Nguyen Huy Dung and delegates performing the opening ceremony of the Public Service Portal of the Ministry of Defense (Photo: mod.gov.vn) <strong> An important milestone in the construction of e-Government of the Ministry of Defense</strong> The Ministry of National Defense&#8217;s public service portal has just been officially opened by this Ministry at the address dichvucong.mod.gov.vn on the afternoon of April 16. Built to meet the regulations on the implementation of the one-door mechanism, the one-stop shop for administrative procedures settlement, the website dichvucong.mod.gov.vn is the online provider of administrative procedures under the state management of the Ministry of National Defense on the principle of concentration, consistency and timeliness. According to the website of the Ministry of National Defense, the website dichvucong.mod.gov.vn provides online public services for 29 administrative procedures in 6 areas, including: journalism, defense explosives management. , civil cryptography, military policy, IT management and electronic authentication. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_17_107_38559709/0ce148b163f38aadd3e2.jpg" width="625" height="370"> On the website dichvucong.mod.gov.vn, the Ministry of Defense provides online public services with 29 administrative procedures in 6 fields. Public service portal The Ministry of Defense is connected to the National Public Service Portal, ready to provide online public services to citizens and businesses on the Internet. This is a reliable address for people and businesses to transact with agencies and units in the Ministry of Defense in an electronic environment. At the same time, this portal is also a channel to monitor and supervise to improve the quality of handling administrative procedures and receive and handle recommendations of agencies and units in the Ministry of Defense. According to the website of the Ministry of National Defense, speaking at the opening ceremony, Senior Lieutenant General Nguyen Tan Cuong, Deputy Minister of National Defense emphasized: &#8220;The official opening of the Ministry of Defense Public Service Portal into operation is a milestone. attaching importance to, affirming the determination of the Central Military Commission and the Ministry of National Defense to promote administrative reform in association with building e-Government in the Ministry of National Defense, focusing on administrative procedure reform with the aim of taking the people. is the center, taking the satisfaction of the people, the organization is the measure to evaluate the service quality of agencies and units &#8220;. <strong> The Department of Defense provides 22 online public services at levels 3 and 4</strong> Notably, data on the Public Service Portal of the Ministry of Defense shows that, of the 282 administrative procedures under the management of the Ministry of Defense, 18 procedures are available online at level 3 and 4. is provided online level 4 &#8211; the highest level done entirely on the network environment. All 4 administrative procedures provided online by the Ministry of Defense at level 4 on the Ministry&#8217;s Public Service Portal are in the field of electronic authentication, they are: Procedures for new issuance of digital certificates of agencies and organizations; procedures for new issuance of digital certificates for equipment, services, and software; procedures for new digital certificates for individuals; digital certificate renewal procedures for competent persons of agencies and organizations in accordance with the law on management and use of seals, persons with state titles. Decree 130 2018 details the implementation of the Law on Electronic transactions regarding digital signatures and digital signature authentication services, stating types of electronic transactions of Party and State agencies if signatures are applied. for the number, use the digital signature authentication service provided by a specialized digital signature authentication service provider provided by the Government. The Department of Digital Authentication and Information Security under the Government Cipher Committee (Ministry of Defense) is a specialized digital signature authentication service provider of the Government. According to this agency&#8217;s data, as of the middle of last year, the specialized digital signature authentication system of the Government has ensured the provision of over 230,000 digital certificates to ministries, branches and localities in the country. According to the instructions, in order to carry out the administrative procedures provided on the Public Service Portal of the Ministry of Defense, before performing the online submission, businesses, organizations and individuals need to register an account. to be able to access the system. In addition to online filing, in the system, businesses, organizations and individuals can also track the status of the application, view statistics on the processing status of the administrative documents or participate in the evaluation. system pricing through survey questions &#8230;</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5251</post-id>	</item>
		<item>
		<title>In addition to counting the number of lines of code, how can you &#8220;calculate performance&#8221; for programmers? ｜Fast Company</title>
		<link>https://en.spress.net/in-addition-to-counting-the-number-of-lines-of-code-how-can-you-calculate-performance-for-programmers-%ef%bd%9cfast-company/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Fri, 16 Apr 2021 12:09:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[addition]]></category>
		<category><![CDATA[calculate]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Company]]></category>
		<category><![CDATA[counting]]></category>
		<category><![CDATA[FAST]]></category>
		<category><![CDATA[lines]]></category>
		<category><![CDATA[number]]></category>
		<category><![CDATA[performance]]></category>
		<category><![CDATA[programmers]]></category>
		<guid isPermaLink="false">https://en.spress.net/in-addition-to-counting-the-number-of-lines-of-code-how-can-you-calculate-performance-for-programmers-%ef%bd%9cfast-company/</guid>

					<description><![CDATA[Image source @Visual China [ThisarticlecomesfromthefeaturedcolumnofTitaniumMedia&#8220;Fast Company&#8221;】 Recently, Simayi, a program code library analysis platform, announced the completion of US$5.2 million in Series A financing in September last year. This round of financing was led by Jingwei China, with existing investors such as GGV, Lenovo Star, and Polychain following the investment, and the funds will be [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="content-picture" src="https://inews.gtimg.com/newsapp_bt/0/13409182889/1000"></p>
<p>Image source @Visual China</p>
<p><strong>[ThisarticlecomesfromthefeaturedcolumnofTitaniumMedia</strong><strong>&#8220;Fast Company&#8221;</strong><strong>】</strong></p>
<p>Recently, Simayi, a program code library analysis platform, announced the completion of US$5.2 million in Series A financing in September last year. This round of financing was led by Jingwei China, with existing investors such as GGV, Lenovo Star, and Polychain following the investment, and the funds will be used For technology investment and product iteration.</p>
<p>According to public information, Simayi was founded in 2018 by Ren Jinglei, PhD in computer science and technology at Tsinghua University. In March of the same year, it received $1.1 million in angel round investment from Polychain Capital and OSS Capital; in May 2020, it received investment from GGV and Lenovo’s Star and Polychain co-invested US$4.1 million in Pre-A round of financing; in September, it received another US$5.2 million in Series A financing from Jingwei China.</p>
<p><strong>After less than 4 years of establishment, it has obtained 3 rounds of financing in a row. What is the appeal of Simayi to investors? Through this financing, Titanium Media interviewed Ren Jinglei, the founder of Simayi.</strong></p>
<p><img decoding="async" class="content-picture" src="https://inews.gtimg.com/newsapp_bt/0/13409182890/1000"></p>
<p>Founder of Merico: Ren Jinglei</p>
<p>A paper starts the entrepreneurial journey</p>
<p>&#8220;Towards Quantifying the Development Value of Code Contributions&#8221; published in the international software engineering conference FSE is the basic framework and the most basic technology for the research and development of the SiMayi project, and it is also a support for products to solutions, just like Google’s two Like the founders who published Page Rank, starting from that paper, they have been building the current Google search engine and the entire business empire.&#8221; Ren Jinglei told Titanium Media.</p>
<p>After graduating from Tsinghua University with a PhD in Computer Science in 2016, Ren Jinglei worked as a visiting scholar at Stanford University and Carnegie Mellon University to engage in research on software systems. He also contributed code to the open source community before joining Microsoft Research.</p>
<p>During his work at Microsoft Research, he learned that Facebook uses a simple and rude way of counting the number of lines of code to determine bonuses, which made him realize that enterprises have a demand for quantitative programmers. But this method is not suitable for all teams, he began to think, since doing program analysis, can we measure the programmer&#8217;s work through some smarter and in-depth analysis methods.</p>
<p>At the same time, there is another problem that has been bothering him. They have been contributing open source code to the community for many years. Now many open source projects have received some donations, and how to allocate these donations reasonably has always been a question he is thinking about. How to make programmers&#8217; intellectual achievements obtain long-term benefits, so as to promote the prosperity of the entire open source community, especially today, 92% of applications rely on open source software.</p>
<p>Based on the above two factors, Ren Jinglei decided to work for quantitative programmers and what to do in the open source community. Therefore, at the end of 2018, he created Simayi together with Yin Hezheng and Roland. The main business is to quantify the work of programmers through in-depth code analysis technology, mainly including program analysis and artificial intelligence.</p>
<p>New scenarios, new data, new architecture</p>
<p>According to the Evans Data Group&#8217;s 2019 report, the number of global developers reached 23.9 million, which is expected to grow to 28.7 million within 5 years. At the same time, with the continuous rise of labor costs, the cost of developers is at the forefront, and the R&#038;D team is transforming from extensive growth to refined management and efficiency improvement.</p>
<p>The enterprise version of Simayi launched in early 2019 is based on in-depth code analysis technology and machine learning technology, extracting retrospective data from historical and current code bases, real-time analysis and feedback, and providing software engineering management and talent development for enterprises The solution is to drive management upgrades with smarter metrics, and promote the joint improvement of the development team and individual developers.</p>
<p>At present, indicators such as working hours, line of codes (LOCs, Line of Codes), and number of commits (NOCs, Number of Commits), which are widely used in the market, are relatively &#8220;simple and rude&#8221; and are easily disturbed by noise such as line breaks and dead codes.</p>
<p>The code analysis engine of SiMayi compiles the code into an abstract syntax tree, and distinguishes the change in the logic amount of the code generated by each submission, so as to judge the workload; in addition, the analysis engine can also analyze the call relationship between the codes. Function influence, combined with code quality and the impact of code on the overall quality of the project, can more accurately and objectively reflect the value of the developer&#8217;s work. At present, the analysis engine has supported 15 development languages, and is continuing to be added.</p>
<p>Since the product went online, it has served Tencent, Didi Chuxing, Hexun.com, ICBC Credit Suisse, Changting Technology, Know Chuangyu, Bairong Yunchuang, Ticket Yitong, Kaisi Auto Parts, Weili Technology and other industry customers, which is also reflected in the side The urgent need of enterprises to improve the efficiency of research and development.</p>
<p><strong>Ren Jinglei said that in response to the needs of customers in different industries, the product is continuously upgraded to 3.0, and the product will be fully optimized from the three dimensions of new scenarios, new data, and new architecture.</strong></p>
<p><strong>New scene</strong></p>
<p>The roles of executives, technical leaders, project managers, and developers, and how different the focus and granularity of the effectiveness data required for different roles are. Based on the wrong roles and usage scenarios, Simayi reconstructed the information framework within the product.</p>
<p><img decoding="async" class="content-picture" src="https://inews.gtimg.com/newsapp_bt/0/13409182891/1000"></p>
<p>Cross-team efficiency comparison view under executive roles</p>
<p>Specifically, executives can quickly review the R&#038;D performance status and trends of different teams or projects, and accurately guide the team&#8217;s improvement direction based on the industry performance reference baseline; project managers can grasp the progress of specific iterations in real time and review project efficiency, quality and stability , Quickly find and respond to bottlenecks; technical managers can continue to track the accumulation of technical debt, identify risks at all stages of the software development cycle, and gain detailed insights into the output efficiency and quality of each developer, and promptly motivate outstanding members; developers can use Quantitative research and development efficiency, visually show their contributions, quickly identify the optimization space of their own code, and how to optimize, so as to spontaneously improve the quality of the project and improve the maintainability of software products.</p>
<p><strong>New data</strong></p>
<p>On the basis of the existing code analysis data, it is connected to JIRA&#8217;s R&#038;D process management data. On the one hand, the R&#038;D efficiency data is gathered in one place, which is convenient for managers to understand the R&#038;D process and results from multiple perspectives; on the other hand, these indicators It can cross-analyze existing efficiency and quality indicators to generate more in-depth insights and help managers perceive R&#038;D trends in a timely manner.</p>
<p><img decoding="async" class="content-picture" src="https://inews.gtimg.com/newsapp_bt/0/13409182892/1000"></p>
<p>Support development equivalent multiple indicators and iterative progress chart</p>
<p>At the same time, version 3.0 supplements industry performance data based on open source projects. According to the scale and language of the enterprise project, the Simayi system can automatically match similar excellent open source projects, provide an external baseline reference, and help R&#038;D managers quickly locate the level of their team in the industry, and objectively understand the direction of improvement.</p>
<p><img decoding="async" class="content-picture" src="https://inews.gtimg.com/newsapp_bt/0/13409182893/1000"></p>
<p>Industry level view</p>
<p><strong>New architecture</strong></p>
<p>Ren Jinglei said that 90% of large companies such as Didi, Tencent, and Taikang Life Insurance used privatized deployment. He found that the company not only has a complex organizational structure, but also has a large number of project levels and a huge amount of code. There may be tens of thousands of code bases. , Dozens of terabytes of code, the scale exceeds the range that the earlier product version can support.</p>
<p>In order to solve this problem, in the release of version 3.0, Si Ma Yi Enough supports complex organization and project structure, rapid import and configuration, which improves the customer&#8217;s startup speed and optimizes the use experience. At the same time, the underlying analysis engine also performs technology Refactoring, based on the distributed computing capabilities of K8s, can now support the import and analysis of 10,000-level code bases to meet the needs of large R&#038;D teams.</p>
<p>Deeply cultivate the code analysis market and introduce AI expert system</p>
<p>Ren Jinglei said, &#8220;In the future, we will increase investment in two aspects. On the one hand, we will continue to deepen the code analysis market; on the other hand, we will introduce AI expert systems to help companies better interpret the analyzed data.&#8221;</p>
<p>Specifically, in the code analysis market, we will continue to open up the front and back links in the R&#038;D process, and access a wider range of R&#038;D data, such as vulnerability and defect data, performance testing, log analysis, etc., and cross-analyze different data to make the R&#038;D process more effective. The overall results can be traced, providing more complete and in-depth insights for R&#038;D management and bringing new commercial value.</p>
<p>Introducing the AI ​​expert system, further productizing the existing light consulting services, improving the system&#8217;s ability to interpret data, discover problems, and judge trends, so that data analysis can more directly help R&#038;D management decision-making.</p>
<p>Regarding corporate profitability, Ren Jinglei’s thinking is that the current focus is on privatization deployment of enterprise version products, and subscription fees, because as of the first 4 months of 2021, 150% of last year’s annual sales have been achieved, and all expired customers are retained. Performance. At the same time, it is also expected that public cloud services will be launched this year to provide SME customers with a more convenient and efficient deployment and use experience.</p>
<p>In addition, the open source community version Merco Build was released at the end of 2020, which provides free analysis of the effectiveness and community activity for open source projects, and provides individual contribution reports for open source contributors.</p>
<p>Hope that through the promotion of public cloud services and community version products, continue to accumulate research and development performance data, optimize the underlying computing engine, create a credible in-depth code analysis engine, and become a developer and development team in contribution analysis, performance analysis, competence analysis, etc. Industry Standard.</p>
<p><strong>(This article first published Titanium Media App, author | Guo Hongu, editor | Cai Pengcheng)</strong></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2765</post-id>	</item>
		<item>
		<title>Women&#8217;s Congress of Gia Lam District Police: Delegates research the document with a card with integrated QR code</title>
		<link>https://en.spress.net/womens-congress-of-gia-lam-district-police-delegates-research-the-document-with-a-card-with-integrated-qr-code/</link>
		
		<dc:creator><![CDATA[H.M]]></dc:creator>
		<pubDate>Fri, 16 Apr 2021 09:25:24 +0000</pubDate>
				<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[Card]]></category>
		<category><![CDATA[CATT]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Congress]]></category>
		<category><![CDATA[Deeply]]></category>
		<category><![CDATA[delegates]]></category>
		<category><![CDATA[District]]></category>
		<category><![CDATA[Document]]></category>
		<category><![CDATA[Executive Committee]]></category>
		<category><![CDATA[Gia]]></category>
		<category><![CDATA[Gia Lam district police]]></category>
		<category><![CDATA[integrated]]></category>
		<category><![CDATA[Integration]]></category>
		<category><![CDATA[Lam]]></category>
		<category><![CDATA[Member]]></category>
		<category><![CDATA[Nguyen Thi Van Hanh]]></category>
		<category><![CDATA[Pham Van Hau]]></category>
		<category><![CDATA[Police]]></category>
		<category><![CDATA[QR code]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Steering committee]]></category>
		<category><![CDATA[Term]]></category>
		<category><![CDATA[Thach Thi Hoa]]></category>
		<category><![CDATA[Trinh Huyen Trang]]></category>
		<category><![CDATA[Vu Thi Kim Yen]]></category>
		<category><![CDATA[Women s Congress]]></category>
		<category><![CDATA[Women s Union CATP]]></category>
		<category><![CDATA[Women union]]></category>
		<category><![CDATA[Womens]]></category>
		<guid isPermaLink="false">https://en.spress.net/womens-congress-of-gia-lam-district-police-delegates-research-the-document-with-a-card-with-integrated-qr-code/</guid>

					<description><![CDATA[The Women&#8217;s Union of the Police Department of Gia Lam district, Hanoi has successfully organized the Congress term 2021-2026, with the participation of 70 delegates. Comrades: Senior Lieutenant Colonel Vu Thi Kim Yen &#8211; President of CATP Women&#8217;s Union; Nguyen Thi Van Hanh &#8211; Vice President of Women&#8217;s Union CATP; Thach Thi Hoa &#8211; Vice [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The Women&#8217;s Union of the Police Department of Gia Lam district, Hanoi has successfully organized the Congress term 2021-2026, with the participation of 70 delegates.</strong><br />
<span id="more-2372"></span> Comrades: Senior Lieutenant Colonel Vu Thi Kim Yen &#8211; President of CATP Women&#8217;s Union; Nguyen Thi Van Hanh &#8211; Vice President of Women&#8217;s Union CATP; Thach Thi Hoa &#8211; Vice Chairman of the Women&#8217;s Union of Gia Lam district; Senior Lieutenant Colonel Pham Van Hau &#8211; Party Committee Secretary, District Police Chief attended and directed the Congress.</p>
<p><img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_16_106_38547459/48e019203262db3c8273.jpg" width="625" height="416"></p>
<p><em>The leaders congratulated the new Executive Committee of CAH Gia Lam Women&#8217;s Union </em></p>
<p>With the spirit of &#8220;Solidarity &#8211; Creation &#8211; Innovation&#8221;, the Congress discussed and contributed ideas to the draft document of the Women&#8217;s Congress at higher levels; Summarizing and evaluating the results of implementing the Resolution of the Congress term 2016-2021; defining goals and 8 basic targets for the term of 2021-2026.</p>
<p><img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_16_106_38547459/0dd544156f578609df46.jpg" width="625" height="416"></p>
<p><em>The comrades in the Party Committee of CAH Gia Lam District congratulate the Women&#8217;s Union of the district police</em></p>
<p>At the congress, 5 excellent delegates were trusted to elect the Executive Committee of the District Police Women&#8217;s Union, term 2021-2026. Comrade Nguyen Thi Hien &#8211; Deputy Team Leader of the General Team continued to be re-elected as Association President; Mr. Trinh Huyen Trang was elected as the Vice Chairman of the Association. Delegates attending the congress, using the delegate card with integrated QR code to view the congress documents and make medical declaration via phone with internet connection.</p>
<p>The report of the Executive Committee of CAH Women&#8217;s Union shows that, over the past 5 years, the Executive Committee has always received the attention and direction of the Women&#8217;s Union of Public Security City, the Women&#8217;s Union of Gia Lam district, the Party Committee, the Public Executive Committee. district police and the coordination and assistance of the Commanding Boards of Stations, Teams, CATTs, Commune Police and Youth Union organizations and Trade Unions.</p>
<p>The Executive Committee of the District Police Women Union determines the movement activities and tasks of the Association are placed under the leadership of the Women&#8217;s Union at higher levels and the direct leadership and direction of the Party Committee and the Public Security Commanding Committee. Gia Lam district. Right from the beginning of the term, the Executive Committee has always focused on timely implementation of programs, plans, instructions and directive documents of all levels of associations and Party Committee, Gia Lam District Police Command. women officials and members.</p>
<p><img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_16_106_38547459/329470545b16b248eb07.jpg" width="625" height="876"></p>
<p><em>Integrated QR code card</em></p>
<p>At the same time, concretize the emulation objectives and targets into the program contents and operation plans suitable to the situation of the unit so that the organization can achieve the highest efficiency, raising awareness and awareness of the organization. officials and members shall abide by the Party&#8217;s undertakings, State laws and policies, local regulations and the Association&#8217;s Charter. The Executive Board is always proactive in advising, directing and being flexible in organizing the implementation of key tasks, promoting the role and responsibility of each individual, contributing to the successful completion of goals and targets. , the key tasks in each year and the whole term.</p>
<p>During the past term, under the direct leadership of the Party Committee, District Command, the close direction of the Women&#8217;s Union at higher levels, with the spirit of initiative and creativity, the Executive Committee of the Women&#8217;s Union term 2016 &#8211; 2021 has concretized the Resolution of the Congress, building it into a Program and plan to implement each specific period, ensuring the leadership of the Party Committee, the Steering Committee and the superior association, in line with reality. of the unit.</p>
<p>The Executive Board has focused on directing and effectively implementing emulation movements, successfully completing the objectives of the Resolution of the Women&#8217;s Congress of the district police, the 2016-2021 term. In the process of leading and implementing the tasks, the Executive Board has renewed the content and mode of operation in a practical direction, close to the actual situation of the unit.</p>
<p>Attach importance to the propaganda and education of the ethical qualities and good traditional values ​​of Vietnamese women. Focusing on professional training, improving staff capacity, quality of members&#8217; activities, promoting activities to gather and attract a large number of members to join the Association.</p>
<p>Promote and improve the quality of emulation movements, diversify the forms to support members to build a civilized and happy family, encourage members to always feel secure in their work, successfully complete assigned tasks. , always at the forefront and exemplary in the collective activities of the unit, protecting the environment. Coordinate well implementation of regimes and policies related to women, well deal with recommendations and legitimate proposals of members.</p>
<p>As a result, the Women&#8217;s Union of the District Police was awarded 01 Certificate of Merit by the Women&#8217;s Union of Hanoi City; Director of CATP gave 06 certificates of merit, Gia Lam District Women&#8217;s Union gave 05 certificates of merit and many officers and members received many certificates of merit in the fields of work.</p>
<p>Right from the beginning of the term, the Women&#8217;s Union of the District Police has built up working regulations, assigned specific responsibilities in the Executive Committee, maintained quarterly meeting schedules and extraordinary meetings when there was unexpected work.</p>
<p>Strictly implementing the principle of democratic centralization, leadership collectives, individuals in charge, and unifying unity in executive leadership work, closely reaching officers and members. The Executive Committee actively advised the Party Committee and District Police Command to create favorable conditions for the Association to operate; promptly grasp feelings and aspirations of women members; develop program, plan of activities by quarter, year and thematic activities in a specific way and suitable with the actual situation of the unit.</p>
<p>At the same time, promoting coordination with Trade Union, Youth Union of district police to do well propaganda of cadres and members to well implement the Party&#8217;s guidelines, State&#8217;s legal policies, regulations. The sector, protecting and taking care of the legitimate and legitimate rights and interests of women and children contribute to improving the quality of women&#8217;s movements.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2372</post-id>	</item>
		<item>
		<title>The Institute of Cryptographic Engineering is geared towards a smart, innovative university model</title>
		<link>https://en.spress.net/the-institute-of-cryptographic-engineering-is-geared-towards-a-smart-innovative-university-model/</link>
					<comments>https://en.spress.net/the-institute-of-cryptographic-engineering-is-geared-towards-a-smart-innovative-university-model/#respond</comments>
		
		<dc:creator><![CDATA[M.T]]></dc:creator>
		<pubDate>Thu, 15 Apr 2021 08:28:10 +0000</pubDate>
				<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[Academy]]></category>
		<category><![CDATA[administration]]></category>
		<category><![CDATA[Brigadier]]></category>
		<category><![CDATA[Clever]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Convert]]></category>
		<category><![CDATA[Creation]]></category>
		<category><![CDATA[Cryptographic]]></category>
		<category><![CDATA[Cryptographic Engineering Academy]]></category>
		<category><![CDATA[Engineering]]></category>
		<category><![CDATA[Fatherland Defense Order]]></category>
		<category><![CDATA[geared]]></category>
		<category><![CDATA[Government Cipher Committee]]></category>
		<category><![CDATA[innovative]]></category>
		<category><![CDATA[Institute]]></category>
		<category><![CDATA[KTMM]]></category>
		<category><![CDATA[Model]]></category>
		<category><![CDATA[Muscle weakness]]></category>
		<category><![CDATA[Nguyen Huu Hung]]></category>
		<category><![CDATA[Paradigm]]></category>
		<category><![CDATA[Renew]]></category>
		<category><![CDATA[Safety information]]></category>
		<category><![CDATA[Second]]></category>
		<category><![CDATA[smart]]></category>
		<category><![CDATA[Staff]]></category>
		<category><![CDATA[University]]></category>
		<category><![CDATA[Vu Ngoc Thiem]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-institute-of-cryptographic-engineering-is-geared-towards-a-smart-innovative-university-model/</guid>

					<description><![CDATA[At the request of the leaders of the Government Cipher Committee, in the coming time, the Institute of Cryptographic Engineering needs to accelerate the digital transformation of work aspects, step by step forming a governance ecosystem towards a smart university. new creation. The above requirements and tasks have just been given by Major General Vu [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>At the request of the leaders of the Government Cipher Committee, in the coming time, the Institute of Cryptographic Engineering needs to accelerate the digital transformation of work aspects, step by step forming a governance ecosystem towards a smart university. new creation.</strong><br />
<span id="more-1048"></span> </p>
<p>The above requirements and tasks have just been given by Major General Vu Ngoc Them, Head of the Government Cipher Committee at the Ceremony to receive the Second Class Defense Medal and celebrate 45 days of tradition with the Institute of Cryptographic Engineering ( KTMM) is held today, April 15.</p>
<p><strong>Bringing Academy into a hub for innovation and digital transformation</strong></p>
<p>The Head of the Government Cipher Committee said that in the coming time, the political and security situation in the world and the region will continue to evolve quickly and complicatedly. Challenges in information warfare and cyber warfare are present and increasingly drastic, threatening global security.</p>
<p>In the context of the industrial revolution 4.0 together with all levels and sectors stepping up the construction and development of e-Government, towards the digital government, the digital economy, the digital society, the risk of leakage of secret information. bile tends to increase with more and more sophisticated nature and degree.</p>
<p>&#8220;This context has been posing enormous requirements and challenges for the cipher work in general and the education and training work of the Academy of Civil Engineering in particular&#8221;, said Mr. Thiem.</p>
<p><img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_15_107_38535653/1b2f6f634521ac7ff530.jpg" width="625" height="416"></p>
<p>Major General, Head of Government Cipher Department Vu Ngoc Thiem</p>
<p>A representative of the leadership of the Government Cipher Committee also pointed out a number of key tasks that KTMM Academy needs to focus on, including the development of the Academy Development Strategy associated with renovating the organizational structure and staffing direction. Lean, modern, efficient operation.</p>
<p>Building a model that is both a high-quality training center serving the Cipher industry, as well as a strategic research agency on information security and security policies to help lead the Advisory Board for the Party and the State on security. national confidentiality and security.</p>
<p>Focus on renewing training contents, programs and methods towards modernization, international integration, comprehensive development of learners. Attaching importance to university training and postgraduate training in the field of cryptography, information security and retraining and retraining of human resources for the entire Cipher industry.</p>
<p>At the same time, to expand cooperation and association in order to take advantage of the strengths of domestic and foreign training and research institutions and enterprises; focus on building a contingent of teaching staff, managerial staff, building facilities for teaching, learning and scientific research &#8230;</p>
<p><img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_15_107_38535653/66f70fbb25f9cca795e8.jpg" width="625" height="416"></p>
<p>Colonel Nguyen Huu Hung, Director of the Academy of KTMM said, striving to 2025 the Academy will become a university under the model of modern &#8220;applied university&#8221;.</p>
<p>Colonel Nguyen Huu Hung, Director of the Academy of KTMM said, Resolution 56 2020 of the Politburo on &#8220;Development Strategy of the Cipher industry in Vietnam to 2030 and orientations to 2045&#8221; has defined the goal of building to build the KTMM Academy into a high-quality training institution on OA and information security to meet weak human resources and socio-economic needs.</p>
<p>Recognizing the mission, vision and core values, according to Mr. Hung, the Institute aims to become a center of innovation, digital transformation and use of digital infrastructure to provide personalized training services. chemistry for learners.</p>
<p>Striving to 2025, the Institute will become a university following the model of a modern &#8220;applied university&#8221; and has an intelligent management model, multi-disciplinary training, closely combining training and scientific research. ; have training quality indicators approaching the group of 30 leading industrial-industry training schools in Vietnam; have a sustainable industry structure, consistent with the reality of Cipher industry and the society; forming a number of strong and specialized research groups on cryptographic science, technology and information security at national level &#8230;</p>
<p><strong>KTMM Academy received the Second Class Defense Medal</strong></p>
<p>Recognizing the achievements of KTMM Academy, on the occasion of the 45th anniversary of the establishment of the school, the President decided to present the Second Class Defense Medal to the Academy.</p>
<p><img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_15_107_38535653/5e653329196bf035a97a.jpg" width="625" height="416"></p>
<p>The Ceremony of awarding the Second Class National Defense Medal to KTMM Academy was held on April 15.</p>
<p>45 years ago, on April 15, 1976, the Central Cipher School, the forerunner of KTMM Academy, was established.</p>
<p>From a staff training school for the Cipher industry with a staff of just over 10 people and inadequate facilities, up to now, KTMM Academy has been a multidisciplinary university, training human resources for the Cipher industry. and socio-economic needs.</p>
<p>At present, there are 7 faculties, 1 Cryptographic Technical Practice Center, 1 Science and Technology Research and Application Institute, 81 lecture halls, practice &#8211; experiments at 2 campuses in Hanoi, Ho Chi Minh City and 42 Engineering, Master and Doctoral training programs.</p>
<p>In the period 2015 &#8211; 2020, the Institute has trained over 50 long-term courses with a total of over 330 classes, deployed 80 short-term training and retraining courses. Especially, more than 2,000 engineers, staff, staff of all kinds of training specialized in KTMM and the majors of information security have graduated; the number of graduate students in KTMM and Information Security has graduated is more than 200.</p>
<p>Over the past five years, the Institute has trained more than 250 foreign students from Laos, Cambodia, and Cuba with types from short-term training, intermediate, full-time university, master&#8217;s and internship specialized in OA and courses. Short-term training courses on KTMM, Information Security, IT. Along with that, the Institute has implemented 58 topics at the grassroots level, 14 topics at the board level and 3 topics at the national level.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://en.spress.net/the-institute-of-cryptographic-engineering-is-geared-towards-a-smart-innovative-university-model/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1048</post-id>	</item>
	</channel>
</rss>