<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>data &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/data/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Sat, 26 Jun 2021 15:30:07 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>Zero2IPO data: A total of 48 Chinese companies went public in May, and the amount of IPO financing increased month-on-month and year-on-year</title>
		<link>https://en.spress.net/zero2ipo-data-a-total-of-48-chinese-companies-went-public-in-may-and-the-amount-of-ipo-financing-increased-month-on-month-and-year-on-year/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Sat, 26 Jun 2021 15:30:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Amount]]></category>
		<category><![CDATA[Chinese]]></category>
		<category><![CDATA[COMPANIES]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[financing]]></category>
		<category><![CDATA[increased]]></category>
		<category><![CDATA[IPO]]></category>
		<category><![CDATA[monthonmonth]]></category>
		<category><![CDATA[Public]]></category>
		<category><![CDATA[total]]></category>
		<category><![CDATA[yearonyear]]></category>
		<category><![CDATA[Zero2IPO]]></category>
		<guid isPermaLink="false">https://en.spress.net/zero2ipo-data-a-total-of-48-chinese-companies-went-public-in-may-and-the-amount-of-ipo-financing-increased-month-on-month-and-year-on-year/</guid>

					<description><![CDATA[Monthly review: 41 domestically listed Chinese companies, 7 overseas listed Chinese companies, and the amount of IPO financing increased month-on-month. 36 Chinese companies are supported by VC/PE institutions, among which domestic listed companies account for 90% JD Logistics received the highest IPO financing amount this month, and the logistics industry ranked first in financing amount [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Monthly review:</p>
<p>41 domestically listed Chinese companies, 7 overseas listed Chinese companies, and the amount of IPO financing increased month-on-month.</p>
<p>36 Chinese companies are supported by VC/PE institutions, among which domestic listed companies account for 90%</p>
<p>JD Logistics received the highest IPO financing amount this month, and the logistics industry ranked first in financing amount</p>
<p>The number of listed companies in Guangdong Province remains the leading; Beijing and Shanghai have both raised over RMB 10 billion in financing</p>
<p> The China Securities Regulatory Commission will study and formulate a package of institutional measures to prohibit improper shareholding by resignees from the system to make up for the shortcomings of the system</p>
<p>According to data from Zero2IPO Private Equity, there are 48 Chinese companies in May 2021[1]The number of IPOs completed in various global trading markets increased by 100% year-on-year; the total financing amount was 64.405 billion yuan, and the financing amount increased by 149.5% year-on-year and 17.6% month-on-month. Chinese companies that completed their IPO this month involved 16 primary industries and landed in 7 trading markets. The average IPO financing amount of Chinese companies was 1.342 billion yuan, an increase of 49.4% from the previous month. The highest single financing amount was 20.229 billion yuan. A total of 36 VC/PE-backed companies went public this month, involving 205 institutions, with a VC/PE penetration rate of 75%.</p>
<p>Figure 1 The number of domestic and overseas listings and total financing amount of Chinese companies from May 2020 to May 2021</p>
<p>Source: Private Equity Pass 2021.6 www.pedata.cn</p>
<p>The total financing amount of IPO companies in the top ten in May accounted for 69.1%</p>
<p>The three IPO companies with the largest amount of financing this month are: JD Logistics listed on the main board of the Hong Kong Stock Exchange, raising a total of 20.229 billion yuan; Hehui Optoelectronics listed on the Shanghai Stock Exchange Science and Technology Innovation Board, raising a total of 7.106 billion yuan; The Shanghai Stock Exchange was listed on the Science and Technology Innovation Board and raised a total of 2.901 billion yuan.</p>
<p>Table 1 Top 10 IPO corporate financing in May</p>
<p> Source: Private Equity Pass 2021.6 www.pedata.cn Table 2 Top 10 listed Chinese companies in financing supported by domestic and overseas VC/PE IPOs in May  Source: Private Equity Pass 2021.6 www.pedata.cn Registered listed companies accounted for more than 50%, and the amount of overseas listed financing increased month-on-month In May, there were 41 domestic listed Chinese companies, accounting for 85.4% of the number of Chinese companies IPO this month. The initial financing amounted to 39.646 billion yuan, accounting for 61.6% of the total financing for the month. In May 2021, 11 and 14 companies were successfully registered and listed on the Growth Enterprise Market and the Science and Technology Innovation Board, accounting for 52.1% of the total number of listed companies in the month, and initial financing accounted for 31.6%. In May, 4 Chinese concept stocks were listed on the U.S. stocks, with a financing amount of approximately RMB 3.093 billion; 3 companies were listed on the main board of the Hong Kong Stock Exchange, with a financing amount of approximately RMB 21.666 billion. The amount of financing in the U.S. and Hong Kong stock markets both increased from last month. Figure 2 Distribution of domestic and overseas listings of Chinese companies in May 2021 (by listing sector)  Source: Private Equity Pass 2021.6 www.pedata.cn Figure 3 The distribution of Chinese companies listing in the domestic market under different IPO systems from May 2020 to May 2021  Source: Private Equity Pass 2021.6 www.pedata.cn Guangdong Province leads the way in the number of IPOs, and Beijing ranks first in terms of financing According to private equity statistics, in May 2021, the number of IPOs in the five provinces and cities of Guangdong, Jiangsu, Shanghai, Zhejiang and Beijing is 5 or more, a total of 32; the initial financing amount plus a total of RMB 50.99 billion, accounting for the country The total amount is nearly 80%. Among them, Guangdong Province leads other provinces in the number of listings of 9 Chinese companies; Beijing and Shanghai have raised financing amounts of more than 10 billion yuan respectively, and Beijing ranked first in the amount of financing raised by Chinese companies listed at 24.988 billion yuan, accounting for about 38.8%. Table 3: Geographical distribution of Chinese companies&#8217; domestic and overseas listings in May 2021  Source: Private Equity Pass 2021.6 www.pedata.cn The May IPO involved 16 industries, with the logistics industry having the highest amount of financing In May 2021, the IPO will involve 16 industries. The number of listed companies in machinery manufacturing, biotechnology/medical health, chemical raw materials and processing industries is 5 or more. In terms of financing, the logistics industry IPO financing was 21.09 billion yuan, accounting for 32.8% of the total financing of Chinese enterprises, ranking first; semiconductor, electronic equipment, and machinery manufacturing industries ranked second and third respectively, with financing amounts exceeding 7 billion. yuan. Figure 45: Industry distribution of the number of IPO companies and financing amount in month 45  Source: Private Equity Pass 2021.6 www.pedata.cn The VC/PE penetration rate of listed companies in May was 75% Among the listed companies this month, 36 Chinese companies were supported by VC/PE institutions, of which 33 were listed domestically, accounting for 91.7%. There are 7 and 13 IPO companies on the ChiNext Board of the Shenzhen Stock Exchange and the Science and Technology Innovation Board of the Shanghai Stock Exchange, respectively, which have received support from VC/PE institutions. The book returns of VC/PE-invested companies listed on domestic listings have dropped. In May 2021, the book return multiples (calculated at issue price) were 1.96 times, a decrease of 27.4% from the previous month and a year-on-year decrease of 35.1%; the book returns of overseas listings in May 2021 increased significantly year-on-year , An increase of 97.21%. Figure 5 Trend of VC/PE-backed IPO penetration from May 2020 to May 2021  Source: Private Equity Pass 2021.6 www.pedata.cn Figure 6 Distribution of book returns of VC/PE supporting IPOs in domestic and overseas markets of Chinese companies from May 2020 to May 2021 (issuance date)  Source: Private Equity Pass 2021.6 www.pedata.cn 16 VC/PE institutions have won no less than 2 Chinese IPOs Among the listed companies this month, 36 Chinese companies received support from VC/PE institutions, a decrease of 12.2% from the previous month. Among them, 16 institutions have invested companies with no less than 2 IPOs. The book return of Lieliang Fund in the Waterdrop IPO was as high as 98.26 times. Table 45 Listed in VC/PE Institution Invested Companies (Partial Institutions)  Source: Private Equity Pass 2021.6 www.pedata.cn Note: 1. The IPOs listed in the above table refer to companies headquartered in China (excluding Hong Kong, Macao and Taiwan) that are first listed on domestic and foreign stock exchanges within the scope of the statistics in 2021. Companies listed in the second listing and multiple listings are not listed. Included; 2. The investment institution only lists the named shareholders appearing in the prospectus; 3. The book amount is the number of shares held by the institution before the initial issuance of the invested project (excluding the cornerstone wheel/strategic placement) * issue price It is calculated that part of the book value may be biased because the number of shares held before the IPO was not disclosed in the prospectus. The China Securities Regulatory Commission issued the Guidelines for the Supervision of the Shareholding Behavior of Retired Persons from the Securities Regulatory Commission System, clarifying the verification requirements for the participation of the resigned employees The China Securities Regulatory Commission has always attached great importance to the supervision of shareholders of companies to be listed, continuously improved the shareholder supervision system and mechanism, and made great efforts to prevent illegal and illegal &#8220;creation of wealth&#8221;. In February of this year, the China Securities Regulatory Commission issued the &#8220;Guidelines for the Application of Regulatory Rules Regarding Information Disclosure of Shareholders of Listed Companies Applying for Initial Public Offerings&#8221;, which strengthened the regulatory constraints on surprise share purchases, abnormal share prices, transfer of interests, and &#8220;shadow shareholders&#8221;, and compacted the information of companies to be listed. Disclosure responsibility and intermediary agency verification responsibility to guide legal and compliant investment in companies that are to be listed. During the implementation of the system, the China Securities Regulatory Commission insisted on cutting its blade inward, and simultaneously studied and formulated a package of system measures to prohibit improper shareholding by system resignees to make up for the shortcomings of the system. While strengthening anti-corruption supervision and management and improving the independent review system, we have specially formulated and issued the &#8220;Guidelines for the Application of Regulatory Rules Issuance No. 2&#8221; (hereinafter referred to as the &#8220;Guidelines&#8221;) to clarify that the retired personnel of the China Securities Regulatory Commission will participate in the public offering and listing or the New Third Board. The verification requirements of selected-tier listed companies highlight the targeted supervision of resigners who fall within the scope of the specification, compact the verification responsibilities of intermediary agencies, and maintain the &#8220;three public&#8221; order in the market. The &#8220;Guidelines&#8221; mainly include the following: One is to clarify the circumstances of improper shareholding. The resignation personnel of the CSRC system used the influence of their original position to seek investment opportunities, the process of shareholding has the transfer of interests, the shareholding during the shareholding prohibition period, the shareholding as an unqualified shareholder, the source of the shareholding funds violates laws and regulations, etc., are considered to be improper shareholding. The second is to strengthen the verification responsibilities of intermediary agencies. In the process of verifying shareholder information, intermediary agencies should comprehensively check whether there is a shareholding situation of resigned personnel specified in the Guidelines and determine whether it is an improper shareholding situation. In the case of improper share purchase, it shall be cleared up. When the issuer and the intermediary institution submit the application documents for the issuance and listing (listing), they shall make a special explanation on the relevant verification status of the resigned personnel of the CSRC system. After submitting an application for issuance and listing (listing), if an improper shareholding situation is discovered or a major media question arises, the intermediary institution shall check and report in a timely manner. The third is to strengthen audit supervision and establish an independent review system. Review the issuance and listing (listing) review process involving the participation of departed employees to ensure that the review process is fair, just, and in compliance with laws and regulations. If clues of violations of law and discipline are found, they shall be handed over to relevant departments for handling. Key case analysis of this month: JD Logistics, Hehui Optoelectronics, Electric Wind Power JD Logistics is listed in Hong Kong, and another listed company is added to the JD department On May 28, 2021, JD Logistics officially listed on the Hong Kong Stock Exchange under the stock code of &#8220;02618.HK&#8221;. It is the second listed company incubated by JD Group. JD Health has been listed on the Hong Kong Stock Exchange before this. The issue price of JD Logistics is HK$40.36 per share per share, and it plans to issue 60,160,800 shares, with a market value of approximately RMB 202.294 billion. On the day of issuance, the closing price was HK$41.7, and the net proceeds from the IPO were approximately HK$24.113 billion. JD Logistics is a technology-driven supply chain solution and logistics service provider under JD. It was born out of JD Group&#8217;s self-built logistics. In 2012, it officially registered a logistics company. In 2017, JD Logistics Group was established. On February 16, 2021, JD Logistics submitted a prospectus on the Hong Kong Stock Exchange and officially launched the IPO. Three months later, JD Logistics officially launched a global public offering of shares. JD Logistics&#8217; IPO has attracted attention from many parties. On May 20, JD Logistics&#8217; IPO subscription ended ahead of schedule. JD Logistics was subscribed by more than 1 million people, oversubscribed by more than 700 times, and frozen funds exceeded 550 billion Hong Kong dollars.  According to data from the JD Logistics prospectus, in 2018, 2019 and 2020, JD Logistics’ revenues were 37.9 billion yuan, 49.8 billion yuan, and 73.4 billion yuan, respectively. Among them, there was a year-on-year increase of 31.6% in 2019 and a year-on-year increase of 47.2% in 2020, almost compared to 2018. Doubled. In the first quarter of 2021, JD Logistics&#8217; revenue reached 22.4 billion, a year-on-year increase of 64.1%, and continued to maintain rapid growth. At the same time, JD Logistics already has profitability. According to previously disclosed public data, after excluding changes in fair value such as equity incentives that do not affect the company&#8217;s value, JD Logistics has a profit of more than 1.7 billion in 2020. Source: Private Equity Pass 2021.6 www.pedata.cn Display panel manufacturer Hehui Optoelectronics goes public, with an issue market value of RMB 35.529 billion On May 28, 2021, Hehui Optoelectronics &#8220;688538.SH&#8221; was listed on the Science and Technology Innovation Board of the Shanghai Stock Exchange with an issue price of 2.65 yuan per share. It plans to issue 2.681 billion shares, with a total financing amount of 7.106 billion yuan and a market value of 35.529 billion yuan. . The closing price on the day of listing was 4.2 yuan, with a turnover of 6.441 billion yuan. The controlling shareholder of Hehui Optoelectronics is Lianhe Investment. Before this issuance, Union Investment held a total of 8.05 billion shares of the company, accounting for 75.12% of the company&#8217;s total share capital. The actual controller of the company is the Shanghai State-owned Assets Supervision and Administration Commission, which holds 100% equity of Lianhe Investment.  Hehui Optoelectronics is a well-known AMOLED semiconductor display panel manufacturer in China, focusing on the R&amp;D, production and sales of small and medium-sized AMOLED semiconductor display panels. According to the prospectus, Hehui Optoelectronics has focused on small and medium-sized AMOLED since its establishment. It is the first domestic manufacturer to achieve mass production of AMOLED semiconductor display panels in the industry, breaking the foreign monopoly. At present, Hehui Optoelectronics has two production lines of the 4.5th generation and the 6th generation, both of which can produce rigid and flexible AMOLED panels. Among them, the production capacity of the 4.5th generation AMOLED production line is 15K/month, the planned production capacity of the 6th generation AMOLED production line is 30K/month, and the mass production capacity is 15K/month, and the 15K/month production capacity is expected to be mass-produced in the second quarter of this year. However, although Hehui Optoelectronics believes that the future growth rate of flexible AMOLED is better than that of rigid AMOLED, it is also known that the flexible display scene has not yet appeared on a large scale, so it is still mainly based on rigid AMOLED. Hehui Optoelectronics&#8217; rigid AMOLED panel mass production capacity ranks first in China and second in the world, while the revenue of flexible products in 2020 is only 71,500 yuan. Source: Private Equity Pass 2021.6 www.pedata.cn &#8220;The first share of state-owned assets split&#8221; electric wind power successfully listed on the Science and Technology Innovation Board of the Shanghai Stock Exchange On May 19, 2021, Shanghai Electric Wind Power Group Co., Ltd. &#8220;688660.SH&#8221; was listed on the Science and Technology Innovation Board of the Shanghai Stock Exchange, with an issue price of 29.01 yuan per share, 533 million shares issued, and a market value of 7.253 billion yuan. According to the announcement, about 2.901 billion yuan of raised funds will be invested in &#8220;new product and technology development projects&#8221;, &#8220;Shanghai Electric Wind Power Group Shandong Haiyang Test Base Project&#8221;, &#8220;post-market capability improvement project&#8221; and other projects, and Reasonably arrange capital investment. Electric Wind Power was established in 2006 and is a holding subsidiary of Shanghai Electric Group Co., Ltd. As the first state-owned company to split a listed stock, in June last year, Electric Wind Power submitted a listing application to the China Securities Regulatory Commission. After nearly a year, it successfully listed on the Science and Technology Innovation Board. At present, the company&#8217;s products cover a full range of wind turbines from 1.25MW to 8MW, basically achieving full power coverage. In addition, the company firmly grasps the major development trends of industry refinement, customization, and large megawatts, and conducts active product development and layout in the onshore 4.X series, 5.X series and the offshore 5.X series and 8.0MW series. . In addition to the overall design technology of wind turbines, the company also has the core technology research and development capabilities of wind turbines represented by blade technology and control technology, and has formed technical research and development capabilities and advantages in key components and key technologies</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">27541</post-id>	</item>
		<item>
		<title>Fresh social data feeds back the government. Meituan released the country&#8217;s first digital platform for life services in the government affairs field in Shanghai, a new addition to urban digital governance</title>
		<link>https://en.spress.net/fresh-social-data-feeds-back-the-government-meituan-released-the-countrys-first-digital-platform-for-life-services-in-the-government-affairs-field-in-shanghai-a-new-addition-to-urban-digital-govern/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Sat, 26 Jun 2021 12:40:05 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[addition]]></category>
		<category><![CDATA[Affairs]]></category>
		<category><![CDATA[countrys]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[E government]]></category>
		<category><![CDATA[feeds]]></category>
		<category><![CDATA[Field]]></category>
		<category><![CDATA[fresh]]></category>
		<category><![CDATA[governance]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Government affairs]]></category>
		<category><![CDATA[life]]></category>
		<category><![CDATA[Meituan]]></category>
		<category><![CDATA[platform]]></category>
		<category><![CDATA[released]]></category>
		<category><![CDATA[services]]></category>
		<category><![CDATA[Shanghai]]></category>
		<category><![CDATA[social]]></category>
		<category><![CDATA[urban]]></category>
		<guid isPermaLink="false">https://en.spress.net/fresh-social-data-feeds-back-the-government-meituan-released-the-countrys-first-digital-platform-for-life-services-in-the-government-affairs-field-in-shanghai-a-new-addition-to-urban-digital-govern/</guid>

					<description><![CDATA[A small shop is the capillary of a city&#8217;s economic activities. A small shop full of smoke and fire carries everyone&#8217;s &#8220;micro happiness&#8221;, and it is the sense that everyone gets from this city. Are the small shops in each area prosperous, and are the fireworks strong? In the past, city managers could only understand [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong> A small shop is the capillary of a city&#8217;s economic activities. A small shop full of smoke and fire carries everyone&#8217;s &#8220;micro happiness&#8221;, and it is the sense that everyone gets from this city.</strong></p>
<p><span id="more-27524"></span></p>
<p>Are the small shops in each area prosperous, and are the fireworks strong? In the past, city managers could only understand through coarse-grained statistics or organizing on-site visits. Now, through the &#8220;Small Store Index&#8221; module of the &#8220;Meituan City Digital Signs System&#8221;, city managers can clearly perceive At present-in Huangpu, Putuo and other areas, the index of small shops in supermarket convenience, fresh fruit, snacks and catering is more than 60% higher than other districts; while small shops in the leisure and entertainment field are the top three fastest-growing districts They are Chongming, Qingpu and Baoshan, which demonstrate the huge growth potential of urban economic development.</p>
<p>A good life in the city is a huge proposition. It is closely related to everyone living in the city. It is more than a small shop, a breakfast full of vitality and within reach, a shared bicycle that is convenient for green travel, and even home. The parks at the gates and the activities held by urban commercial bodies are all microscopic components of the nerve endings of a good life. If the fresh social data can feed back to the government, it will become a new supplement to the digital governance of the market.</p>
<p>On June 10, Shanghai City Operation Digital Sign 1.0 was officially launched. Just today, Meituan and the Shanghai Institute of Digital Governance released in Shanghai the country’s first digital platform for life services in the field of government affairs-&#8220;Meituan City Digital Sign System&#8221;, which will be connected to the &#8220;Shanghai City Operation Digital Sign System&#8221; &#8220;Based on Meituan’s consumption, evaluation data and practice accumulation in the field of life services, through observation of urban consumption such as catering and entertainment, as well as life service modules such as the operation of small stores, it empowers city operation and management and helps create a quality life.</p>
<p><strong> The fastest data update can be synchronized with the real scene in real time</strong></p>
<p>The &#8220;Meituan City Better Life Digital Sign System&#8221; released this time is based on Meituan&#8217;s practice in the field of life services under the guidance and help of the Shanghai Urban Transport Center, and draws on the experience of the Urban Transport Center in the field of digital governance of super large cities. , Which took more than a year to explore together.</p>
<p>In terms of coverage, the digital signs of a good life in the city cover more than 200 sub-categories in 6 categories, including food, lodging, travel, shopping, and entertainment; at the level of consumption scenarios, search, browse, order, and evaluation form complete consumption. Closed-loop windows, through the supply-demand relationship model, build a healthy supply-demand ecology; at the geographic level, it can be refined to streets and business circles, and run through the various units of urban management vertically, achieving macroscopic view, manageable at the end, and breaking barriers horizontally through inter-regional comparison And mobile insights to help fine-tune urban governance. At present, the data update on the system can be synchronized with the real scene in real time at the fastest.</p>
<p>Meituan Bicycle, the most familiar to Shanghai citizens, converts the number of kilometers that citizens ride on shared bicycles daily into actual figures for reducing carbon emissions in the &#8220;Bicycle Riding Heat Map&#8221; module. The reporter saw that in the data released on the day of release, the number of kilometers that Shanghai citizens rode on a bicycle that day, if converted into a private car trip, is equivalent to replacing about 160,000 trips with a private car, and the calories consumed by cycling is equal to about 240,000. The calories of a burger or 1.46 million xiaolongbao.</p>
<p> Not only that, the data in the field of transportation capacity distribution provides an effective reference for city managers to solve the &#8220;last mile&#8221; of citizens&#8217; travel. Li Jiao, head of big data products at Meituan City, gave an example. When a company launches shared bicycles, it may place 8 cars at exit 1 of a certain subway station and 2 cars at exit 2 according to the traffic volume. Changes in the weather and an important meeting may change the use of shared bicycles. With the help of government public data and open resources, shared bicycles will become more &#8220;smart&#8221;, which will be based on passenger flow at rail stations, weather changes, etc. The data adjusts the number of vehicles delivered. Citizens&#8217; evaluation of public service places can also become an important reference for city managers to improve their management level. The reporter saw that the &#8220;Resident Evaluation&#8221; module in the &#8220;Meituan Digital Signs System for a Better Life in Cities&#8221; is to analyze the natural evaluations of users on the POI pages of urban public services such as parks and stadiums collected by Meituan to encourage citizens to actively participate. Urban governance practices the concept of &#8220;People&#8217;s Cities and People&#8217;s Construction&#8221; to highlight the temperature of the city. Taking the park as an example, the evaluation can help the park learn about the inadequacies in fee admission, service management level, park facilities richness, environmental beauty, convenience facilities perfection, transportation convenience, etc., and provide reference for its refined construction and operation . In addition, Meituan takes advantage of the full business chain coverage of the life service industry of &#8220;food, lodging, travel, shopping and entertainment&#8221;. Through comprehensive and detailed data, it can not only fully present the development of the regional life service industry, but also provide a window for research in sub-fields. Taking catering as an example, in addition to understanding the overall consumption situation of the catering industry, research can also be carried out by subdividing catering categories such as hot pot, coffee, and milk tea. The &#8220;Meituan City Better Life Digital Sign System&#8221; also refers to the &#8220;Excavator Index&#8221; in the industrial field, and uses the Milk Tea Index, Coffee Index and other popular specialties in cities. The data shows that Shanghai’s coffee consumption index is 2.4 times that of 35 cities (30 provincial capitals/municipalities + 5 cities specifically designated in the national plan).  <strong> Empowering city operation and management with fresh enterprise data</strong> This year, Shanghai issued opinions on comprehensively advancing the digital transformation of Shanghai&#8217;s city, and proposed strengthening system integration and overall improvement. According to Xu Huili, deputy director of the General Office of the Municipal Government and director of the Municipal Urban Transport Center, the digitalization of life and the digitalization of governance are both important parts of the digital transformation of cities, and through the exploration of professional fields, fresh enterprise data can empower city operation and management , Repeating the needs of urban citizens in daily life, has become a new force in the operation of the &#8220;one network unified management&#8221; of cities. Today, Meituan also demonstrated other explorations in the field of life services. For example, based on Meituan&#8217;s consumer review data, we will promote social co-governance of food safety. Meituan has more than 1,000 engineers working on AI, and has applied technological innovations to back kitchen monitoring, warehouse temperature control, food seal recognition, intelligent meal cabinets, unmanned delivery vehicles, and other scenarios. Support the upgrading of products and services in the field of life services through the digitalization of the offline economy. Through industrial cooperation, the further exploration of innovative solutions for food safety technology is also what Meituan has been exploring in recent years. Last year, Meituan launched the first food safety technology innovation platform activity, soliciting food safety technology innovation solutions for the whole society in warehousing, cooking and processing, takeaway delivery, dine-in dining, etc., and mobilizing more people to care about and participate in food safety governance and Industry sustainability work. “Food safety work is not just a business for an enterprise, but also requires the extensive participation of all sectors of society and all stakeholders, co-governance and sharing. Food safety work is not something that can be accomplished overnight. It is more reflected in daily food safety risk monitoring, In terms of evaluation and management,” the relevant person in charge of Meituan introduced, “Meituan has also been exploring to link industry partners to jointly sum up and precipitate good food safety management experience, and form standards and norms that the industry abides by.” &#8220;One of the basic elements of Shanghai&#8217;s urban operation&#8217;One Network Management&#8217; is to use real-time online data to help city managers observe the society, perceive needs, and cognitive laws, so as to better meet the needs of the masses and solve problems efficiently.&#8221; Xu Huili said, After Meituan’s exploration in the life service industry is empowered by the urban transportation system, it will effectively help city managers find problems in a more timely and accurate manner, connect needs, study the situation, prevent risks, and accumulate more energy for good governance in big cities. Author: Xu Jinghui Editor: Zhang Tianchi *Wenhui exclusive manuscript, please indicate the source for reprinting</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">27524</post-id>	</item>
		<item>
		<title>Fight against crypto currencies China closes data centers Virtual means of payment such as Bitcoin are a thorn in the side of the Chinese government. That is why it is vehemently against it: Now data centers have been switched off in several parts of the country. From Steffen Wurzel.</title>
		<link>https://en.spress.net/fight-against-crypto-currencies-china-closes-data-centers-virtual-means-of-payment-such-as-bitcoin-are-a-thorn-in-the-side-of-the-chinese-government-that-is-why-it-is-vehemently-against-it-now-data/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 24 Jun 2021 08:05:11 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[centers]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Chinese]]></category>
		<category><![CDATA[Chinese Government]]></category>
		<category><![CDATA[closes]]></category>
		<category><![CDATA[Country]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[currencies]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[data center]]></category>
		<category><![CDATA[E government]]></category>
		<category><![CDATA[fight]]></category>
		<category><![CDATA[German]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[means]]></category>
		<category><![CDATA[Means of payment]]></category>
		<category><![CDATA[parts]]></category>
		<category><![CDATA[Payment]]></category>
		<category><![CDATA[Side]]></category>
		<category><![CDATA[Steffen]]></category>
		<category><![CDATA[switched]]></category>
		<category><![CDATA[thorn]]></category>
		<category><![CDATA[vehemently]]></category>
		<category><![CDATA[Virtual]]></category>
		<category><![CDATA[Wurzel]]></category>
		<guid isPermaLink="false">https://en.spress.net/?p=27209</guid>

					<description><![CDATA[Fight against cryptocurrencies China closes data centers As of: 06/22/2021 8:26 am Virtual means of payment like Bitcoin are a thorn in the side of the Chinese government. That is why it is vehemently against it: Now data centers have been switched off in several parts of the country. From Steffen Wurzel, ARD studio Shanghai [&#8230;]]]></description>
										<content:encoded><![CDATA[</p>
<h1> Fight against cryptocurrencies China closes data centers </h1>
<p> As of: 06/22/2021 8:26 am </p>
<p><span id="more-27209"></span></p>
<p><strong> Virtual means of payment like Bitcoin are a thorn in the side of the Chinese government. That is why it is vehemently against it: Now data centers have been switched off in several parts of the country. </strong> </p>
<p> From Steffen Wurzel, ARD studio Shanghai </p>
<p>The Chinese government continues to vehemently oppose everything that has to do with Bitcoin. Banks and financial service providers were again asked not to offer any more services that have to do with crypto payment methods. One wants to preserve the stability and the security of the financial market and protect the assets and property of the population, said the state central bank of China.</p>
<p>China had banned trading in crypto-currency such as Bitcoin as early as 2017, as the first large country in the world. The so-called mining, however, i.e. the electronic generation of Bitcoins and Co with huge computer networks, was still tolerated by the Chinese authorities. The government has only been systematically taking action against decentralized and digital means of payment for around six weeks. Huge data centers were shut down in several parts of the country. Most recently, around two thirds of all new Bitcoins worldwide were generated with computers in China. This share will now decrease rapidly and significantly, say analysts. </p>
<p> <a   class="teaser-absatz__link" href="https://en.spress.net/wp-content/plugins/wp-optimize-by-xtraffic/redirect/?gzv=H4sIAAAAAAACA03IMQ6AIBQE0bvQA9pyFhtE5BMRCCwhxnh3sbObNzdrTDECclWLXGTvXUA7W6sh3cRmx_IFn3aMtgF_G_JR86NcGalrS6VFx1cPk3zk8zQLwhnY8wJ1dqqcZgAAAA.." target="_blank" rel="nofollow noopener"> </p>
<p>
</p>
<p>
<p> <strong> </strong> 02/23/2021 </p>
<p> Booming cryptocurrency China&#8217;s answer to the Bitcoin </p>
</p>
<p><p> In China, almost two thirds of all bitcoins on the world market are mined &#8211; still tolerated by the state.</p>
</p>
<p> </a></p>
<h2> Concept of bitcoin contradicts politics</h2>
<p> Monetary and currency policy are centrally controlled in China. The central bank is directly under the communist leadership. The Chinese currency, renminbi or yuan, is not freely convertible. The decentralized and open concept of Bitcoin contradicts this policy and is therefore rejected by the Chinese government. At the same time, the government is working on its own digital currency, which, however, has almost nothing to do with Bitcoin.</p>
<p>The stricter action taken by the Chinese authorities against crypto-currency has helped Bitcoin to lose around half of its value in the past two months. The Bitcoin price is still a good three times as high as a year ago</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">27209</post-id>	</item>
		<item>
		<title>Data proof: Huawei Hongmeng is optional for playing games!</title>
		<link>https://en.spress.net/data-proof-huawei-hongmeng-is-optional-for-playing-games/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Wed, 23 Jun 2021 18:07:19 +0000</pubDate>
				<category><![CDATA[World]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Games]]></category>
		<category><![CDATA[Hongmeng]]></category>
		<category><![CDATA[Huawei]]></category>
		<category><![CDATA[Optional]]></category>
		<category><![CDATA[playing]]></category>
		<category><![CDATA[Proof]]></category>
		<guid isPermaLink="false">https://en.spress.net/data-proof-huawei-hongmeng-is-optional-for-playing-games/</guid>

					<description><![CDATA[Perhaps many engine oils believe that the higher the mobile phone hardware configuration, the better the game play.Secondly, in addition to high hardware configuration, optimization (scheduling strategy) is also needed to bring out its real performance.Yesterday, Xiaobai&#8217;s evaluation released the &#8220;Peace Elite (Smooth +90 frame rate) test data&#8221; on Weibo. The blogger said: &#8220;In some [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong> Perhaps many engine oils believe that the higher the mobile phone hardware configuration, the better the game play.Secondly, in addition to high hardware configuration, optimization (scheduling strategy) is also needed to bring out its real performance.Yesterday, Xiaobai&#8217;s evaluation released the &#8220;Peace Elite (Smooth +90 frame rate) test data&#8221; on Weibo.</strong></p>
<p><span id="more-27120"></span></p>
<p>The blogger said: &#8220;In some of the new models currently tested, 90 frames of Huawei, Realme, Meizu, and Rescuers are okay. OnePlus and Xiaomi have slightly dropped frames, while vivo and OPPO have dropped in the first version of the system. Frame.&#8221;</p>
<p>From the comparison test data,<strong> Huawei Mate40 Pro Hongmeng Full frame rate 90.17 resultsRanked first, The second place is the Honor 50 Pro equipped with Qualcomm Snapdragon 778G. After the third place is the current most powerful Snapdragon 888 model.</strong> . This result is very unexpected!</p>
<p> <strong> It seems that Honor 50 Pro has optimized the bottom layer and effectively adjusted it to a high level.</strong> . It’s also worth mentioning,The Huawei Mate 40 Pro upgraded to Hongmeng HarmonyOS has a better gaming experience,&#8221;Original God&#8221;, &#8220;Peace Elite&#8221;, &#8220;King of Glory&#8221; can run almost in full frame.  What the captain wants to emphasize is,<strong> This is the importance of optimization!</strong> We can&#8217;t just see the stacking of hardware materials, but ignore the ability of tuning and optimization. Sometimes optimizing the experience is more important than stacking hardware.  In addition, according to the blogger, <strong> At 16:00 this afternoon, the third batch of HarmonyOS internal testing is ready to open for registration. The internal testing list is the Honor model.</strong>  <strong> Xiaoping is dead?This iPhone 12 is discontinued </strong> <strong> Millet generation &#8220;sacred machine&#8221; was actually a product 4 years ago </strong> <strong> It used to be No.1 for taking pictures!Xiaomi&#8217;s mysterious new machine enters the network </strong> <strong> Mate40? The price of the camera on the phone was over 10,000! </strong> <strong> Honor 50 is beautiful but expensive, so wait for Magic 3 </strong> <strong> Release next month!This may be the cheapest white flagship machine </strong> <strong> Don&#8217;t choose the wrong version when you buy this flagship machine! </strong> <strong> [Trailer]In the second half of the year, these 5 new models are worth looking forward to! </strong> <strong> New phones in May: as low as 699!12 models released, only 3 models recommended </strong> <strong> Pay attention to the captain, enter the following keywords in the dialog box to obtain:</strong> <strong> 1. For recommendations of cost-effective mobile phones at various prices, please reply to &#8220;purchase&#8221; to obtain;</strong> <strong> 2. The performance ladder diagram, please reply to &#8220;CPU&#8221; to obtain;</strong> <strong> 3. WeChat</strong> <strong> Stealth</strong> <strong> Please reply separately &#8220;</strong> <strong> Blank nickname</strong> <strong> &#8220;</strong> <strong> Obtain</strong> <strong> ；</strong> <strong> 4. Baidu SkyDrive &#8220;Lite Edition&#8221;, please reply to &#8220;Baidu SkyDrive&#8221; to obtain;</strong> <strong> 5. Watch VIP video artifacts for free, please reply to &#8220;VIP&#8221;</strong> <strong> Obtain</strong> (updated)<strong> ；</strong> <strong> 6. To retrieve the accidentally deleted phone photos, please reply to &#8220;Photo Recovery&#8221; to obtain;</strong> <strong> 7. A certain mine on the PC side downloads unlimited speed software,</strong> <strong> please reply&#8221;</strong> <strong> xunlei</strong> <strong> &#8221; Obtain;</strong> <strong> 8. To download the software of high-definition video at station B, please reply to &#8220;Station B&#8221; to obtain;</strong> <strong> 9. Are high-speed rail tickets hard to grab? please reply&#8221;</strong> <strong> Grab votes</strong> <strong> &#8220;</strong> <strong> Obtain;</strong> <strong> 10. Nice brand built-in wallpapers and anime wallpapers, please click</strong> <strong> &#8221; Here</strong> <strong> &#8220;</strong> <strong> Obtain;</strong> <strong> 11. To make double avatars on WeChat, please reply to &#8220;double avatars&#8221; to obtain;</strong> <strong> 12. To download paid music for free, please reply to &#8220;Music&#8221; to get</strong> <strong> (Update the PC side)</strong> <strong> ；</strong> <strong> 13. Visit the foreign education website, please reply &#8220;</strong> VPN<strong> &#8220;Obtain;</strong> <strong> 14. Get TikTok International Edition</strong> <strong> ,please reply</strong> <strong> &#8220;</strong> Douyin<strong> &#8220;Obtain</strong> <strong> (New iOS)</strong> <strong> .</strong></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">27120</post-id>	</item>
		<item>
		<title>How important is original Ali to Hangzhou? Just look at the data and you will know that Tencent is incomparable at this point!</title>
		<link>https://en.spress.net/how-important-is-original-ali-to-hangzhou-just-look-at-the-data-and-you-will-know-that-tencent-is-incomparable-at-this-point/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Wed, 23 Jun 2021 03:29:06 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[ALI]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Hangzhou]]></category>
		<category><![CDATA[important]]></category>
		<category><![CDATA[incomparable]]></category>
		<category><![CDATA[Original]]></category>
		<category><![CDATA[point]]></category>
		<category><![CDATA[Tencent]]></category>
		<guid isPermaLink="false">https://en.spress.net/how-important-is-original-ali-to-hangzhou-just-look-at-the-data-and-you-will-know-that-tencent-is-incomparable-at-this-point/</guid>

					<description><![CDATA[With the popularization of the Internet, the era of the Internet has come, and Alibaba and Tencent have become the two most successful companies in this era, not only helping everyone to accept the new era more easily, but also changing people’s habits to a certain extent. Lifestyle, the products of these two companies both [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong> <strong> <strong> <strong>With the popularization of the Internet, the era of the Internet has come, and Alibaba and Tencent have become the two most successful companies in this era, not only helping everyone to accept the new era more easily, but also changing people’s habits to a certain extent. Lifestyle, the products of these two companies both play an indispensable position in people&#8217;s lives. Although the main business directions are different, there will always be people who compare the two companies!</strong></strong> </strong> </strong><br />
<span id="more-26892"></span></p>
<p>Alibaba’s headquarters is located in Hangzhou, which has also greatly promoted the economic development of Hangzhou. According to valid data, Hangzhou’s GDP in 2020 will reach 1,610.6 billion yuan, an average annual growth rate of 3.9%, and it has just been established in Alibaba. In 1999, Hangzhou’s GDP was only 122.5 billion yuan. In just 20 years, Hangzhou’s GDP has doubled by as much as 12 times. Although the GDP of every city in China has been guaranteed in the past few years, There are few data like Hangzhou, and Ali has contributed a lot!<br />
In fact, Hangzhou is not without other large companies, such as Wahaha, Nongfu Spring, Geely and other large companies are located in Hangzhou. They have also contributed their own strength to the development of the city, but compared to Ali, they are much worse. They are just themselves. However, Ali’s industry can drive the overall development of the city. According to incomplete statistics, Ali directly and indirectly created 33 million new jobs in Hangzhou and its surrounding areas, which has driven Hangzhou’s economic development as a whole. It&#8217;s not that you can&#8217;t live without Ali, but Hangzhou has today, and Ali is indispensable!
 </p>
<p> However, Tencent in Shenzhen is much worse than that of Shenzhen. It’s not that Tencent’s size is much smaller than that of Ali. It’s that Tencent’s main business is games and social networking, and it has a higher degree of virtualization. It will not drive the city’s economy like Ali. So big, and because Shenzhen itself is much more economically developed than Hangzhou, and there are many other large-scale companies in Shenzhen, Tencent is absolutely not as important to Shenzhen as Ali is to Hangzhou!  Of course, this is not because Tencent is inferior to Alibaba. It can only be said that it is a problem of the location of everyone’s headquarters. Just like Daqing Oilfield in Daqing, Anshan Iron and Steel in Anshan, etc., these are large enterprises in small cities, and the existence of enterprises is of greater significance to cities. It may even be the backbone of the city&#8217;s GDP, but there is no way that these companies will be stronger than Tencent Ali!</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">26892</post-id>	</item>
		<item>
		<title>The data center is built like this: Use AI to create the &#8220;engine room&#8221; of the Internet</title>
		<link>https://en.spress.net/the-data-center-is-built-like-this-use-ai-to-create-the-engine-room-of-the-internet/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Tue, 22 Jun 2021 11:05:11 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[built]]></category>
		<category><![CDATA[Center]]></category>
		<category><![CDATA[create]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[data center]]></category>
		<category><![CDATA[engine]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[Like this]]></category>
		<category><![CDATA[Room]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-data-center-is-built-like-this-use-ai-to-create-the-engine-room-of-the-internet/</guid>

					<description><![CDATA[Source丨Forbes Author 丨 Martin Giles Compiler丨Technology Walker Equinix may not be well-known, but their services support the trillion-dollar global network business system. This company, headquartered in Redwood City, California, has a market value of US$72 billion, with total revenue of US$6 billion last year, and operates a comprehensive infrastructure network of more than 220 data [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong> Source丨Forbes</strong> <strong> Author 丨 Martin Giles</strong> <strong> Compiler丨Technology Walker</strong>  Equinix may not be well-known, but their services support the trillion-dollar global network business system. This company, headquartered in Redwood City, California, has a market value of US$72 billion, with total revenue of US$6 billion last year, and operates a comprehensive infrastructure network of more than 220 data centers in 26 countries or regions. Equinix customers use a large number of servers (with a total area of ​​more than 2.4 million square meters) provided by these data centers to store and process massive amounts of data necessary for online business. In addition, customers can also use the nearly 400,000 optical fiber links managed by Equinix to transmit data between their own servers and servers of other enterprises, and enjoy smooth and convenient interconnection support. Milind Wagle became the CIO of Equinix in September 2016. In his opinion, &#8220;The company has become the engine room of the digital economy. After all, the Internet must have a physical foundation to form and maintain operation, and this foundation is the data center.&#8221;  Picture: Milind Wagle, CIO of Equinix The infrastructure operated by Equinix, as well as the service resources provided by competitors such as Digital Realty Trust and CyrusOne, will not directly appear in the eyes of customers. But the failure of these facilities is likely to cause serious damage: earlier this month, another network backbone company, Fastlyl, suffered an accident that affected multiple websites involving customers such as Amazon, The New York Times and Forbes. Although the incident itself has received high levels of attention, there are still many serious problems that people cannot feel at all, and technology executives such as Wagle have been looking for ways to enhance network resilience. <strong> &#8220;Foresight&#8221; in the data center</strong> Like other competitors, Equinix also needs to measure when the server in the data center may reach the upper limit of usage, when it needs to purchase land, and plan for the construction of new data centers and how much electricity the new facilities may require. Wagle explained, “Accurately predicting the power consumption and space occupancy of a data center is a very important task.” According to Equinix data, a data center that can accommodate thousands of servers often requires an investment of hundreds of millions of dollars. The cost depends on the specific location, local electricity price, selected equipment and hardware configuration. Data center companies also need to seriously consider designing long-term power purchase contracts. This is because each data center consumes several megawatts of power, and any calculation errors may bring huge costs. An Equinix spokesperson also shared an example of a Silicon Valley data center contract that contains a monthly fine of $223,000, emphasizing that the center&#8217;s expected power consumption should not be less than the committed use of 3 megawatts. For a long time, Equinix has been reviewing historical trends through the planning process, manual spreadsheets and dedicated planners, and combining information from customer channels to make clear estimates of future needs. But with the development of the business, this work has become more and more complicated. To this end, the Wagle team began to seek new applications of AI technology, hoping to develop algorithms to assist Equinix planners to improve their work efficiency and enhance their forecasting level. But the early results gave everyone a blow. Wagle recalled, “At first, everyone was not very interested, and most employees were skeptical about it, and our model was not 100% accurate.” But during the exploration, he also realized the great potential of AI technology and advocated for the team. Allow more time. He firmly believes that algorithms and a large amount of data from customer channels and historical usage patterns are the key to the company&#8217;s upgrade of the planning process. Wagle&#8217;s IT team found that an important reason why its AI model did not perform well in predicting demand in the early stage was that some of the input information itself was not accurate enough. To this end, he began to persuade colleagues to participate together, helping him to broadly improve the quality of data throughout the enterprise. Many observers believe that this incident is also an important node for Wagle to win the trust and support of opponents. Brian Lillie, who worked with Web domain registrar Verisign and Wagle, said, “His will is very firm. As long as he sees things right, he can always burst out strong willpower and enthusiasm for work, and must pull opponents out. Come to my side.&#8221; It was based on his understanding that Lillie decided to invite Wagle to join Equinix and take up the position of CIO. <strong> &#8220;AI Exploration&#8221; in the Data Center</strong> Wagle also said that Equinix has now fully launched a new idea of ​​using AI to promote facility planning. &#8220;This brings us a very valuable modeling tool, we can predict how long the data center capacity will be completely exhausted, in order to make better supply chain decisions.&#8221; These models also help Equinix more Targeted optimization of its own power consumption, as far as possible to improve the environmental sustainability of the business. His team has also been trying to introduce AI technology in other fields. In terms of sales, they built new models to identify and attract new customers. This set of models absorbs about 100 different input indicators, including the target company&#8217;s financial status and expected growth trajectory. They also use AI technology to promote workflow automation, including working with internal finance teams to develop algorithms, reducing the amount of manual approval work that needs to be processed every year to about one-third.  Picture: An Equinix data center in Amsterdam. The establishment of new Equinix data centers everywhere also reflects the tremendous benefits that Wagle&#8217;s efforts have brought to the enterprise itself-since this year, Equinix&#8217;s stock price has risen by 17%, which greatly exceeds the overall increase of the Nasdaq index. The company said that 2021 has become one of the most active years of business expansion in its history, and it is currently building 36 infrastructure projects in 19 countries or regions. Their plan also includes the construction of more &#8220;super large-scale&#8221; giant data centers, sufficient to support the data and processing needs of Internet giants such as Amazon and Google. On June 14 this year, Equinix announced that it has reached a US$3.9 billion deal with Singapore’s sovereign wealth fund GIC for the continued expansion of facility construction. Equinix is ​​also continuing to expand its fiber optic cable network to maintain efficient data flow between corporate customers. Timothy Horan, an analyst at Oppenheimer, an investment bank, believes that “many customers choose Equinix because they can more easily communicate with other companies here.” Horan compares Equinix to the central station of the Internet. Wagle and his team plan to further promote the full application of AI technology to ensure that these key interconnection systems and the data centers that support the network system always maintain stable and reliable operation</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">26670</post-id>	</item>
		<item>
		<title>Huawei Cloud TechWave Global Technology Summit (Artificial Intelligence &#038; Data) was successfully held</title>
		<link>https://en.spress.net/huawei-cloud-techwave-global-technology-summit-artificial-intelligence-data-was-successfully-held/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Tue, 22 Jun 2021 01:25:11 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Artificial]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[global]]></category>
		<category><![CDATA[held]]></category>
		<category><![CDATA[Huawei]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Successfully]]></category>
		<category><![CDATA[summit]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[TechWave]]></category>
		<category><![CDATA[The financial]]></category>
		<guid isPermaLink="false">https://en.spress.net/huawei-cloud-techwave-global-technology-summit-artificial-intelligence-data-was-successfully-held/</guid>

					<description><![CDATA[On June 18th, the Huawei Cloud TechWave Global Technology Summit (Artificial Intelligence &#38; Data) was successfully held in Shanghai. AI technology sub-forum &#8220;AI technology innovation accelerates the industry&#8217;s intelligent upgrade&#8221; As the theme, Huawei Cloud technical experts shared the latest AI technology and product developments, and industry guests shared AI&#8217;s landing practices in Internet media, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>On June 18th, the Huawei Cloud TechWave Global Technology Summit (Artificial Intelligence &amp; Data) was successfully held in Shanghai. AI technology sub-forum<strong> &#8220;AI technology innovation accelerates the industry&#8217;s intelligent upgrade&#8221;</strong> As the theme, Huawei Cloud technical experts shared the latest AI technology and product developments, and industry guests shared AI&#8217;s landing practices in Internet media, medical, environmental and other industries, and how the Huawei Cloud Pangu NLP model can help companies achieve revenue. Leading figures from all walks of life gathered together to discuss how to implement the AI ​​industry!<br />
 Live photos of the AI-enabled sub-forum</p>
<h1> HUAWEI CLOUD AI continues to innovate, accelerating industry intelligence upgrades</h1>
<p>Fang Fan, a senior planner of Huawei Cloud EI, believes that artificial intelligence has entered thousands of industries and has begun to enter the practical stage. AI has entered the core production system of enterprises and began to create greater value. The overall development strategy of Huawei Cloud AI is to create a full-stack, full-scenario solution for cloud, edge, and end devices, providing ample and economical computing resources, easy-to-use, high-efficiency, and full-process AI platform. At the same time, the latest AI technology and practice accumulation are added to existing products and services, allowing customers to effectively implement AI; and facing the world, continue to cooperate extensively with academia, industry and industry partners to invest in open ecology and talent training.<br />
 Fang Fan, Senior Planner of Huawei Cloud EI<br />
In order to be more committed to lowering the threshold of AI development, Huawei Cloud’s one-stop high-efficiency AI development platform ModelArts continues to upgrade and further upgrades its development capabilities: ModelArts CodeLab, which makes AI exploration and learning more efficient, through a large number of course cases in the AI ​​Gallery, which can be connected in seconds. Entry and practice; ModelArts IDE SDKs, cloud on and off, seamless collaboration, close to the usage habits of developers; ModelArts Studio, flexibly develop AI application workflow, accelerate model experiments and deployment iterations, and improve the overall efficiency of the AI ​​application process. In addition, in order to more conveniently implement AI applications, Huawei Cloud provides a unified framework for Runtime Framework on the cloud side, which can be developed once online, multiple reasoning, and real-time model updates and iterations.</p>
<p> In addition, in order to further reduce the difficulty of development for developers, HUAWEI CLOUD has built the AI ​​Gallery community, providing AI assets such as data sets, algorithms, pre-training models, workflows, models, papers, articles, courses, etc. related to many industries and fields. As with scenario cases, there are currently 2000+ AI assets, the most 6+ asset types in the industry. The newly released HUAWEI Cloud Pangu large model with hundreds of billions of parameters is also among them. It extracts and learns common knowledge for massive data, solves the problem of low-cost large-scale replication, and realizes &#8220;industrialized&#8221; development.</p>
<h1> Classics will be passed on forever, and media AI will bring old movies to life</h1>
<p> Zhou Suyue revealed that the black-and-white movie &#8220;Leifeng&#8221; adopts GPU parallel computing and AI iterative optimization and coloring. The self-learning iterative coloring process solves the two major problems of high computational complexity and difficult model building for black-and-white video coloring; further implementation of neural network automatic learning 1. The color timing consistency between frames, 2. The color space coordination within the frame, 3. The color semantic consistency of the object objects to achieve high-efficiency and high-quality AI coloring results.  Zhou Suyue, Chief Expert of Malanshan Video Cultural and Creative Industrial Park Based on the HUAWEI cloud platform and media AI capabilities, Malanshan Video Cultural and Creative Park provides computing, storage, network, video media, AI, big data and other capabilities to meet the needs of cloud services in all aspects of video production, production, and distribution, greatly improving Improved the speed of video processing. The Malanshan Huawei Cloud Audio and Video Industry Innovation Center will combine 2021 industrial operations, joint innovation, industrial planning and ecological construction, from building an industrial park to building an industrial intelligent body, through the construction of the entire process of variety show production, the entire process of film production, and lightweight Four production lines for live broadcast and 3D music production lines, two platforms for video cultural and creative talent training and digital asset trading, as well as virtual production innovation, and the entire chain on the cloud, help Malanshan build a highly competitive China &#8220;V&#8221; valley.</p>
<h1> Every second counts for the new crown epidemic, AI increases the efficiency of drug screening by ten times</h1>
<p> The speech by Dr. Mingyue Zheng, a researcher at the Shanghai Institute of Materia Medica, Chinese Academy of Sciences, focused on the AI ​​large-scale virtual drug screening cloud service released by HUAWEI CLOUD EIHealth and the drug federation learning service based on HUAWEI CLOUD ModelArts.  Dr. Mingyue Zheng, Researcher, Shanghai Institute of Materia Medica, Chinese Academy of Sciences Based on the HUAWEI CLOUD medical agent EIHealth, Researcher Zheng Mingyue and HUAWEI CLOUD team have carried out a number of AI drug research and development cooperation projects, such as the iPhord algorithm for predicting protein structure from the primary sequence for early research on drug targets, and the AI ​​prediction algorithm for drug relocation , Use the multi-omics automatic modeling tool AutoOmics to quickly discover biomarkers, use the personalized federated learning integration algorithm FedAMP to achieve efficient and safe integration of pharmaceutical enterprise data, and use Huawei Cloud&#8217;s automatic AI modeling tool for omics data to accurately predict drug attributes Wait. HUAWEI CLOUD EI Medical Intelligence (EIHealth) platform, based on the powerful AI capabilities of HUAWEI CLOUD AI Ascension Cluster Service and HUAWEI CLOUD ModelArts one-stop AI development and management platform, integrates many algorithms, tools, AI models and automated pipelines in the medical field . Through the medical agent platform, protein homology modeling, molecular dynamics simulation calculations, and large-scale virtual drug screening can be completed quickly, and tens of millions of simulation calculations can be completed in a short time, greatly shortening the screening time and improving drug screening More than 10 times the efficiency.</p>
<h1> Intelligent algorithm empowers indoor air quality</h1>
<p> Wu Ke, deputy dean of Daikin China Institute of Technology Development, explained how intelligent algorithms empower IAQ to monitor, predict, and control indoor air.  Wu Ke, Vice President of Daikin China Institute of Technology Development After the new crown epidemic in 2020, people pay more attention to the indoor environment. Users gradually accept CO2 as an important indoor air (IAQ) indicator. The air retention of CO2 can cause discomfort to the human body and increase the possibility of spreading influenza. In addition, the country’s carbon is at its peak, the carbon neutrality policy is clearly directed, and the company’s energy saving requirements have become a must. IAQ is a highly professional field, and standards and testing methods need to be interpreted by professionals. In general commercial scenarios, there is a lack of professional personnel and effective data detection and control. In order to solve user pain points, Wu Ke led the team and Huawei Cloud EI team to dig deep into IAQ&#8217;s reserve technology, through big data and AI algorithms, to achieve air quality prediction, so as to accurately define the time point of the fresh air switch. In the air quality prediction project, the advantages of efficient integration and joint optimization of the HUAWEI CLOUD Pangu large model are used to improve the prediction accuracy and efficiency, and play an extremely important role in the prediction of intelligent control and air cleanliness indicators.</p>
<h1> AI enables intelligent transformation of the financial industry</h1>
<p> Zhang Song, Director of Huawei Cloud EI Product Solutions, mentioned that the key to the entire financial value chain is how to collect and transform physical world information, how to extract digital credit, and then evaluate financial assets based on digital credit. Four aspects are involved in this process:</p>
<blockquote class="ql-align-justify"><p> 1. Efficiency improvement: The difficulty lies in the huge amount of information collection, the difficulty in extracting unstructured data, and the many process breakpoints.
</p></blockquote>
<blockquote class="ql-align-justify"><p> 2. Risk control: Fraudulent transactions are grouped, the equity structure is nested, and the credit relationship is complicated.
</p></blockquote>
<blockquote class="ql-align-justify"><p> 3. Investing in research and improving efficiency: It involves many data sources, strong dependence on data service providers, and strong data interference signals.
</p></blockquote>
<blockquote class="ql-align-justify"><p> 4. Risk pricing: requires strong real-time calculations and high demand for combined pricing.
</p></blockquote>
<p>  Zhang Song, Director of Huawei Cloud EI Product Solutions Based on customer demands, HUAWEI CLOUD proposed innovative solutions for the financial value chain: automated smart operation, smart risk control, and smart investment and research. First of all, the automated smart operation solution uses the capabilities of AI+RPA to create digital employees, perform repetitive tasks, and increase service efficiency by 20 times in financial marketing scenarios. Second, the smart risk control solution uses the Huawei Cloud GES graph computing engine and the RTD real-time decision engine to build relationships based on information such as capital flow, transfer records, accounts, corporate information, and industry information, and effectively improve risk control and marketing levels by mining relationships. Finally, the intelligent investment research solution based on the HUAWEI Cloud Pangu model integrates millions of financial news and Chinese and foreign stock data across the entire network, monitors hundreds of commodity prices, e-commerce commodity prices and sales, monitors various risk events, and uses nature. Language processing technology establishes a graph of the relationship between events and securities, and realizes event-driven risk prevention and control and investment opportunity mining.</p>
<h1> How Huawei Cloud Pangu NLP Large Model Helps Companies Realize Revenue Growth</h1>
<p> Dr. Yang Zhilin, co-founder of Recycle Intelligence, described the HUAWEI CLOUD Pangu NLP large model created in collaboration with HUAWEI CLOUD, which overcomes the problems of traditional large models in commercial implementation, and brings “improvement of employee execution ability in enterprise marketing and communication scenarios”. Solutions for three business scenarios, such as &#8220;target customer preference&#8221; and &#8220;compliance enhancement&#8221;, help companies to improve employee professional capabilities faster, find target customers faster, reduce compliance risks, and reshape customer experience And the steady growth of revenue.  Dr. Yang Zhilin, Co-founder of Recycle Intelligence Among them, the &#8220;employee execution improvement&#8221; scenario solution uses the HUAWEI CLOUD Pangu NLP large model to digitally model the real sales communication process, open the black box of the communication process, and help managers to supervise the daily execution of sales staff, and make targeted guide. At the same time, it provides real-time assistance systems for front-line sales personnel to help them improve execution and productivity. The &#8220;target customer optimization&#8221; solution uses the HUAWEI CLOUD Pangu NLP large model to build an intention prediction model based on the communication dialogue data and the result of the order. Through the algorithm model, the high intention customers in the stock clues can be screened, or the customers who are more interested in a certain product can be screened Target customers, reduce the waste of energy on low-intention leads, and improve the efficiency of sales staff. The &#8220;Compliance Enhancement&#8221; solution leverages the paragraph-level semantic analysis capabilities of the HUAWEI CLOUD Pangu NLP model to help companies discover potential compliance risks in the communication between employees and customers, and greatly enhance business compliance.</p>
<h1> Collaborative deployment of end-side cloud, accelerating the landing of industry AI applications</h1>
<p> Finally, Xie Zhouyi, service director of HUAWEI CLOUD EI HiLens, explained how the AI ​​platform of HUAWEI CLOUD can solve this problem through the collaborative end-to-cloud solution.  Xie Zhouyi, Director of Huawei Cloud EI Services In the process of AI applications being implemented in various industries, developers need to develop multiple sets of incompatible AI applications based on different platform development standards and interfaces, resulting in a long AI application development cycle and high costs. In addition, how to agile development and rapid deployment of AI applications has become an important problem to be solved in the AI ​​industry. Huawei Cloud’s HiLens platform is the industry’s first end-cloud collaborative AI application development and deployment platform. Based on the three capabilities of the management and operation platform HiLens Console, the development framework HiLens Framework, and the cloud development environment HiLens Studio, Huawei Cloud HiLens supports developers You can quickly develop your own skills without setting up the environment, and can simulate the effect of the algorithm online, and you can also use the rich AI skills preset on the platform. Through the unified development framework of HiLens end-side cloud, AI skills can be deployed to HiLens-supported end-side or edge devices for real-time reasoning. At the same time, it can also be combined with the capabilities of Huawei Cloud Cloud to easily integrate into third-party platform systems to form overall AI Business logic, build smart solutions in urban, financial, park, water, and industrial scenarios, and promote the rapid implementation of AI applications in various industries. Follow @Huaweiyun for more information</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">26502</post-id>	</item>
		<item>
		<title>Digital consumer protection Security gaps in health apps In the corona pandemic, health apps have gained many users. For some, however, there is a lack of data protection. This was the result of a study by the Federal Office for Information Security.</title>
		<link>https://en.spress.net/digital-consumer-protection-security-gaps-in-health-apps-in-the-corona-pandemic-health-apps-have-gained-many-users-for-some-however-there-is-a-lack-of-data-protection-this-was-the-result-of-a-stu/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Mon, 21 Jun 2021 16:35:10 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[As the]]></category>
		<category><![CDATA[BSI]]></category>
		<category><![CDATA[Consumer]]></category>
		<category><![CDATA[Corona]]></category>
		<category><![CDATA[Corona pandemic]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[Federal]]></category>
		<category><![CDATA[gained]]></category>
		<category><![CDATA[gaps]]></category>
		<category><![CDATA[German]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[health]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[lack]]></category>
		<category><![CDATA[Office]]></category>
		<category><![CDATA[Pandemic]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[result]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Study]]></category>
		<category><![CDATA[users]]></category>
		<guid isPermaLink="false">https://en.spress.net/?p=26336</guid>

					<description><![CDATA[Digital consumer protection Vulnerabilities in health apps As of: 16.06.2021 1:53 p.m. In the corona pandemic, health apps have gained many users. For some, however, there is a lack of data protection. This was the result of a study by the Federal Office for Information Security. The Federal Office for Information Security (BSI) found numerous [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="ts-image" src="https://www.tagesschau.de/multimedia/bilder/smartphone-137https://www.tagesschau.de/https://www.tagesschau.de/~_v-videowebm.jpg" srcset="https://www.tagesschau.de/https://www.tagesschau.de/~_v-videowebm.jpg" alt="Man holds smartphone in his hands | AP" title="Man holds smartphone in his hands | AP"></p>
<h1> Digital consumer protection Vulnerabilities in health apps </h1>
<p>As of: 16.06.2021 1:53 p.m. </p>
<p> <strong> In the corona pandemic, health apps have gained many users. For some, however, there is a lack of data protection. This was the result of a study by the Federal Office for Information Security.</strong> The Federal Office for Information Security (BSI) found numerous security gaps in an investigation of health apps. According to a BSI report, six out of seven thoroughly tested apps transmitted passwords in clear text to authentication services. None of the apps fully met the security requirements of the BSI guidelines for health apps. The BSI did not provide the names of the apps examined.</p>
<p><a   class="teaser-absatz__link" href="https://en.spress.net/wp-content/plugins/wp-optimize-by-xtraffic/redirect/?gzv=H4sIAAAAAAACAxXGMQ7DIAwAwL-wg5s1b_HiUiu2QijCJgxV_p5mOOl-YYQ1iHuzFQFhzpmcNjbLQiN9GEHryea6keuJ8O6xcxbufwimT4XVrQzOO8fCvVJrkap_a1xeSxI_SrhuBAjeLGkAAAA." target="_blank" rel="nofollow noopener"> <img fifu-featured="1" decoding="async" class="ts-image js-image" src="https://www.tagesschau.de/multimedia/bilder/lernapp-anton-101~_v-klein1x1.jpg" alt="" title=""Anton" is displayed on a tablet. ' title = 'The start screen of the learning app "Anton" is displayed on a tablet. '> <strong> Exclusive</strong> 03/10/2021</p>
<p>Learning app &#8220;Anton&#8221; Massive security breach with school app Outsiders could have read out data or pretended to be teachers.</p>
<p></a></p>
<h2> Personal data is not adequately protected</h2>
<p>&#8220;From the point of view of technical IT security, this result must at least be rated as critical, especially in view of the fact that a significant proportion of the apps process sensitive and particularly sensitive data&#8221;, criticized the office for taking care of the data security of the federal government. &#8220;Because, according to the findings of the study, this does not adequately protect user data against attacks.&#8221; The BSI checked the health apps as part of the first report on digital consumer protection 2020, which, due to the corona pandemic, focused on digital health offers.</p>
<p><a   class="teaser-absatz__link" href="https://en.spress.net/wp-content/plugins/wp-optimize-by-xtraffic/redirect/?gzv=H4sIAAAAAAACAw3KMQ6AIAwAwL-wQ2X1LV0aaQoJVgNFEo1_15vvccOtLpudfUVAmHMGI-Het0wjJEYoWkkTQipSjCr7i1s_mgwV_0e22-eixk3a0OTjEkO2vbr3A6XQ2a1cAAAA" target="_blank" rel="nofollow noopener"> <img decoding="async" class="ts-image js-image" src="https://www.tagesschau.de/multimedia/bilder/vivy-app-101~_v-klein1x1.jpg" alt="Vivy health app on smartphone | dpa" title="Vivy health app on smartphone | dpa"> <strong> background</strong> 07/11/2019</p>
<p>Digital Supply Act What changes for patients The Bundestag passed Minister Spahn&#8217;s Digital Supply Act.</p>
<p></a></p>
<h2> damage &#8220;first of all manageable&#8221;</h2>
<p>The BSI expert Nicolas Stöcker described the danger for users of the criticized apps when exploiting the identified loopholes as &#8220;first of all manageable&#8221;. If an attack took place, it would initially only affect a single person. &#8220;It would be worse if the backend, where the data is kept, were also insecure.&#8221; The authority has a corresponding further investigation for the future &#8220;on the screen&#8221;, says Stocker. However, BSI President Arne Schönbohm warned that the deficiencies found were also dangerous: &#8220;Every gap that is there, every weak point that is there has somehow been exploited at some point.&#8221; They are currently working with the app providers to close the gaps. &#8220;If we see that this is not fixed, then we reserve the right to issue a corresponding product warning&#8221;said Schönbohm.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">26336</post-id>	</item>
		<item>
		<title>How to completely erase all data on iPhone</title>
		<link>https://en.spress.net/how-to-completely-erase-all-data-on-iphone/</link>
		
		<dc:creator><![CDATA[Sang Trần]]></dc:creator>
		<pubDate>Sun, 20 Jun 2021 08:23:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[At the root]]></category>
		<category><![CDATA[Catfish]]></category>
		<category><![CDATA[chips]]></category>
		<category><![CDATA[completely]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Delete]]></category>
		<category><![CDATA[Destroy]]></category>
		<category><![CDATA[Drill]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Erase]]></category>
		<category><![CDATA[Flash memory]]></category>
		<category><![CDATA[Ipad]]></category>
		<category><![CDATA[iPad 6]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[IPHONE IPAD]]></category>
		<category><![CDATA[Memory]]></category>
		<category><![CDATA[Motherboard]]></category>
		<category><![CDATA[Remove]]></category>
		<category><![CDATA[setting]]></category>
		<category><![CDATA[The Intercept]]></category>
		<category><![CDATA[Use]]></category>
		<guid isPermaLink="false">https://en.spress.net/how-to-completely-erase-all-data-on-iphone/</guid>

					<description><![CDATA[If the user has an unused iPhone, wiping the data is essential. Depending on the importance of each type of data, the way to delete information will be different. If you&#8217;re planning to sell, give away, or throw away an old iPhone or iPad, make sure you&#8217;ve erased any personal information on the device and [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>If the user has an unused iPhone, wiping the data is essential. Depending on the importance of each type of data, the way to delete information will be different.</strong><br />
<span id="more-25826"></span> If you&#8217;re planning to sell, give away, or throw away an old iPhone or iPad, make sure you&#8217;ve erased any personal information on the device and that it won&#8217;t be recovered.</p>
<p> According to the <em> The Intercept, </em> In addition to the usual way, there is an &#8220;unofficial&#8221; way to ensure that the data on the iPhone cannot be restored. However, doing so would mean damaging the device. <strong> The official way to wipe iPhone</strong> The encryption key is where your iPhone/iPad uses to decrypt information, so removing this key leaves all your data permanently encrypted and therefore inaccessible. The first thing you&#8217;ll need is a working iPhone/iPad that you can navigate using the touchscreen or connect to a computer. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_119_39183930/da6bc422cb60223e7b71.jpg" width="625" height="468"> <em> Before selling, giving or transferring iPhone, users should wipe old personal data. Photo: iMore. </em> The easiest way is to do the following steps:<strong> Settings > General > Reset > Erase All Content and Settings</strong> <em> .</em> If your device for some reason cannot access <strong> Setting</strong> , you can try the second way by connecting them to your laptop or desktop and restore them through a third device. If the above two methods still don&#8217;t work, try putting the device into Recovery Mode<em> , </em> iPhone/iPad will return to factory settings and erase all your data. Alternatively, if your device won&#8217;t even turn on, use Force Restart according to the manufacturer&#8217;s instructions, then follow one of the methods outlined above. <strong> The most thorough way to delete data</strong> If you have tried all the steps above and your device still won&#8217;t turn on or can&#8217;t connect to the computer, the best way is to destroy the memory chip, which contains all user data. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_119_39183930/cfafd5e6daa433fa6ab5.jpg" width="625" height="780"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_119_39183930/ab89b3c0bc8255dc0c93.jpg" width="625" height="130"> <em> The flash memory chip (yellow border below) is in the same black board and controller chip. Photo: The Intercept. </em> In &#8216;s post <em> The Intercept</em> , the author used iPad 6 as an example of how to destroy memory chips. However, regardless of model, the general procedure is the same: remove the iPhone/iPad screen, find the board, and destroy the memory chip. To get the memory chip, you must disassemble your iPad. First, find a way to remove the iPad&#8217;s touch screen so you can look at the internal components. There are specialized tools on the market to remove the panel, but if such tools are not available, you can heat around the edge of the screen, to melt the adhesive, then use a flat object and gently pry the monitor up. After removing the screen, you&#8217;ll find the iPad&#8217;s battery with a metal shell on the side that houses the iPad&#8217;s logic board and memory chip. Remove all securing screws and connection cables, and remove the board cover. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_119_39183930/6644700d7f4f9611cf5e.jpg" width="625" height="351"> <em> Use the drill to destroy the memory chip. Photo: The Intercept. </em> After removing the cover, you will see the memory chip is silver and located in a metal shell, next to the logic board and the black processor chip. Now all you have to do is take out the flash chip and destroy it. The suggestion from the article is to use a drill and drill through the memory chip until the device breaks. The author of the article recommends that you ensure safety issues before starting to destroy the aforementioned chip. The above method is also used by many hackers around the world to delete evidence. Catfish, the owner of Chicken Drumstick, the biggest game cheat ever, recounted smashing his memory chips one by one to erase the crime. Once discovered, Catfish quickly shut down the servers running the cheat software, and hammered out all the hard drives that might still contain cheat-related data. “I panicked so much that I smashed every chip I saw in the SSD. Then I dumped it all a few miles away,” Catfish said.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25826</post-id>	</item>
		<item>
		<title>Technology must serve the community</title>
		<link>https://en.spress.net/technology-must-serve-the-community/</link>
		
		<dc:creator><![CDATA[Thanh Hà]]></dc:creator>
		<pubDate>Sun, 20 Jun 2021 01:32:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Approach]]></category>
		<category><![CDATA[Briefings]]></category>
		<category><![CDATA[Community]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Declare]]></category>
		<category><![CDATA[Disruptive]]></category>
		<category><![CDATA[Fight Covid 19]]></category>
		<category><![CDATA[Measure]]></category>
		<category><![CDATA[minister]]></category>
		<category><![CDATA[Ministry of Information and Communication]]></category>
		<category><![CDATA[Nguyen Manh Hung]]></category>
		<category><![CDATA[Room Technology Center]]></category>
		<category><![CDATA[Serve]]></category>
		<category><![CDATA[State management]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[test]]></category>
		<category><![CDATA[Tracing]]></category>
		<category><![CDATA[Translate]]></category>
		<category><![CDATA[Vaccines]]></category>
		<category><![CDATA[voluntarily]]></category>
		<guid isPermaLink="false">https://en.spress.net/technology-must-serve-the-community/</guid>

					<description><![CDATA[At the online conference of state management in the second quarter of 2021, Minister of Information and Communications Nguyen Manh Hung emphasized on a new approach in combating the Covid-19 epidemic. Minister of Information and Communications Nguyen Manh Hung chaired the State management briefing in the second quarter of 2021. Source: mic.gov.vn Accordingly, currently fighting [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>At the online conference of state management in the second quarter of 2021, Minister of Information and Communications Nguyen Manh Hung emphasized on a new approach in combating the Covid-19 epidemic.</strong><br />
<span id="more-25715"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_8_39183500/7b7782058d4764193d56.jpg" width="625" height="389"> </p>
<p> Minister of Information and Communications Nguyen Manh Hung chaired the State management briefing in the second quarter of 2021. <em> Source: mic.gov.vn</em> Accordingly, currently fighting against the Covid-19 epidemic has changed from being the main defense to the main attack; the attack on all 3 shots: Active testing even when there is no epidemic and rapid testing; switch from encouraging to mandatory use of some key technologies; Vaccines are the decisive attack. Action motto from &#8220;5K + vaccine&#8221; to &#8220;5K + vaccine + technology&#8221;. According to Minister Nguyen Manh Hung, technology is important to apply before the epidemic, because it is like a &#8220;night watch&#8221; to protect people, so that when the epidemic breaks out, we have data to detect quickly. close contacts, not large-scale isolation. Therefore, the Ministry of Information and Communications must work closely with the Ministry of Health to propagate so that people understand that the application of technology is a factor to ensure successful epidemic prevention and control. Technology must be applied in the stages of medical declaration, entry, testing, tracing, isolation, vaccination; even technological solutions to measure and warn about a well-ventilated working environment, reducing the risk of infection. Along with that, it is necessary to strengthen persuasion for people to understand and voluntarily use and not abuse administrative measures. The Minister of Information and Communications also emphasized that technology is a lot but must not cause trouble for people, that is, it must be re-integrated through a single portal, people only have to do it once. The establishment of the Technology Center for Covid-19 prevention and control is also for that purpose. Technology must bring benefits to the people, the community and the value brought must be greater than the cost. Technology is not an investment to take advantage of, not an additional cost for the budget, for the business or organization, but for the technology to create added value.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25715</post-id>	</item>
		<item>
		<title>Is the &#8216;transforming&#8217; application Voila AI Artist as dangerous as FaceApp?</title>
		<link>https://en.spress.net/is-the-transforming-application-voila-ai-artist-as-dangerous-as-faceapp/</link>
		
		<dc:creator><![CDATA[An Khang]]></dc:creator>
		<pubDate>Sat, 19 Jun 2021 11:36:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[app]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[APPSTORE]]></category>
		<category><![CDATA[Artist]]></category>
		<category><![CDATA[Cartoon]]></category>
		<category><![CDATA[Cause fever]]></category>
		<category><![CDATA[Dangerous]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Developers]]></category>
		<category><![CDATA[Edit]]></category>
		<category><![CDATA[FaceApp]]></category>
		<category><![CDATA[Figure]]></category>
		<category><![CDATA[Image processing]]></category>
		<category><![CDATA[Pixar]]></category>
		<category><![CDATA[Play Store]]></category>
		<category><![CDATA[Renaissance]]></category>
		<category><![CDATA[Sensor Tower]]></category>
		<category><![CDATA[setting]]></category>
		<category><![CDATA[Transfiguration]]></category>
		<category><![CDATA[transforming]]></category>
		<category><![CDATA[Tri Duc]]></category>
		<category><![CDATA[Understand]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Voila]]></category>
		<category><![CDATA[WIRED]]></category>
		<guid isPermaLink="false">https://en.spress.net/is-the-transforming-application-voila-ai-artist-as-dangerous-as-faceapp/</guid>

					<description><![CDATA[App that converts faces into cartoon characters is causing fever on Vietnamese social networks and many countries. Users need to understand before deciding to install this app. Recently, the photo editing application Voilá AI Artist has become a trend on social networking sites, similar to last year&#8217;s FaceApp trend. The trend of &#8220;transforming&#8221; into cartoon [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>App that converts faces into cartoon characters is causing fever on Vietnamese social networks and many countries. Users need to understand before deciding to install this app.</strong><br />
<span id="more-25483"></span> Recently, the photo editing application Voilá AI Artist has become a trend on social networking sites, similar to last year&#8217;s FaceApp trend. The trend of &#8220;transforming&#8221; into cartoon characters is not only causing a fever in Vietnam, the Voilá AI Artist application has had more than 8 million downloads globally, according to data from an analytics company. <em> Sensor Tower</em> .</p>
<p> This tool supports editing user photos into animated characters of Pixar or Disney. Although there are no controversial, worrying terms like FaceApp, Voilá AI Artist still has certain conditions for users. <strong> How much does it cost to use Voila ?</strong> Application &#8220;transform&#8221; Voilá is a photo editing tool that is free to download on iOS and Android. This app helps users turn their photos into hand-drawn caricatures, cartoon characters or a Renaissance painting. This application only allows 3 days of free use, before the screens and conditions for collection appear. Specifically, the Voilá Pro package costs $2/week on Android and $3/week for the iOS version. To use the app for 1 year, the developer has more preferential packages such as 21 USD / year for Android or 30 USD / year on Apple devices. Paying users will get rid of ads, speed up image processing and unlock other features like removing the app icon from the image when exporting. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_119_39179332/04b6c937c6752f2b7664.jpg" width="625" height="260"> <em> Portrait of billionaire Elon Musk before and after using the Voilá AI Artist app. Photo: OlharDigital. </em> According to the <em> Wired</em> , when paying, it&#8217;s true that the app processes photos faster. However, it is not possible to confirm if it is due to the processing acceleration feature or because the app has removed ads. Compared to free apps that often appear on the Play Store or AppStore, Voilá has a more &#8220;sustainable&#8221; way of collecting money. Usually, users only need to pay a one-time amount of a few dollars if they want to quit ads, or accept to see periodic ads for free use. With weekly payment mode, users also need to note the automatic payment. Compared to the whole year price, if you buy a weekly package just to edit a few photos and forget, users can lose tens to hundreds of dollars if they forget to remove automatic payment. This is not an uncommon problem with today&#8217;s paid recurring or content services. Users should be careful to avoid wasting money when the application automatically renews. <strong> Doesn&#8217;t require &#8216;sensitivity&#8217; like FaceApp, but still has a privacy note</strong> Like all apps that have access to data, Voilá AI Artist can also compromise user privacy. According to the application terms, Voilá is allowed to transfer and store users&#8217; images like many other editing apps. This application may use users&#8217; images for their own advertising purposes without notice or fees. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_119_39179332/768fb70eb84c5112085d.jpg" width="625" height="312"> <em> Like photo editing apps, Voilà also asks permission to use user data for advertising. </em> In 2020, Vietnamese people used to compete to post edited photos from the FaceApp application. Like Voilá, FaceApp brings effects such as changing gender, making an old face or turning a child. However, FaceApp&#8217;s data requests are much more sensitive. Specifically, the installation part of FaceApp requires the right to launch with the system, access memory, run in the background, full permission to use the Internet&#8230; Thus, after installation, FaceApp has the right to automatically launch, access access memory and transfer data to the server. &#8220;With more than 100 million downloads, this is a huge data store. Some access rights exceed the limits of photo editing applications,&#8221; said Tri Duc, a security expert working in New York, USA. share with <em> Zing when talking about </em> FaceApp<em> .</em> Developers <em> Website.AI </em> of the application Voilá AI Artist said their company will delete the data after 24-48 hours. However, this claim has yet to be verified. So, <em> Wired </em> users need to understand that the use of these &#8220;transforming&#8221; applications carries certain risks and needs to be responsible for themselves before using.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25483</post-id>	</item>
		<item>
		<title>Beware of the trend of cartoon photos that are &#8220;storming&#8221; on Facebook</title>
		<link>https://en.spress.net/beware-of-the-trend-of-cartoon-photos-that-are-storming-on-facebook/</link>
		
		<dc:creator><![CDATA[Trọng Đạt]]></dc:creator>
		<pubDate>Sat, 19 Jun 2021 02:01:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Alert]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Beware]]></category>
		<category><![CDATA[Caricatures]]></category>
		<category><![CDATA[Cartoon]]></category>
		<category><![CDATA[Collect]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Edit]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Filter]]></category>
		<category><![CDATA[MAD]]></category>
		<category><![CDATA[Make it rain]]></category>
		<category><![CDATA[Movement]]></category>
		<category><![CDATA[On face]]></category>
		<category><![CDATA[photos]]></category>
		<category><![CDATA[Pixar]]></category>
		<category><![CDATA[Processing speed]]></category>
		<category><![CDATA[Purpose]]></category>
		<category><![CDATA[Renaissance]]></category>
		<category><![CDATA[storming]]></category>
		<category><![CDATA[Trend]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Voilà AI Artist]]></category>
		<guid isPermaLink="false">https://en.spress.net/beware-of-the-trend-of-cartoon-photos-that-are-storming-on-facebook/</guid>

					<description><![CDATA[Facebook users are caught up in the trend of cartoon images without knowing that their images can be collected and used for other purposes. A few days back, when accessing Facebook, many people will notice a dense appearance of posts related to cartoon images. Pay closer attention, those are the same Facebook users&#8217; images posted [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Facebook users are caught up in the trend of cartoon images without knowing that their images can be collected and used for other purposes.</strong><br />
<span id="more-25303"></span> A few days back, when accessing Facebook, many people will notice a dense appearance of posts related to cartoon images. Pay closer attention, those are the same Facebook users&#8217; images posted under cartoon images.</p>
<p> These images are transformed from ordinary photos to drawings in a very soulful way. Just a few simple steps, anyone will turn themselves into a cartoon character. As a result, many Facebook users have been fascinated by this trend. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_23_39178230/88c7a44aab0842561b19.jpg" width="625" height="625"> <em> Due to Voila AI Artist&#8217;s impressive photo editing capabilities, internet users are going crazy with the cartoon photo trend. </em> According to the research of <em> VietNamNet</em> , to create such animated images, users have to download a photo editing app called Voilà AI Artist. According to the introduction of the development team, Voilà AI Artist is an application that combines human creativity and artificial intelligence. The aim is to turn photos into fun cartoons and create stunning masterpieces. Using Voilà AI Artist is quite simple, this application provides 4 different filter groups. Users can download and use it for free without creating an account. If you want to use the paid version with more advanced features, users will have to pay 48,000 VND/week, 87,000 VND/month or 476,000 VND/year of use. Paying will help the image processing speed faster, in addition, the returned image is not watermarked. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_23_39178230/c302e98fe6cd0f9356dc.jpg" width="625" height="416"> <em> Filters of Voila AI Artist photo editing application. Photo: Trong Dat</em> To create animated images, users only need to upload photos to the application for the AI ​​system to automatically process. In addition to creating images in the style of Pixar cartoon characters, the application also helps turn ordinary photos into renaissance paintings or caricatures. With such attractive features, even though it has only appeared since May 31, 2021 on A, Voilà AI Artist has stormed and created a fever with more than 10 million downloads globally. . And Vietnamese users are also very quickly caught up in that new trend. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_23_39178230/2004088907cbee95b7da.jpg" width="625" height="625"> <em> In addition to creating cartoon images, Voila AI Artis can also create renaissance-style drawings. </em> However, users should note because in addition to the rights required in normal photo editing applications such as accessing the camera, taking photos, reading content, modifying or deleting content in memory, Voilà AI Artist also requires quite a few sensitive permissions. Accordingly, one of the requirements when using Voilà AI Artist is location access, permission to run at startup, read notifications and prevent the phone from going to sleep. Voilà AI Artist is a product of Wemagine.AI. This is a company registered in the state of British Colombia (Canada). According to the developer, by downloading and installing the application, the user agrees to be bound by Voilà AI Artist&#8217;s terms and privacy policy. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_23_39178230/b64c91c19e8377dd2e92.jpg" width="625" height="416"> <em> Users need to be careful because the policy of the Voila AI Artis developer has many absurd points. Photo: Trong Dat</em> By accessing the application, from the first access, the user has unconditionally agreed to the terms of Voilà AI Artist and irrevocably these constraints. The application developer also reserves the right to change the terms and conditions and these changes are effective immediately without the consent of the user. In general, with photo editing applications like Voilà AI Artist, users need to be extremely vigilant about issues related to data and privacy. This is because, through the development of Voilà AI Artist, the developer can collect users&#8217; personal images for other purposes.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25303</post-id>	</item>
		<item>
		<title>This week&#8217;s &#8220;horror data&#8221; + Fed interest rate decision, the dollar is dead!</title>
		<link>https://en.spress.net/this-weeks-horror-data-fed-interest-rate-decision-the-dollar-is-dead/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Sat, 19 Jun 2021 00:29:12 +0000</pubDate>
				<category><![CDATA[World]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Dead]]></category>
		<category><![CDATA[decision]]></category>
		<category><![CDATA[dollar]]></category>
		<category><![CDATA[Fed]]></category>
		<category><![CDATA[Horror]]></category>
		<category><![CDATA[Interest]]></category>
		<category><![CDATA[rate]]></category>
		<category><![CDATA[weeks]]></category>
		<guid isPermaLink="false">https://en.spress.net/this-weeks-horror-data-fed-interest-rate-decision-the-dollar-is-dead/</guid>

					<description><![CDATA[Before the Fed&#8217;s interest rate decision, the market began to bet that the bank will tighten its policy? Local time Monday (June 14), a survey by the New York Federal Reserve showed that American households’ expectations for next year’s inflation, housing prices, income and expenditure growth all rose in May; the median one-year inflation expectation [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong> <strong>Before the Fed&#8217;s interest rate decision, the market began to bet that the bank will tighten its policy?</strong></strong></p>
<p><span id="more-25276"></span> Local time Monday (June 14), a survey by the New York Federal Reserve showed that American households’ expectations for next year’s inflation, housing prices, income and expenditure growth all rose in May; the median one-year inflation expectation in May increased from 3.4 in April. % Rose to 4.0%, a new high since the inflation expectations index was launched in 2013.</p>
<p><img fifu-featured="1" decoding="async" src="https://p0.itc.cn/q_70/images01/20210615/3ccbb55bb89647998f9bc245e0c36d8f.png" max-width="600"></p>
<p>On the same day, another data released by the New York Fed also received attention. The data shows that the Fed accepted US$583.9 billion in fixed-rate reverse repurchase, which continued to hit a record high and exceeded US$500 billion for four consecutive trading days. This reflects the increasing liquidity in the US dollar financing market.</p>
<p>In addition, data released by the U.S. Department of Labor last Thursday (June 10) showed that the U.S. May unseasonally adjusted CPI annual rate was 5%, the highest since August 2008, with an expected 4.7% and a previous value of 4.2%; the United States 5 The monthly unseasonally adjusted core CPI annual rate was 3.8%, a new high since 1992, expected to be 3.4%, and the previous value was 3.0%.</p>
<p>Inflation continues to soar and liquidity is rampant. More and more institutions believe that the Fed will start the process of debt reduction at the end of this year or early next year. Some institutions even warn the Fed to ignore the risks caused by inflation!</p>
<p>Jamie Dimon, chairman and chief executive officer of JPMorgan Chase, is more direct. He said that JPMorgan Chase has been “efficiently hoarding” cash instead of using it to buy U.S. Treasury bonds or other investments because it is more direct. High inflation may force the Fed to raise interest rates.</p>
<p>In fact, the performance of the market may also reflect some situations. Last Friday (June 11), in the absence of heavy data or event stimulus, the US dollar index rose significantly and once touched 90.60, while gold fell by more than 20 US dollars. The above-mentioned market may be as simple as non-profit-taking, and it is not ruled out that investors are beginning to bet that the Fed will tighten policy soon. But the final decision is in the hands of the Fed.</p>
<p><strong> &#8220;Terror data&#8221; + Federal Reserve interest rate, this week the market ushered in the ultimate test?</strong></p>
<p>On Tuesday (June 15), the United States will release data such as the monthly retail sales rate in May, the PPI in May in the United States, the manufacturing index of the New York Fed in June in the United States, the industrial output in May in the United States, and the NAHB real estate market index in June in the United States. Among them, the US retail sales data in May has attracted much attention.</p>
<p><img decoding="async" src="https://p7.itc.cn/q_70/images01/20210615/a08d9b0645994d1f84409d714e89bbab.png" max-width="600"> </p>
<p> The market expects the monthly rate of retail sales in the United States to fall by 0.7% in May, which was unchanged from the previous value. If the data is in line with or lower than expected, or suggest that the effect of the White House fiscal stimulus is gradually fading, it may weaken the Fed’s expectations of tightening policy. Since consumer spending accounts for about 70% of US economic output, US retail sales data often trigger huge market shocks, so it is commonly called &#8220;terrorist data.&#8221;</p>
<p>In addition, the performance of the US PPI in May cannot be ignored. As a leading indicator of price trends, the performance of the PPI indicator will reflect the relevant situation of production costs. The market expects that the US PPI will rise at an annual rate of 6.3% in May, which will further reveal the pressure on the transmission of production costs. The overall performance of the above two data may cause greater interference to the short-term trend of the US dollar.</p>
<p>But the market is more concerned about the upcoming Federal Reserve interest rate decision. At 02:00 AM Beijing time on Thursday (June 17), the Federal Reserve FOMC announced interest rate resolutions, policy statements and economic expectations; at 02:30, Fed Chairman Powell held a press conference.</p>
<p>As the CPI data for two consecutive months &#8220;exploded&#8221;, whether the Fed will change its description of inflation in this policy statement will be one of the focuses of the market&#8217;s attention. If the bank still insists that inflation is temporary, it implies that it should not rush to change the current easing policy, which may cause the US dollar to suffer a new round of crit. However, if the Fed admits that inflation poses risks, it will increase expectations for tightening policies, thereby providing strong support for the US dollar.</p>
<p>In addition, because the scale of reverse repurchase frequently hits new highs, whether the Fed makes a relevant statement on this is also worthy of attention. At the same time, the Fed’s latest quarterly economic outlook and dot-map will provide more guidance for judging the FOMC’s economic outlook, labor market, inflation expectations, and interest rate trends, and they cannot be ignored.</p>
<p>In short, if the Fed releases its hawkish tendencies, especially on the issue of inflation, it will be considered by the market as a signal that the bank is about to turn, and may become the fuse for the dollar to initiate a bull market; however, if the Fed still insists on inflation If it is temporary, the market will interpret that the bank is not in a hurry to tighten policy, which may cause more plunges in the dollar.</p>
<p><strong> Technical analysis of the US dollar index: the performance of a position is extremely critical</strong></p>
<p><img decoding="async" src="https://p4.itc.cn/q_70/images01/20210615/59ca93b8ab1245458334d75fba7886b6.png" max-width="600"></p>
<p>The daily chart of the US dollar index shows that the price fell to 89.54 (May 25 low, A point) after hitting 90.91 (X point) on May 13 and then the market rose and hit 90.63 (June 4 high, Point D), but quickly retreated significantly and formed a bearish Gartley pattern: 0.618XA=AB, 0.886AB=BC, 1.27BC=CD, 0.786XA=AD, AB=CD.</p>
<p>However, the downward market was supported by 0.786AD (89.77) and stabilized the downward trend line since March 31, avoiding further expansion of the decline. The key pressure above is at 90.63. If it breaks through effectively, in addition to destroying the above-mentioned Gartley pattern, the market will also constitute a bullish 123 rule, or confirm a phased bottom. It does not rule out expanding the increase to 91.00 or even 91.50.</p>
<p>If the price drops significantly below 89.77, the market does not rule out falling to 89.50 or even 89.21 levels for support.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25276</post-id>	</item>
		<item>
		<title>China wants access to Cambodia&#8217;s COVID-19 tracing data</title>
		<link>https://en.spress.net/china-wants-access-to-cambodias-covid-19-tracing-data/</link>
		
		<dc:creator><![CDATA[Bình Giang]]></dc:creator>
		<pubDate>Fri, 18 Jun 2021 05:56:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Ambassador]]></category>
		<category><![CDATA[Angkor Wat Temple]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Approach]]></category>
		<category><![CDATA[Asia Times]]></category>
		<category><![CDATA[Cambodia]]></category>
		<category><![CDATA[Cambodias]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[COVID19]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[grasp]]></category>
		<category><![CDATA[MOR]]></category>
		<category><![CDATA[Muay Thai]]></category>
		<category><![CDATA[Officials]]></category>
		<category><![CDATA[Remind again and again]]></category>
		<category><![CDATA[stop]]></category>
		<category><![CDATA[Thai Chana]]></category>
		<category><![CDATA[Tracing]]></category>
		<category><![CDATA[track]]></category>
		<category><![CDATA[WANG]]></category>
		<category><![CDATA[Wang Wentian]]></category>
		<guid isPermaLink="false">https://en.spress.net/china-wants-access-to-cambodias-covid-19-tracing-data/</guid>

					<description><![CDATA[Chinese Ambassador Wang Wentian recently met with Cambodian officials and expressed his request to access a tracing application called &#8216;Stop COVID-19&#8217; that Cambodia has just launched, Asia Times cited sources familiar with the matter. know. Cambodia&#8217;s Angkor Wat temple complex was bustling with tourists. (Photo: Asia Times) The Chinese ambassador is said to have repeatedly [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Chinese Ambassador Wang Wentian recently met with Cambodian officials and expressed his request to access a tracing application called &#8216;Stop COVID-19&#8217; that Cambodia has just launched, Asia Times cited sources familiar with the matter. know.</strong><br />
<span id="more-24865"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_20_39169467/8d139c1692547b0a2245.jpg" width="625" height="418"> </p>
<p> Cambodia&#8217;s Angkor Wat temple complex was bustling with tourists. (Photo: Asia Times) The Chinese ambassador is said to have repeatedly said that this data is needed to help Beijing monitor the movement of people between the two countries, but the reality is that China is now imposing strict quarantine measures. strict for visitors and the two countries do not share borders According to reports, people who install the Stop COVID-19 app when entering a specific location will receive a message of a 6-digit sequence via phone. They need to enter this code to be granted entry. In this way, a digital log is created to record and track the user&#8217;s location based on the phone where the app is installed, as well as their behavior and relationships. Sources said that Ambassador Wang and other Chinese officials offered to assist the Cambodian Ministry of Post and Telecommunications in upgrading the current QR system with Huawei&#8217;s modern digital technology. Last year, China also made a similar offer to Thailand to access two movement tracking apps &#8220;Thai Chana&#8221; and &#8220;Mor Chana&#8221;. Chinese agencies are said to have requested access to information about foreigners in Thailand. The Chinese official told Thai authorities that any decision on allowing Chinese tourists to return to Thailand would also depend on sharing information on the Thai Chana and Mor Chana apps. Beijing has a bargaining chip when it comes to this proposal. In 2019, when the pandemic had not yet begun, Thailand welcomed 11 million Chinese tourists, more than any other country. Tourism accounts for nearly 20% of Thailand&#8217;s GDP and is currently suffering extremely serious damage because of restrictive measures to deal with the epidemic. However, Thailand has dodged this sensitive offer from China thanks to skillful diplomacy, the sources said. Thai people say that it is difficult to gather all the information in one application because the information is stored in many different databases. Cambodia is even more dependent on Chinese tourists. Out of a total of 5.29 million visitors to Cambodia in 2019, 2 million were from China. Tourism accounted for 32.7% of Cambodia&#8217;s GDP that year, but has been virtually crippled by the pandemic so far. Experts say Cambodia&#8217;s vulnerability and strategic location make it one of the focus of China&#8217;s influence efforts, as well as a target China wants to monitor, especially is with sensitive people in government and armed forces.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24865</post-id>	</item>
		<item>
		<title>Study on corona vaccine Novavax 90 percent effective According to preliminary study data, the corona vaccine from the US pharmaceutical manufacturer Novavax is safe and highly effective &#8211; even with virus variants. The product raises great hopes, especially in developing countries.</title>
		<link>https://en.spress.net/study-on-corona-vaccine-novavax-90-percent-effective-according-to-preliminary-study-data-the-corona-vaccine-from-the-us-pharmaceutical-manufacturer-novavax-is-safe-and-highly-effective-even-with-vi/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 17 Jun 2021 19:40:08 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Corona]]></category>
		<category><![CDATA[Corona vaccine]]></category>
		<category><![CDATA[CORONAVIRUS]]></category>
		<category><![CDATA[countries]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[developing]]></category>
		<category><![CDATA[Effective]]></category>
		<category><![CDATA[German]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Great]]></category>
		<category><![CDATA[highly]]></category>
		<category><![CDATA[hopes]]></category>
		<category><![CDATA[manufacturer]]></category>
		<category><![CDATA[NOVAVAX]]></category>
		<category><![CDATA[Percent]]></category>
		<category><![CDATA[Pharmaceutical]]></category>
		<category><![CDATA[Preliminary]]></category>
		<category><![CDATA[Product]]></category>
		<category><![CDATA[raises]]></category>
		<category><![CDATA[safe]]></category>
		<category><![CDATA[Study]]></category>
		<category><![CDATA[vaccine]]></category>
		<category><![CDATA[variants]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://en.spress.net/?p=24580</guid>

					<description><![CDATA[Corona vaccine study Novavax is 90 percent effective Status: 14.06.2021 2:21 p.m. According to preliminary study data, the corona vaccine from the US pharmaceutical manufacturer Novavax is safe and highly effective &#8211; even with virus variants. The product raises great hopes, especially in developing countries. According to the US pharmaceutical company, the Novavax corona vaccine [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="ts-image" src="https://www.tagesschau.de/multimedia/bilder/novavax-impfstoff-101https://www.tagesschau.de/https://www.tagesschau.de/~_v-videowebm.jpg" alt="Novavax vaccine | REUTERS" title="Novavax vaccine | REUTERS"></p>
<h1> Corona vaccine study Novavax is 90 percent effective </h1>
<p>Status: 14.06.2021 2:21 p.m. <strong> According to preliminary study data, the corona vaccine from the US pharmaceutical manufacturer Novavax is safe and highly effective &#8211; even with virus variants. The product raises great hopes, especially in developing countries.</strong> According to the US pharmaceutical company, the Novavax corona vaccine protects well against the virus and its variants. The company said that the vaccine was around 90 percent effective and, according to preliminary data from a study, safe. The vaccine effectiveness study involved nearly 30,000 people in the United States and Mexico. Two-thirds of them received two doses of the vaccine three weeks apart, all others received placebos. A total of 77 people were infected with the coronavirus, 14 of them in the group of those who were vaccinated. Of the participants who received the drug, none developed severe or moderate symptoms, while there were 14 in the comparison group without vaccination.</p>
<p><a   class="teaser-absatz__link" href="https://en.spress.net/wp-content/plugins/wp-optimize-by-xtraffic/redirect/?gzv=H4sIAAAAAAACAxXJOw6AIBBF0b3QCxo71kJDlM9EZYjzCIVx72J5z31UU1ZloIp1xpneu4ZPQWTLvuk9DKIbf0U4g7DlwicnGoOuGgUc41Rv3tsB4jIt86ozrlO9H4wwY8NbAAAA" target="_blank" rel="nofollow noopener"> <img fifu-featured="1" decoding="async" class="ts-image js-image" src="https://www.tagesschau.de/multimedia/bilder/impfflaeschchen-101~_v-klein1x1.jpg" alt="" title="" title="Vials for vaccine doses from BioNTech / Pfizer | dpa"> <strong> background</strong> 06/14/2021</p>
<p>Corona vaccine Which slows down vaccine production Corona vaccine is still scarce. What makes it so difficult to manufacture quickly in large quantities?</p>
<p></a></p>
<h2> No cases of blood clots or heart problems</h2>
<p>The vaccine was similarly effective against several variants of the coronavirus, including the alpha variant first discovered in the UK, as well as in high-risk groups such as the elderly and people with pre-existing conditions. The side effects were similar to those of other vaccines and mainly concerned pain at the injection site. There have been no reports of blood clots or heart problems, said Novavax boss Stanley Erck. Novavax plans to publish the results in a medical journal where they will be reviewed by independent experts.</p>
<h2> Vaccine important for developing countries</h2>
<p>The company said that applications for approval would be submitted in the USA and Europe, among others, by the end of September. Until then, a production of 100 million cans per month is possible. Novavax&#8217;s vaccine is easy to transport and store, which is why it is expected to play an important role in vaccination campaigns in developing countries. &#8220;Many of our first doses will go to low- and middle-income countries, and that was the goal from the start,&#8221; said Erck. Novavax&#8217;s vaccine works in a similar way to flu vaccines. It is made with laboratory-grown copies of the spike protein that envelops the coronavirus. The immune system reacts to the proteins in the vaccine and is thus prepared when it is actually confronted with the virus. Other vaccines that are widely used today contain the genetic instructions for the body to make its own spike protein.</p>
<p><a   class="teaser-absatz__link" href="https://en.spress.net/wp-content/plugins/wp-optimize-by-xtraffic/redirect/?gzv=H4sIAAAAAAACAyXJMQrAIAwAwL-4a-rat7gEjUbUIhpxKP17C90O7lZLnYpF-jwdONh7G8FEc3rGZQI5wDUrXuFDHLmgg9x61IkGeZacCmXRf2l7WMPSqnpeiy14tlgAAAA." target="_blank" rel="nofollow noopener"> <img decoding="async" class="ts-image js-image" src="https://www.tagesschau.de/multimedia/bilder/coronavirus-suedafrika-103~_v-klein1x1.jpg" alt="A man in Johannesburg voluntarily gets injected with a possible corona vaccine. | AP" title="A man in Johannesburg voluntarily gets injected with a possible corona vaccine. | AP"> <strong> </strong> 02.03.2021</p>
<p>Corona vaccine African countries are back in line again Far too little vaccine, plus wars and conflicts &#8211; the vaccination campaigns in the countries of Africa are not getting off the ground.</p>
<p></a></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24580</post-id>	</item>
		<item>
		<title>Assets in Dubai Scholz lets buy data on tax fraud Finance Minister Scholz has initiated an explosive deal. An anonymous informant obtained data on thousands of Germans who own assets in Dubai. It is about uncovering tax fraud, said Scholz.</title>
		<link>https://en.spress.net/assets-in-dubai-scholz-lets-buy-data-on-tax-fraud-finance-minister-scholz-has-initiated-an-explosive-deal-an-anonymous-informant-obtained-data-on-thousands-of-germans-who-own-assets-in-dubai-it-is-a/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 17 Jun 2021 11:40:07 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[anonymous]]></category>
		<category><![CDATA[assets]]></category>
		<category><![CDATA[buy]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Deal]]></category>
		<category><![CDATA[Dubai]]></category>
		<category><![CDATA[Explosive]]></category>
		<category><![CDATA[Finance]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[German]]></category>
		<category><![CDATA[Germans]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[informant]]></category>
		<category><![CDATA[initiated]]></category>
		<category><![CDATA[Lets]]></category>
		<category><![CDATA[minister]]></category>
		<category><![CDATA[obtained]]></category>
		<category><![CDATA[Olaf Scholz]]></category>
		<category><![CDATA[Scholz]]></category>
		<category><![CDATA[tax]]></category>
		<category><![CDATA[Tax fraud]]></category>
		<category><![CDATA[thousands]]></category>
		<category><![CDATA[Thousands of]]></category>
		<category><![CDATA[uncovering]]></category>
		<guid isPermaLink="false">https://en.spress.net/?p=24385</guid>

					<description><![CDATA[Assets in Dubai Scholz can buy data on tax fraud Status: 11.06.2021 5:57 p.m. Finance Minister Scholz has initiated an explosive deal. An anonymous informant obtained data on thousands of Germans who own assets in Dubai. It is about uncovering tax fraud, said Scholz. Federal Finance Minister Olaf Scholz wants to intensify the fight against [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="ts-image" src="https://www.tagesschau.de/multimedia/bilder/dubai-165https://www.tagesschau.de/https://www.tagesschau.de/~_v-videowebm.jpg" alt="Dubai skyline | picture alliance / CHROMORANGE" title="Dubai skyline | picture alliance / CHROMORANGE"></p>
<h1> Assets in Dubai Scholz can buy data on tax fraud </h1>
<p>Status: 11.06.2021 5:57 p.m. </p>
<p> <strong> Finance Minister Scholz has initiated an explosive deal. An anonymous informant obtained data on thousands of Germans who own assets in Dubai. It is about uncovering tax fraud, said Scholz.</strong> Federal Finance Minister Olaf Scholz wants to intensify the fight against tax fraud. &#8220;At my instigation, the Federal Central Tax Office procured a CD containing tax-relevant data from the Emirate of Dubai,&#8221; he said in Berlin. These data would soon be evaluated by the federal states. It is about uncovering possible crimes such as tax fraud. &#8220;Tax evasion is not a trivial offense, but a criminal act.&#8221;</p>
<p><a   class="teaser-absatz__link" href="https://en.spress.net/wp-content/plugins/wp-optimize-by-xtraffic/redirect/?gzv=H4sIAAAAAAACAwXBOw7DIAwA0Luwg5s1Z_FCsYWRElT5A0OVu-e9f4p0JnH_2YmAsPcuXjubNalRiBHGXGw-evWxECZp3qQIi5VqE8_mHKxfdo2eKbSJRZOYnWc-PkcRv6_0vLxYauJpAAAA" target="_blank" rel="nofollow noopener"> <img fifu-featured="1" decoding="async" class="ts-image js-image" src="https://www.tagesschau.de/multimedia/bilder/puerto-rico-135~_v-klein1x1.jpg" alt="" title="" title="The Capitol in Puerto Rico | REUTERS"> <strong> Exclusive</strong> 08/12/2020</p>
<p>Data leak Bank is said to have helped with tax fraud The BKA searched the houses and business premises of German customers of a bank in Puerto Rico.</p>
<p></a></p>
<h2> Assets hidden from the tax authorities?</h2>
<p>The &#8220;Spiegel&#8221; had first reported on the process. An anonymous informant offered the data. The purchase cost the Federal Central Tax Office around two million euros. According to the magazine, millions of taxpayers are said to be affected, including several thousand Germans who, among other things, have land and real estate in the Gulf emirate. The data provided insights into assets that were hidden from the tax authorities in Dubai, according to the ministry report. In addition to clearing up criminal offenses, the data also ensured that the tax authorities would have full access to cross-border transactions. This would avoid loss of income.</p>
<p><a   class="teaser-absatz__link" href="https://en.spress.net/wp-content/plugins/wp-optimize-by-xtraffic/redirect/?gzv=H4sIAAAAAAACAwXBwQqAIAwA0H_ZXUdBF79ll2EjhTRpU4Po33vvhQ4BklnTQEg45_TGh6jGxN3vQpjrELV8sOVB2LheNxcmjL04edyybj5ZOeH7AYq9vphMAAAA" target="_blank" rel="nofollow noopener"> <img decoding="async" class="ts-image js-image" src="https://www.tagesschau.de/multimedia/bilder/aktentasche100~_v-klein1x1.jpg" alt="A man with a briefcase is reflected in a house facade. | dpa" title="A man with a briefcase is reflected in a house facade. | dpa"> <strong> </strong> 07/12/2019</p>
<p>European financial supervision Tax deal fraud continues According to a report by the European Financial Market Authority, there are still tax-driven transactions.</p>
<p></a></p>
<h2> Handover to the federal states next week</h2>
<p>After the secret handover of the material, the data is now, according to the &#8220;Spiegel&#8221; report, at the Federal Central Tax Office in Bonn. Next week they should be sent to the tax authorities of the federal states so that they can examine aspects of criminal tax law and, if necessary, initiate investigations. So far, only federal states had bought tax data. The then North Rhine-Westphalian finance minister and today&#8217;s SPD leader Norbert Walter-Borjans bought several tax data CDs. He was NRW Minister of Finance from 2010 to 2017.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24385</post-id>	</item>
		<item>
		<title>Last year, a net loss of 489 million medical big data company Zero Krypton Technology went to the US for IPO</title>
		<link>https://en.spress.net/last-year-a-net-loss-of-489-million-medical-big-data-company-zero-krypton-technology-went-to-the-us-for-ipo/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 17 Jun 2021 11:01:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Big]]></category>
		<category><![CDATA[Company]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[IPO]]></category>
		<category><![CDATA[Krypton]]></category>
		<category><![CDATA[Loss]]></category>
		<category><![CDATA[medical]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[Net]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[year]]></category>
		<guid isPermaLink="false">https://en.spress.net/last-year-a-net-loss-of-489-million-medical-big-data-company-zero-krypton-technology-went-to-the-us-for-ipo/</guid>

					<description><![CDATA[Every reporter: Cai Ding Every editor: Wu Yongjiu In the early morning of June 15th, Beijing time, LinkDoc Technology Limited, a Chinese medical big data company, submitted its first F-1 prospectus to the U.S. Securities and Exchange Commission (SEC). The company plans to be listed on the Nasdaq Global Select Market. Listed under the trading [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Every reporter: Cai Ding Every editor: Wu Yongjiu</p>
<p>In the early morning of June 15th, Beijing time, LinkDoc Technology Limited, a Chinese medical big data company, submitted its first F-1 prospectus to the U.S. Securities and Exchange Commission (SEC). The company plans to be listed on the Nasdaq Global Select Market. Listed under the trading code &#8220;LDOC&#8221; and raised US$100 million. The underwriters of ZeroKr Technology&#8217;s IPO are Morgan Stanley, Bank of America Securities and CICC. Since it is the first F-1 prospectus, LingKr Technology has not yet disclosed the number of American Depositary Shares (ADS) to be issued and the expected issuance price range.</p>
<p>The prospectus shows that Zerokrypton Technology intends to use IPO funds raised: about 45% will be used to strengthen R&amp;D capabilities and technical infrastructure, and to attract more oncologists, data scientists and other experienced professionals to join; about 15% will be used for expansion The company’s patient care center network and services, and other capital expenditures; about 25% of the funds will be used for potential strategic investments and acquisitions; about 15% will be used for general corporate purposes.</p>
<p><img fifu-featured="1" decoding="async" src="https://p0.itc.cn/q_70/images03/20210615/0d3ab23c7619464faaaa93cbb6052509.jpeg" width="630"></p>
<p>Visual China Map</p>
<p>Obtained strategic investment from Alibaba Health</p>
<p>According to the prospectus, Zerokrypton Technology was established in 2014, headquartered in Beijing, China, and its corporate address is No. 8 Haidian Street, Haidian District, Beijing. The company is a tumor big data solution provider. In March this year, it received a strategic investment from Ali Health. Other investors include China Investment Corporation and CICC Capital.</p>
<p>The prospectus quoted Frost&amp;Sullivan&#8217;s data as saying that in terms of cultivating high-quality medical data assets, ZeroKrypton Technology is a leading data-driven and artificial intelligence medical technology company. The company has established China&#8217;s largest data-driven digital infrastructure for precision medicine. These include LinkCare, a digital continuous care platform for critically ill patients, LinkData, a longitudinal medical data management system that supports artificial intelligence, and LinkSolutions, a data-driven precision life science solution platform that helps life science companies accelerate clinical research and real evidence adoption.</p>
<p>According to the prospectus, in terms of the nursing platform LinkCare, Lingkrypton Technology generates revenue by selling innovative drugs, auxiliary drugs and nutritional drugs, as well as providing patients with infusion or injection services and other auxiliary businesses; LinkData is the core technology of Lingkrypton Technology. Platforms and R&amp;D engines, not profit channels; LinkSolutions is a platform driven by real-world data, providing accurate life science solutions for life science companies in their clinical and commercialization stages. In the first quarter of 2021, the number of life science company customers of ZeroKr Technology was 169. As of March 31, 2021, LinkSolutions Service of LinkSolutions has supported more than 310 major researchers, covering approximately of the total number of new oncology indications approved for clinical trials in China from 2017 to March 31, 2021. 57%. Specifically, Zerokrypton Technology realizes the monetization of LinkSolutions by charging service fees for comprehensive clinical research services.</p>
<p> The prospectus shows that the vast majority of Zerokrypton Technology&#8217;s revenue comes from the sales of medicines and health products. The sales revenue of medicines and health products accounted for 75% and 85.5% of the company&#8217;s total revenue in 2019 and 2020, respectively, and accounted for 80.2% of the total revenue in the first quarter of 2021.</p>
<p>The prospectus shows that since April 2015, LingKr Technology has provided care for more than 3.5 million patients and provided longitudinal care for more than 2.5 million patients. According to Frost &amp; Sullivan, Zero Krypton Technology has become China&#8217;s largest patient-centered continuous tumor care platform. As of March 31, 2021, ZeroKr Technology has established 34 patient care centers nationwide, covering 28 provinces across the country.</p>
<p>The prospectus shows that in 2019 and 2020, Zerokrypton Technology&#8217;s revenue will be 499 million yuan and 942 million yuan, net losses will be 434 million yuan and 489 million yuan, and basic and diluted losses per share will be 5.32 yuan and 6.59 yuan respectively. In the first quarter of 2021, the company&#8217;s revenue increased by 41% year-on-year to 223 million yuan, a net loss of 138 million yuan, and a basic and diluted loss per share of 1.76 yuan.</p>
<p>Completed six rounds of financing since its establishment</p>
<p>Zerokrypton Technology stated in its prospectus that, based on 2019 data, China is the world&#8217;s second largest medical market, with national medical expenditures of US$944 billion, an increase of 9.7% over 2015. With the improvement of people&#8217;s health awareness and personal disposable income, China&#8217;s total healthcare expenditure is expected to increase to US$2.529 billion at a compound annual growth rate of 9.4% in 2030. The total scale of China’s medical big data solutions market is rapidly growing at a compound annual growth rate of 43.9% from US$1 billion in 2015 to US$4.1 billion in 2019. It is expected to reach US$215.4 billion in 2030. The compound annual growth rate is 43.3%.</p>
<p>The prospectus also stated that among all the treatment fields in China, oncology has the highest growth rate in medical expenditures, mainly because China has the largest number of cancer patients in the world. The scale of China&#8217;s oncology big data market has grown from US$500 million in 2015 to US$2.1 billion, with a compound annual growth rate of 46.1%. It is expected to grow to US$119.6 billion by 2030. The compound annual growth rate from 2019 to 2030 is 44.4%.</p>
<p>The prospectus shows that as of March 31, 2021, ZeroKr Technology has 1,250 full-time employees, of which 199 are responsible for technology and R&amp;D, 573 are responsible for operation and quality assurance, 352 are responsible for sales and marketing, and 126 are responsible for general administrative work. .</p>
<p>According to the prospectus, before the IPO, Zhang Tianze, CEO and director of LingKr Technology, held 61.3 million shares of the company, accounting for 19.7%; LingKr Technology co-founder, COO and CTO Luo Ligang held 9 million shares, accounting for 2.9%; Technology co-founder and executive vice president Li Liping holds 11 million shares, accounting for 3.5%.</p>
<p>According to the information of Qixinbao, since its establishment, Lingkrypton Technology has completed a total of six rounds of financing. After obtaining 1 billion yuan in Series D financing from China Investment Corporation on July 4, 2018, it received CICC Capital and Excellent on September 7, 2020. Hill Capital and Broadband Capital CBC 700 million US dollars in financing. On March 4 this year, Zerokrypton Technology also received a strategic investment from Alibaba Health, but the amount of financing was not disclosed.</p>
<p>The “Daily Business News” reporter noted that Qixinbao’s risk information on ZeroKr Technology showed that the company had been accused of labor disputes and infringement of the right to disseminate information on the Internet on May 15, 2019 and November 23, 2020, respectively. Prosecute. Secondly, on September 1 and December 1, 2020, there were two civil case judgment documents against the intellectual property rights infringement disputes of Zerokrypton Technology. The documents show that in the two dispute cases, Zerokrypton Technology is both defendant. In addition, Zhang Tianze, Li Liping and Luo Ligang all have a small amount of shares currently in a state of pledge.</p>
<p>Daily economic news</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24372</post-id>	</item>
		<item>
		<title>Full layout of China Merchants Bank&#8217;s digital &#8220;artificial intelligence + big data&#8221;</title>
		<link>https://en.spress.net/full-layout-of-china-merchants-banks-digital-artificial-intelligence-big-data-2/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Wed, 16 Jun 2021 20:31:12 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Artificial]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[Banks]]></category>
		<category><![CDATA[Big]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[full]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Layout]]></category>
		<category><![CDATA[merchants]]></category>
		<guid isPermaLink="false">https://en.spress.net/full-layout-of-china-merchants-banks-digital-artificial-intelligence-big-data-2/</guid>

					<description><![CDATA[&#8220;Technology is the only force that can subvert the business model of commercial banks.&#8221; Tian Huiyu, President of China Merchants Bank, engraved this statement in the 2019 China Merchants Bank&#8217;s annual report, and it has been shining. Tian Huiyu attaches great importance to the development of financial technology. In the more than 2,000 words of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>&#8220;Technology is the only force that can subvert the business model of commercial banks.&#8221; Tian Huiyu, President of China Merchants Bank, engraved this statement in the 2019 China Merchants Bank&#8217;s annual report, and it has been shining.</strong></p>
<p><span id="more-24023"></span> Tian Huiyu attaches great importance to the development of financial technology. In the more than 2,000 words of the &#8220;President&#8217;s Address&#8221; in the China Merchants Bank&#8217;s 2019 annual report, he mentioned a total of 6 &#8220;technology&#8221;, 9 &#8220;transformation&#8221;, and 14 &#8220;digitalization&#8221;.</p>
<p>Since taking office in 2013, Tian Huiyu has been pushing China Merchants Bank to &#8220;run wildly&#8221; on the road of technology.</p>
<p>&#8220;We have made a clear-cut proposal to build a financial technology bank, and take the exploration of digital business models as the main direction of the second half of the transformation.&#8221; Tian Huiyu said in the 2019 annual report.</p>
<p>Thanks to the efforts of Tian Huiyu and other people from China Merchants Bank, China Merchants Bank&#8217;s &#8220;technological strength&#8221; has been at the forefront of the industry.</p>
<ul>
<li> At the end of 2019, CMB’s investment in information technology was 9.361 billion yuan, an increase of 43.97% year-on-year, which was 3.72% of the company’s operating income; in 2020, CMB’s investment in information technology reached 12 billion yuan</li>
<li> In December 2020, China Merchants Bank and JD.com jointly won the second direct banking license in China. China Merchants Topology Bank will fully adopt an online business model and explore new forms of banking in the future</li>
<li> As of January 10, 2021, the CMB App has accumulated 145 million users and 60.25 million monthly active users</li>
</ul>
<p>The emergence of the epidemic will bring more complicated situations and tests to banks in 2020, and China Merchants Bank&#8217;s performance last year was relatively stable. According to the performance bulletin published on January 14, China Merchants Bank achieved operating income of 290.508 billion yuan in 2020, an increase of 20.805 billion yuan, or 7.71%, over the same period last year.</p>
<p>Recently, Tian Huiyu also said in an interview with a reporter from the Financial Times that the epidemic has isolated physical contact between people, but thanks to a higher level of digital service system, the relationship between China Merchants Bank and its customers has become closer. It also strengthened China Merchants Bank&#8217;s determination to promote digital transformation.</p>
<p><img fifu-featured="1" decoding="async" src="https://p1.itc.cn/images01/20210615/81fd308593f447308237a89e6daeaa29.jpeg" max-width="600"> Create &#8220;Digital Merchants Bank&#8221;</p>
<p>China Merchants Bank, founded in 1987 and headquartered in Shenzhen, China, is the first joint-stock commercial bank in China that is wholly owned by a corporate legal person.</p>
<p>China Merchants Bank adheres to the strategic direction of &#8220;light banking&#8221; and the strategic positioning of &#8220;one body and two wings&#8221;.</p>
<p><strong> &#8220;Light Bank&#8221;</strong> The strategic direction of China Merchants Bank requires light management, light assets, light business model, etc. For example, light management refers to a light organization structure, which is manifested in the head office and branches going hand in hand; light asset refers to less asset consumption and more controllable risks. At present, China Merchants Bank and ICBC have joined the ranks of light banks. In its annual report, China Merchants Bank pointed out that it is necessary to closely focus on the transformation direction of &#8220;light banking&#8221; and strive to achieve a breakthrough in the qualitative change of financial technology banks.</p>
<p>At the same time, China Merchants Bank also insisted<strong> &#8220;One body and two wings&#8221;</strong> Strategic positioning,<strong> Retail &#8220;One&#8221; takes MAU as &#8220;North Star&#8221; (North Star is the most important direction, and all indicators serve this indicator)</strong> , Wholesale &#8220;Two Wings&#8221; take specialization as the direction, focus on building wholesale business systemization capabilities, and accelerate the advancement of digital transformation.</p>
<p> With MAU as the most important indicator, the number of APP users of China Merchants Bank continues to rise. At the end of 2019, the cumulative number of CMB App users exceeded 100 million; in mid-2020, the cumulative number of CMB App users reached 129 million; as of January 10, 2021, the cumulative number of CMB App users had reached 145 million. The number of active users is 60.25 million.</p>
<p>China Merchants Bank also directly pointed out that it must pass<strong> Benchmarking financial technology companies</strong> , Vigorously carry out the construction of financial technology banks, use financial technology as the nuclear power of transformation and development, and fully empower business development<strong> .</strong></p>
<p>Currently, China Merchants Bank has built three software centers in Shenzhen, Hangzhou, and Chengdu, and two data centers in Shenzhen and Shanghai to support the business development of the entire bank.</p>
<p>China Merchants Bank&#8217;s &#8220;AI Actual Combat&#8221;</p>
<p>Digital risk control</p>
<p>China Merchants Bank&#8217;s intelligent risk control platform &#8220;Libra System&#8221; covers online and offline transaction channels, and can intercept telecom fraud in real time.</p>
<p>As of the end of 2019, the &#8220;Libra System&#8221; can intercept suspected fraudulent transactions within 30 milliseconds, reduce the proportion of counterfeit and embezzled amounts of non-cardholders to five ten million, and help customers intercept 27,900 telecommunications fraud transactions. The interception amounted to 493 million yuan, which provided a strong guarantee for the safety of customer funds.</p>
<p>As of mid-2020, China Merchants Bank has reached 75.60% of the early warning accuracy of potential risky corporate customers; it has helped customers intercept 80,000 telecommunications fraud transactions, with an intercepted amount of more than 1.8 billion yuan, which provides a strong guarantee for the safety of customer funds.</p>
<p>Now, the intelligent risk control platform &#8220;Libra System&#8221; can intercept most suspected fraudulent transactions within 20 milliseconds, reducing the proportion of counterfeit and embezzled amounts by non-cardholders to six ten millionths.</p>
<p>In addition, in terms of external cooperation, China Merchants Bank is also actively cooperating with digital technology companies such as Huawei, Tencent, and Suoxinda.</p>
<p>According to an article published on Huawei&#8217;s official website in 2018, after the China Merchants Bank credit card unified risk control platform based on Huawei&#8217;s FusionInsight big data solution was launched, the number of risk cases was reduced by 50%, and the loss in half a year was reduced by more than 100 million yuan. The credit card issuance time has been reduced from about 15 days. Shorten it to 5 minutes.</p>
<p>In November 2017, Tencent and China Merchants Bank formally signed a cooperation agreement to reach a cooperation in the field of financial big data anti-fraud: Tencent Financial Cloud and Tencent Security Anti-fraud Laboratory opened up anti-fraud capabilities to China Merchants Bank through AI technology to help China Merchants Bank Better identify fraud in financial services and jointly build a financial security ecosystem.</p>
<p>According to news in April 2020, Tencent and China Merchants Bank jointly launched the &#8220;Lingshield Plan&#8221; to create a new model of anti-fraud through technology.</p>
<p>Digital marketing</p>
<p>In the field of intelligent marketing, the characteristics of China Merchants Bank are personalized recommendation, precise identification and electronic channel construction.</p>
<p>Beginning in 2015, China Merchants Bank has cooperated with Suoxinda Holdings, a global financial AI big data and integrated intelligent marketing solution manufacturer, from the customer group marketing stage 1.0, to the personalized marketing stage 2.0, to the real-time marketing 3.0 stage, to AI Marketing 4.0 stage, comprehensively build China Merchants Bank&#8217;s leading digital smart marketing system. It is reported that through the generation of 1,726 customer portrait tags for retail customers, the number of marketing customer contacts has increased by 6.56 times, the marketing success rate has reached 17.42%, and the personalized recommendation of &#8220;thousands of people&#8221; has begun.</p>
<p>Digital Customer Service</p>
<p>In 2016, under the technological wave of AI + big data, China Merchants Bank&#8217;s credit card service started the application of intelligent services with the palm life app as the core, from AR customer service, to AI-core intelligent customer service, and then to small recruitment assistants. Every new technology exploration and application has brought users a better interactive experience, and has become a more personalized and portable intelligent assistant for users step by step.</p>
<p>At present, the &#8220;Xiao Zhao Miao Smart Assistant&#8221; launched by CMB Credit Card on the Pocket Life App uses AI technologies such as voice conversion and semantic recognition to perform intelligent intent analysis of natural language, making the service &#8220;visible&#8221; and &#8220;heard&#8221; &#8220;. At the same time, the intelligent voice navigation function is implanted in the telephone voice IVR, the recognition accuracy rate reaches 94%, and the interaction volume is nearly 80,000. In addition to voice recognition technology, face recognition has also been used in the image, which greatly shortens the security authentication time.</p>
<p>In 2020, an interim report issued by China Merchants Bank pointed out that the automatic response accuracy rate of China Merchants Bank&#8217;s intelligent customer service reached 96.7%.</p>
<p>Digital investment advisory</p>
<p>In 2016, China Merchants Bank launched a robo-advisory service-&#8220;Capricorn Intelligent Investment&#8221;, which is also the first domestic commercial bank to launch robo-advisory services.</p>
<p>&#8220;Capricorn Smart Investment&#8221; mainly uses machine learning algorithms to incorporate more than ten years of wealth management experience of China Merchants Bank, and builds an asset allocation portfolio based on public funds, so as to achieve the purpose of diversifying investment risks with investors.</p>
<p>In 2018 alone, the cumulative sales scale of CMB Capricorn Smart Investment reached 12.233 billion.</p>
<p>Digital Middle Office</p>
<p>In the 2019 annual report, China Merchants Bank pointed out that it will build a unified digital middle-station for enterprises-China Merchants Bank&#8217;s open platform, explore the transformation of business models supported by standardized and modular services, and quickly respond to customer needs.</p>
<p>Prior to this, Leifeng.com (Public Account: Leifeng.com) had reported on China Merchants Bank&#8217;s data center in detail. For example, China Merchants Bank has built a middle-office system for customer acquisition and operation across the entire chain, such as the Rubik&#8217;s Cube activity operating platform and the red envelope platform. Like the Rubik’s Cube event platform, branches can quickly configure an online event within 5 minutes and reach target users through the China Merchants Bank App.</p>
<p><img decoding="async" src="https://p3.itc.cn/images01/20210615/e90281d834dd42de8c2f2ac39361f135.png" max-width="600"></p>
<p>China Merchants Bank also proposed<strong> Strengthen the construction of data center and promote data connection.</strong> Strengthen data governance, improve the convenience and ease of use of data, build a data application tool platform, and lower the threshold of data application. Promote the integration and opening of the system, open up the work flow and information flow of each system, and realize one entrance to the whole line. Decoupling the system with open thinking, micro-service and productization of functional modules,<strong> Precipitate various general capabilities as the middle stage of the system.</strong></p>
<p>The 2020 Interim Report of China Merchants Bank pointed out that China Merchants Bank will accelerate the iterative development of its customer relationship management system (CRM), and use the CRM system as a medium- and Taiwan-based capability precipitation carrier to form a customer information center, information case center, business processing center, marketing support center and a series of scenarios. Five core functions such as the team building center.</p>
<p>The CRM4.0 system is a key platform for the transformation of the &#8220;China Merchants Bank&#8221; financial business model. It is a smart marketing platform and a digital operation platform based on the business system, as well as a customer service system and a customer manager management system platform.</p>
<p>smart robot</p>
<p>China Merchants Bank relies on big data and artificial intelligence to create intelligent service robots, traffic distribution decision-making robots, intelligent agent assistant robots, service analysis robots, quality inspection robots, etc., covering user insights, traffic distribution, service interaction, demand re-excavation, management improvement, etc. Five modules, and moved the call center to the Pocket Life App to provide users with audio-visual multimedia interactive services, which has achieved the upgrade of service efficiency and user experience.</p>
<p>In June 2020, Tian Huiyu pointed out that China Merchants Bank relies on big data and artificial intelligence to create a large number of intelligent service robots. The cost of robots used for retail credit collection is 1/10 of labor, and the output is 9 times that of labor. The above is to increase production capacity.</p>
<p>RPA (Robot Process Automation)</p>
<p>As of October 2020, the financial industry accounted for the highest proportion of domestic RPA companies at 54.55%, of which 77.78% of financial institutions are banks. Among them, Shanghai Pudong Development Bank and China Merchants Bank were the first banks to use RPA. They were the first to introduce RPA technology in the domestic financial industry in 2016 and 2017, respectively, in order to improve the level of operation automation. The effect is very impressive.</p>
<p>In December 2018, China Merchants Bank used intelligent robots to participate in business processing in the new version of its online custody banking system, which was the first to realize the application of RPA technology in the asset custody field.</p>
<p>In 2020, China Merchants Bank has innovatively integrated the RPA shared pool technology on the basis of the original CBS7.0 platform, and launched CBS-RPA, which can quickly help companies build a complete treasury management system, build a comprehensive treasury management system, and solve treasury management Problems and perplexities. The product became very popular after it was launched, and it has been successfully launched in nearly ten large group companies across the country within only half a year of its launch.</p>
<p>In the 2020 interim report, China Merchants Bank pointed out that it applied RPA, OCR and NLP (natural language processing) and other financial technology technologies in 24 middle and back-office scenarios including verification, entry, and consulting. During the reporting period, the number of alternative businesses reached 11.64 million. .</p>
<p>Tian Huiyu, President of China Merchants Bank, said: RPA uses machines to replace simple outsourcing, which saves a lot of costs.</p>
<p>cloud computing</p>
<p>At the end of 2019, the total number of X86 server deployments of China Merchants Bank increased by 60.67% year-on-year. The new generation of PaaS (Platform as a Service) platform expanded its use, and the proportion of the bank&#8217;s applications on the cloud reached 44%.</p>
<p>At the same time, China Merchants Bank continues to enhance its open banking capabilities. The &#8220;Open API Platform&#8221; for unified external services across the bank supports the safe and fast output of APIs, serving financial payment, AI, smart parking, smart medical and other scenarios, and empowering 629 cooperative enterprises. In terms of big data + AI, the big data cloud platform was upgraded, the overall capacity of the data lake was increased to 9.8PB, and the data entering the lake increased by 68% year-on-year.</p>
<p>Based on the integration of internal and external data, China Merchants Bank has increased the research and application of AI technology, built three AI cloud services of intelligent customer service, risk public opinion, and computer vision, and launched three major AI solutions for knowledge management, digital marketing, and risk management to support business The development of intelligence.</p>
<p>The 2020 mid-term report pointed out that China Merchants Bank will establish a large-scale digital infrastructure based on cloud computing technology, promote the construction of a native cloud that is more convenient for rapid construction, expansion, openness and iteration of systems and applications, and support the safe access of new applications from the head office and branches to the cloud .</p>
<p>As of mid-2020, China Merchants Bank has 4,015 native cloud servers, an increase of 100% over the end of the previous year; the scale of native cloud storage is 29.18PB, an increase of 92% over the end of the previous year; the number of native cloud containers is 69,080, an increase of 121% over the end of the previous year.</p>
<p>database</p>
<p>On November 27, 2017, China Merchants Bank and Huawei established a joint innovation laboratory for distributed databases to jointly develop independent and controllable financial-grade distributed database products.</p>
<p>In this joint creation project, China Merchants Bank mainly does three things: first, to provide advanced financial business scenarios; second, based on so many years of advanced experience in database use and operation and maintenance of China Merchants Bank, it proposes a solution for the joint creation of distributed databases. Specific requirements; third, for the key components of the Lianchuang database, such as the kernel and high-availability architecture, deeply participate in the entire link from design, coding, testing to final production. Huawei, on the other hand, has a large amount of technology accumulation in the database field, and is mainly responsible for the realization of product development and the promotion of future marketization.</p>
<p>After initial contact and cooperation, China Merchants Bank and Huawei conducted a pilot database application in 2018.</p>
<p>In the 2019 annual report, China Merchants Bank pointed out the establishment of the Kunpeng Computing Joint Innovation Laboratory and the Load Balancing Joint Innovation Laboratory to accelerate the implementation of the research results of the distributed database joint innovation laboratory.</p>
<p>Biometrics</p>
<p>As the leading brand of commercial banks, China Merchants Bank focuses on internal risk control and payment security, combined with cutting-edge technologies such as big data, cloud computing, and artificial intelligence, and continuously upgrades the risk control system, creates smart risk control, and creates convenience and efficiency for consumers. Safe and assured customer experience.</p>
<p>In order to strengthen the bank’s internal security management, increase the efficiency of the banking system’s authorization, and enhance the counter business risk prevention capabilities, China Merchants Bank introduced the fingerprint recognition algorithm and smart terminals of Eyes Technology as early as 2009, which were applied to the counters and smart branches of China Merchants Bank. And in mobile marketing, it has realized intelligent risk control and cost reduction and efficiency enhancement, helping China Merchants Bank to provide consumers with intelligent, convenient and safe financial services with user experience as the core, and add to the good life of users.</p>
<p>Blockchain</p>
<p>As early as 2018, China Merchants Bank issued the country&#8217;s first financial industry blockchain electronic invoice.</p>
<p>At the end of 2019, China Merchants Bank improved and developed the standard branch chain and BaaS (blockchain as a service) platform ecology, with a total of 25 applications.</p>
<p>In the 2020 mid-term report, China Merchants Bank pointed out that it is improving and developing the open permission chain and blockchain as a service (BaaS) platform. It has been developing the continuous application of blockchain and business integration in scenarios such as supply chain finance and merchant fund clearing. explore.</p>
<p>Online payment</p>
<p>In the 2019 annual report, China Merchants Bank pointed out that it will realize ecological operation with the industrial Internet as the key link. Focusing on the three major directions of account and payment system digitization, digital financing, and financial technology capability output, the industry chain is opened up, and the unified payment and settlement system is innovated to realize the collection and settlement function and the internal account settlement mode of the B2B platform.</p>
<p>At the end of 2019, China Merchants Bank’s comprehensive settlement solution &#8220;Cloud Bills&#8221; has provided services to 5,766 corporate customers, with a transaction volume of 287.271 billion yuan; the aggregate collection business focuses on insurance, medicine, education, and FMCG four scenarios, and the number of transactions Reached 502 million transactions, with a transaction value of 146.647 billion yuan, a year-on-year increase of 267.51%.</p>
<p>The &#8220;Three Times&#8221; of China Merchants Bank</p>
<p>China Merchants Bank started from Shekou, Shenzhen, and has been crowned as the &#8220;King of Retailing&#8221; in the banking industry for 40 years of ups and downs. Along the way, it is inseparable from the three presidents&#8217; keen insight into market changes and their strong courage to actively reform.</p>
<p><strong> Wang Shizhen</strong> He was the first president of China Merchants Bank and served for 14 years. Under his leadership, China Merchants Bank evolved from a wholly-owned bank of China Merchants into a standard joint-stock commercial bank, and gradually got rid of the restrictions of regional banks, and basically formed a national commercial bank. Pattern.</p>
<p>Wang Shizhen and other leaders also made the decision to quickly establish a computer system for China Merchants Bank, and set a clear mid-term goal: to complete the computerization of basic business processing within three years, and to complete the computerization of all business processing within five years. This has laid a good foundation for China Merchants Bank to carry out digital transformation in the future.</p>
<p>Year 1999,<strong> Ma Weihua</strong> He took over as the president of China Merchants Bank and fully started the construction of China Merchants Bank&#8217;s online banking after taking office, becoming the first commercial bank in China with online financial services. The opening of China Merchants Bank&#8217;s online banking became the starting point for its retail business.</p>
<p>In 2010, after realizing that the profit growth achieved by large-scale capital consumption and profit margins in the past was difficult to sustain, Ma Weihua led China Merchants Bank to implement the goals of reducing capital consumption, increasing loan pricing, and controlling financial costs. &#8220;Secondary transformation&#8221;. Like Wang Shizhen, Ma Weihua has also been at the helm of China Merchants Bank for 14 years.</p>
<p>year 2013,<strong> Tian Huiyu</strong> Taking over as the president of China Merchants Bank, China Merchants Bank has ushered in a new era in which it is fully embarking on the road of &#8220;finan-tech banking&#8221;.</p>
<p>Under the leadership of Tian Huiyu, China Merchants Bank proposed &#8220;mobile first&#8221; in 2015, consciously using APP as its main business position.</p>
<p>In 2016, China Merchants Bank mentioned fintech in its annual report for the first time, proposing that the bank’s “premature power” must be used to advance its fintech strategy, and in its 17-year report, it proposed to be a “finan-tech bank”.</p>
<p>Under the leadership of Tian Huiyu and other leaders of China Merchants Bank, at the end of 2019, China Merchants Bank invested 9.361 billion yuan in information technology, a year-on-year increase of 43.97%, which is 3.72% of the company&#8217;s operating income.</p>
<p>China Merchants Bank attaches great importance to science and technology investment, and its investment in information technology has far exceeded that of most banks over the years. Public information shows that the annual financial technology budget of China Merchants Bank is determined at 3.5% of the previous year&#8217;s revenue.</p>
<p>Recently, Tian Huiyu said in an interview that China Merchants Bank&#8217;s investment in information technology has reached 12 billion yuan in 2020. Based on this figure, Leifeng.com calculates that China Merchants Bank&#8217;s IT investment will account for more than 4% of the company&#8217;s operating income in 2020.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24023</post-id>	</item>
		<item>
		<title>Total import and export value of Vietnam&#8217;s goods in the period of May 2, 2021 reached 28.69 billion USD</title>
		<link>https://en.spress.net/total-import-and-export-value-of-vietnams-goods-in-the-period-of-may-2-2021-reached-28-69-billion-usd/</link>
		
		<dc:creator><![CDATA[Hoàng Lân]]></dc:creator>
		<pubDate>Wed, 16 Jun 2021 14:55:07 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Accessary]]></category>
		<category><![CDATA[Accessories]]></category>
		<category><![CDATA[Balance of trade]]></category>
		<category><![CDATA[billion]]></category>
		<category><![CDATA[Corresponding]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Deficit]]></category>
		<category><![CDATA[Direct investment capital]]></category>
		<category><![CDATA[Export]]></category>
		<category><![CDATA[FDI]]></category>
		<category><![CDATA[First half]]></category>
		<category><![CDATA[General Department of Customs]]></category>
		<category><![CDATA[Goods]]></category>
		<category><![CDATA[Import]]></category>
		<category><![CDATA[Import and Export]]></category>
		<category><![CDATA[Iron and steel]]></category>
		<category><![CDATA[machines]]></category>
		<category><![CDATA[Period]]></category>
		<category><![CDATA[Preliminary]]></category>
		<category><![CDATA[reached]]></category>
		<category><![CDATA[Same period]]></category>
		<category><![CDATA[textile]]></category>
		<category><![CDATA[total]]></category>
		<category><![CDATA[USD]]></category>
		<category><![CDATA[Value]]></category>
		<category><![CDATA[Vietnams]]></category>
		<guid isPermaLink="false">https://en.spress.net/total-import-and-export-value-of-vietnams-goods-in-the-period-of-may-2-2021-reached-28-69-billion-usd/</guid>

					<description><![CDATA[The latest preliminary statistics of the General Department of Customs show that the total import and export value of Vietnam&#8217;s goods in the period of May 2, 2021 (from May 16 to May 31, 2021) reached 28, $69 billion, an increase of 11.6% (equivalent to an increase of $2.99 ​​billion) compared to the results in [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The latest preliminary statistics of the General Department of Customs show that the total import and export value of Vietnam&#8217;s goods in the period of May 2, 2021 (from May 16 to May 31, 2021) reached 28, $69 billion, an increase of 11.6% (equivalent to an increase of $2.99 ​​billion) compared to the results in the first half of May 2021.</strong><br />
<span id="more-23856"></span> With the results achieved in the second half of this May, the total import and export value of the country in the first 5 months of 2021 reached USD 262.73 billion, up 33.7% (equivalent to USD 66.27 billion). compared to the same period in 2020.</p>
<p> In which, the total import-export value of enterprises with foreign direct investment (FDI) reached 182.81 billion USD, up 38.2% (equivalent to 50.56 billion USD); the import-export value of domestic enterprises was 79.93 billion USD, up 24.5% (equivalent to 15.71 billion USD) over the same period last year. In the 2nd period of May, 2021, the trade balance of goods has a deficit of 129 million USD. Generally, in the 5 months of 2021, the trade balance will have a deficit of 473 million USD. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_15_16_39197348/05d2dbc85889b1d7e898.jpg" width="625" height="357"> <em> Illustration/nhandan.vn</em> Regarding exports: The total value of Vietnam&#8217;s exports in the 2nd period of May, 2021 reached US$ 14.28 billion, up 20.1% (equivalent to an increase of US$ 2.39 billion in absolute terms) compared to the same period last year. May 1, 2021. The export value of the second period of May, 2021, fluctuated and increased compared to the period of May 1, 2021 in the following commodity groups: Textile and garment increased by USD 303 million; iron and steel of all kinds increased by 199 million USD; machinery, equipment, tools and spare parts increased by 185 million USD; footwear of all kinds increased by $182 million&#8230; Thus, in the first 5 months of 2021, the total export value of Vietnam reached 131.13 billion USD, an increase of 30.9%, equivalent to an increase of 30.96 billion USD over the same period in 2020. Statistics of the General Department of Customs also show that the export value of goods of foreign direct investment (FDI) enterprises in the 2nd period of May, 2021 reached 10.15 billion USD, up 16 6%, equivalent to an increase of $ 1.44 billion compared to the first period of the month, thereby bringing the total export value of goods from the beginning of the year to the end of May 2021 of this group of enterprises to $ 97.20 billion, an increase 36.7% (equivalent to an increase of 26.08 billion USD) over the same period last year, accounting for 74.1% of the total export value of the country. Regarding imports: The total value of imported goods of Vietnam in the 2nd period of May, 2021 reached 14.41 billion USD, an increase of 4.3% (equivalent to an increase of 594 million USD in absolute number) compared to the actual result. in the first half of May 2021. Import value of goods in the 2nd period of May 5-2021 increased compared to the previous period 1 mainly in a number of commodity groups: Computers, electronic products and components increased by 168 million USD; crude oil increased by 132 million USD; Ore and other minerals increased by 126 million USD&#8230; Thus, in the first 5 months of 2021, the total import value of the whole country reached 131.6 billion USD, up 36.7% (equivalent to 35.3 billion USD) over the same period in 2020. Import value of goods by FDI enterprises in this period reached US$9.1 billion, a slight increase of 2.6% (equivalent to an increase of US$232 million) compared to the first period of May 2021. Calculated in the 5 months of 2021, the total import value of this group of enterprises reached 85.61 billion USD, up 40% (equivalent to 24.47 billion USD) over the same period last year, accounting for 65% of the total import value. import value of the country.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23856</post-id>	</item>
		<item>
		<title>Investigation report Bezos, Musk and Co. hardly paid taxes A new report reveals that the richest Americans hardly pay any income tax &#8211; among them Amazon founder Bezos and Tesla boss Musk. The tax authority wants to determine how the confidential data became public. By T. Teichmann.</title>
		<link>https://en.spress.net/investigation-report-bezos-musk-and-co-hardly-paid-taxes-a-new-report-reveals-that-the-richest-americans-hardly-pay-any-income-tax-among-them-amazon-founder-bezos-and-tesla-boss-musk-the-tax-auth/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Wed, 16 Jun 2021 06:24:11 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Amazon]]></category>
		<category><![CDATA[Americans]]></category>
		<category><![CDATA[among]]></category>
		<category><![CDATA[Authority]]></category>
		<category><![CDATA[Bezos]]></category>
		<category><![CDATA[Boss]]></category>
		<category><![CDATA[confidential]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[determine]]></category>
		<category><![CDATA[founder]]></category>
		<category><![CDATA[German]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Income]]></category>
		<category><![CDATA[Income Tax]]></category>
		<category><![CDATA[investigation]]></category>
		<category><![CDATA[Musk]]></category>
		<category><![CDATA[paid]]></category>
		<category><![CDATA[pay]]></category>
		<category><![CDATA[Public]]></category>
		<category><![CDATA[Report]]></category>
		<category><![CDATA[reveals]]></category>
		<category><![CDATA[richest]]></category>
		<category><![CDATA[tax]]></category>
		<category><![CDATA[Taxes]]></category>
		<category><![CDATA[Teichmann]]></category>
		<category><![CDATA[Tesla]]></category>
		<category><![CDATA[The rich]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">https://en.spress.net/?p=23508</guid>

					<description><![CDATA[Disclosure report Bezos, Musk and Co. hardly paid any taxes As of: 06/09/2021 05:04 a.m. A new report reveals that the richest Americans hardly pay any income tax &#8211; among them Amazon founder Bezos and Tesla boss Musk. The tax authority wants to determine how the confidential data became public. By Torsten Teichmann, ARD studio [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="ts-image" src="https://www.tagesschau.de/multimedia/bilder/bezos-127https://www.tagesschau.de/https://www.tagesschau.de/~_v-videowebm.jpg" alt="Amazon boss Jeff Bezos | AP" title="Amazon boss Jeff Bezos | AP"></p>
<h1> Disclosure report Bezos, Musk and Co. hardly paid any taxes </h1>
<p>As of: 06/09/2021 05:04 a.m. </p>
<p> <strong> A new report reveals that the richest Americans hardly pay any income tax &#8211; among them Amazon founder Bezos and Tesla boss Musk. The tax authority wants to determine how the confidential data became public.</strong> By Torsten Teichmann, ARD studio Washington In 2007, multibillionaire Jeff Bezos didn&#8217;t pay a dime in US income tax. In 2011, too, the Amazon founder offset his income against losses so much that the US tax authority IRS granted him an income-related child allowance of 4,000 US dollars. This had often been speculated about. But now the numbers are known. The foundation for investigative journalism ProPublica quotes from Bezos tax return. These tax tricks are not illegal. But the network of loopholes and discounts remains denied to most Americans due to lack of assets. They move from salary to salary, as US President Joe Biden complains time and again: &#8220;Sometimes I argue with friends in the Democratic Party about it: It&#8217;s okay to be a billionaire or a millionaire, but pay your fair share.&#8221;</p>
<h2> What tax amounts are fair for the rich?</h2>
<p>But how much should the top 0.01 percent in the US contribute financially to society? There is a dispute about this. The ProPublica report rekindles this debate. The foundation has obtained official tax documents from thousands of the richest Americans, says the journalist Jesse Eisinger involved in the NPR radio station. They cover a period of 15 years. ProPublica initially refers to the reported income from the tax returns of the 25 richest Americans and the increase in wealth over the period that is not taxed. In addition to Bezos, Tesla founder Elon Musk, Facebook boss Mark Zuckerberg and New York&#8217;s ex-Mayor Michael Bloomberg will be there.</p>
<p>If we look at the actual tax on capital growth &#8211; which is essentially your income &#8211; then its tax rate is 3.4 percent. For people like Jeff Bezos or Warren Buffet, it&#8217;s even less.</p>
<h2> Far from the top tax rate of 37 percent</h2>
<p>The investor Warren Buffet paid 0.1 percent tax on income and asset growth between 2014 and 2018, ProPublica calculates. At Bezos it is just under one percent. Americans pay an average of 14 percent income tax. The top tax rate would be 37 percent. America&#8217;s billionaires are far from that. The Biden administration reacted cautiously to the findings. Any unauthorized publication of government documents is against the law, said Biden&#8217;s spokeswoman Jen Psaki. The Ministry of Finance is trying to clarify how the tax returns have come to the public.</p>
<p>Generally speaking, we know that more needs to be done to ensure that businesses and high-income citizens do more of their fair share. This is what the President says in his proposals, in his budget, and this is how he wants to pay for his proposals. A government proposal provides for higher taxes for households with an annual income of more than $ 400,000. According to the ProPublica report, however, it is completely unclear whether a corresponding reform will generate additional income as long as the loopholes in the tax laws of the USA are not closed.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23508</post-id>	</item>
		<item>
		<title>CITIC Bank&#8217;s digital &#8220;artificial intelligence + big data&#8221; layout</title>
		<link>https://en.spress.net/citic-banks-digital-artificial-intelligence-big-data-layout/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Wed, 16 Jun 2021 03:07:15 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Artificial]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[Banks]]></category>
		<category><![CDATA[Big]]></category>
		<category><![CDATA[CITIC]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Layout]]></category>
		<guid isPermaLink="false">https://en.spress.net/citic-banks-digital-artificial-intelligence-big-data-layout/</guid>

					<description><![CDATA[In March of this year, China CITIC Bank released its 2020 annual report and highlighted its investment and progress in financial technology. The annual report shows that in 2020, CITIC Bank invested 6.926 billion yuan in science and technology, an increase of 24.43% year-on-year; the number of science and technology personnel in CITIC Bank has [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In March of this year, China CITIC Bank released its 2020 annual report and highlighted its investment and progress in financial technology.</strong></p>
<p><span id="more-23330"></span> The annual report shows that in 2020, CITIC Bank invested 6.926 billion yuan in science and technology, an increase of 24.43% year-on-year; the number of science and technology personnel in CITIC Bank has quadrupled in two years to 4190.</p>
<p>With the increasing investment in technology, the achievements of China CITIC Bank&#8217;s digital transformation are gradually emerging:</p>
<p>China CITIC Bank and its peers have established a large-scale blockchain cooperation ecology among domestic banks, and the cumulative transaction volume of the blockchain trade finance platform has exceeded 10 billion yuan</p>
<p>China CITIC Bank successfully put into production the first independent distributed core system of domestic medium and large banks-Lingyun Engineering</p>
<p>China CITIC Bank has nearly 800 application scenarios for intelligent robots (RPA), the branch application coverage rate exceeds 80%, and the average business operation efficiency has increased by more than 20%.</p>
<p>On March 15th, Li Qingping, who has a &#8220;financial iron lady&#8221;, resigned as chairman of China CITIC Bank, and Zhu Hexin, who was the former vice governor of finance, took over. Zhu Hexin is an &#8220;old Bank of Communications&#8221; with more than 20 years of experience in the financial industry. Under his leadership, CITIC Bank&#8217;s layout in the field of financial technology may undergo major changes.</p>
<p><img fifu-featured="1" decoding="async" src="https://p1.itc.cn/images01/20210615/0f069797a5b542d59e8192df53670b77.jpeg" max-width="600"></p>
<p>Build a digital CITIC Bank</p>
<p>China CITIC Bank, founded in 1987 and headquartered in Beijing, is one of the nationwide commercial banks. Its total assets exceed 7 trillion yuan and the number of employees is nearly 60,000.</p>
<p>In the &#8220;Top 100 Chinese Banking Industry 2020&#8221; released by the China Banking Association, CITIC Bank ranked 11th according to the ranking of core Tier 1 capital. In this ranking, China CITIC Bank surpasses China Everbright Bank and is second only to Minsheng Bank.</p>
<p>CITIC Bank, like CITIC Securities, CITIC Construction Investment Securities, CITIC Trust, CITIC Prudential Life and other companies, is one of the subsidiaries of CITIC Group.</p>
<p>In 2020, China CITIC Bank, together with other CITIC Group subsidiaries, provided customers with a combined financing scale of 107.82 billion yuan, a year-on-year increase of 68%, breaking the &#8220;one trillion&#8221; mark for the first time.</p>
<p>On March 25, China CITIC Bank Co., Ltd. released its 2020 annual performance report. The report shows that China CITIC Bank will achieve revenue of 194.731 billion yuan in 2020, a year-on-year increase of 3.81%.</p>
<p> <strong> In recent years, China CITIC Bank has continuously increased its investment in financial technology.</strong></p>
<p>In 2020, CITIC Bank invested nearly 7 billion yuan in technology, an increase of 24% over the previous year, and technology investment accounted for 3.56% of operating income.</p>
<p>As of the end of 2020, CITIC Bank has 4190 scientific and technical personnel (excluding subsidiaries), a year-on-year increase of 31.68%, and CITIC Bank’s scientific and technical personnel accounted for 7.60%.</p>
<p>The number of scientific and technological personnel in CITIC Bank has quadrupled in two years, which is also a supplement to the upcoming larger-scale digital transformation.</p>
<p>At the beginning of this year, China CITIC Bank released a new three-year development plan, proposing to use high-tech as the engine and high-quality development as the theme to strengthen the development of light and intensive.</p>
<p><img decoding="async" src="https://p1.itc.cn/images01/20210615/d0daf4344ede476c8b88b8f057788f67.png" max-width="600"></p>
<p>In order to achieve high-quality development goals,<strong> The financial technology structure of China CITIC Bank has been adjusted to &#8220;three committees, two departments, and two centers&#8221;</strong> . Compared with 2019, China CITIC Bank has added a new data management committee to its 2020 annual report.</p>
<p><strong> At the same time, China CITIC Bank also proposed the implementation path of &#8220;one reform, two transformations and three challenges&#8221;. In response, China CITIC Bank proposed to accelerate digital transformation and light capital transformation.</strong></p>
<p>In terms of ecological scenario layout and corporate cooperation, China CITIC Bank has jointly built more than 5,500 scenarios with hundreds of partners such as UnionPay, Didi, JD.com, etc., serving 5.2 million users and accumulating 390 million capital transactions.</p>
<p>In cooperation with artificial intelligence-related applications, China CITIC Bank has launched cooperation with the three Internet giants of BAT, and other well-known artificial intelligence application technology manufacturers such as Megvii, HKUST Xunfei, Tongdun and Bangsheng, enriching itself in various fields. Artificial intelligence applications on business lines.</p>
<p>CITIC Bank AI combat</p>
<p><strong> Artificial intelligence platform</strong></p>
<p>As early as 2017, the artificial intelligence platform &#8220;CITIC Brain&#8221; independently developed by China CITIC Bank was fully launched.</p>
<p>In 2018, &#8220;CITIC Brain&#8221; initially has the ability to provide intelligent services for retail, corporate, custody, and compliance.</p>
<p>In 2020, with the &#8220;CITIC Brain&#8221; as the main engine, CITIC Bank will build an &#8220;AI Model Center&#8221; and an &#8220;AI Efficiency Center&#8221;, implement 307 &#8220;AI + data&#8221; precision models, and serve more than 10 million customers intelligently in real time.</p>
<p>Among them, wealth management AI intelligent recommendation achieved online sales of 232.65 billion yuan, landing strategic customer equity chain applications, and increasing management assets by more than 52.2 billion yuan.</p>
<p><strong> Intelligent risk control</strong></p>
<p>The 2020 annual report shows that China CITIC Bank has accelerated the practice of intelligent risk control, independently developed real-time intelligent anti-fraud and anti-money laundering systems, with an accuracy rate of 90% for real-time transaction monitoring and interception, and offline risk control screening and intercepting more than 17,000 risk events.</p>
<p>The bank&#8217;s credit card center uses big data, machine learning, cloud computing and other intelligent technologies to introduce multi-dimensional new data to enrich customer risk profiles. In 2020, a total of 26 full-process credit risk scoring cards will be iteratively optimized, effectively improving the ability of risk control and precise policy implementation; Through machine learning algorithms, it has achieved a new breakthrough in more efficient and accurate risk decision-making capabilities, and realized a 20% increase in transaction amount.</p>
<p>In 2018, China CITIC Bank and Bangsheng Technology reached a cooperation in the construction of risk control and anti-fraud, and contributed to the upgrade of CITIC Bank&#8217;s intelligent real-time risk control system.</p>
<p>In the same year, China CITIC Bank also reached a cooperation with Tongdun Technology. Tongdun Technology provides smart risk control middle-office services for China CITIC Bank Credit Card Center.</p>
<p><strong> Smart marketing</strong></p>
<p>According to the 2020 annual report, China CITIC Bank expanded its new customers by 12,800 new customers by increasing digital marketing and using the chain-based customer acquisition and product customer acquisition model, driving a deposit growth of 53.9 billion yuan.</p>
<p>In addition, CITIC Bank has also actively developed a retail business system, which has boosted the scale of assets by nearly 200 billion yuan, and the AI ​​smart recommendation for wealth management has achieved CITIC Bank&#8217;s online sales scale of more than 230 billion yuan.</p>
<p>In 2017, China CITIC Bank cooperated with Suoxinda Holdings, a global financial AI big data and integrated intelligent marketing solution manufacturer, and introduced Suoxinda AI, big data and other leading technologies and end-to-end digital intelligent marketing overall solutions to comprehensively build CITIC Bank Leading digital marketing system.</p>
<p><strong> Smart Customer Service</strong></p>
<p>In October 2018, China CITIC Bank Mobile Banking launched an intelligent voice service product to help visually impaired users experience barrier-free mobile financial services.</p>
<p>With the support of Tencent Cloud&#8217;s intelligent voice and semantic understanding technology, China CITIC Bank&#8217;s mobile banking intelligent voice service has achieved rapid upgrades.</p>
<p>With the help of intelligent voice technology, CITIC Bank&#8217;s customer service robots can meet the needs of scenarios such as question and answer, transfer tasks, account query tasks, financial tasks, small chats, etc., and provide solutions for complex financial transaction scenarios.</p>
<p>In the same year, China CITIC Bank also cooperated with HKUST iFLYTEK in intelligent customer service.</p>
<p><strong> Robo-advisor</strong></p>
<p>CITIC Bank&#8217;s robo-advisory product-&#8220;Xinzhitou&#8221;, on the basis of agency fund sales, integrates technologies such as big data analysis and quantitative financial models.</p>
<p>&#8220;Xinzhi Investment&#8221; analyzes the customer&#8217;s investment pain points from the three stages of pre-investment, investment, and post-investment, and provides customers with a complete set of fund investment solutions based on the customer&#8217;s profile and target risk strategy.</p>
<p>Lu Tiangui, the current business director of CITIC Bank, once introduced the three highlights of Xinzhi Investment in 2018:</p>
<p>One is to intelligently match target risks and simulated returns based on the customer&#8217;s risk assessment results, and recommend the most suitable product combination. According to reports, Xinzhi Investment has built an intelligent risk assessment model based on multi-dimensional data analysis of more than 2 million customers.</p>
<p>Second, Xinzhi Investment not only has forward-looking market analysis by investment research experts and professional research on underlying products, but also uses big data, investment models, and intelligent algorithms to make up for the lack of human computing power.</p>
<p>Third, the user experience is convenient. CITIC Bank searches for the optimal combination from more than 4,000 funds, and directly pushes the recommended asset allocation combination to users. Users make decisions, purchase with one click, and enjoy follow-up services. Experts continue to track the macro market and Bottom product situation.</p>
<p><strong> Core system</strong></p>
<p>In 2020, China CITIC Bank successfully put into production the first autonomous distributed core system (Lingyun Project) of domestic medium and large banks.</p>
<p>As the first to be put into production in China, the new generation of cloud-based credit card core system with independent intellectual property rights-the new core system of China CITIC Bank Credit Card StarCard, will be the first anniversary of stable operation in 2020.</p>
<p>The data shows that StarCard has successfully carried the operation and management of 110 million accounts. The peak transaction value is as high as 4,500 transactions per second, which is more than three times that of the original system. The average transaction response time is only 36 milliseconds, which is effective for satisfying, membership days, rush to buy, and marketing. Activities, Double Eleven Shopping Festival and other high-frequency trading application scenarios.</p>
<p>At the same time, the bank&#8217;s credit card center has steadily promoted the construction of the second phase of the upgrade of the new core system of StarCard, and has completed 30 planned subprojects of the second phase, and implemented &#8220;second-level&#8221; real-time and intelligent data business scenario services.</p>
<p><strong> Blockchain</strong></p>
<p>The 2020 annual report shows that the China CITIC Bank blockchain platform is the first to pass 5 credible evaluations of the China Academy of Information and Communications Technology at one time. The blockchain forfaiting trading platform has been recognized by the People&#8217;s Bank of China and upgraded to a national industry platform.</p>
<p>The blockchain forfaiting trading platform is a large-scale blockchain cooperation ecosystem between domestic banks established by China CITIC Bank and its peers.</p>
<p>At present, the cumulative transaction volume of the blockchain trade finance platform has exceeded 10 billion yuan.</p>
<p><strong> cloud computing</strong></p>
<p>In 2017, China CITIC Bank launched an ecological financial cloud platform. It is understood that the cloud platform is operated by financial institutions, technology companies, professional institutions, regulatory agencies, etc., in accordance with the mechanism of division of labor.</p>
<p>In the 2018 annual report, 53% of CITIC Bank&#8217;s applications have been migrated to the cloud platform, and the system deployment efficiency has increased by more than 20%.</p>
<p>In the 2020 annual report, the overall cloudification rate of China CITIC Bank&#8217;s infrastructure reached 96.71%, and the infrastructure resources have T+1 day delivery capabilities.</p>
<p>At present, China CITIC Bank pointed out that it has completed the first stage of production of the bank-level data lake, and the basic data platform of &#8220;one lake, one database&#8221; has been basically completed, and the overall processing performance has increased by more than 50%.</p>
<p><strong> RPA (Intelligent Robot)</strong></p>
<p>In 2019, Daguan Data won the bid for the AI ​​project of CITIC Bank Credit Card Center to provide it with RPA products and technical services.</p>
<p>The 2020 annual report shows that there are nearly 800 application scenarios for CITIC Bank&#8217;s intelligent robot (RPA), the branch application coverage rate exceeds 80%, and the average business operation efficiency has increased by more than 20%.</p>
<p>With online processes, mobile approvals, and intelligent customer identification, China CITIC Bank has shortened the time it takes to open public accounts by approximately 30%.</p>
<p><strong> Biometrics</strong></p>
<p>In terms of fingerprint recognition, China CITIC Bank and Lenovo Venture Capital Group’s subsidiary &#8220;National Authentication&#8221; reached a cooperation in 2018 to deploy a fingerprint login function module in the new version of mobile banking 4.0. Users only need to turn on the fingerprint login function to experience extreme speed Easy and quick to log in.</p>
<p>In the direction of face recognition, China CITIC Bank applied Megvii Technology&#8217;s face core product in 2018.</p>
<p><strong> mobile bank</strong></p>
<p>In the construction of mobile banking, China CITIC Bank is speeding up the construction of a multi-application ecological network with mobile banking as the main operating position and small programs as light touch points.</p>
<p>The dual APP of China CITIC Bank&#8217;s mobile banking and mobile card space is upgraded to version 7.0, and realizes interconnection; mobile banking APP 7.0 realizes the version switching that changes according to the customer, and on the basis of the popular standard version, it covers overseas finance, the elderly, and private banks. Five characteristic customer groups, small and micro, and foreign, provide personalized and exclusive services.</p>
<p>In the first half of 2020, China CITIC Bank has 10.85 million monthly active mobile banking (MAU) accounts, a year-on-year increase of 17%, and China CITIC Bank’s credit card APP &#8220;Moving Card Space&#8221; has 13.24 million monthly active users (MAU), an increase of 12% year-on-year.</p>
<p>As of the end of 2020, China CITIC Bank has 26.155 million online monthly active users, of which mobile banking APP transaction amount has increased by 20.66% over the previous year, and the replacement rate of e-banking transactions has reached 99.54%.</p>
<p>In terms of channel co-building, China CITIC Bank has also continued to strengthen online service integration. The mobile banking APP successfully launched the online business hall services of CITIC Securities and China Securities Construction Investment Securities, and jointly launched the CITIC Academy function with CITIC Publishing Group.</p>
<p>President Fang Heying: Build a first-class technology-based bank</p>
<p>At present, the senior management organization structure of China CITIC Bank presents a pattern of six presidents with &#8220;one director and five associates&#8221;.</p>
<p>On the evening of March 15, Li Qingping, the former chairman of China CITIC Bank, handed in her resignation. At the same time, the board of directors has elected the chairman of CITIC Group Zhu Hexin as the chairman of the bank, and the president of China CITIC Bank Fang Heying as the vice chairman.</p>
<p>Among them, President Fang Heying is a 25-year veteran of China CITIC Bank.</p>
<p>Since 1996, Fang Heying has worked at China CITIC Bank, where he has served as the bank’s financial market business director, Hangzhou branch president, and Suzhou branch president.</p>
<p>Now 55, he addressed the shareholders on behalf of China CITIC Bank in the 2020 China CITIC Bank Annual Report just released.</p>
<p>Looking forward to the next three years, Fang Heying stated in the annual report president’s speech that he will continue to increase investment in science and technology.<strong> Accelerate the digital transformation and build China CITIC Bank into a &#8220;first-class technology bank&#8221;</strong> , Through the same direction of technology and business, to drive more innovation and bring about greater changes.</p>
<p>At the level of financial technology, Lv Tiangui, the business director of CITIC Bank and the proposed vice president, also said in response to a question from a reporter from the Economic Information Daily that the goal of CITIC Bank is to build two major platforms in technology and data within three to five years. &#8220;Support and promote the transformation of the bank&#8217;s operation and management from informatization and digitization to intelligence, forming an agile + intelligent innovation system, and becoming a first-class technology-driven bank.&#8221;</p>
<p>Lu Tiangui also said that digital transformation has now been upgraded to a bank-wide strategy to promote the entire process of systematic changes from technology application, model innovation, process reengineering to organizational remodeling, and promote the improvement of the bank&#8217;s governance system and the improvement of governance capabilities.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23330</post-id>	</item>
		<item>
		<title>Full layout of China Merchants Bank&#8217;s digital &#8220;artificial intelligence + big data&#8221;</title>
		<link>https://en.spress.net/full-layout-of-china-merchants-banks-digital-artificial-intelligence-big-data/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Tue, 15 Jun 2021 20:12:14 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Artificial]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[Banks]]></category>
		<category><![CDATA[Big]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[full]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Layout]]></category>
		<category><![CDATA[merchants]]></category>
		<guid isPermaLink="false">https://en.spress.net/full-layout-of-china-merchants-banks-digital-artificial-intelligence-big-data/</guid>

					<description><![CDATA[&#8220;Technology is the only force that can subvert the business model of commercial banks.&#8221; Tian Huiyu, President of China Merchants Bank, engraved this statement in the 2019 China Merchants Bank&#8217;s annual report, and it has been shining. Tian Huiyu attaches great importance to the development of financial technology. In the more than 2,000 words of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>&#8220;Technology is the only force that can subvert the business model of commercial banks.&#8221; Tian Huiyu, President of China Merchants Bank, engraved this statement in the 2019 China Merchants Bank&#8217;s annual report, and it has been shining.</strong></p>
<p><span id="more-22935"></span> Tian Huiyu attaches great importance to the development of financial technology. In the more than 2,000 words of the &#8220;President&#8217;s Address&#8221; in the China Merchants Bank&#8217;s 2019 annual report, he mentioned a total of 6 &#8220;technology&#8221;, 9 &#8220;transformation&#8221;, and 14 &#8220;digitalization&#8221;.</p>
<p>Since taking office in 2013, Tian Huiyu has been pushing China Merchants Bank to &#8220;run wildly&#8221; on the road of technology.</p>
<p>&#8220;We have made a clear-cut proposal to build a financial technology bank, and take the exploration of digital business models as the main direction of the second half of the transformation.&#8221; Tian Huiyu said in the 2019 annual report.</p>
<p>Thanks to the efforts of Tian Huiyu and other people from China Merchants Bank, China Merchants Bank&#8217;s &#8220;technological strength&#8221; has been at the forefront of the industry.</p>
<ul>
<li> At the end of 2019, CMB’s investment in information technology was 9.361 billion yuan, an increase of 43.97% year-on-year, which was 3.72% of the company’s operating income; in 2020, CMB’s investment in information technology reached 12 billion yuan</li>
<li> In December 2020, China Merchants Bank and JD.com jointly won the second direct banking license in China. China Merchants Topology Bank will fully adopt an online business model and explore new forms of banking in the future</li>
<li> As of January 10, 2021, the CMB App has accumulated 145 million users and 60.25 million monthly active users</li>
</ul>
<p>The emergence of the epidemic will bring more complicated situations and tests to banks in 2020, and China Merchants Bank&#8217;s performance last year was relatively stable. According to the performance bulletin published on January 14, China Merchants Bank achieved operating income of 290.508 billion yuan in 2020, an increase of 20.805 billion yuan, or 7.71%, over the same period last year.</p>
<p>Recently, Tian Huiyu also said in an interview with a reporter from the Financial Times that the epidemic has isolated physical contact between people, but thanks to a higher level of digital service system, the relationship between China Merchants Bank and its customers has become closer. It also strengthened China Merchants Bank&#8217;s determination to promote digital transformation.</p>
<p><img fifu-featured="1" decoding="async" src="https://p1.itc.cn/images01/20210615/81fd308593f447308237a89e6daeaa29.jpeg" max-width="600"> Create &#8220;Digital Merchants Bank&#8221;</p>
<p>China Merchants Bank, founded in 1987 and headquartered in Shenzhen, China, is the first joint-stock commercial bank in China that is wholly owned by a corporate legal person.</p>
<p>China Merchants Bank adheres to the strategic direction of &#8220;light banking&#8221; and the strategic positioning of &#8220;one body and two wings&#8221;.</p>
<p><strong> &#8220;Light Bank&#8221;</strong> The strategic direction of China Merchants Bank requires light management, light assets, light business model, etc. For example, light management refers to a light organization structure, which is manifested in the head office and branches going hand in hand; light asset refers to less asset consumption and more controllable risks. At present, China Merchants Bank and ICBC have joined the ranks of light banks. In its annual report, China Merchants Bank pointed out that it is necessary to closely focus on the transformation direction of &#8220;light banking&#8221; and strive to achieve a breakthrough in the qualitative change of financial technology banks.</p>
<p>At the same time, China Merchants Bank also insisted<strong> &#8220;One body and two wings&#8221;</strong> Strategic positioning,<strong> Retail &#8220;One&#8221; takes MAU as &#8220;North Star&#8221; (North Star is the most important direction, and all indicators serve this indicator)</strong> , Wholesale &#8220;Two Wings&#8221; take specialization as the direction, focus on building wholesale business systemization capabilities, and accelerate the advancement of digital transformation.</p>
<p> With MAU as the most important indicator, the number of APP users of China Merchants Bank continues to rise. At the end of 2019, the cumulative number of CMB App users exceeded 100 million; in mid-2020, the cumulative number of CMB App users reached 129 million; as of January 10, 2021, the cumulative number of CMB App users had reached 145 million. The number of active users is 60.25 million.</p>
<p>China Merchants Bank also directly pointed out that it must pass<strong> Benchmarking financial technology companies</strong> , Vigorously carry out the construction of financial technology banks, use financial technology as the nuclear power of transformation and development, and fully empower business development<strong> .</strong></p>
<p>Currently, China Merchants Bank has built three software centers in Shenzhen, Hangzhou, and Chengdu, and two data centers in Shenzhen and Shanghai to support the business development of the entire bank.</p>
<p>China Merchants Bank&#8217;s &#8220;AI Actual Combat&#8221;</p>
<p>Digital risk control</p>
<p>China Merchants Bank&#8217;s intelligent risk control platform &#8220;Libra System&#8221; covers online and offline transaction channels, and can intercept telecom fraud in real time.</p>
<p>As of the end of 2019, the &#8220;Libra System&#8221; can intercept suspected fraudulent transactions within 30 milliseconds, reduce the proportion of counterfeit and embezzled amounts of non-cardholders to five ten million, and help customers intercept 27,900 telecommunications fraud transactions. The interception amounted to 493 million yuan, which provided a strong guarantee for the safety of customer funds.</p>
<p>As of mid-2020, China Merchants Bank has reached 75.60% of the early warning accuracy of potential risky corporate customers; it has helped customers intercept 80,000 telecommunications fraud transactions, with an intercepted amount of more than 1.8 billion yuan, which provides a strong guarantee for the safety of customer funds.</p>
<p>Now, the intelligent risk control platform &#8220;Libra System&#8221; can intercept most suspected fraudulent transactions within 20 milliseconds, reducing the proportion of counterfeit and embezzled amounts by non-cardholders to six ten millionths.</p>
<p>In addition, in terms of external cooperation, China Merchants Bank is also actively cooperating with digital technology companies such as Huawei, Tencent, and Suoxinda.</p>
<p>According to an article published on Huawei&#8217;s official website in 2018, after the China Merchants Bank credit card unified risk control platform based on Huawei&#8217;s FusionInsight big data solution was launched, the number of risk cases was reduced by 50%, and the loss in half a year was reduced by more than 100 million yuan. The credit card issuance time has been reduced from about 15 days. Shorten it to 5 minutes.</p>
<p>In November 2017, Tencent and China Merchants Bank formally signed a cooperation agreement to reach a cooperation in the field of financial big data anti-fraud: Tencent Financial Cloud and Tencent Security Anti-fraud Laboratory opened up anti-fraud capabilities to China Merchants Bank through AI technology to help China Merchants Bank Better identify fraud in financial services and jointly build a financial security ecosystem.</p>
<p>According to news in April 2020, Tencent and China Merchants Bank jointly launched the &#8220;Lingshield Plan&#8221; to create a new model of anti-fraud through technology.</p>
<p>Digital marketing</p>
<p>In the field of intelligent marketing, the characteristics of China Merchants Bank are personalized recommendation, precise identification and electronic channel construction.</p>
<p>Beginning in 2015, China Merchants Bank has cooperated with Suoxinda Holdings, a global financial AI big data and integrated intelligent marketing solution manufacturer, from the customer group marketing stage 1.0, to the personalized marketing stage 2.0, to the real-time marketing 3.0 stage, to AI Marketing 4.0 stage, comprehensively build China Merchants Bank&#8217;s leading digital smart marketing system. It is reported that through the generation of 1,726 customer portrait tags for retail customers, the number of marketing customer contacts has increased by 6.56 times, the marketing success rate has reached 17.42%, and the personalized recommendation of &#8220;thousands of people&#8221; has begun.</p>
<p>Digital Customer Service</p>
<p>In 2016, under the technological wave of AI + big data, China Merchants Bank&#8217;s credit card service started the application of intelligent services with the palm life app as the core, from AR customer service, to AI-core intelligent customer service, and then to small recruitment assistants. Every new technology exploration and application has brought users a better interactive experience, and has become a more personalized and portable intelligent assistant for users step by step.</p>
<p>At present, the &#8220;Xiao Zhao Miao Smart Assistant&#8221; launched by CMB Credit Card on the Pocket Life App uses AI technologies such as voice conversion and semantic recognition to perform intelligent intent analysis of natural language, making the service &#8220;visible&#8221; and &#8220;heard&#8221; &#8220;. At the same time, the intelligent voice navigation function is implanted in the telephone voice IVR, the recognition accuracy rate reaches 94%, and the interaction volume is nearly 80,000. In addition to voice recognition technology, face recognition has also been used in the image, which greatly shortens the security authentication time.</p>
<p>In 2020, an interim report issued by China Merchants Bank pointed out that the automatic response accuracy rate of China Merchants Bank&#8217;s intelligent customer service reached 96.7%.</p>
<p>Digital investment advisory</p>
<p>In 2016, China Merchants Bank launched a robo-advisory service-&#8220;Capricorn Intelligent Investment&#8221;, which is also the first domestic commercial bank to launch robo-advisory services.</p>
<p>&#8220;Capricorn Smart Investment&#8221; mainly uses machine learning algorithms to incorporate more than ten years of wealth management experience of China Merchants Bank, and builds an asset allocation portfolio based on public funds, so as to achieve the purpose of diversifying investment risks with investors.</p>
<p>In 2018 alone, the cumulative sales scale of CMB Capricorn Smart Investment reached 12.233 billion.</p>
<p>Digital Middle Office</p>
<p>In the 2019 annual report, China Merchants Bank pointed out that it will build a unified digital middle-station for enterprises-China Merchants Bank&#8217;s open platform, explore the transformation of business models supported by standardized and modular services, and quickly respond to customer needs.</p>
<p>Prior to this, Leifeng.com (Public Account: Leifeng.com) had reported on China Merchants Bank&#8217;s data center in detail. For example, China Merchants Bank has built a middle-office system for customer acquisition and operation across the entire chain, such as the Rubik&#8217;s Cube activity operating platform and the red envelope platform. Like the Rubik’s Cube event platform, branches can quickly configure an online event within 5 minutes and reach target users through the China Merchants Bank App.</p>
<p><img decoding="async" src="https://p3.itc.cn/images01/20210615/e90281d834dd42de8c2f2ac39361f135.png" max-width="600"></p>
<p>China Merchants Bank also proposed<strong> Strengthen the construction of data center and promote data connection.</strong> Strengthen data governance, improve the convenience and ease of use of data, build a data application tool platform, and lower the threshold of data application. Promote the integration and opening of the system, open up the work flow and information flow of each system, and realize one entrance to the whole line. Decoupling the system with open thinking, micro-service and productization of functional modules,<strong> Precipitate various general capabilities as the middle stage of the system.</strong></p>
<p>The 2020 Interim Report of China Merchants Bank pointed out that China Merchants Bank will accelerate the iterative development of its customer relationship management system (CRM), and use the CRM system as a medium- and Taiwan-based capability precipitation carrier to form a customer information center, information case center, business processing center, marketing support center and a series of scenarios. Five core functions such as the team building center.</p>
<p>The CRM4.0 system is a key platform for the transformation of the &#8220;China Merchants Bank&#8221; financial business model. It is a smart marketing platform and a digital operation platform based on the business system, as well as a customer service system and a customer manager management system platform.</p>
<p>smart robot</p>
<p>China Merchants Bank relies on big data and artificial intelligence to create intelligent service robots, traffic distribution decision-making robots, intelligent agent assistant robots, service analysis robots, quality inspection robots, etc., covering user insights, traffic distribution, service interaction, demand re-excavation, management improvement, etc. Five modules, and moved the call center to the Pocket Life App to provide users with audio-visual multimedia interactive services, which has achieved the upgrade of service efficiency and user experience.</p>
<p>In June 2020, Tian Huiyu pointed out that China Merchants Bank relies on big data and artificial intelligence to create a large number of intelligent service robots. The cost of robots used for retail credit collection is 1/10 of labor, and the output is 9 times that of labor. The above is to increase production capacity.</p>
<p>RPA (Robot Process Automation)</p>
<p>As of October 2020, the financial industry accounted for the highest proportion of domestic RPA companies at 54.55%, of which 77.78% of financial institutions are banks. Among them, Shanghai Pudong Development Bank and China Merchants Bank were the first banks to use RPA. They were the first to introduce RPA technology in the domestic financial industry in 2016 and 2017, respectively, in order to improve the level of operation automation. The effect is very impressive.</p>
<p>In December 2018, China Merchants Bank used intelligent robots to participate in business processing in the new version of its online custody banking system, which was the first to realize the application of RPA technology in the asset custody field.</p>
<p>In 2020, China Merchants Bank has innovatively integrated the RPA shared pool technology on the basis of the original CBS7.0 platform, and launched CBS-RPA, which can quickly help companies build a complete treasury management system, build a comprehensive treasury management system, and solve treasury management Problems and perplexities. The product became very popular after it was launched, and it has been successfully launched in nearly ten large group companies across the country within only half a year of its launch.</p>
<p>In the 2020 interim report, China Merchants Bank pointed out that it applied RPA, OCR and NLP (natural language processing) and other financial technology technologies in 24 middle and back-office scenarios including verification, entry, and consulting. During the reporting period, the number of alternative businesses reached 11.64 million. .</p>
<p>Tian Huiyu, President of China Merchants Bank, said: RPA uses machines to replace simple outsourcing, which saves a lot of costs.</p>
<p>cloud computing</p>
<p>At the end of 2019, the total number of X86 server deployments of China Merchants Bank increased by 60.67% year-on-year. The new generation of PaaS (Platform as a Service) platform expanded its use, and the proportion of applications on the cloud in the bank reached 44%.</p>
<p>At the same time, China Merchants Bank continues to enhance its open banking capabilities. The &#8220;Open API Platform&#8221; for unified external services across the bank supports the safe and fast output of APIs, serving financial payment, AI, smart parking, smart medical and other scenarios, and empowering 629 cooperative enterprises. In terms of big data + AI, the big data cloud platform was upgraded, the overall capacity of the data lake was increased to 9.8PB, and the data entering the lake increased by 68% year-on-year.</p>
<p>Based on the integration of internal and external data, China Merchants Bank has increased the research and application of AI technology, built three AI cloud services of intelligent customer service, risk public opinion, and computer vision, and launched three major AI solutions for knowledge management, digital marketing, and risk management to support business The development of intelligence.</p>
<p>The 2020 mid-term report pointed out that China Merchants Bank will establish a large-scale digital infrastructure based on cloud computing technology, promote the construction of a native cloud that is more convenient for rapid construction, expansion, openness and iteration of systems and applications, and support the safe access of new applications from the head office and branches to the cloud .</p>
<p>As of mid-2020, China Merchants Bank has 4,015 native cloud servers, an increase of 100% over the end of the previous year; the scale of native cloud storage is 29.18PB, an increase of 92% over the end of the previous year; the number of native cloud containers is 69,080, an increase of 121% over the end of the previous year.</p>
<p>database</p>
<p>On November 27, 2017, China Merchants Bank and Huawei established a joint innovation laboratory for distributed databases to jointly develop independent and controllable financial-grade distributed database products.</p>
<p>In this joint creation project, China Merchants Bank mainly does three things: first, to provide advanced financial business scenarios; second, based on so many years of advanced experience in database use and operation and maintenance of China Merchants Bank, it proposes a solution for the joint creation of distributed databases. Specific requirements; third, for the key components of the Lianchuang database, such as the kernel and high-availability architecture, deeply participate in the entire link from design, coding, testing to final production. Huawei, on the other hand, has a large amount of technology accumulation in the database field, and is mainly responsible for the realization of product development and the promotion of future marketization.</p>
<p>After initial contact and cooperation, China Merchants Bank and Huawei conducted a pilot database application in 2018.</p>
<p>In the 2019 annual report, China Merchants Bank pointed out the establishment of the Kunpeng Computing Joint Innovation Laboratory and the Load Balancing Joint Innovation Laboratory to accelerate the implementation of the research results of the distributed database joint innovation laboratory.</p>
<p>Biometrics</p>
<p>As the leading brand of commercial banks, China Merchants Bank focuses on internal risk control and payment security, combined with cutting-edge technologies such as big data, cloud computing, and artificial intelligence, and continuously upgrades the risk control system, creates smart risk control, and creates convenience and efficiency for consumers. Safe and assured customer experience.</p>
<p>In order to strengthen the bank’s internal security management, increase the efficiency of the banking system’s authorization, and enhance the counter business risk prevention capabilities, China Merchants Bank introduced the fingerprint recognition algorithm and smart terminals of Eyes Technology as early as 2009, which were applied to the counters and smart branches of China Merchants Bank. And in mobile marketing, it has realized intelligent risk control and cost reduction and efficiency enhancement, helping China Merchants Bank to provide consumers with intelligent, convenient and safe financial services with user experience as the core, and add to the good life of users.</p>
<p>Blockchain</p>
<p>As early as 2018, China Merchants Bank issued the country&#8217;s first financial industry blockchain electronic invoice.</p>
<p>At the end of 2019, China Merchants Bank improved and developed the standard branch chain and BaaS (blockchain as a service) platform ecology, with a total of 25 applications.</p>
<p>In the 2020 mid-term report, China Merchants Bank pointed out that it is improving and developing the open permission chain and blockchain as a service (BaaS) platform. It has been developing the continuous application of blockchain and business integration in scenarios such as supply chain finance and merchant fund clearing. explore.</p>
<p>Online payment</p>
<p>In the 2019 annual report, China Merchants Bank pointed out that it will realize ecological operation with the industrial Internet as the key link. Focusing on the three major directions of account and payment system digitization, digital financing, and financial technology capability output, the industry chain is opened up, and the unified payment and settlement system is innovated to realize the collection and settlement function and the internal account settlement mode of the B2B platform.</p>
<p>At the end of 2019, China Merchants Bank’s comprehensive settlement solution &#8220;Cloud Bills&#8221; has provided services to 5,766 corporate customers, with a transaction volume of 287.271 billion yuan; the aggregate collection business focuses on insurance, medicine, education, and FMCG four scenarios, and the number of transactions Reached 502 million transactions, with a transaction value of 146.647 billion yuan, a year-on-year increase of 267.51%.</p>
<p>The &#8220;Three Times&#8221; of China Merchants Bank</p>
<p>China Merchants Bank started from Shekou, Shenzhen, and has been crowned as the &#8220;King of Retailing&#8221; in the banking industry for 40 years of ups and downs. Along the way, it is inseparable from the three presidents&#8217; keen insight into market changes and their strong courage to actively reform.</p>
<p><strong> Wang Shizhen</strong> He was the first president of China Merchants Bank and served for 14 years. Under his leadership, China Merchants Bank evolved from a wholly-owned bank of China Merchants into a standard joint-stock commercial bank, and gradually got rid of the restrictions of regional banks, and basically formed a national commercial bank. Pattern.</p>
<p>Wang Shizhen and other leaders also made the decision to quickly establish a computer system for China Merchants Bank, and set a clear mid-term goal: to complete the computerization of basic business processing within three years, and to complete the computerization of all business processing within five years. This has laid a good foundation for China Merchants Bank to carry out digital transformation in the future.</p>
<p>Year 1999,<strong> Ma Weihua</strong> He took over as the president of China Merchants Bank and fully started the construction of China Merchants Bank&#8217;s online banking after taking office, becoming the first commercial bank in China with online financial services. The opening of China Merchants Bank&#8217;s online banking became the starting point for its retail business.</p>
<p>In 2010, after realizing that the profit growth achieved by large-scale capital consumption and profit margins in the past was difficult to sustain, Ma Weihua led China Merchants Bank to implement the goals of reducing capital consumption, increasing loan pricing, and controlling financial costs. &#8220;Secondary transformation&#8221;. Like Wang Shizhen, Ma Weihua has also been at the helm of China Merchants Bank for 14 years.</p>
<p>year 2013,<strong> Tian Huiyu</strong> Taking over as the president of China Merchants Bank, China Merchants Bank has ushered in a new era in which it is fully embarking on the road of &#8220;finan-tech banking&#8221;.</p>
<p>Under the leadership of Tian Huiyu, China Merchants Bank proposed &#8220;mobile first&#8221; in 2015, consciously using APP as its main business position.</p>
<p>In 2016, China Merchants Bank mentioned fintech in its annual report for the first time, proposing that the bank’s “premature power” must be used to advance its fintech strategy, and in its 17-year report, it proposed to be a “finan-tech bank”.</p>
<p>Under the leadership of Tian Huiyu and other leaders of China Merchants Bank, at the end of 2019, China Merchants Bank invested 9.361 billion yuan in information technology, a year-on-year increase of 43.97%, which is 3.72% of the company&#8217;s operating income.</p>
<p>China Merchants Bank attaches great importance to science and technology investment, and its investment in information technology has far exceeded that of most banks over the years. Public information shows that the annual financial technology budget of China Merchants Bank is determined at 3.5% of the previous year&#8217;s revenue.</p>
<p>Recently, Tian Huiyu said in an interview that China Merchants Bank&#8217;s investment in information technology has reached 12 billion yuan in 2020. Based on this figure, Leifeng.com calculates that China Merchants Bank&#8217;s IT investment will account for more than 4% of the company&#8217;s operating income in 2020.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">22935</post-id>	</item>
		<item>
		<title>By 2030 6G technology will be commercialized globally</title>
		<link>https://en.spress.net/by-2030-6g-technology-will-be-commercialized-globally/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 10 Jun 2021 20:46:11 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[3GPP]]></category>
		<category><![CDATA[5G]]></category>
		<category><![CDATA[Bandwidth]]></category>
		<category><![CDATA[Commercialization]]></category>
		<category><![CDATA[commercialized]]></category>
		<category><![CDATA[Computer]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[Generation]]></category>
		<category><![CDATA[global]]></category>
		<category><![CDATA[globally]]></category>
		<category><![CDATA[IMT 2030]]></category>
		<category><![CDATA[Integration]]></category>
		<category><![CDATA[ITELECOM]]></category>
		<category><![CDATA[Latency]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Slow]]></category>
		<category><![CDATA[Standardize]]></category>
		<category><![CDATA[Super fast]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[White book]]></category>
		<category><![CDATA[Wireless network]]></category>
		<guid isPermaLink="false">https://en.spress.net/by-2030-6g-technology-will-be-commercialized-globally/</guid>

					<description><![CDATA[6th generation (6G) mobile communication technology will be commercialized globally by 2030 and will integrate with advanced computing, big data, artificial intelligence (AI) and blockchain. . In the White Paper published on June 6, the IMT-2030 (6G) Promotion Group, established in June 2019 at the request of the Ministry of Industry and Information Technology of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>6th generation (6G) mobile communication technology will be commercialized globally by 2030 and will integrate with advanced computing, big data, artificial intelligence (AI) and blockchain. .</strong><br />
<span id="more-22507"></span> In the White Paper published on June 6, the IMT-2030 (6G) Promotion Group, established in June 2019 at the request of the Ministry of Industry and Information Technology of China, the 6G network will realize the integration of deepening of the real physical world and the virtual digital world, and building a new world of &#8220;intelligent connection of everything and digital&#8221;.</p>
<p> According to the White Paper, the international organization for telecommunications technology 3GPP is expected to begin research and development of international technical standards for 6G networks around 2025 before commercialization is expected around 2030. China has granted a license for commercial use of 5G networks and started researching and developing 6G technology from 2019. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_06_365_39096786/34d3f605e5470c195556.jpg" width="625" height="351"> <em> 6th generation (6G) mobile communication technology will be commercialized globally by 2030</em> Meanwhile, according to experts, 5G technology is designed to increase the speed and responsiveness of wireless networks. 5G was born to succeed 4G, resulting in faster download speeds, smoother data streaming and more. 5G is not only about speed but it also opens up completely new applications and causes a huge revolution in the following years. The arrival of 5G network promises to bring a lot of utilities and wide applications in the future. 5G could be the key to making self-driving cars more ubiquitous. For them to function at their best, they need to be able to quickly send and receive data to and from other cars, navigation systems and more. These require a fast network speed, low latency, lots of bandwidth and high reliability. One thing where the speed and bandwidth of 5G can really help is the Internet of Things (IoT). With everything from smart air conditioners to smart lights popping up in your home, 5G provides the capabilities you need to connect everything easily. According to the Ministry of Communications and Internal Affairs of Japan, the committee on 6G super-fast communication network will discuss technology developments, as well as methods and policies for exploiting this next-generation wireless network, projecting It is expected to launch around 2030. Japan has lagged behind the US and South Korea in launching commercial 5G services. As many other countries have begun to talk about how to exploit 6G technology, Japan aims to map out the above strategy and take the lead in standardization efforts. Japan&#8217;s 6G Committee, expected to include representatives from the private sector as well as research experts from universities, will listen to input from a variety of industries to study potential challenges. <strong> Thanh Van</strong> <strong> See more : </strong> After ITelecom, Vietnam is about to have a virtual mobile network</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">22507</post-id>	</item>
		<item>
		<title>The Center for Technology for COVID-19 Prevention and Control uniformly manages medical declaration data</title>
		<link>https://en.spress.net/the-center-for-technology-for-covid-19-prevention-and-control-uniformly-manages-medical-declaration-data/</link>
		
		<dc:creator><![CDATA[Tin, ảnh: XC/Báo Tin tức]]></dc:creator>
		<pubDate>Thu, 10 Jun 2021 13:45:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Center]]></category>
		<category><![CDATA[Control]]></category>
		<category><![CDATA[Coordinator]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[COVID19]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Declaration]]></category>
		<category><![CDATA[Declare]]></category>
		<category><![CDATA[Department of Informatics]]></category>
		<category><![CDATA[Department of Informatization]]></category>
		<category><![CDATA[Gathering]]></category>
		<category><![CDATA[Isolation]]></category>
		<category><![CDATA[Manage]]></category>
		<category><![CDATA[manages]]></category>
		<category><![CDATA[medical]]></category>
		<category><![CDATA[Ministry of Information and Communication]]></category>
		<category><![CDATA[Ministry of Information and Communications]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Prevention]]></category>
		<category><![CDATA[Quarantine]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Tracing]]></category>
		<category><![CDATA[Translate]]></category>
		<category><![CDATA[TTTT]]></category>
		<category><![CDATA[Unified]]></category>
		<category><![CDATA[uniformly]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-center-for-technology-for-covid-19-prevention-and-control-uniformly-manages-medical-declaration-data/</guid>

					<description><![CDATA[The Ministry of Information and Communications (TT&#38;TT) has just established the National Center for Technology for COVID-19 Prevention and Control located at the Department of Informatization. This center gathers a technology force operating 24/7 to serve the prevention of the COVID-19 epidemic. People make electronic medical declarations. The National Center for Technology for COVID-19 Prevention [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The Ministry of Information and Communications (TT&amp;TT) has just established the National Center for Technology for COVID-19 Prevention and Control located at the Department of Informatization. This center gathers a technology force operating 24/7 to serve the prevention of the COVID-19 epidemic.</strong><br />
<span id="more-22407"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_294_39087028/67d0c02dd76f3e31677e.jpg" width="625" height="468"> </p>
<p> <em> People make electronic medical declarations.</em> The National Center for Technology for COVID-19 Prevention and Control has the task of acting as the focal point for coordination and coordination with agencies, organizations and enterprises participating in technical and technology-related support and cooperation to support support for the prevention of COVID-19; design, organize, build, manage, operate, monitor, ensure safety and network security for technology platforms and systems for epidemic prevention and control. The center performs unified management, centralized connection and distribution of electronic medical declaration data, domestic movement declaration data, people&#8217;s reflection data, quarantine point data and data control entry and exit of quarantine points between epidemic prevention technology systems. The Center has a flexible working structure, is not an administrative organization, does not create additional organizations and staff, besides the Director, in charge of general administration is the leader of the Informatics Department. The Ministry of Information and Communications also invites medical experts and technology experts to join the National Center for Technology for COVID-19 Prevention and Control, as core members. Reportedly, in the conclusion of the online meeting of the National Steering Committee with the provinces of Bac Ninh, Bac Giang and Ho Chi Minh City on June 2, Deputy Prime Minister Vu Duc Dam asked the Ministry of Information and Communications, the Ministry of Health, The information analysis team of the National Steering Committee coordinated and gathered businesses and experts to urgently complete applications, software and technology solutions to effectively support the task of medical declaration, managing people in isolation, tracing, managing people entering and leaving the hospital, testing and administering vaccines; complete the COVID-19 safety map tool so that localities, businesses and people can look up and participate in updating smoothly.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">22407</post-id>	</item>
		<item>
		<title>The Ministry of Information and Communications has set up a technology &#8216;squad&#8217; to prevent and control the COVID-19 epidemic</title>
		<link>https://en.spress.net/the-ministry-of-information-and-communications-has-set-up-a-technology-squad-to-prevent-and-control-the-covid-19-epidemic/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Wed, 09 Jun 2021 20:18:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Center]]></category>
		<category><![CDATA[Clue]]></category>
		<category><![CDATA[Co operate]]></category>
		<category><![CDATA[communications]]></category>
		<category><![CDATA[Control]]></category>
		<category><![CDATA[Coordinator]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[COVID19]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Declare]]></category>
		<category><![CDATA[epidemic]]></category>
		<category><![CDATA[Establish]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[medical]]></category>
		<category><![CDATA[Ministry]]></category>
		<category><![CDATA[Ministry of Health]]></category>
		<category><![CDATA[Ministry of Information and Communication]]></category>
		<category><![CDATA[Ministry of Information and Communications]]></category>
		<category><![CDATA[Mission]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Prevent]]></category>
		<category><![CDATA[Quarantine]]></category>
		<category><![CDATA[Room Technology Center]]></category>
		<category><![CDATA[set]]></category>
		<category><![CDATA[Skill]]></category>
		<category><![CDATA[squad]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Translate]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-ministry-of-information-and-communications-has-set-up-a-technology-squad-to-prevent-and-control-the-covid-19-epidemic/</guid>

					<description><![CDATA[The Center has the task of acting as the focal point to coordinate and coordinate with agencies, organizations and businesses in providing technical and technology-related support and cooperation to support the prevention and control of the COVID-19 epidemic. The Ministry of Information and Communications has just issued a decision to set up a technology force [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The Center has the task of acting as the focal point to coordinate and coordinate with agencies, organizations and businesses in providing technical and technology-related support and cooperation to support the prevention and control of the COVID-19 epidemic.</strong><br />
<span id="more-21887"></span> The Ministry of Information and Communications has just issued a decision to set up a technology force operating 24/7 to serve the prevention and control of the COVID-19 epidemic.</p>
<p> Accordingly, the National Center for Technology for COVID-19 Prevention and Control (Center) is a flexible working structure, not an administrative organization, without creating additional organizations or staff. The Center has the task of acting as the focal point to coordinate and coordinate with agencies, organizations and enterprises in providing technical and technology-related support and cooperation to support the prevention and control of the COVID-19 epidemic; Design, build, manage, operate, monitor, ensure safety and network security for technology platforms and systems for COVID-19 prevention and control. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_114_39085359/e5e179b46bf682a8dbe7.jpg" width="625" height="445"> <em> Decided to establish the center. Photo: VT</em> A unified management force, centralized connection and distribution of electronic medical declaration data, domestic movement declaration data, people&#8217;s reflection data, quarantine point data and control data entering and exiting quarantine points between technology systems for COVID-19 epidemic prevention and control. The center also develops or receives new technology solutions in the prevention and control of COVID-19 epidemic, serving the requirements of using technology to support the medical profession of the Ministry of Health. The Center will support technical requirements, guide organizations to deploy technological measures for ministries, sectors and localities in the prevention and control of COVID-19. Urging the implementation and application of technology systems and platforms to prevent and control the COVID-19 epidemic. In addition, the Center also performs other tasks as assigned by the Minister of Information and Communications.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21887</post-id>	</item>
		<item>
		<title>EU and UK antitrust investigation against Facebook</title>
		<link>https://en.spress.net/eu-and-uk-antitrust-investigation-against-facebook/</link>
		
		<dc:creator><![CDATA[Lan Phương (TTXVN)]]></dc:creator>
		<pubDate>Wed, 09 Jun 2021 08:10:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[advertisement]]></category>
		<category><![CDATA[Amazon]]></category>
		<category><![CDATA[Andrea Coscelli]]></category>
		<category><![CDATA[Antitrust]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Classify]]></category>
		<category><![CDATA[CMA]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[European Commission]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[investigation]]></category>
		<category><![CDATA[Lawsuit]]></category>
		<category><![CDATA[Margrethe Vestager]]></category>
		<category><![CDATA[Monopoly]]></category>
		<category><![CDATA[Online Advertising]]></category>
		<category><![CDATA[Position]]></category>
		<category><![CDATA[Tamponade]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[UK]]></category>
		<guid isPermaLink="false">https://en.spress.net/eu-and-uk-antitrust-investigation-against-facebook/</guid>

					<description><![CDATA[The European Union (EU) and the United Kingdom have opened antitrust investigations into Facebook&#8217;s use of advertising data in its classified advertising business, with a focus on investigating how Facebook uses data. users in the online advertising market and oppress competitors. Social network icon Facebook. Photo: AFP/VNA This is the first antitrust investigation that European [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The European Union (EU) and the United Kingdom have opened antitrust investigations into Facebook&#8217;s use of advertising data in its classified advertising business, with a focus on investigating how Facebook uses data. users in the online advertising market and oppress competitors.</strong><br />
<span id="more-21766"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_04_294_39078455/508715000742ee1cb753.jpg" width="625" height="420"> </p>
<p> <em> Social network icon Facebook. Photo: AFP/VNA</em> This is the first antitrust investigation that European Commissioner for Competition Margrethe Vestager has launched against the world&#8217;s number one social media provider and the latest she has launched into an American &#8220;tech giant&#8221;. Ms. Vestager had previously forced Alphabet &#8211; Google&#8217;s parent company to pay a fine of 8 billion euros (about 9.7 billion USD) and is conducting a similar investigation to Amazon and Apple. During the Facebook investigation, Ms. Vestager said she would review Facebook&#8217;s huge data warehouse collected from 7 million companies that have participated in advertising on this social network. The European Commission (EC) and the UK&#8217;s Competition and Markets Authority (CMA) are investigating the possibility of Facebook exploiting its dominant position in the social network or digital advertising by collecting collects and uses data, and examines Facebook&#8217;s &#8220;distortion&#8221; of the advertising market through service classification. Ms. Vestager stressed that in today&#8217;s digital economy, data should not be used in ways that undermine competition. This tech giant may have to change its business model with large fines. Reacting to the EU and UK&#8217;s decision, Facebook said it will fully cooperate with the authorities of both sides to demonstrate that Facebook&#8217;s integrated &#8220;Marketplace&#8221; and dating platform provides all people with more choices and all operate in a highly competitive environment. In the role of &#8220;gatekeeper&#8221;, Facebook as well as other social networking platforms have collected a large amount of personal private information of users based on privacy terms to develop an integrated platform. Marketplace aims to increase competitive advantage over competitors. In the past, the UK has rarely conducted independent antitrust investigations into US tech giants. Since withdrawing from the EU, the UK&#8217;s antitrust division has become an independent global regulator. Andrea Coscelli, CEO of the CMA, has pledged to tackle companies like Google and Facebook with a series of antitrust lawsuits, and said he is open to working alongside colleagues in Brussels.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21766</post-id>	</item>
		<item>
		<title>CEO Jan Koum- The creator of the app with 2 billion users</title>
		<link>https://en.spress.net/ceo-jan-koum-the-creator-of-the-app-with-2-billion-users/</link>
		
		<dc:creator><![CDATA[Đức Giang]]></dc:creator>
		<pubDate>Mon, 07 Jun 2021 07:38:21 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[app]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[billion]]></category>
		<category><![CDATA[Brian Acton]]></category>
		<category><![CDATA[CEO]]></category>
		<category><![CDATA[Creator]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Father]]></category>
		<category><![CDATA[Jan]]></category>
		<category><![CDATA[Jan Koum]]></category>
		<category><![CDATA[Koum]]></category>
		<category><![CDATA[Mark Zuckerberg]]></category>
		<category><![CDATA[Message]]></category>
		<category><![CDATA[Repurchase]]></category>
		<category><![CDATA[rise]]></category>
		<category><![CDATA[Signal]]></category>
		<category><![CDATA[stamps]]></category>
		<category><![CDATA[Subsidy]]></category>
		<category><![CDATA[University of san jose]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[WHATSAPP]]></category>
		<category><![CDATA[Yahoo]]></category>
		<guid isPermaLink="false">https://en.spress.net/ceo-jan-koum-the-creator-of-the-app-with-2-billion-users/</guid>

					<description><![CDATA[Billionaire Jan Koum is one of the few billionaires with a &#8216;poor&#8217; start, living on pensions. But he rose to build the popular messaging app WhatsApp, which was later acquired by Facebook for $19 billion. Rejected by Facebook Jan Koum is of Jewish descent, born in 1976 into a poor family on the outskirts of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Billionaire Jan Koum is one of the few billionaires with a &#8216;poor&#8217; start, living on pensions. But he rose to build the popular messaging app WhatsApp, which was later acquired by Facebook for $19 billion.</strong><br />
<span id="more-21244"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_03_318_39057927/14c6d5bac4f82da674e9.jpg" width="625" height="382"> </p>
<p> <strong> Rejected by Facebook</strong> Jan Koum is of Jewish descent, born in 1976 into a poor family on the outskirts of Kiev, the capital of Ukraine. Koum&#8217;s father worked as a hospital and school construction manager, and his mother worked as a housewife. At the age of 16, Koum followed his mother and grandmother to the US to settle first, intending to settle down to welcome his father. They live off social welfare, from food stamps for those who cannot afford food. Koum&#8217;s mother takes care of the kids to earn extra money, while Koum cleans a grocery store. Koum still uses notebooks and pens brought from Ukraine because he lacks money to buy them. In 1997, when Koum was 21 years old, his father died in his hometown. Three years later, Koum&#8217;s mother also died in the US from cancer. In high school, Jan Koum didn&#8217;t have many friends and was seen as an outcast. He almost failed to graduate because of his lack of education. Jan Koum finds joy in his old computer. This time, Koum joins a hacker group called woowoo. With the experience gained from this hacker group, he applied for the exam and entered the University of San Jose. During his studies, he worked for Ernst and Young Auditing Company in the position of security vulnerability tester. In 1997, he ran into Yahoo employee Brian Acton. With the help of Acton, Koum got a job in cybersecurity six months later at Yahoo. Koum decided to leave school to focus on working for Yahoo. After 9 years at Yahoo, Koum rose to the position of infrastructure manager. In 2007, Koum and Acton both quit their jobs at Yahoo, spending time traveling South America in search of new inspirations. When they returned, the two applied to Facebook together, but were rejected. During his unemployment, Koum mulled over his next job. Buying an iPhone, Koum realized he could succeed with apps from the App Store. Koum came up with the idea to let people set up status updates on their phones. He said: “I am annoyed because I miss a lot of calls when I am at the gym. So I came up with the idea of ​​an app that lets friends know if the person on the other end of the line is ready to take a call, with a feature called &#8220;status&#8221;. We didn&#8217;t originally plan to start a company, we just wanted to make a product that people could use.&#8221; In February 2009, Koum and Acton co-founded WhatsApp, turning the product into a messaging app. At first, the cost to verify SMS for users cost about 500,000 USD/month, making Koum&#8217;s bank account almost exhausted. By December 2009, they updated a new version for WhatsApp on iPhone, making it possible for this application to send images, immediately the number of users increased. To ensure coverage, WhatsApp charged about $1 a month to use, which brought in about $5,000 in revenue in early 2010, enough to cover expenses later. By February 2013, when the number of WhatsApp users reached about 200 million and the number of employees was 50, Acton and Koum decided to organize a fundraiser and was invested 50 million USD by Sequoia Investment Fund, increasing the value of WhatsApp to 1 , 5 billion USD. The founding duo is very concerned about security for users. “We want to know as little of the user&#8217;s information as possible. We don&#8217;t run ads, so we don&#8217;t need personal data,&#8221; Koum said. WhatsApp quickly grew without any marketing or PR campaigns, especially in less developed countries where users rely heavily on SMS messages. <strong> Return to conquer the big man</strong> WhatsApp&#8217;s growth caught the attention of Facebook&#8217;s CEO. In 2012, Mark Zuckerberg phoned Koum to express his interest in WhatsApp. The two then kept in touch, often climbing mountains and chatting about the topic of world connection. In February 2014, Zuckerberg met Koum and offered to buy WhatsApp for $19 billion (including $4 billion in cash, the rest in Facebook stock). At the time Facebook acquired WhatsApp, the app had 450 million monthly active users. In 2019, this number has reached 1.5 billion. By February 2021, the application has surpassed 2 billion users in 180 countries, is the world&#8217;s most popular free messaging application over the internet today. However, the sale of WhatsApp by co-founders Jan Koum and Brian Acton is said to be a bad decision. The biggest split between WhatsApp and Facebook is the messaging app&#8217;s monetization policy. Koum and Acton have resisted the adoption of Facebook&#8217;s widespread advertising model, which uses personal data to allow marketers to show ads to specific sets of customers on the social network. Those disagreements have led to tensions with Facebook CEO Mark Zuckerberg and COO Sheryl Sandberg. Acton left WhatsApp in 2017, 8 months later Jan Koum also left. &#8220;I sold my company. For great personal gain I sold my users&#8217; privacy to Facebook. I made a decision and compromised with that and I regret it&#8221; &#8211; Jan Koum shared with Forbes. After the two founders left, Facebook persisted with the policy given to WhatsApp. In early January 2021, WhatsApp made a controversial decision, when it changed its policy and terms of use, requiring WhatsApp users to agree to the sharing of their personal information with the parent company Facebook. and Facebook affiliated companies. According to WhatsApp, sharing information will help this application better understand users, in order to improve and enhance the quality of the service. However, this move of WhatsApp has angered many users and called for a boycott of the application, because they do not want to share their information with Facebook. Many WhatsApp users have switched to other free internet messaging apps and services, like Telegram and Signal. In 2014, Jan Koum entered Forbes&#8217; list of the 400 richest Americans at number 62, with an estimated net worth of $7.5 billion. As of August 2020, his net worth is estimated at $10 billion.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21244</post-id>	</item>
		<item>
		<title>UC Browser secretly collects browsing data of iPhone users</title>
		<link>https://en.spress.net/uc-browser-secretly-collects-browsing-data-of-iphone-users/</link>
		
		<dc:creator><![CDATA[TIỂU MINH]]></dc:creator>
		<pubDate>Sun, 06 Jun 2021 08:07:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Alibaba]]></category>
		<category><![CDATA[App store]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[browsing]]></category>
		<category><![CDATA[Collect]]></category>
		<category><![CDATA[collects]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Gabi Cirlig]]></category>
		<category><![CDATA[Google chrome]]></category>
		<category><![CDATA[Google Play]]></category>
		<category><![CDATA[Incognito]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[IP address]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[secret]]></category>
		<category><![CDATA[secretly]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Surfing the web]]></category>
		<category><![CDATA[UC Browser]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<guid isPermaLink="false">https://en.spress.net/uc-browser-secretly-collects-browsing-data-of-iphone-users/</guid>

					<description><![CDATA[Recently, security researcher Gabi Cirlig discovered that UC Browser (a fairly popular mobile browser) was secretly sending iPhone users&#8217; browsing data to servers in China. The collected data even includes IP addresses, which can be used to track the approximate location of the user. UC Browser is developed by UCWeb, a subsidiary of Alibaba (China). [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Recently, security researcher Gabi Cirlig discovered that UC Browser (a fairly popular mobile browser) was secretly sending iPhone users&#8217; browsing data to servers in China.</strong><br />
<span id="more-21025"></span> The collected data even includes IP addresses, which can be used to track the approximate location of the user.</p>
<p> UC Browser is developed by UCWeb, a subsidiary of Alibaba (China). This is one of the most popular mobile browsers in Asia, with over 500 million downloads on Google Play alone. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_02_331_39051919/1e841e3a0f78e626bf69.jpg" width="625" height="352"> According to security researcher Gabi Cirlig, UC Browser silently sent iPhone users&#8217; browsing data (even with incognito mode enabled) to UCWeb servers (registered in China, but located in the US). ). This is in stark contrast to the company&#8217;s previous statement, which does not record a user&#8217;s &#8220;browsing and search history&#8221; when incognito mode is activated. More worryingly, UC Browser also collects IDs (unique identifiers) to track users across various websites. The collection of user data happens on both Android and iOS versions, not sure what UCWeb is doing with all this information? Interested readers can watch the video at: “This kind of tracking is done on purpose,” Cirlig told Forbes. When compared with Google Chrome browser and some other popular browsers, he found there is no browser like UC Browser. UC Browser just rolled out a new update last week, but the company never mentioned monitoring users&#8217; browsing activity. Currently the English version of UC Browser has been removed from the App Store, but the Chinese version still exists, and unlike the English version, it does not send data back to the UCWeb server. Earlier in 2019, the UC Browser version for Android also violated Google Play&#8217;s policies.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21025</post-id>	</item>
		<item>
		<title>4 recommendations to limit risks from ransomware</title>
		<link>https://en.spress.net/4-recommendations-to-limit-risks-from-ransomware/</link>
		
		<dc:creator><![CDATA[Khánh Linh]]></dc:creator>
		<pubDate>Sat, 05 Jun 2021 17:16:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Ask for money]]></category>
		<category><![CDATA[Backup]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[case]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[FTP]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Limit]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Prevent]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[recommendation]]></category>
		<category><![CDATA[Recommendations]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[Right from the start]]></category>
		<category><![CDATA[risks]]></category>
		<category><![CDATA[Scanning]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[website]]></category>
		<guid isPermaLink="false">https://en.spress.net/4-recommendations-to-limit-risks-from-ransomware/</guid>

					<description><![CDATA[Ransomware is a common form of cyber attack, appearing in many fields. Understanding how it works will help your organization protect against future threats. Appropriate measures should be taken to limit the risk from ransomware. Illustration. With this form of attack, hackers often use tricks to fake websites, extract data of agencies and organizations and [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Ransomware is a common form of cyber attack, appearing in many fields. Understanding how it works will help your organization protect against future threats.</strong><br />
<span id="more-20877"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_02_309_39044821/fcc826223760de3e8771.jpg" width="625" height="351"> </p>
<p> <em> Appropriate measures should be taken to limit the risk from ransomware. Illustration. </em> With this form of attack, hackers often use tricks to fake websites, extract data of agencies and organizations and demand ransom. Cybercriminals carry out cyberattacks according to a concise strategy that is applicable to many industries. An analysis of recent experts shows that, in 2020 alone, the amount of damage related to ransomware attacks has reached billions of dollars. More dangerously, this behavior also targets the government&#8217;s information technology systems, causing serious impact. To protect critical data from attacks, government IT systems need to ensure external layers of security, while having the added responsibility of maintaining the infrastructure if an intrusion occurs. offense. According to studies, despite the development and expansion of the scope, the attacker&#8217;s methods still have similarities. Most hackers will illegally exploit the lowest-level vulnerabilities first, through some common and easy-to-implement method. Therefore, experts recommend to prevent ransomware from this initial step through some of the following methods. <strong> 1. Secure remote access</strong> Remote access is a familiar method often used by attackers, especially through unpatched vulnerabilities of information systems. Accordingly, hackers are constantly scanning the internet, looking for ways to exploit these vulnerabilities to perform attacks. To combat vulnerability scanning, organizations should prioritize patching vulnerabilities first. Along with that, to protect the system, experts recommend that organizations identify remote access systems to their systems by looking up IP addresses. If an attack is suspected, users should block public access to remote desktop protocol services (iRemoteDesktop &#8211; RDP), a secure shell that encrypts transmission data (Secure Socket Shell &#8211; SSH) ) and file transfer protocol (File Transfer Protocol &#8211; FTP). Agencies and organizations need to ensure that systems for remote access such as firewalls, VPN gateways, and email gateways are regularly patched, perform scanning for security holes, and deploy multi-factor authentication. Multi-factor Authentication (MFA) for accounts that are authorized for remote access. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_02_309_39044821/6d7e059ab8d9518708c8.jpg" width="625" height="499"> Hackers take advantage of security holes to attack the network. Illustration. <strong> 2. Email security</strong> Many ransomware incidents can start with an email sent to a user. This attack method is gradually becoming popular for hackers to perform blackmail. Experts say it&#8217;s safer to prevent unsolicited emails in the first place. The email security system acts as a &#8220;fence&#8221; to protect the strange messages from the internet and private mailboxes in the intranet system. To avoid email threats, users need to make sure email messages are scanned through a filtering system, and check attachments and links for advanced threats. In addition, account holders should audit or block password-protected documents as hackers often use this method to bypass email data scanning. <strong> 3. Keep data backups safe </strong> The third most common method for ransomware is to identify the target, encrypt the data, and then completely delete the backups. In addition to the data on the network and the data being used directly, the hacker will search all backups and encrypt them, disabling the data to increase the possibility of ransom from the victim. The victim then has a high probability of paying to buy back these encrypted data. Therefore, individuals, agencies and organizations should have backup plans to ensure the safety of all data. <strong> 4. Implement a 3-2-1 . Backup Strategy</strong> Without the right protections, backups, and archiving, concurrent copies on the same network are vulnerable to hackers. To avoid network-wide attacks, experts have come up with a safe backup measure for users&#8217; data systems. For all important files, users should store 3 copies, including 1 primary backup for daily use and 2 backup copies. In it, the files will be saved on 2 different media environments to reduce the possibility of mass attacks. These copies must be in place so that data can be accessed and restored easily and quickly in the event of a failure. At the same time, users should save 1 copy outside the work network or home network, in case of force majeure situations due to natural disasters, unexpected disasters.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">20877</post-id>	</item>
		<item>
		<title>Vietnam is in the top 10 countries using smartphones the most in the world</title>
		<link>https://en.spress.net/vietnam-is-in-the-top-10-countries-using-smartphones-the-most-in-the-world/</link>
		
		<dc:creator><![CDATA[Duy Vũ]]></dc:creator>
		<pubDate>Sat, 05 Jun 2021 02:42:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[BAIN]]></category>
		<category><![CDATA[Best of the world]]></category>
		<category><![CDATA[Company]]></category>
		<category><![CDATA[countries]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Ecommerce]]></category>
		<category><![CDATA[Fintech]]></category>
		<category><![CDATA[Growth]]></category>
		<category><![CDATA[Indonesia]]></category>
		<category><![CDATA[Infiltrate]]></category>
		<category><![CDATA[Inside]]></category>
		<category><![CDATA[Market research]]></category>
		<category><![CDATA[Measure]]></category>
		<category><![CDATA[nation]]></category>
		<category><![CDATA[Population]]></category>
		<category><![CDATA[smartphones]]></category>
		<category><![CDATA[STATISTA]]></category>
		<category><![CDATA[Statista Market]]></category>
		<category><![CDATA[Temasek Holdings]]></category>
		<category><![CDATA[Top]]></category>
		<category><![CDATA[Top 10]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[World]]></category>
		<guid isPermaLink="false">https://en.spress.net/vietnam-is-in-the-top-10-countries-using-smartphones-the-most-in-the-world/</guid>

					<description><![CDATA[According to the survey data, Vietnam uses about 61.3 million smartphones and is among the top countries using smartphones in the world. According to market research firm Statista, global smartphone sales continue to grow. Annual smartphone sales more than tripled from 2009 to 2015. After that, the market began to stabilize around 1.5 million units [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>According to the survey data, Vietnam uses about 61.3 million smartphones and is among the top countries using smartphones in the world.</strong><br />
<span id="more-20746"></span> According to market research firm Statista, global smartphone sales continue to grow. Annual smartphone sales more than tripled from 2009 to 2015. After that, the market began to stabilize around 1.5 million units per year.</p>
<p> In 2020, smartphone vendors sold about 1.38 billion smartphones worldwide. And the number will continue to increase in 2021 with a predicted number of over 1.53 million units. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_02_107_39044010/84d5abc6bb8452da0b95.jpg" width="625" height="356"> 10 countries with the most smartphone users (Source: Statista) Survey data by market research firm Statista shows that, as of May 2021, China is still the leading country in terms of smartphone users with nearly 912 million people. Although the number is less than half, but India also ranks second after China with over 439 million units. These two countries will continue to top the rankings by large populations and are considered as markets with strong growth potential given the relatively low smartphone adoption rates, Statista commented. Among Southeast Asian countries, Indonesia and Vietnam are the two markets with the highest number of users. The data shows that Indonesia has up to 160.2 million smartphone users and ranks 4th in the rankings. Vietnam has 61.3 million users, in the top 10 countries with the largest number of smartphone users in the world. The Philippines and Thailand have lower user rates, with 41.3 and 37.8 million users, respectively. The smartphone penetration rate can be used as an indicator to measure how advanced a country&#8217;s economy is. The number of smartphone users and smartphone penetration rate are also considered as one of the bases for the development of the digital economy. In 2020, the smartphone penetration rate in Vietnam ranked 9th with an index of 63.1%, higher than Indonesia with a penetration rate of 58.6% and the Philippines at 37.7%. Vietnam is also considered as a potential and high-growth digital economy market in Southeast Asia. According to a report by Google, Temasek and Bain &#038; Company, in 2020 Southeast Asia&#8217;s digital economy will see the growth of e-commerce, food delivery and online media amid the pandemic. Accordingly, digital payments will reach 620 billion USD in 2020 and are expected to reach 1.2 trillion USD in 2025. Online media also posted 22% growth, reaching $17 billion in 2020. This was driven by the explosive growth of video streaming service providers (video streaming), the growth rate 12 times in Vietnam and 18 times in Thailand. According to the assessment, Vietnam and Indonesia are two countries that have recorded double-digit growth for the digital economy. In which, Vietnam&#8217;s digital economy has a total value of about 14 billion USD and is expected to reach 52 billion by 2025, with an average growth rate of 29% from now until then. In the context of the pandemic, the Internet economy in Vietnam recorded growth in transportation, food, e-commerce and fintech.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">20746</post-id>	</item>
		<item>
		<title>WHO approves China&#8217;s Sinovac vaccine</title>
		<link>https://en.spress.net/who-approves-chinas-sinovac-vaccine/</link>
		
		<dc:creator><![CDATA[Phương Linh]]></dc:creator>
		<pubDate>Fri, 04 Jun 2021 20:24:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Adviser]]></category>
		<category><![CDATA[approved]]></category>
		<category><![CDATA[approves]]></category>
		<category><![CDATA[Cansino Biologics Co]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Chinas]]></category>
		<category><![CDATA[clinical]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Elder]]></category>
		<category><![CDATA[Emergency]]></category>
		<category><![CDATA[Latin America]]></category>
		<category><![CDATA[pharmacy]]></category>
		<category><![CDATA[Ratify]]></category>
		<category><![CDATA[Recommendations]]></category>
		<category><![CDATA[SINOPHARM]]></category>
		<category><![CDATA[SINOVAC]]></category>
		<category><![CDATA[Sinovac vaccine]]></category>
		<category><![CDATA[vaccine]]></category>
		<category><![CDATA[Vaccines]]></category>
		<category><![CDATA[Vaccines for COVID 19]]></category>
		<category><![CDATA[Vaccines Sinopharm]]></category>
		<category><![CDATA[WHO]]></category>
		<category><![CDATA[World Health Organization]]></category>
		<guid isPermaLink="false">https://en.spress.net/who-approves-chinas-sinovac-vaccine/</guid>

					<description><![CDATA[The World Health Organization (WHO) on June 1 approved the emergency use of a Covid-19 vaccine developed by Chinese pharmaceutical company Sinovac. The WHO technical advisory group made the approval recommendation after reviewing the clinical data on the safety and effectiveness of the Sinovac vaccine as well as the company&#8217;s manufacturing operations, Reuters reported on [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The World Health Organization (WHO) on June 1 approved the emergency use of a Covid-19 vaccine developed by Chinese pharmaceutical company Sinovac.</strong><br />
<span id="more-20689"></span> The WHO technical advisory group made the approval recommendation after reviewing the clinical data on the safety and effectiveness of the Sinovac vaccine as well as the company&#8217;s manufacturing operations, <em> Reuters</em> reported on 1/6.</p>
<p> In the statement, the WHO&#8217;s independent expert panel recommended that Sinovac be given to adults over 18 years of age, with a second dose initiated every 2-4 weeks. There is no age limit for this vaccine, as data shows it is likely to protect older adults. This is the second Chinese vaccine approved by the WHO for emergency use &#8211; after the Sinopharm vaccine approved in early May. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_01_119_39043488/6d405a424a00a35efa11.jpg" width="625" height="351"> <em> Covid-19 vaccine box manufactured by Sinovac pharmaceutical company. Photo: Anadolu Agency. </em> A third Chinese vaccine, manufactured by CanSino Biologics, has submitted clinical trial data, but WHO has not scheduled a review. Sinovac said it had delivered more than 600 million doses of the vaccine at home and abroad as of the end of May, of which more than 430 million had been administered. In addition, China has deployed hundreds of millions of doses of its own vaccines &#8211; including Sinopharm and Sinovac &#8211; to many countries, especially in Latin America, Asia, and Africa. Many of these countries have difficulty finding a vaccine developed by the West.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">20689</post-id>	</item>
		<item>
		<title>Don&#8217;t play with customer data</title>
		<link>https://en.spress.net/dont-play-with-customer-data/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 03 Jun 2021 01:10:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[administration]]></category>
		<category><![CDATA[Bank]]></category>
		<category><![CDATA[Customer]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Debt]]></category>
		<category><![CDATA[dont]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Incident]]></category>
		<category><![CDATA[Information system]]></category>
		<category><![CDATA[Institutions]]></category>
		<category><![CDATA[Joke]]></category>
		<category><![CDATA[KYC]]></category>
		<category><![CDATA[mind]]></category>
		<category><![CDATA[Operational]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[play]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Resources]]></category>
		<category><![CDATA[safe]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Warning]]></category>
		<guid isPermaLink="false">https://en.spress.net/dont-play-with-customer-data/</guid>

					<description><![CDATA[Data is an extremely valuable economic resource, many businesses and fields depend on it. In the banking sector (NH), customer data is many times more important, because it is not only basic personal information, but also the status of customers&#8217; assets, balances, and cash flows. . Security so that customer data is not exposed (breach) [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Data is an extremely valuable economic resource, many businesses and fields depend on it. In the banking sector (NH), customer data is many times more important, because it is not only basic personal information, but also the status of customers&#8217; assets, balances, and cash flows. . Security so that customer data is not exposed (breach) is one of the top concerns of these financial institutions, so banks have to invest a lot of effort and money.</strong><br />
<span id="more-20177"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_31_318_39021011/cbfbeec36e8087dede91.jpg" width="625" height="886"> </p>
<p> <strong> A wake-up call about SMALL governance</strong> Recently, on social networks in Vietnam, a computer screen shot of a famous artist&#8217;s NH account statement related to the incident has attracted a lot of public opinion. Although NH has admitted that its employees spread the word, this is a wake-up call for those working in the banking sector, as well as the leaders of these organizations. In the era of information technology, customer data security can be said to be the most important for banks. Previously, the prestige of the banks was in the solidity of the safes, which were dug deep in the tunnels, through many layers of thick steel doors, resistant to fire and explosion and even earthquakes. Today it is the NH&#8217;s security system. Because most assets and liabilities are stored in the form of numbers, lines of data. The disclosure of customer data is often considered an accident of the security system, due to unintentional human error, or due to an external attack. But security risks do not only come from information technology systems. There are three places where security risks arise, that is from a governance perspective in relation to processes, monitoring, information systems, and operations. The above incident shows an error in the operation of the staff, related to the management of the bank. Normally, when signing a work contract, in the contract terms, of course, there must be things that employees must not do, not to mention the business ethics of the industry. And so this is not entirely the fault of the staff, NH is also responsible for regular training, as well as supervision. The consequences of customer data being disclosed are serious on several levels. For example, the bank must be responsible for the damages incurred because the customer account is attacked individually, or the entire information system of the bank is the prey of hackers. Equally important damage is the reputation of NH. As a customer, no one wants to send money or do business with NH but &#8220;house&#8221; is loose. The more important partners are not. <strong> NH is also confused</strong> Customer data in banks is the survival of banks. Security is the new generation of &#8220;safes&#8221;, and the prestige lies in the system, as well as the consciousness and skills of the key holders. In the matter of customer data, banks also have a big confusion between needing a lot of customer data (KYC), security and customer privacy (privacy). Banks themselves also need a lot of KYC, not only to manage risks, but also to develop services to provide to customers, especially cross-selling and value-added services. State regulatory agencies also require banks to perform KYC, mainly for the purpose of anti-money laundering and illegal activities. But when customer data increases, integration from many sources, many systems with heterogeneous standards or formats, is a huge challenge for NH&#8217;s information system. Because the more sources, the more &#8220;entrances&#8221; there are more exposed points, many places can be hacked. The collection of customer data is also met with a certain reaction from them because of privacy. In many developed countries, such as Europe with the General Data Protection Regulation 2016/679 aka GDPR, there is a huge shift from service providers in general and the sector. NH in particular. There are data, currently NH wants to collect the consent of customers. In short, customer data in banks is the survival of banks. The security is a new generation &#8220;safe&#8221; form, and the prestige lies in the system, as well as the consciousness and skills of the key holders. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_31_318_39021011/e43dcc34db7632286b67.jpg" width="625" height="468"> <strong> Domestic banks need to pay attention</strong> In terms of customer data security risks, domestic banks compete with each other in technology and there is almost no big difference between banks in the same group, for example, large banks have enough resources to Get the best system. Even later banks have an advantage because technology costs decrease over time. The problem for data security, therefore, mainly lies in the management system of the bank, as well as in the daily operation. In administration, besides processes and monitoring systems, leaders&#8217; awareness of security issues is extremely important. Not only investing properly for the information technology system, leaders must always closely monitor this issue, considering this as their important task. Therefore, there is a need for consistent direction and coordination between the banks&#8217; departments, considering this as the core activity of the bank. In the course of daily operations, it is the awareness and skills of the employees. Periodic and continuous training is absolutely necessary for all employees, especially functions and positions of authority. If the employee is aware of the seriousness of the disclosure of the customer&#8217;s account, no employee would dare to act so impulsively, not to mention, besides internal handling, it may also be involved in legal regulations .</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">20177</post-id>	</item>
		<item>
		<title>UAE to set up &#8216;digital&#8217; hospitals in the post-COVID-19 period</title>
		<link>https://en.spress.net/uae-to-set-up-digital-hospitals-in-the-post-covid-19-period/</link>
		
		<dc:creator><![CDATA[Việt Khoa (TTXVN)]]></dc:creator>
		<pubDate>Tue, 01 Jun 2021 09:26:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Arab Emirates]]></category>
		<category><![CDATA[Big]]></category>
		<category><![CDATA[Cloud computing]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[Digitizing]]></category>
		<category><![CDATA[Dubai]]></category>
		<category><![CDATA[Establish]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[Hospital]]></category>
		<category><![CDATA[Hospitals]]></category>
		<category><![CDATA[Pandemic]]></category>
		<category><![CDATA[Period]]></category>
		<category><![CDATA[Play a role]]></category>
		<category><![CDATA[postCovid19]]></category>
		<category><![CDATA[Service Provider]]></category>
		<category><![CDATA[set]]></category>
		<category><![CDATA[SINOPHARM]]></category>
		<category><![CDATA[Take care of]]></category>
		<category><![CDATA[UAE]]></category>
		<category><![CDATA[UAE Government]]></category>
		<category><![CDATA[UAE Ministry of Health]]></category>
		<category><![CDATA[United Arab Emirates]]></category>
		<category><![CDATA[Vaccines against Covid 19]]></category>
		<guid isPermaLink="false">https://en.spress.net/uae-to-set-up-digital-hospitals-in-the-post-covid-19-period/</guid>

					<description><![CDATA[Technology continues to play an important role in healthcare in the United Arab Emirates (UAE) in the post-pandemic period of COVID-19 and the country will set up a series of &#8216;digital&#8217; hospitals &#8216; Future. This is confirmed by Mr. Ali Juma AlAjme, Director of Digital Health Department of the UAE Ministry of Health at the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Technology continues to play an important role in healthcare in the United Arab Emirates (UAE) in the post-pandemic period of COVID-19 and the country will set up a series of &#8216;digital&#8217; hospitals &#8216; Future.</strong><br />
<span id="more-19749"></span> This is confirmed by Mr. Ali Juma AlAjme, Director of Digital Health Department of the UAE Ministry of Health at the first Middle East Digital Health Forum held in Dubai recently.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_29_294_39003199/7fc409331e71f72fae60.jpg" width="625" height="438"> <em> Sinopharm&#8217;s COVID-19 vaccine is given to people in Dubai, UAE on February 28, 2021. Photo: AFP/VNA</em> According to the above official, Big Data technology will help UAE health authorities control the COVID-19 pandemic more effectively. In the future, the country will have more “digital” hospitals so that people can access telemedicine solutions more often. AlAjme expert affirmed that the UAE has enough modern infrastructure to provide the best healthcare services. This is in line with the UAE government&#8217;s Information Technology Strategy 2021 and the National Innovation Strategy, which focuses on efforts to make the UAE a fully &#8220;digital&#8221; country. In addition, the &#8220;UAE Vision&#8221; plan also focuses on applying cloud computing to create positive changes in the healthcare sector. The UAE currently has two laws in place regarding healthcare providers. The first is the Law on Health Information Technology, which regulates the use of technology in healthcare. The second is the law on medical examination and treatment processes and procedures for parties building telemedicine systems. In fact, high-tech infrastructure and the development of the health sector are the &#8220;backbone&#8221; of the UAE in the current fight against COVID-19. Decisions about distributing preventive vaccines, opening field hospitals or building isolation areas are all based on digitized real data. Last year, the UAE Ministry of Health also implemented the Tatmeen digital platform to secure the supply chain in the healthcare industry. This platform helps to track medical products in the supply chain, helps promote transparency, prevents unauthorized or expired products.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19749</post-id>	</item>
		<item>
		<title>VTVcab builds a database of Vietnamese football on a digital platform</title>
		<link>https://en.spress.net/vtvcab-builds-a-database-of-vietnamese-football-on-a-digital-platform/</link>
		
		<dc:creator><![CDATA[(TTXVN/Vietnam+)]]></dc:creator>
		<pubDate>Mon, 31 May 2021 15:20:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[administration]]></category>
		<category><![CDATA[build]]></category>
		<category><![CDATA[builds]]></category>
		<category><![CDATA[Co operate]]></category>
		<category><![CDATA[Communication]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Database]]></category>
		<category><![CDATA[Database management system]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[football]]></category>
		<category><![CDATA[History of Vietnamese football]]></category>
		<category><![CDATA[Hoang Ngoc Huan]]></category>
		<category><![CDATA[Official]]></category>
		<category><![CDATA[Only]]></category>
		<category><![CDATA[operate]]></category>
		<category><![CDATA[Operation process]]></category>
		<category><![CDATA[platform]]></category>
		<category><![CDATA[Signed]]></category>
		<category><![CDATA[Strategic partnership]]></category>
		<category><![CDATA[The infrastructure]]></category>
		<category><![CDATA[Training session]]></category>
		<category><![CDATA[Tran Quoc Tuan]]></category>
		<category><![CDATA[Vietnam football federation]]></category>
		<category><![CDATA[Vietnamese]]></category>
		<category><![CDATA[VTVCAB]]></category>
		<guid isPermaLink="false">https://en.spress.net/vtvcab-builds-a-database-of-vietnamese-football-on-a-digital-platform/</guid>

					<description><![CDATA[VFF decided to choose VTVcab to become the only unit to cooperate in building VFF&#8217;s only and official digital platform system for managing and operating the Vietnamese football data infrastructure. The Vietnamese team before the training session on the afternoon of May 27, 2021. (Photo: Hoang Linh/VNA) On May 28, in Hanoi, Vietnam Cable Television [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>VFF decided to choose VTVcab to become the only unit to cooperate in building VFF&#8217;s only and official digital platform system for managing and operating the Vietnamese football data infrastructure.</strong><br />
<span id="more-19567"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_293_39001477/e3945b714c33a56dfc22.jpg" width="625" height="394"> </p>
<p> <em> The Vietnamese team before the training session on the afternoon of May 27, 2021. (Photo: Hoang Linh/VNA)</em> On May 28, in Hanoi, Vietnam Cable Television Corporation (VTVcab) and Vietnam Football Federation (VFF) officially signed an Agreement to establish a strategic partnership for the period from 2021-2026. . Representative of the Vietnam Football Federation, Standing Vice Chairman Tran Quoc Tuan and Chairman of the Board of Directors of VTVcab Hoang Ngoc Huan signed the cooperation agreement. According to the principle of agreement, the two sides commit to strengthen cooperation towards the goal of always being each other&#8217;s strategic partners in the process of operation and development; jointly promote cooperation activities, provide solutions and links to expand and strengthen solutions to support the development of the Vietnam Football Federation in the fields of sponsorship; communication cooperation; research and build a data management system as well as develop football management platforms With the advantage of television and digital platforms, VTVcab and VFF promote the field of communication of Vietnamese football activities across the entire resources of the country. <strong> VTVcab</strong> . One of the notable signings was that the Vietnam Football Federation decided to choose VTVcab to become the only unit to cooperate in building a digital platform system to manage and operate the football data infrastructure. The only and orthodox Vietnamese stone of <strong> VFF</strong> , including administration system <strong> football data</strong> nation; league, club, player management tools; building VFF football social network; interactive platform system between fans, players, clubs and VFF. The signing of the Agreement in principle to establish a strategic partnership is of great significance, contributing to motivating the teams to achieve the expected results, and at the same time promoting the development of the team. <strong> Vietnamese football</strong> more and more professional and sustainable.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19567</post-id>	</item>
		<item>
		<title>Nearly 1 million customers of Canada Post are at risk of having their personal data exposed</title>
		<link>https://en.spress.net/nearly-1-million-customers-of-canada-post-are-at-risk-of-having-their-personal-data-exposed/</link>
		
		<dc:creator><![CDATA[Hương Giang (P/v TTXVN tại Ottawa)]]></dc:creator>
		<pubDate>Mon, 31 May 2021 13:35:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Aim at]]></category>
		<category><![CDATA[Anticipation]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[Customer]]></category>
		<category><![CDATA[Customers]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Declaration]]></category>
		<category><![CDATA[exposed]]></category>
		<category><![CDATA[Got]]></category>
		<category><![CDATA[Group]]></category>
		<category><![CDATA[Help them]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[parcel]]></category>
		<category><![CDATA[Parcels]]></category>
		<category><![CDATA[Personal]]></category>
		<category><![CDATA[Post]]></category>
		<category><![CDATA[Postal]]></category>
		<category><![CDATA[Receiver]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Sender]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Supplier]]></category>
		<guid isPermaLink="false">https://en.spress.net/nearly-1-million-customers-of-canada-post-are-at-risk-of-having-their-personal-data-exposed/</guid>

					<description><![CDATA[The malware attack against Commport Communications, one of Canada Post&#8217;s providers, put nearly a million people at risk of having their personal data exposed. A malware attack against Commport Communications puts 1 million of Canada Post&#8217;s customers at risk of having their personal data exposed. Illustration: VNA A malware attack targeting Commport Communications, one of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The malware attack against Commport Communications, one of Canada Post&#8217;s providers, put nearly a million people at risk of having their personal data exposed.</strong><br />
<span id="more-19552"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_324_38994277/1a5ceb88f3ca1a9443db.jpg" width="625" height="416"> </p>
<p> <em> A malware attack against Commport Communications puts 1 million of Canada Post&#8217;s customers at risk of having their personal data exposed. Illustration: VNA</em> A malware attack targeting Commport Communications, one of Canada Post&#8217;s providers, has affected 44 of Canada&#8217;s largest business customers, Canada Post, Canada&#8217;s national postal group, said. Canada Post across the country and nearly a million people are at risk of having their personal data exposed. Commport Communications operates in the field of electronic data exchange, management of shipping declaration data of large parcel delivery businesses. Commport Communications&#8217; systems have access to information such as the names and addresses of senders and recipients when large parcels are shipped. Canada Post said the cyberattack obtained information about delivery activity between July 2016 and March 2019. According to Canada Post, 97% of the information stolen was names and addresses. This attack did not have access to financial information. Canada Post is currently working closely with Commport Communications and has invited external cybersecurity experts to fully investigate and take appropriate action. Canada Post said it proactively notified affected business customers and provided the information and support needed to help them determine next steps. At the same time, the Privacy Commissioner&#8217;s Office was notified of the incident.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19552</post-id>	</item>
		<item>
		<title>5 Android apps contain dangerous vulnerabilities that users need to remove urgently from their phones</title>
		<link>https://en.spress.net/5-android-apps-contain-dangerous-vulnerabilities-that-users-need-to-remove-urgently-from-their-phones/</link>
		
		<dc:creator><![CDATA[Duy Huỳnh]]></dc:creator>
		<pubDate>Mon, 31 May 2021 11:50:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[Check Point]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Contain]]></category>
		<category><![CDATA[Dangerous]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Download data online]]></category>
		<category><![CDATA[Emergency]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Google Play]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Identity]]></category>
		<category><![CDATA[Leakage]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Remove]]></category>
		<category><![CDATA[Screen Recorder]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Urgently]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">https://en.spress.net/5-android-apps-contain-dangerous-vulnerabilities-that-users-need-to-remove-urgently-from-their-phones/</guid>

					<description><![CDATA[Vulnerable apps put Android users at risk of fraud, identity theft, and malware attacks. Recently, security researchers at Check Point have discovered a series of Android applications that are less secure, leaving users vulnerable to leakage of personal data. The report found that as many as 23 apps are available on Google Play, each with [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Vulnerable apps put Android users at risk of fraud, identity theft, and malware attacks.</strong><br />
<span id="more-19536"></span> Recently, security researchers at Check Point have discovered a series of Android applications that are less secure, leaving users vulnerable to leakage of personal data.</p>
<p> The report found that as many as 23 apps are available on Google Play, each with between 50,000 and 10 million downloads, violating privacy guidelines in the collection and storage of user information. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_329_38993920/17589c0e8a4c63123a5d.jpg" width="625" height="192"> <em> Some applications are less secure, leaving users vulnerable to personal data leakage. (Photo: Check Point)</em> Of these, there are 13 applications that store user data in the cloud but are not secure. This means hackers can easily access data from the outside. Hackers can even modify the developer&#8217;s notice, and replace it with malicious links or misleading content. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_329_38993920/0d3d856b93297a772338.jpg" width="625" height="222"> <em> Users&#8217; personal information is easily leaked when using these applications. (Photo: Check Point)</em> These vulnerabilities put at least 100 million Android users at risk of phishing, identity theft, and malware attacks. 13 out of 23 apps have extremely poor security, allowing hackers to access public data, but Check Point only lists 5 applications that need attention: <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_329_38993920/815116070045e91bb054.jpg" width="625" height="642"> <em> This Screen Recoder app was found to be storing users&#8217; passwords on an unsecured cloud service, leaving the data vulnerable to leaks. (Photo: Check Point)</em> &#8211; <strong> Astro Guru</strong> : Horoscope app with over 10 million downloads. Astro Guru stores each user&#8217;s name, date of birth, gender, GPS location, email address, and payment information. &#8211; <strong> iFax</strong> : Mobile fax application, stores all documents sent by more than 500,000 users in a cloud database. &#8211; <strong> Logo Maker</strong> : Logo design app with over 170,000 users. The user&#8217;s full name, account ID, email and password are all accessible. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_329_38993920/3716a440b2025b5c0213.jpg" width="625" height="468"> <em> (Artwork: Crystal Cox/Business Insider)</em> &#8211; <strong> Screen Recorder</strong> : This app has more than 10 million downloads. The developer stored the user&#8217;s password on an unsecured cloud service, making the data vulnerable to leaks. &#8211; <strong> T&#8217;Leva</strong> : Taxi hailing app from Angola with over 50,000 downloads. This application saves the history between the driver and the rider, the location data, name and phone number are accessible. Check Point said it notified the app developers, but only Astro Guru responded, and some of the apps are still available on Google Play.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19536</post-id>	</item>
		<item>
		<title>Launched an international research lab on artificial intelligence and multimedia data</title>
		<link>https://en.spress.net/launched-an-international-research-lab-on-artificial-intelligence-and-multimedia-data/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Sat, 29 May 2021 23:07:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[AI Center]]></category>
		<category><![CDATA[Artificial]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[Big]]></category>
		<category><![CDATA[Choi In hyuk]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[debut]]></category>
		<category><![CDATA[Exchange program]]></category>
		<category><![CDATA[Global AI R D Belt]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[international]]></category>
		<category><![CDATA[LAB]]></category>
		<category><![CDATA[Launched]]></category>
		<category><![CDATA[Make]]></category>
		<category><![CDATA[Multimedia]]></category>
		<category><![CDATA[NAVER]]></category>
		<category><![CDATA[Naver Corporation]]></category>
		<category><![CDATA[Naver Labs Europe]]></category>
		<category><![CDATA[Post and Telecommunications Institute of Technology]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Research room]]></category>
		<category><![CDATA[student]]></category>
		<category><![CDATA[Tilt Belt]]></category>
		<category><![CDATA[Vu Van San]]></category>
		<guid isPermaLink="false">https://en.spress.net/launched-an-international-research-lab-on-artificial-intelligence-and-multimedia-data/</guid>

					<description><![CDATA[The &#8216;International Laboratory for Artificial Intelligence and Multimedia Data&#8217; was officially launched at the Post and Telecommunications Institute of Technology (PTIT) on May 27. Carry out the opening ceremony of the research room. On May 27 at PTIT, Naver (Korea&#8217;s leading technology company) and PTIT held the Launching Ceremony of &#8220;International Research Lab on Artificial [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The &#8216;International Laboratory for Artificial Intelligence and Multimedia Data&#8217; was officially launched at the Post and Telecommunications Institute of Technology (PTIT) on May 27.</strong><br />
<span id="more-19127"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_181_38988275/15b9e92bff6916374f78.jpg" width="625" height="415"> </p>
<p> <em> Carry out the opening ceremony of the research room.</em> On May 27 at PTIT, Naver (Korea&#8217;s leading technology company) and PTIT held the Launching Ceremony of &#8220;International Research Lab on Artificial Intelligence and Multimedia Data&#8221;. The ceremony took place in an online form to ensure the health and safety of the delegates. “International Research Laboratory for Artificial Intelligence and Multimedia Data” is the first collaborative project between Naver Corporation and PTIT. With this activity, PTIT will officially join the &#8220;Global AI R&#038;D Belt&#8221; of Naver and be the second university in Vietnam to receive the core technological knowledge provided by the university. Korean corporation brought. From Korea, CEO of NAVER Group &#8211; Mr. Choi In Hyuk said: <em> “Choosing to cooperate with the Academy of Posts and Telecommunications Technology, a non-business unit under the Ministry of Information and Communications of Vietnam, is an important step for Naver in building the Global AI R&#038;D Belt. Together with the cooperation to establish AI Center, we hope to create a leading AI research and training environment in Vietnam.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_181_38988275/d50a28983edad7848ecb.jpg" width="625" height="415"> <em> The guests attended the ceremony.</em> <em> NAVER has been taking advantage of diverse opportunities to become an international technology corporation. In the future, Naver will constantly expand its network, bringing together talented people from everywhere to grow together and become global leaders in AI technology.”</em> . Before the Lab was officially launched on May 27, PTIT&#8217;s technology experts collaborated with Naver Labs Europe&#8217;s team leaders to carry out the first research projects. It is expected that these studies will make a significant contribution to the digitalization process in Vietnam, and at the same time contribute to turning the country of more than 96 million people into a global player in artificial intelligence in the early next decade. . Academy Director &#8211; Mr. Vu Van San said: <em> The corporation&#8217;s &#8220;global AI research and development belt&#8221;, along with ongoing research activities at PTIT, the cooperation and sharing of core AI values ​​from Naver will play a significant part in the building the Academy&#8217;s &#8220;miniature digital nation&#8221; and jointly developing and creating high-tech &#8220;make in Vietnam&#8221;&#8221;.</em> <em> The main activities of the International Research Department on Artificial Intelligence and Multimedia Data include: Organizing courses for students including training in Embedded, IoT, AI, Big Data, Blockchain, Data; Organize student and faculty exchange programs. Vietnamese students and lecturers will have the opportunity to participate in exchange activities arranged by Naver; Transfer and apply Naver&#8217;s strong technologies, products and services; Developing new curricula and international training programs; Grant scholarships to outstanding students in the AI ​​field of PTIT; Conducted a joint research project between Naver and PTIT.</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19127</post-id>	</item>
		<item>
		<title>Viettel IDC data center is granted a report on risk control SOC 1,2,3 type II</title>
		<link>https://en.spress.net/viettel-idc-data-center-is-granted-a-report-on-risk-control-soc-123-type-ii/</link>
		
		<dc:creator><![CDATA[Doãn Phong]]></dc:creator>
		<pubDate>Thu, 27 May 2021 22:15:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Audit firm]]></category>
		<category><![CDATA[Center]]></category>
		<category><![CDATA[Control]]></category>
		<category><![CDATA[Control Case]]></category>
		<category><![CDATA[cycle]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[data center]]></category>
		<category><![CDATA[Financial report]]></category>
		<category><![CDATA[granted]]></category>
		<category><![CDATA[IDC]]></category>
		<category><![CDATA[Independence]]></category>
		<category><![CDATA[ISO 27001]]></category>
		<category><![CDATA[ISO 9001]]></category>
		<category><![CDATA[level]]></category>
		<category><![CDATA[PCI DSS]]></category>
		<category><![CDATA[Report]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Safety information]]></category>
		<category><![CDATA[Service Provider]]></category>
		<category><![CDATA[Soc]]></category>
		<category><![CDATA[Tallest]]></category>
		<category><![CDATA[Top of the world]]></category>
		<category><![CDATA[type]]></category>
		<category><![CDATA[Type II]]></category>
		<category><![CDATA[Viettel]]></category>
		<category><![CDATA[Viettel IDC]]></category>
		<guid isPermaLink="false">https://en.spress.net/viettel-idc-data-center-is-granted-a-report-on-risk-control-soc-123-type-ii/</guid>

					<description><![CDATA[The data centers of Viettel IDC are issued with 3 types of control reports SOC 1,2,3 level 2 (Type II) by Control Case &#8211; the world&#8217;s leading independent auditing company. SOC report &#8211; System and Organization Controls focuses on auditing and controlling financial reporting processes, user management, organization management, process control, services related to security, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The data centers of Viettel IDC are issued with 3 types of control reports SOC 1,2,3 level 2 (Type II) by Control Case &#8211; the world&#8217;s leading independent auditing company.</strong><br />
<span id="more-18680"></span> SOC report &#8211; System and Organization Controls focuses on auditing and controlling financial reporting processes, user management, organization management, process control, services related to security, availability, integrity and confidentiality of the organization. SOC reporting has 2 levels: Type I (one-time review) and Type II (full cycle review) and 3 categories: SOC 1, SOC 2, SOC 3, related to financial reporting levels main, operational functions, service reliability assessment for an organization.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_26_23_38973109/79bf95b380f169af30e0.jpg" width="625" height="353"> <em> Viettel IDC&#8217;s data centers are granted SOC 1, 2, 3 Type II reports</em> Viettel IDC is the first service provider in Vietnam to be granted 3 types of SOC 1, 2, 3 reports at the highest level (Type II) by Control Case &#8211; a world famous independent auditing company. Accordingly, all data center services of Viettel IDC are assessed, risk controlled, ensuring to provide customers with good, reliable, safe and secure services. SOC reporting is an important and mandatory requirement that many large organizations and enterprises around the world require external service providers to ensure the security of their core business systems, to avoid risk problems, revealing important information. Since the beginning of 2020, with the trend of strong investment in Vietnam by large companies in the world, Viettel IDC has received many requests related to the implementation of the commitment to quality and information security of service products. services, fully meeting international standards and practices &#8211; things that cannot be expressed in an ordinary cooperation contract. In addition to the existing standards and certificates such as ISO 9001, ISO 27001, 27017, PCI-DSS to meet the increasingly strict requirements of customers Viettel IDC started a journey of more than 1 year to deploy solutions, organizations organization until receiving SOC 1,2,3 type II reports. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_26_23_38973109/75179d1b885961073848.jpg" width="625" height="407"> <em> Data Center of Viettel IDC</em> Being a pioneer in Vietnam to receive SOC 1,2,3 type II Control reports is a testament to our pioneering efforts in serving customers and our commitment to always providing the highest quality services. , ensuring the most secure information in accordance with international standards of Viettel IDC.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18680</post-id>	</item>
		<item>
		<title>Is Colonial Pipeline covered by insurance?</title>
		<link>https://en.spress.net/is-colonial-pipeline-covered-by-insurance/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 27 May 2021 09:40:11 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[CNA]]></category>
		<category><![CDATA[Colonial]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Colonial Pipeline Company]]></category>
		<category><![CDATA[Covered]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Evil Corp]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Hades myth]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[Insurance company]]></category>
		<category><![CDATA[Insurrance]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[OFAC]]></category>
		<category><![CDATA[pay]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[sensitive]]></category>
		<category><![CDATA[Steal]]></category>
		<guid isPermaLink="false">https://en.spress.net/is-colonial-pipeline-covered-by-insurance/</guid>

					<description><![CDATA[CNA Financial Corp., one of the largest insurers in the US, reportedly paid $40 million in late March to regain control of its network following a ransomware attack, according to people have knowledge of the attack. Ransomware is a type of malware that encrypts the victim&#8217;s data. Cybercriminals using ransomware also often steal data. The [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>CNA Financial Corp., one of the largest insurers in the US, reportedly paid $40 million in late March to regain control of its network following a ransomware attack, according to people have knowledge of the attack.</strong><br />
<span id="more-18536"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_26_232_38971994/d799f8a1ede304bd5df2.jpg" width="625" height="312"> </p>
<p> Ransomware is a type of malware that encrypts the victim&#8217;s data. Cybercriminals using ransomware also often steal data. The hackers then demanded a payment to unlock the files and promised not to leak the stolen data. In recent years, hackers have targeted victims with cyber insurance policies, and large volumes of sensitive consumer data make them more likely to pay ransoms, according to cybersecurity experts. According to the unnamed source, CNA paid the hackers about two weeks after a bunch of company data was stolen and CNA officials were locked out of its own network. CNA does not comment on the ransom, with a CNA spokesperson saying CNA followed all laws, regulations and guidelines, including OFAC&#8217;s 2020 ransomware guide, in handling the matter. CAN also shares attack intelligence and hackers&#8217; identities with the FBI and the Treasury Department&#8217;s Office of Foreign Assets Control because facilitating ransom payments to hackers can cause punishment risk. <strong> The largest ransom amount</strong> Ransomware attacks &#8211; and payments in particular &#8211; are rarely disclosed so it&#8217;s difficult to know what the largest ransom is. The $40 million payout is larger than any previously disclosed payments to hackers. The hackers attacking CNA used malware called Phoenix Locker, a variant of ransomware called &#8216;Hades.&#8217; According to cybersecurity experts, Hades was created by a Russian cybercrime organization called Evil Corp. Evil Corp. was sanctioned by the United States in 2019. However, identifying attacks can be difficult because hacking groups can share code or sell malware to each other. CNA, which provides cyber insurance, said its investigation concluded that the Phoenix hacker group was not on the US sanctions list. The disclosure of the payment is likely to draw outrage from lawmakers and regulators who are unhappy that US companies are paying large sums of money to criminal hackers who over the past year have targeted hospitals, drug manufacturers, police forces and other entities critical to public safety. The FBI discourages organizations from paying ransoms because it encourages additional attacks and does not guarantee data will be returned. Last year was a standout year for ransomware groups, with a task force made up of security experts and law enforcement agencies estimating that victims paid around $350 million in ransom last year, up 311% compared to 2019. The Task Force suggested 48 actions the Biden administration and the private sector could take to mitigate such attacks, including better regulation of money markets. digital currency used to make ransom payments. The report, prepared by the Institute for Security and Technology, was delivered to the White House days before the Colonial Pipeline Company was compromised in a ransomware attack that resulted in fuel shortages and long lines at stores. gas stations along the US East Coast Bloomberg reported that Colonial paid hackers nearly $5 million shortly after the attack. Colonial CEO Joseph Blount, in an interview with the Wall Street Journal published Wednesday, confirmed that the company paid the hackers &#8211; $4.4 million in ransom. According to two people familiar with the CNA attack, the company initially ignored the hacker&#8217;s request and attempted to recover the data without negotiating with the criminals. But within a week, the company decided to start negotiating with the hackers, who were demanding $60 million. Residents said the payment was made a week later. According to Barry Hensley, chief intelligence officer at cybersecurity firm Secureworks Corp. then the Phoenix Locker seems to be a variation of Hades based on the overlap of the code used in each. He said they have not yet identified which hackers used the Hades variant to attack CNA. Cybersecurity firm CrowdStrike Holdings Inc believes Hades was created by Evil Corp. to bypass US sanctions against the hacking group. In December 2019, the Treasury Department announced sanctions against 17 individuals and six entities associated with Evil Corp. At the time, the Treasury Department said Evil Corp used malware &#8220;to infect computers and collect login information from hundreds of banks and financial institutions in more than 40 countries, causing more than 100 million dollars of theft. “It is illegal for any U.S. company to knowingly pay a ransom to Evil Corp. According to Melissa Hathaway, President of Hathaway Global Strategies and a former cybersecurity adviser to Presidents George W. Bush and Barack Obama, demand for ransomware has grown exponentially over the past six months. Hathaway said the average hacker&#8217;s ransom demand is between $50 million and $70 million. Those claims are often negotiable, and companies often pay ransoms in the tens of millions of dollars, in part because cyber insurance policies cover some or all of the costs. Hathaway estimates that the average payout is between $10 and $15 million. <strong> Ngoc Linh </strong> &#8211; According to Insurance Journal</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18536</post-id>	</item>
		<item>
		<title>How to limit the leak of activity history on Google</title>
		<link>https://en.spress.net/how-to-limit-the-leak-of-activity-history-on-google/</link>
		
		<dc:creator><![CDATA[MINH HOÀNG]]></dc:creator>
		<pubDate>Tue, 25 May 2021 02:39:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[activity]]></category>
		<category><![CDATA[Any]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Erase]]></category>
		<category><![CDATA[Extra]]></category>
		<category><![CDATA[Feature]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[history]]></category>
		<category><![CDATA[leak]]></category>
		<category><![CDATA[Leakage]]></category>
		<category><![CDATA[Limit]]></category>
		<category><![CDATA[Log in]]></category>
		<category><![CDATA[My Activity]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Press]]></category>
		<category><![CDATA[Query]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Song]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Verification]]></category>
		<guid isPermaLink="false">https://en.spress.net/how-to-limit-the-leak-of-activity-history-on-google/</guid>

					<description><![CDATA[When you use a Google product, your search queries, the songs you&#8217;ve heard, the places you&#8217;ve visited, etc. will be saved on Google&#8217;s servers. Since all of this data is private and sensitive, Google just added an extra layer of security to make sure only you can access the data. According to Google, if users [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>When you use a Google product, your search queries, the songs you&#8217;ve heard, the places you&#8217;ve visited, etc. will be saved on Google&#8217;s servers.</strong><br />
<span id="more-18010"></span> Since all of this data is private and sensitive, Google just added an extra layer of security to make sure only you can access the data.</p>
<p> According to Google, if users turn on the Extra verification feature (additional verification), their personal data will be safer, especially on shared devices (work computers, tablets &#8230;). Note, this feature only applies to My Activity item. First, open a browser on your phone or computer and go to https://myactivity.google.com/myactivity, then log in with the corresponding Google account. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_23_331_38941779/8bdb46bf52fdbba3e2ec.jpg" width="625" height="477"> <em> The section that manages personal activities on Google. Photo: MINH HOANG</em> Next, click on the Manage My Activity Verifications link, and select Request Additional Verification &#8211; Save to finish. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_23_331_38941779/a8cf7cab68e981b7d8f8.jpg" width="625" height="475"> <em> Enable additional verification for better data protection. Photo: MINH HOANG</em> Once enabled, this feature will ask you to verify your identity before showing activity history. This essentially takes you to Google&#8217;s sign-in page, which then asks the user to enter the account password or connect using an Android device (if you&#8217;ve set it up before). Overall, this extra feature is quite useful on shared devices. However, if you feel uncomfortable with saving activity history, you can turn off unnecessary items or delete everything in the settings. To do this, go to https://myactivity.google.com/myactivity, log in with the respective account. There will be three sections here: Web &#038; App Activity, Location History, and YouTube Activity History. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_23_331_38941779/9549452d516fb831e17e.jpg" width="625" height="487"> <em> Delete all previously saved activity history. Photo: MINH HOANG</em> When you click on any item, you can temporarily disable that feature or delete all previously saved data through Activity Management. If you want Google to automatically delete data for each time period, users just need to select Delete automatically, then select the corresponding time period (more than 3 months, more than 18 months or more than 36 months) and follow the steps instructions until complete.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18010</post-id>	</item>
		<item>
		<title>How to fix Google Chrome browser error on Windows 10</title>
		<link>https://en.spress.net/how-to-fix-google-chrome-browser-error-on-windows-10/</link>
		
		<dc:creator><![CDATA[MINH HOÀNG]]></dc:creator>
		<pubDate>Sat, 22 May 2021 13:56:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Beta]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[Chromium]]></category>
		<category><![CDATA[Complain]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Desktop]]></category>
		<category><![CDATA[Enter]]></category>
		<category><![CDATA[error]]></category>
		<category><![CDATA[File Explorer]]></category>
		<category><![CDATA[Fix]]></category>
		<category><![CDATA[Fixes]]></category>
		<category><![CDATA[Folder]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google chrome]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[MACOS]]></category>
		<category><![CDATA[Tab]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Windows 10]]></category>
		<category><![CDATA[Windows Latest]]></category>
		<guid isPermaLink="false">https://en.spress.net/how-to-fix-google-chrome-browser-error-on-windows-10/</guid>

					<description><![CDATA[According to Windows Latest, there are quite a few users complaining about the Google Chrome 90 browser frequently crashing on Windows 10. Specifically, when you open a new tab (tab) or access the Settings (settings), Bookmarks (bookmarks), the browser will immediately crash. At the moment, this bug is only reported to occur on Windows 10, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>According to Windows Latest, there are quite a few users complaining about the Google Chrome 90 browser frequently crashing on Windows 10.</strong><br />
<span id="more-17371"></span> Specifically, when you open a new tab (tab) or access the Settings (settings), Bookmarks (bookmarks), the browser will immediately crash. At the moment, this bug is only reported to occur on Windows 10, so macOS and Linux users are unlikely to be affected.</p>
<p> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_22_331_38928201/bc83fcaae7e80eb657f9.jpg" width="625" height="468"> <em> Google Chrome 90 on macOS and Linux does not appear to be affected. Photo: MINH HOANG</em> A Google product expert seems to have identified the problem. &#8220;It seems that this issue is related to the User Data folder of the computer, so using Google Chrome (beta) should solve the problem.&#8221; However, if you just want to use the stable version of Google Chrome, you can follow these steps to prevent problems. First, close the browser and press the Windows + E key combination to open File Explorer, then paste the %LOCALAPPDATA%GoogleChromeUser Data link in the address bar and press Enter. Next, delete the Local State file, then reopen the Google Chrome browser. If the problem is still not fixed, the user can simply go back to %LOCALAPPDATA%GoogleChromeUser Data, copy everything here to another place, such as the Desktop. Then, rename the User Data folder to any name (different from the old name) and reopen the Google Chrome browser. Currently Google has confirmed the issue, and it will probably be fixed in the near future through a new update.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17371</post-id>	</item>
		<item>
		<title>Raise awareness of personal data protection</title>
		<link>https://en.spress.net/raise-awareness-of-personal-data-protection/</link>
		
		<dc:creator><![CDATA[Đặng Ngọc]]></dc:creator>
		<pubDate>Sat, 22 May 2021 05:58:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Advanced]]></category>
		<category><![CDATA[Awareness]]></category>
		<category><![CDATA[Beauty salon]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[Collect]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[dentistry]]></category>
		<category><![CDATA[Dismantled]]></category>
		<category><![CDATA[Electric]]></category>
		<category><![CDATA[Electrical company]]></category>
		<category><![CDATA[Illegal]]></category>
		<category><![CDATA[line]]></category>
		<category><![CDATA[Personal]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[Police Department]]></category>
		<category><![CDATA[protect]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[Purchase]]></category>
		<category><![CDATA[raise]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Store goods]]></category>
		<category><![CDATA[usurp]]></category>
		<guid isPermaLink="false">https://en.spress.net/raise-awareness-of-personal-data-protection/</guid>

					<description><![CDATA[The Department of Cybersecurity and High-Tech Crime Prevention of the Ministry of Public Security has just dismantled a large-scale data collection, appropriation, and trading line in Vietnam. Accordingly, the subjects in this line have illegally collected, appropriated, bought, sold and used nearly 1.3 thousand GB of data containing billions of information about individuals and organizations [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The Department of Cybersecurity and High-Tech Crime Prevention of the Ministry of Public Security has just dismantled a large-scale data collection, appropriation, and trading line in Vietnam.</p>
<p> Accordingly, the subjects in this line have illegally collected, appropriated, bought, sold and used nearly 1.3 thousand GB of data containing billions of information about individuals and organizations nationwide. The dismantling of the above-mentioned large-scale data collection, appropriation and trading line shows the efforts of the police sector in strictly dealing with the theft and illegal use of personal data for handling. according to the provisions of law, creating a deterrent; and at the same time prevent cybercriminals from taking advantage of this information to commit fraud, appropriate property and limit the use of personal information to send spam messages, make &#8220;terrible&#8221; calls. dad&#8221; advertising&#8230; It is worth noting that the personal information being traded in the above line is the customers of the banks; power companies, finance, securities, insurance; electronics and fashion stores; services: spa, dental, beauty salon&#8230; There is even a list of parents, students, household registration, phone subscribers&#8230; Thereby showing that, in order to obtain the personal data of users, in addition to the sophisticated tricks of the perpetrators, there is also the subjectivity and neglect of many people in the security of personal information. Currently, many people are willing to provide personal information (name, address, phone number, email &#8230;) to participate in promotions, sweepstakes, purchase online&#8230; helping the subjects steal information easily. Therefore, in addition to the investigation and handling of the subjects who steal and illegally use personal information, in order to protect themselves, each individual must raise the awareness of protecting personal data, do not provide information easily, avoid becoming a victim of fraudsters or being bothered by unwanted messages and phone calls.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17269</post-id>	</item>
		<item>
		<title>The largest oil pipeline network in the US was hacked</title>
		<link>https://en.spress.net/the-largest-oil-pipeline-network-in-the-us-was-hacked/</link>
		
		<dc:creator><![CDATA[Theo Reuters]]></dc:creator>
		<pubDate>Fri, 21 May 2021 16:25:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[Ask for money]]></category>
		<category><![CDATA[Atlanta]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Georgia]]></category>
		<category><![CDATA[hacked]]></category>
		<category><![CDATA[Joe Biden]]></category>
		<category><![CDATA[largest]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[Net]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Oil]]></category>
		<category><![CDATA[Operating]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[Transport]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-largest-oil-pipeline-network-in-the-us-was-hacked/</guid>

					<description><![CDATA[Colonial Pipeline, America&#8217;s leading fuel pipeline operator, has had to shut down its entire network after a cyber attack by ransomware. &#8220;Colonial Pipeline is working on verification and resolution of the cyber attack. At this point, our main focus is on safely and efficiently restoring service to normal operations.&#8221; Colonial Pipeline released a statement. The [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Colonial Pipeline, America&#8217;s leading fuel pipeline operator, has had to shut down its entire network after a cyber attack by ransomware.</strong><br />
<span id="more-17026"></span> &#8220;Colonial Pipeline is working on verification and resolution of the cyber attack. At this point, our main focus is on safely and efficiently restoring service to normal operations.&#8221; Colonial Pipeline released a statement.</p>
<p> The US has opened an investigation into this cyber attack. Ransomware is a type of malware designed to lock down a system by encrypting data and demanding a ransom from the victim to regain access. Colonial Pipeline asked a cybersecurity company to coordinate with federal law enforcement agencies to investigate this cyberattack. President Joe Biden was briefed on the incident. The White House said Washington will work to help the Colonial Pipeline resume the interrupted fuel supply. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_09_106_38780041/7c9da632bb70522e0b61.jpg" width="625" height="410"> <em> This is considered the largest cyber attack on the US energy system</em> Colonial Pipeline is providing nearly half of the fuel for the US east coast. This is considered one of the largest ransomware attacks ever recorded against US energy infrastructure. The shutdown of the largest fuel pipeline network in the United States will cause the price of this item and related products to spike. Colonial Pipeline transports 2.5 million barrels of gasoline and other fuels per day through 8,850 kilometers of pipeline connecting Gulf Coast refineries to the eastern and southern United States. The company also supplies fuel to several major US airports, including Hartsfield Jackson Airport in Atlanta, which has the world&#8217;s largest passenger traffic.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17026</post-id>	</item>
		<item>
		<title>Biden declares state of emergency after serious cyber attack</title>
		<link>https://en.spress.net/biden-declares-state-of-emergency-after-serious-cyber-attack/</link>
		
		<dc:creator><![CDATA[Thanh Hảo]]></dc:creator>
		<pubDate>Fri, 21 May 2021 06:35:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Biden]]></category>
		<category><![CDATA[Cease]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[declares]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Emergency]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Information resource]]></category>
		<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[Joe Biden]]></category>
		<category><![CDATA[Malware Mã]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Pipe]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Planes]]></category>
		<category><![CDATA[Promulgate]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[State]]></category>
		<category><![CDATA[State of emergency]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[Transport]]></category>
		<guid isPermaLink="false">https://en.spress.net/biden-declares-state-of-emergency-after-serious-cyber-attack/</guid>

					<description><![CDATA[The US government has just declared a state of emergency after the largest fuel pipeline in the country was attacked by malicious code. Colonial Pipeline transports 2.5 million barrels of fuel a day – accounting for 45% of the East Coast&#8217;s supplies of diesel, gasoline and jet fuel. This arterial oil route was completely paralyzed [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The US government has just declared a state of emergency after the largest fuel pipeline in the country was attacked by malicious code.</strong><br />
<span id="more-16831"></span> Colonial Pipeline transports 2.5 million barrels of fuel a day – accounting for 45% of the East Coast&#8217;s supplies of diesel, gasoline and jet fuel. This arterial oil route was completely paralyzed after being attacked by a cyberattack on May 7 and is still in the process of restoring operation.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_23_38787518/84535b29466baf35f67a.jpg" width="625" height="351"> <em> Colonial Pipeline transports 2.5 million barrels of fuel per day. Photo: Colonial Pipeline</em> According to the BBC, the state of emergency allows fuel to be transported by road. The news agency quoted experts as saying that fuel prices could increase by 2-3% on May 10, but the real impact would be much worse if this situation continued for longer. Many sources confirm that the malicious code attack is caused by a cybercriminal gang called DarkSide, which infiltrated Colonial&#8217;s system on May 6 and stole nearly 100GB of data as a &#8220;hostage&#8221;. After taking over the data, the group of hackers locked this data on some computers and servers, demanded a ransom and warned that if they did not receive the money, they would release the data on the internet. Colonial is working with law enforcement, cybersecurity and the US Department of Energy to restore service. On the evening of May 9, the company announced that although the four main pipelines continued to stop, some smaller lines between the terminals and delivery points were still operating. &#8220;Immediately after learning of the attack, Colonial proactively shut down certain systems to stop the threat. These actions temporarily halted all pipeline operations and affected some systems. our information technology system, which we are actively working on restoring,&#8221; said Colonial. &#8220;We are in the process of restoring service to other pipelines and will bring the entire system back online when we believe it is safe and in full compliance with all federal regulations. &#8220;. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_23_38787518/ff0927733a31d36f8a20.jpg" width="625" height="414"> <em> The DarkSide message appears on the victim&#8217;s computer screen. </em> DarkSide isn&#8217;t the largest cybercriminal gang in the field, but the incident demonstrates the heightened risk that malware poses to critical U.S. industrial infrastructure, not just businesses. This gang lists all types of stolen data and sends the victim the URL of the &#8220;personal leak site&#8221;, where the data is pre-loaded waiting for automatic publication, if the company or organization does not. payment before the deadline. DarkSide claims to provide proof of the data obtained, and is ready to delete all such data from the victim&#8217;s network. According to Digital Shadows, a London-based cybersecurity company that tracks global cybercrime groups to help businesses limit their risk of being hacked, DarkSide acts like a company.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16831</post-id>	</item>
		<item>
		<title>Ransomware Attack Targets US Fuel Pipelines</title>
		<link>https://en.spress.net/ransomware-attack-targets-us-fuel-pipelines/</link>
		
		<dc:creator><![CDATA[Anh Duy]]></dc:creator>
		<pubDate>Fri, 21 May 2021 01:15:11 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[Ask for money]]></category>
		<category><![CDATA[Atlanta]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[Georgia]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Information resource]]></category>
		<category><![CDATA[Malware Mã]]></category>
		<category><![CDATA[Net]]></category>
		<category><![CDATA[Operating]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Pipelines]]></category>
		<category><![CDATA[populous]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[Targets]]></category>
		<category><![CDATA[Transport]]></category>
		<guid isPermaLink="false">https://en.spress.net/ransomware-attack-targets-us-fuel-pipelines/</guid>

					<description><![CDATA[On May 10, Reuters reported that the US administration was working to support the country&#8217;s top fuel pipeline operator after a large-scale cyberattack threatened national security. Accordingly, the White House is working closely with the leading US fuel pipeline operator Colonial Pipeline to help them recover from a ransomware attack that forced the company to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>On May 10, Reuters reported that the US administration was working to support the country&#8217;s top fuel pipeline operator after a large-scale cyberattack threatened national security.</strong><br />
<span id="more-16746"></span> Accordingly, the White House is working closely with the leading US fuel pipeline operator Colonial Pipeline to help them recover from a ransomware attack that forced the company to close a network. an important fuel supply to the populous states in the East.</p>
<p> The attack was one of the most disruptive digital ransom schemes reported, prompting US lawmakers to call for increased protection of America&#8217;s critical energy infrastructure from hackers. Commerce Secretary Gina Raimondo said pipeline repairs were a priority for the Biden administration and Washington was working to avoid more severe fuel supply disruptions by helping Colonial restart the road network. The tube is more than 5,500 miles (8,850 km) long. &#8220;Right now it&#8217;s an all-in-one effort,&#8221; Raimondo said on CBS&#8217;s &#8220;Face the Nation.&#8221; &#8220;We are working closely with company, state and local officials to ensure they return to normal operations as quickly as possible and without disruption to supplies,&#8221; Colonial said. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_62_38788853/fbf5adbdb0ff59a100ee.jpg" width="625" height="473"> <em> The pipeline network was attacked &#8211; Photo: Reuters</em> Their main fuel lines are still offline, but some of the smaller routes between the terminals and delivery points are now up and running. Neither Raimondo nor the company has given an estimate of a full reboot date. U.S. gasoline futures rose more than 3% to $2,217 a gallon, the highest since May 2018 as trading opened for the week and market participants reacted to pipeline closures. Colonial ships about 2.5 million barrels per day of gasoline and other fuels from refineries on the Gulf Coast to consumers. Its extensive pipeline network serves major US airports including Atlanta&#8217;s Hartsfield Jackson Airport, the world&#8217;s busiest airport by passenger traffic. A spokeswoman for Charlotte Douglas International Airport said the airport had supplies on hand and was &#8220;monitoring the situation closely&#8221;. Retail fuel experts including the American Automobile Association say outages lasting several days could have a significant impact on fuel supplies in the region, particularly in the southeastern US. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_62_38788853/427e10360d74e42abd65.jpg" width="625" height="326"> <em> Colonial Pipeline&#8217;s fuel tanks &#8211; Photo: Reuters</em> While the US government investigation is in its early stages, a former official and three industry sources said the suspected hackers were a professional cybercrime group called DarkSide. DarkSide is one of many gangs that often use malware to extort victims. These groups gain access to private networks, encrypt files with software, and often steal data. They ask for money to decrypt the files and ask for more money to not publish the stolen content. During the Colonial attack, the hackers stole more than 100 gigabytes of data.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16746</post-id>	</item>
		<item>
		<title>US &#8216;red alert&#8217; after malicious code attack on fuel system</title>
		<link>https://en.spress.net/us-red-alert-after-malicious-code-attack-on-fuel-system/</link>
		
		<dc:creator><![CDATA[Ngọc Hà (TTXVN)]]></dc:creator>
		<pubDate>Thu, 20 May 2021 12:44:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Alert]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Colonial Pipeline Company]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Joe Biden]]></category>
		<category><![CDATA[malicious]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Malware Mã]]></category>
		<category><![CDATA[Net]]></category>
		<category><![CDATA[Operating]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[red]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[System]]></category>
		<guid isPermaLink="false">https://en.spress.net/us-red-alert-after-malicious-code-attack-on-fuel-system/</guid>

					<description><![CDATA[America&#8217;s largest fuel pipeline system, operated by Colonial Pipeline, was forced to shut down its entire network after a cyber attack. Colonial Pipeline had to shut down the entire network after a cyber attack. Photo: wsj.com The administration of President Joe Biden said it was making every effort to restore the company&#8217;s operations and avoid [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>America&#8217;s largest fuel pipeline system, operated by Colonial Pipeline, was forced to shut down its entire network after a cyber attack.</strong><br />
<span id="more-16577"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_294_38793245/cd9b8e6093227a7c2333.jpg" width="625" height="416"> </p>
<p> <em> Colonial Pipeline had to shut down the entire network after a cyber attack. Photo: wsj.com</em> The administration of President Joe Biden said it was making every effort to restore the company&#8217;s operations and avoid disruption to supply. Experts say gas prices will not be affected if the company resumes normal operations in the next few days. However, this cyberattack, rated as the worst ever for the US infrastructure system, should be a warning bell for other companies about the risk they will become the next target of similar attacks. According to Colonial Pipeline, the company&#8217;s pipeline carries gasoline and other fuels from Texas to the Northeast, providing nearly 45 percent of the fuel for the East Coast of the United States. Although Colonial Pipeline has not revealed who is responsible for the cyber attack, an unnamed person on the team investigating the incident confirmed that the culprit was a hacker group nicknamed Darkside. This group has been spreading ransomware since August 2020 and is classified as one of the most attackable groups. Over the past 3 years, Darkside has become more and more professional and has caused Western countries tens of billions of dollars in losses. Ransomware attacks are malicious code designed to lock down computer systems using encrypted data and demand a ransom to restore access. US Commerce Secretary Gina Raimondo on May 9 warned US businesses to be wary of ransomware attacks. The female minister affirmed that she would work closely with the Department of Homeland Security to handle the issue, considering this a top priority of the government. Reuters news agency, citing a notice from the White House, said the administration was working to help Colonial Pipeline company resume operations to avoid supply disruptions. According to sources, before activating ransomware, hackers often steal data, which is used to blackmail businesses or distort the truth. Sometimes stolen data is more valuable to hackers than the benefit they get by disrupting business operations. Security experts say the attack is a warning to operators and managers of essential infrastructure in the US such as electricity, water, energy and transportation facilities that have long been built. do not update the method to ensure security against the risk of being attacked. Mr. David Kennedy, a senior security consultant and founder of the security consulting firm TrustedSec, admitted that ransomware attacks have spiraled out of control in the US and are currently under development. is one of the greatest threats facing the United States. However, most American companies lack the ability to prepare for such threats.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16577</post-id>	</item>
		<item>
		<title>It&#8217;s time to uninstall Google Photos on iPhone</title>
		<link>https://en.spress.net/its-time-to-uninstall-google-photos-on-iphone/</link>
		
		<dc:creator><![CDATA[Phúc Thịnh]]></dc:creator>
		<pubDate>Thu, 20 May 2021 11:41:11 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[App store]]></category>
		<category><![CDATA[Apple Photos]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[Collect]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[EXIF]]></category>
		<category><![CDATA[Gmail]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google Photos]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[Labels]]></category>
		<category><![CDATA[Phonebook]]></category>
		<category><![CDATA[photos]]></category>
		<category><![CDATA[Private]]></category>
		<category><![CDATA[setting]]></category>
		<category><![CDATA[Share photo]]></category>
		<category><![CDATA[Storage]]></category>
		<category><![CDATA[Telephone directory]]></category>
		<category><![CDATA[time]]></category>
		<category><![CDATA[uninstall]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Zak Doffman]]></category>
		<guid isPermaLink="false">https://en.spress.net/its-time-to-uninstall-google-photos-on-iphone/</guid>

					<description><![CDATA[As a photo storage application, Google Photos collects various data on iPhone, including phone contacts or transaction history. After a while of not updating, Google has added a list of collected data for all products released on the App Store, including the photo storage application Google Photos. Like Gmail, Chrome or Maps, Google Photos collects [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>As a photo storage application, Google Photos collects various data on iPhone, including phone contacts or transaction history.</strong><br />
<span id="more-16563"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_119_38793177/2bec27dd3a9fd3c18a8e.jpg" width="625" height="416"> </p>
<p> After a while of not updating, Google has added a list of collected data for all products released on the App Store, including the photo storage application Google Photos. Like Gmail, Chrome or Maps, Google Photos collects more data than apps of its kind, including Apple Photos. The data collection list is revealed as Google complies with Apple&#8217;s new rule, which requires all apps released on the App Store to list the types of data it collects, such as browsing history or location, including personal information. associated with the user&#8217;s identity (financial data, contacts&#8230;), serving personalized advertising. This list is called Privacy Label. <em> Zing</em> Summary of article translation by author Zak Doffman on <em> Forbes</em> about Google Photos collecting too much data on the iPhone. <strong> Google Photos collects many times more data than Apple Photos</strong> Looking at the Google Photos privacy label on the App Store, it&#8217;s not surprising that the app collects a lot of data, including seemingly unrelated information such as transaction history, phone numbers. &#8230; According to Google, the privacy label shows all the information that can be collected, but what data is actually recorded depends on the feature used. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_119_38793177/b899bea8a3ea4ab413fb.jpg" width="625" height="414"> <em> The Google Photos privacy label on the App Store reveals how much more data the browser collects than Apple Photos, which comes pre-installed on the iPhone. Photo: Forbes. </em> &#8220;We will collect contact data if you want to share photos with others, or if you want to buy photo books, we will store credit card information, shopping data. They will not be collected if you don&#8217;t want to share photos or buy photo books,&#8221; explains Google. That&#8217;s Google&#8217;s description of how their photo-saving apps get contact information or transaction history. The company believes that iCloud is the storage platform behind Apple Photos, while Google Photos has its own storage and some special features. However, history shows that Apple and Google&#8217;s approach to privacy are very different. While Apple only collects data, receives revenue from the purchase and use of Apple products, Google&#8217;s revenue is largely based on personalized advertising, which appears on the majority of websites you visit on the Internet. . The closer the ad is displayed to the audience, the more money Google will collect based on the click. There are two main sections in the privacy label on the App Store, including &#8220;linked data&#8221; and &#8220;unlinked data&#8221;. Developers only use unaffiliated data to improve the service, track usage frequency or the location where it is most enabled. As for the linked data, they can use it to paint a &#8220;picture&#8221; of your interests and activities on the Internet. Compared to Apple Photos, Google Photos is a more complex application, so users can accept sending a lot of information to Google to use all functions. However, if you look at the Chrome browser, all the collected data is linked to the user&#8217;s identity. Finding the basic difference between Chrome and Safari or other browsers is not easy. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_119_38793177/306432552f17c6499f06.jpg" width="625" height="312"> <em> Millions of Apple product users are using Google Photos, according to Forbes. Photo: 9to5Google. </em> <strong> Various ways to get Google&#8217;s data</strong> Sundar Pichai, CEO of Google once affirmed that &#8220;do not use information in applications that mainly store personal data such as Gmail, Drive, Calendar and Photos for advertising purposes&#8221;. However, even if Photos doesn&#8217;t collect information for advertising purposes, Google&#8217;s advertising ecosystem is quite complex, and it doesn&#8217;t need to link directly to a person&#8217;s specific activity to target an audience. Google argues that Apple has its own advantages when it comes to collecting data from a variety of sources. Meanwhile, Google requires users of Apple and other platforms to create login accounts, which is like creating a repository of information about them similar to the Android platform. When you install Google Photos on your iPhone, you&#8217;ll get a notification that says &#8220;Google Photos needs to access all your photos&#8221; to view, share, and back up photos. However, from a privacy perspective, it&#8217;s an &#8220;all or nothing&#8221; question, users need to accept that data leaves Apple&#8217;s control to another company if they want to use the service normally. often. Google also confirmed the collection of EXIF ​​data in each photo. These are parameters related to the time, the exact location at which the photo was taken, including the device and camera settings. &#8220;We use EXIF ​​to improve in-app experiences, such as memories (Memories) or photo book recommendations based on recent travel,&#8221; Google said. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_119_38793177/de0ac13bdc7935276c68.jpg" width="625" height="351"> <em> Google also confirmed to collect EXIF ​​data in each image. Photo: Culf of Mac. </em> Finally, your information may serve an advertisement, even if it is not mentioned directly. Facebook has admitted that even without permission to share location on smartphones, it can still collect this information based on EXIF ​​in uploaded photos. Over the past few years, the technology industry has had to pay more attention to customer privacy as many lawmakers become increasingly concerned about the misuse of user data. Google is facing at least three major antitrust lawsuits, including a landmark lawsuit initiated by the US Department of Justice and a complaint from a bipartisan coalition of states. While Google Photos has more features than Apple Photos or some other apps, understand the data trade-offs when you accept it. Everyone has the right to choose what services and data is collected. If you still use Google Photos despite reading the privacy label, that&#8217;s your decision. <em> <strong> Why doesn&#8217;t Google want you to say &#8216;Go Google&#8217;?</strong> </em> <em> If Google is so widely used that it no longer defines what it is but is used as a generic term, they could lose the trademark.</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16563</post-id>	</item>
		<item>
		<title>People participate in building a smart city in Hue</title>
		<link>https://en.spress.net/people-participate-in-building-a-smart-city-in-hue/</link>
		
		<dc:creator><![CDATA[Quang Thành – Bảo Lâm]]></dc:creator>
		<pubDate>Thu, 20 May 2021 03:40:13 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Analysis]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Building]]></category>
		<category><![CDATA[Can Tho]]></category>
		<category><![CDATA[Center]]></category>
		<category><![CDATA[City]]></category>
		<category><![CDATA[Clever]]></category>
		<category><![CDATA[Command]]></category>
		<category><![CDATA[Communication]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Hue]]></category>
		<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[Interactive]]></category>
		<category><![CDATA[International Olympic Committee]]></category>
		<category><![CDATA[Mekong Delta]]></category>
		<category><![CDATA[Monitoring]]></category>
		<category><![CDATA[Operating]]></category>
		<category><![CDATA[participate]]></category>
		<category><![CDATA[people]]></category>
		<category><![CDATA[Pilot]]></category>
		<category><![CDATA[Promote]]></category>
		<category><![CDATA[Reflect]]></category>
		<category><![CDATA[regulation]]></category>
		<category><![CDATA[smart]]></category>
		<guid isPermaLink="false">https://en.spress.net/people-participate-in-building-a-smart-city-in-hue/</guid>

					<description><![CDATA[Developing a smart city with the motto of taking the people as the center, the TT-Hue government has helped people promote their mastery role. Applying IT into practice, developing smart cities with the motto of taking people as the center, TT-Hue provincial government has helped the people of the ancient capital promote their mastery role. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Developing a smart city with the motto of taking the people as the center, the TT-Hue government has helped people promote their mastery role.</strong><br />
<span id="more-16428"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_23_38797109/f26741a25fe0b6beeff1.jpg" width="625" height="296"> </p>
<p> <strong> Applying IT into practice, developing smart cities with the motto of taking people as the center, TT-Hue provincial government has helped the people of the ancient capital promote their mastery role.</strong> On the morning of July 12, 2020, a group of 120 people carrying King Ham Nghi Long from TT-Hue province to Quang Tri stopped at O ​​Loi noodle shop on Le Huan Street (Hue City) for breakfast. The owner of the restaurant &#8220;hacks&#8221; each bowl of vermicelli 60,000 VND (normal price ranges from 25,000 to 30,000 VND). Mr. LHT (a person traveling with the delegation) was angry and reflected on his personal facebook with the desire that the authorities come in<br />
inspection and correction. Upon receiving information from the interactive system of the Hue Smart City Monitoring Center, the Market Management Department of TT-Hue province sent officers to verify, make a record of administrative violations and sanction 750,000 VND for O Loi noodle shop for the act of &#8220;not listing the prices of goods and services at the price listing point as prescribed&#8221;. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_23_38797109/cfad42685c2ab574ec3b.jpg" width="625" height="416"> State President Nguyen Xuan Phuc (when serving as Prime Minister) during a visit to the Hue Smart City Management Monitoring Center &#8220;I reported on July 12, but only 3 days later, the functional force of TT-Hue province quickly took action and corrected us, making us very satisfied,&#8221; said Mr. T. About 2 years ago, the streets of Hue city center became the obsession of every passerby. Hundreds of people blatantly encroached on the sidewalk to trade. Shops and vehicles are messy, creating sloppy, offensive scenes, &#8220;bad&#8221; the face of the city of Hue. A campaign to restore urban order was directed and implemented by leaders of TT-Hue Provincial People&#8217;s Committee. Smart urban surveillance system with hundreds of &#8220;magic eyes&#8221; are cameras installed on all streets, accessing data, supporting the government to thoroughly handle violations. Those are just stories, small things among thousands of events received and handled during the journey of building a smart city in TT-Hue. <strong> People at the center</strong> TT-Hue is one of the first localities to build an e-government architecture after the e-Government framework was promulgated. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_23_38797109/121998dc869e6fc0368f.jpg" width="625" height="351"> 300 cameras were installed, transmitting data to the center. Along with e-government, smart city development has become an inevitable trend, a revolution in the digital transformation era. Director of the Department of Information and Communications of TT-Hue province, Mr. Nguyen Xuan Son said: “Its effect is that people and businesses can promote their own role. The motto is to take the people as the center. Going from &#8220;advocacy&#8221; to &#8220;sanctions&#8221; and becoming a need &#8230;&#8221;, Mr. Son said. In early 2019, TT-Hue province made a breakthrough decision when piloting smart city services (IOC) on the Hue-S application platform. The smart city management center located at the Department of Information and Communications of the province is considered the &#8220;headquarters&#8221; agency, responsible for implementing services, receiving input from the society; analyze, verify and transfer information to competent authorities. On the basis of information technology application, a series of application solutions such as field reflection; group of urban surveillance camera solutions; warning information; monitoring local press information; electronic cards of civil servants; supervision of public administrative services; electronic advertising monitoring; environmental monitoring; information security monitoring<br />
and fishing vessel monitoring… have been integrated on Hue-S. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_23_38797109/d6105dd54397aac9f386.jpg" width="625" height="337"> Camera sensors detect traffic violations. On the Hue-S application platform, people use smart phones to take photos and send videos of issues that need to be reported to the system and keep their personal information confidential. Based on the images provided by the people and data recorded directly from the IOC&#8217;s image system, the Monitoring Center will classify each specific content and send it to the relevant authorities for processing. In addition to the reflected inadequacies, the application has also been responded to and deployed by the people and through which the values ​​of people, culture, humanity&#8230; have been actively promoted, many good examples of good work. good is found, many humanistic actions are developed. The software is deployed under the tracking mechanism and cannot take any action that can interfere with data deletion. All this information is publicly available on the website for people to monitor, so it is not possible to intervene to handle violations. <strong> Roadmap for building a smart city</strong> Not coincidentally, at the Digital Transformation Week 2021 taking place in Hue City from April 27, Deputy Minister of Information and Communications Nguyen Huy Dung said that, at the local level, TT-Hue Province Think of yourself as a miniature country to apply the right strategy, set the right goals and do the right things. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_23_38797109/e6316ef470b699e8c0a7.jpg" width="625" height="416"> The human resource system analyzes and streams reflections to send to the relevant authorities for handling. TT-Hue must become a destination for major national and world technology events with dual goals: Developing tourism while developing technology and becoming a model for digital transformation. &#8220;- Mr. Dung said. In the past two years, TT-Hue province ranked 2nd out of 63 provinces in terms of readiness for ICT development and application in Vietnam &#8211; Vietnam ICT Index 2020 according to technical infrastructure indicators, human infrastructure indexes, etc. force. Hue&#8217;s work is also being widely deployed across the country. The project on development of smart cities in Vietnam for the period of 2018-2025 and a vision to 2030 clearly identifies major issues including: Building a legal foundation for smart city development; Develop management tools, institutions, for example, a framework to guide criteria and evaluate smart cities of cities; Formulate specific regulations, regulations and standards on planning on smart construction in urban areas. The goal is that by 2030, the whole country will form a chain of smart cities in the North, Central, South and Mekong Delta regions with Hanoi, Ho Chi Minh City, Da Nang and Can Tho as the core. forming a chain linking smart cities. The results of the smart city deployment process will increase people&#8217;s trust in the government and vice versa, governments at all levels and management units will be more motivated because they must maintain that trust, to continue to improve operational efficiency. Currently, the province has 300 sensor surveillance cameras and is expected to have 1,500 cameras by 2025. Since its establishment, traffic surveillance cameras have detected and transferred 4,300 cases of violations to the police; processed 3,600 cases and 700 cases in progress. Meanwhile, with the solution to reflect the scene (Hue-S), the Center has received 30,425 complaints (there are 20,000 reports eligible to receive); 214 agencies in the province have handled 18,500 complaints, 1,500 complaints are under review. The project on development of smart cities in Vietnam for the period of 2018-2025 and a vision to 2030 clearly identifies major issues including: Building a legal foundation for smart city development; Develop management tools, institutions, for example, a framework to guide criteria and evaluate smart cities of cities; Formulate specific regulations, regulations and standards on planning on smart construction in urban areas.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16428</post-id>	</item>
		<item>
		<title>Facebook disregards the privacy of Vietnamese users</title>
		<link>https://en.spress.net/facebook-disregards-the-privacy-of-vietnamese-users/</link>
		
		<dc:creator><![CDATA[Điệp Lưu]]></dc:creator>
		<pubDate>Thu, 20 May 2021 02:40:16 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[advertisement]]></category>
		<category><![CDATA[Aim]]></category>
		<category><![CDATA[BAD]]></category>
		<category><![CDATA[Cambridge Analytica]]></category>
		<category><![CDATA[case]]></category>
		<category><![CDATA[clearly]]></category>
		<category><![CDATA[Collect]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[disregards]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Forum]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[Leakage]]></category>
		<category><![CDATA[Philippines]]></category>
		<category><![CDATA[phone number]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Private]]></category>
		<category><![CDATA[Scandal]]></category>
		<category><![CDATA[Social Network]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Vietnamese]]></category>
		<guid isPermaLink="false">https://en.spress.net/facebook-disregards-the-privacy-of-vietnamese-users/</guid>

					<description><![CDATA[The case that the information of 533 million Facebook accounts has just been released by hackers has brought the issue of user privacy back into focus. The case that the information of 533 million Facebook accounts has just been released by hackers has made the issue of user privacy once again the focus of all [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The case that the information of 533 million Facebook accounts has just been released by hackers has brought the issue of user privacy back into focus.</strong><br />
<span id="more-16406"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_23_38796906/ee2a50c34e81a7dffe90.jpg" width="625" height="296"> </p>
<p> <strong> <em> The case that the information of 533 million Facebook accounts has just been released by hackers has made the issue of user privacy once again the focus of all attention. </em> </strong> Agreeing on the fee of 5 million dong to regain the account after clicking on a strange link sent by a friend thanks to a vote on Facebook, Ms. LA, the owner of a famous beauty spa in Hanoi, spent 2 more days considering the proposal. about identity verification. Due to the characteristics of her job and the desire to create credibility with her partner, Ms. LA accepts to spend an additional 50 million to ask an intermediary to register for a green certificate. People who need to authenticate their Facebook accounts and other social networks like LA are not rare, especially business people, or celebrities. They are willing to spend a small amount of money to assert something that is their own property. While some platforms allow for free and simple identity verification, with Facebook it is both a difficult challenge and an intermediary fee is an option that is almost mandatory. That seemingly absurd thing is still happening every day, every hour, but no one is sure whether those verified accounts are guaranteed forever or not, because of the status of blue-tick accounts being occupied. becoming an online sales channel in recent times is easy to find. Especially when information about the data of 533 million Facebook users has just been released, many people cannot help but worry. The above data source is being sold by hackers on a hacker forum last week, including information such as phone number, login ID, full name, home address, date of birth, profile and email address &#8230; Which involves users in 106 countries, with 32 million Americans, 11 million British and 6 million Indians. In this regard, Facebook said the stolen data did not include users&#8217; financial, health and password information. However, these data can provide valuable information for hackers and other breaches. More importantly, this is not the first time Facebook&#8217;s user data has been exposed on a large scale. <strong> Facebook user data is regularly leaked</strong> The 2015 cult case involving the British consulting firm Cambridge Analytica illegally used the personal data of more than 87 million Facebook users to target political ads. This is a scandal that caused Facebook to accept a settlement of up to $ 5 billion, and also caused founder Mark Zuckerberg to testify before the US Congress. Then in September 2019, a database of more than 400 million phone numbers related to Facebook accounts was released, including about 50 million Vietnamese users. Just 3 months later, the information of 267 million users including login IDs, names and phone numbers continued to fall into the hands of hackers. At the same time, the data leak in Belgium and Luxembourg, including that of European Justice Didier Reynders, many EU cabinet members and diplomats, has caused Facebook to suffer for a while. long time. However, Facebook explained that these data leaks were not caused by hackers breaking into the system, but rather by a vulnerability in the sync communication tool that was exploited by vandals in 2019. Facebook later The company has discovered the vulnerability and fixed it, and confirmed that similar incidents will not happen again in the future. Meanwhile, Mike Clark, Facebook&#8217;s director of product management, is constantly moving to try to downplay the impact of this large-scale leak. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_23_38796906/d9c2662b78699137c878.jpg" width="625" height="393"> By March 2021, netizens were again shocked by the information that the data of 41 million Facebook users in Vietnam was distributed by hackers. Talking to a VietNamNet reporter at the time, a Facebook representative acknowledged that the leaked data was from users of this social network, but said &#8220;this may be information obtained before we (Facebook &#8211; PV) made changes over the past few years to protect users&#8217; information. However, whether Facebook really protects users&#8217; information according to what the head of this platform often says, that is another story. Judging by the recent situation, it seems that the problem of leaking Facebook user information is difficult to completely solve and needs to be looked at in detail. The spread of user information may first be because Facebook did not pay attention to this aspect, nor did it establish a complete and strict system to protect user information. At the same time, after a data breach, Facebook did not thoroughly summarize the problem, how to fix loopholes and prevent new problems from appearing. Not only that, a Facebook spokesperson said it is not clear which users should be notified in the recent incident. Because users cannot patch the vulnerabilities themselves and their personal data has been spread on the Internet, Facebook will not specifically notify the users involved. As a result, Facebook&#8217;s performance in this area is relatively poor, and user data leaks are frequent. After all, compared to other social software, users&#8217; dependence on Facebook is still very high. If it leaks many times, I am afraid that it will easily cause irreparable losses and bad consequences. <strong> Legal privacy of Facebook users</strong> With the data of 87 million users exposed in the Cambridge Analytica scandal, the 10 countries with the most Facebook accounts being collected are the US, Philippines, Indonesia, UK, Mexico, Canada, India, Brazil, Vietnam and Australia. Vietnam has 427,446 user accounts whose data has been collected. CEO Mark Zuckerberg admitted that Facebook made mistakes and that his company failed to protect customer data, losing users&#8217; trust. &#8220;We have a responsibility to protect your data, and if we can&#8217;t do that, we don&#8217;t deserve to serve you,&#8221; Zuckerberg wrote in a post on his personal Facebook page after the scandal. In addition to the $5 billion settlement with the US Federal Trade Commission (FTC) at the time, the two sides reached a landmark settlement against allegations of misuse of user data. . According to the settlement reached by the FTC, when more than 500 user information is illegally stolen, Facebook is required to report it within 30 days. In connection with this case, Facebook also had to pay £500,000 (about $ 649,000) after a fine from the UK Information Commissioner&#8217;s Office (ICO). By October last year, a user group called Facebook You Owe Us in the United Kingdom, led by the law firm Milberg London and supported by former CEO Richard Lloyd, continued to sue Facebook and seek compensation. another large sum. Meanwhile, most of Facebook&#8217;s data disclosure scandals have a direct impact on users of this social network in Vietnam. No one has been able to determine how many of the 427,446 Vietnamese user accounts in the Cambridge Analytica incident, or the 41 million accounts in the newly announced case in March 2021, were affected, even appropriated and had to be stolen. spend a small amount of money to get your account back like LA One thing is for sure, users are solely responsible for the security of personal account information in accordance with the general provisions of most platforms, including Facebook. However, if personal information on platforms like Facebook is leaked without subjective reasons from the user, on the contrary due to a security incident from the platform, who will be responsible for this? Since Facebook is obligated to compensate users in the US or EU affected by security incidents on the platform, why are 69,280,000 users using this social network in Vietnam, accounting for 70 .1% of the entire population (statistics as of June 2020), of which many are victims of Facebook incidents, are automatically responsible? This question, the writer would like to leave the answer open, because currently Vietnam does not have specific regulations and sanctions that apply specifically to social networking platforms, or the object of application in this case is outside of Vietnam. the scope of control under applicable law due to not having a home office. However, it is a problem that needs to be solved in the near future…</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16406</post-id>	</item>
		<item>
		<title>The number of new COVID-19 cases in the US at the lowest level since September 2020</title>
		<link>https://en.spress.net/the-number-of-new-covid-19-cases-in-the-us-at-the-lowest-level-since-september-2020/</link>
		
		<dc:creator><![CDATA[Phan An (TTXVN)]]></dc:creator>
		<pubDate>Wed, 19 May 2021 14:49:24 +0000</pubDate>
				<category><![CDATA[Travel]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[Cases]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[COVID19]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Dead]]></category>
		<category><![CDATA[disease]]></category>
		<category><![CDATA[Face mask]]></category>
		<category><![CDATA[level]]></category>
		<category><![CDATA[lowest]]></category>
		<category><![CDATA[medical]]></category>
		<category><![CDATA[Nose]]></category>
		<category><![CDATA[number]]></category>
		<category><![CDATA[Obligatory]]></category>
		<category><![CDATA[Population]]></category>
		<category><![CDATA[recommendation]]></category>
		<category><![CDATA[Remove]]></category>
		<category><![CDATA[September]]></category>
		<category><![CDATA[Situation]]></category>
		<category><![CDATA[Translate]]></category>
		<category><![CDATA[vaccination]]></category>
		<category><![CDATA[Vaccines]]></category>
		<category><![CDATA[Vaccines against Covid 19]]></category>
		<category><![CDATA[Warning]]></category>
		<category><![CDATA[wear]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-number-of-new-covid-19-cases-in-the-us-at-the-lowest-level-since-september-2020/</guid>

					<description><![CDATA[Johns Hopkins University data shows that the COVID-19 epidemic situation in the US is on a downward trend as the average number of new cases per day in the country fell below 41,000 over the weekend, the lowest level since. from September 2020. People wait in line to get tested for COVID-19 in New York, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Johns Hopkins University data shows that the COVID-19 epidemic situation in the US is on a downward trend as the average number of new cases per day in the country fell below 41,000 over the weekend, the lowest level since. from September 2020.</strong><br />
<span id="more-16196"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_294_38801005/658c8ed64895a1cbf884.jpg" width="625" height="416"> </p>
<p> <em> People wait in line to get tested for COVID-19 in New York, US, February 5, 2021. Photo: THX/VNA</em> Specifically, over the weekend, the number of new COVID-19 cases in the 7-day average in the US was about 40,800 cases, down 30% from the previous 2 weeks and down 43% from the most recent peak in the middle of the epidemic. last April (71,000 cases/day). This number is also the lowest number of new cases recorded in the US since September 19, 2020. Meanwhile, the average number of deaths from COVID-19 per day in the past 7 days in the US is 667 cases, much lower than the epidemic peaks last winter. Currently, about 46% of the US population has received at least one dose of the COVID-19 vaccine and more than 30% have received the full dose. US President Joe Biden announced last week that the country&#8217;s new goal is to vaccinate at least one dose of the COVID-19 vaccine by July 4 by Independence Day for 70% of the adult population and 160 million adults. receive a full dose of vaccine. In Washington, D.C., the number of new daily COVID-19 cases is now at its lowest level in nearly a year. The city government plans within the next two weeks to lift restrictions on most businesses and public places. Accordingly, museums, zoos, restaurants, shops, religious facilities &#8230; are allowed to reopen completely from May 21, while bars, nightclubs, entertainment venues &#8230; entertainment, stadiums can reopen from June 11. Wearing a mask is still mandatory in enclosed spaces, except when eating and drinking. More than 225,000 people out of a population of 700,000 in Washington are now fully vaccinated. Meanwhile, in New York state, more than 60% of its nearly 20 million population has received at least one shot of the COVID-19 vaccine. To increase immunity, Governor Andrew Cuomo on May 10 announced a pilot program, allowing people who have been vaccinated against COVID-19 to ride the subway for free. Specifically, from May 12-16, New Yorkers can get a single dose of Johnson &#038; Johnson&#8217;s vaccine at one of six selected medical facilities. Once vaccinated, they will receive a free metro pass for a week or a suburban rail return ticket. Governor Cuomo said the program, if successful, would be replicated. On the same day, May 10, the US State Department announced that it had lowered its travel advisories to the UK and Israel to level 3 and level 2, respectively, from the highest level of warning level 4. Last month, the Department of State US delivery has put 119 countries, including the UK, Israel, Canada, France, Mexico and Germany, on the alert level 4 list, which recommends not to go to these countries because these are places with a high risk of infection. COVID-19 infection is very high. Currently, about 150 of the 209 destinations on the US State Department&#8217;s list are under Level 4 alert.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16196</post-id>	</item>
	</channel>
</rss>