Seafood can also be injected with water? The reporter measured that the razor clam gained 29% weight after water injection.

  Summer is a good time to eat seafood. Pipi shrimp, razor clam, conch, crab and shrimp are all tempting delicacies. Recently, netizens broke the news that the clams they bought in the seafood market were all boiled with water. After asking friends who made seafood, they discovered the shady situation: soaking in low salinity water can gain weight.

  On May 28th, the reporter conducted a group of seven-hour field tests in the Wuhan store of Hema. The results showed that 9&permil was adopted; After soaking in low salinity water for seven hours, the weight of razor clam and abalone increased by 29% and 34% respectively.

  Soaking seafood in low salt will make you "puffy"

  The pictures taken by netizens on the Weibo were placed with only standard salinity (the standard salinity is 18‰ ) Half of the water (9 & permit; Low salinity water), 2064 grams of razor clam increased to 2854 grams in a few hours.

  At noon yesterday, the reporter tested 9&permil in Wuhan Box Horse Shouyi Store. After soaking in low salinity water for seven hours, the weight of razor clam and abalone increased by 29% and 34% respectively.

  Yuan Liang, the person in charge of seafood procurement in Boxma Wuhan, said that this phenomenon is the infiltration principle. The organisms in seawater live in high concentration seawater, and the cell salinity is high. When the salinity is reduced or changed to fresh water, when the external salinity is lower than the cell salinity, the cells will absorb water and the weight of seafood will increase. The longer seafood is cultured in low salinity water, the heavier it will be, and the taste will become dry and tasteless, and it will die more easily than normal seafood.

  In general, it is soaked in the normal 18‰ Seafood in salinity water environment will slowly discharge the sediment and dirt in the body, and consumers can live for several days when they take it home. Soak in 9 & permit; Seafood in salinity water environment is like being shrouded in smog, which makes it difficult to breathe and absorb water desperately, reduces vitality and has a high mortality rate. Consumers can’t take it home for half a day.

  Only a few seafood absorbs water.There are obvious changes.

  Whether the meat behind Boston lobster is exposed is one of the characteristics to judge whether there is "water injection". There must be a "raw food" logo on the salmon packaging. Photo by reporter He Xiaogang

  In this soaking process, only a few seafood will have obvious changes in appearance characteristics after absorbing water, and we can see the clues by careful observation. "Boston lobster is a kind of seafood with obvious changes. The bloated lobster will be very bloated and the meat behind it will be exposed. After soaking in low salinity water, the vitality of abalone will decrease, and the meat will become soft and have no Q-elastic feeling. Abalone without drinking water will attract each other, and the meat of abalone will feel q-elastic when you click it with your fingers. After the scorpion is soaked in low salinity water, the body will shrink into the carapace, and if it does not stretch, the meat will become soft and the touch will be soft. "

  Yuan Liang reminded the public to pay attention to whether all kinds of seafood in Shangchao have explicit standards such as salinity and temperature, so as to avoid buying puffy seafood soaked in low salt.

  Salmon can be eaten raw.

  As for the salmon that people are concerned about recently, Yuan Liang reminds consumers to try their best to buy those salmon with Norwegian origin and raw packaging qualification. "Now there are many producing areas of salmon in the world, and Norway is the best. The salmon sold by Box Horse is directly harvested from Norway, which can be delivered to China within 72 hours. The whole process of cold and fresh air transportation technology is much better than those salmon that are frozen first and then thawed and shipped to China by sea for one month. Although you can’t see the difference between air and sea salmon with the naked eye, you will know that the feeling of meat quality is obviously different after eating it once. "

  (Text/Reporter Zhang Yitu/Reporter He Xiaogang)

On the 25th anniversary of Hong Kong’s return to China, 25 buildings look at urban changes.

Recently, it coincides with the 25th anniversary of Hong Kong’s return to the motherland. The Palace Museum in Hong Kong opened, and there are more buildings in the streets of Hong Kong. From the rows of residential buildings and Tang buildings in the streets and lanes to the Bank of China Building designed by I.M. Pei and the Hong Kong International Airport of Foster Architects, these large and small buildings constitute the history of a city. This paper presents the past, present and future of Hong Kong from the perspective of architecture through 25 architectural projects in chronological order.

Hong Kong architecture is inherently public, and "publicity" is an organic part of local life. The architecture of public institutions plays a central, subtle and decisive role in the quality of the city. In the same book, Wu Xianghong explains the unique reasons behind public buildings in Hong Kong. In a crowded city, citizens are eager for good public space. Public spaces and buildings have become a part of urban life. This also urges architects and designers to think about how to use space effectively in the process of urban planning and housing design. Public buildings have become multi-purpose, multi-value and multi-level works. The mixed-use environment improves the effectiveness and flexibility of the space and optimizes the use in different periods of a year and a day.

?Chapman Chow, Landscape of Victoria Harbour, Hong Kong

After World War II, public housing and public buildings in Hong Kong were mostly designed or supervised by government architects in the Public Works Department at that time. Modernism in architecture appeared in the form of "brutalism" to adapt to the economic environment at that time. The public buildings in Hong Kong pay attention to firmness, machine-like efficiency and machine aesthetics, which coincides with the popular modernist style at that time. The Public Works Department was dissolved in 1982. In 1986, the government established the Architectural Services Department, which is a government department responsible for the design, supervision and maintenance of public buildings, with its own architects, engineers and surveyors. There are more and more local professionals, who design various projects to serve the public with their own understanding of the local lifestyle.

After 1970s, most of the early graduates of the Department of Architecture of Hong Kong University have entered a mature period. Local students who have lost overseas have gradually returned to Hong Kong to participate in the construction. However, Hong Kong’s sustained economic activity and frequent construction activities provide a lot of training and practice opportunities for new design forces. In the last few decades before the return to the motherland, the main investors in the construction of Hong Kong were local Chinese, and the sense of seeking roots and being local in society was high. This also urges architects to think about Hong Kong issues, face local conditions and create buildings that truly belong to Hong Kong. In the construction boom, some prominent individuals and firms have emerged. Partly because of the post-war hardships and high land prices, architects in Hong Kong generally embrace the principle of modernism. Their designs have created the general features of Hong Kong architecture: practical, economical, concise and, to some extent, pleasant.

In 1990s, the theory of globalization resounded around the world, and Hong Kong became an international city in Asia. Globalization is the guidance of transnational business and the inevitable direction of economic development. The large buildings in Central and Wan Chai are the physical symbols of this transformation process. From the 1990s to the 21st century, Hong Kong still carried out some large-scale and many seamless constructions, and improved the infrastructure facilities in Hong Kong.

main building

Coordinates: Campus of Pokfulam Road Headquarters, Central and Western District

The main building of the University of Hong Kong was built in 1912, which is the oldest building on campus, laying the foundation for the establishment of the University of Hong Kong. The overall proportion of the building is well-proportioned, the layout is neat, and it has a typical Renaissance architectural form. The building is supported by a number of classical Ionian granite columns, with the bell tower as the center and two watchtowers on each side.

main building

Old Supreme Court Building, Central

Coordinates: No.8 jackson road, Central and Western District.

The design adopts the architectural style of neoclassicism, and the ground is surrounded by Ionian columns. The most distinctive feature is the triangular gable in the central part. At the top of the gable stands a blindfolded statue of the Greek goddess Themis to represent justice. The building was used by the Legislative Council (known as the Legislative Council before July 1997) from 1985 to 2011. After renovation, the building has been used by the Hong Kong Court of Final Appeal since 2015.

Old Supreme Court Building in Central Source: official website, Hong Kong Tourism Board

Old Tai Po Hui Railway Station

Coordinates: 13 Chongde Street, Tai Po Market

The old Tai Po Hui Railway Station was built in 1913, which is different from other railway stations along the Kowloon-Canton Railway. The facade, roof and decoration of Tai Po Hui Railway Station have China architectural characteristics, and the interior is designed according to the operation needs of the railway station. The project was listed as a monument in 1984. After comprehensive restoration, it is now used as the Hong Kong Railway Museum.

Hong Kong Old Tai Po Market Railway Station

The 1920s

Blue house complex

Coordinates: No.72, 72A, 74 and 74A (Blue House), Shishuiqu Street, Wan Chai/No.2, 4, 6 and 8, Qingyun Street (Yellow House)/No.8, Jingxing Street (Orange House)

The Blue House complex consists of a group of old residential buildings, including the Blue House and the Yellow House built in the 1920s and the Orange House built in the 1950s. Among them, the Blue House is listed as a "first-class historical building" by the Hong Kong government. It has typical Lingnan architectural features and is one of the few Tang buildings with convex balconies.

Blue house complex ?LWK+PARTNERS

Hong kong Yichang building

Coordinates: No.1010-1056, King’s Road, Bayu Chung

Yichang Building consists of five extremely dense residential buildings (Seaview Building, Fuchang Building, Haishan Building, Yifa Building and Yichang Building). It was built in the 1960s, with commercial space on the ground floor and apartments on the upper floor. Dense and crowded are the iconic features here, showing people the life in old Hong Kong.

Jetdelacruz, Yichang Building, Hong Kong

Hong Kong City Hall

Coordinates: No.5 Edinburgh Place, Central

Built in 1962, the Great Hall is one of the rare and important modernist buildings in Hong Kong. At the same time, it is also the first multi-purpose cultural center open to all citizens in Hong Kong. Since its opening, it has been a venue for many major historical events and witnessed the artistic and cultural development of Hong Kong.

Official website, Leisure and Cultural Services Department.

Hsbc building

Design: Foster+Partners, 1986

Coordinates: 1 Queen’s Road Central, Central.

HSBC Building Source: Foster+Partners

In structural design, Foster adopted a similar treatment to Pompidou Center, moving the structure from the center to the outside, making the whole building supported by a structural system similar to the exoskeleton, giving the interior a spacious and open space.

Because there were no inner columns, the whole office area was designed as an open office area, which was the first in the world at that time. The large-area glass curtain wall set with reference to the local climate in Hong Kong, together with the huge atrium, brings comfortable lighting to the office area.

Lippo Centre

Design: paul rudolph and Wang Ouyang (HK) Co., Ltd., 1988.

Coordinates: 89 Queensway, Central and Western District

Lippo Center The Estate of Paul Rudolph, The Paul Rudolph Heritage Foundation

Lippo Center was built in 1988 and designed by American architect Paul Rudolph. Composed of two office buildings, the design aims to create a sculpture-like structured and winding facade.

Both towers are hexagonal in plan layout, one is 36 stories high and the other is 40 stories high. The facade is divided into three sections, forming a concave-convex visual effect. This distinctive facade is reminiscent of a koala climbing a tree. The skirt building includes spaces such as banks, retail shops, restaurants and telephone buildings.

Lippo Center The Estate of Paul Rudolph, The Paul Rudolph Heritage Foundation

Bank of China Building, Hong Kong

Design: Bekofer and Partners, Gong Shukai Architects Co., Ltd., 1989.

Coordinates: No.1 Garden Road, Central, Central and Western District

Bank of China Building, Hong Kong

The Bank of China Tower was completed in 1989 and is still one of the tallest buildings in Hong Kong. Designed by I.M. Pei, the design of this project is inspired by the image of bamboo, which symbolizes strength, vitality, sturdiness and enterprising spirit.

Its architectural feature is to combine China’s traditional architectural ideas with modern advanced architectural technology. The whole building is composed of four triangular prisms with different heights, which can show different colors under the irradiation of sunlight.

?Paul Warchol, Bank of China Building, Hong Kong

Pacific Place Phase I and Phase II

Design: Wang Ouyang (Hong Kong) Limited, 1990.

Coordinates: 88 Queensway, Central and Western District

 Pacific Place Phase I and Phase II Source: Wang Ouyang (Hong Kong) Co., Ltd. official website

This project is one of the largest comprehensive development projects in Hong Kong, with a total area of over 490,000 square meters. The first phase of the project includes JW Marriott Hotel in Hong Kong, Xi ‘an Xuan, One Pacific Place and the first phase of the shopping mall. The second phase includes island shangri-la hotel, Hong Kong Gangli Hotel, Garden, Tower 2 of Pacific Place and the second phase of the shopping mall.

Although the project is designed and built in stages, the four tall buildings have their own styles, but they also show a unified architectural language, such as the color coordination of curtain wall system, metal hanging plates and other elements, so that the integrity can be preserved.

hong kong international airport

Design: Foster+Partners, 1992.

Coordinates: Chek Lap Kok, Lantau Island, New Territories

Hong Kong International Airport Source: Foster+Partners

Completed in 1998, Hong Kong International Airport is the only civil aviation airport in Hong Kong and one of the largest and most advanced airports in the world. It is estimated that by 2040, it can receive 80 million passengers every year, equivalent to the sum of London Heathrow Airport and new york Kennedy Airport.

The Y-shaped design makes the overall lines of the airport smooth and the traffic streamline simple. At the same time, luggage transportation, supporting service facilities and technical equipment are arranged under the passenger hall, which is also more convenient for passengers to travel. The design of light roof is calm without losing the sense of rhythm, which provides sufficient natural light for the room. Huge floor-to-ceiling glass windows also allow visitors to enjoy the surrounding landscape.

Hong Kong International Airport Source: Foster+Partners

International Finance Center Phase II

Design: Perry Clark Perry Architects Office and Xu Liyan Architects Affairs Co., Ltd. (local cooperative unit), 2004.

Coordinates: No.8, Financial Street, Central

International Finance Center Phase II Source: Xu Liyan Architects Affairs Co., Ltd.

The second phase of the International Finance Center is located in Central Financial Street, which is a famous landmark of Hong Kong as a world-class financial center. The building is like a lighthouse at the entrance of Victoria Port, which enriches the skyline of the port.

The architectural form is conical, tapering from bottom to top, as if climbing vertically. The office area is designed as an open layout, and the glass curtain wall on the facade allows indoor people to enjoy the magnificent scenery of the port and surrounding cities from all angles.

Hong Kong Special Administrative Region Government Headquarters

Design: Xu Liyan Architects Affairs Co., Ltd., 2011

Coordinates: No.2, Matianmei Road, Jintongtian.

Source: Xu Liyan Architects Affairs Co., Ltd.

The new government headquarters in Hong Kong, including the government headquarters building, the Chief Executive’s office, the Legislative Council Complex and the municipal parks, are interconnected. The design revolves around four themes: openness (the door is always open), happiness (the ground is evergreen), persistence (the sky is blue) and coexistence (the people are eternal).

The project will also connect the scattered green spaces in the city, including Hong Kong Park, Xiayan Garden and the future waterfront promenade. The Legislative Council Complex and the Chief Executive’s Office are erected on both sides, side by side with the East Block and the West Block of the Government Secretariat Building, and on both sides of the municipal park, overlooking the vast Victoria Harbour.

Source: Xu Liyan Architects Affairs Co., Ltd.

kai tak cruise terminal

Design: Foster+Partners, 2013

Coordinates: 33 Chengfeng Road, Kowloon

Hong Kong Kai Tak Cruise Terminal Source: Foster+Partners

The cruise terminal was built on the original site of the old airport in Hong Kong, and it is also the first project that has been opened to the public in the original site reconstruction project of the airport. The design is highly flexible and makes full use of the original facilities, so that the building can be used all year round.

The core of the design lies in the rooftop park at the end of the runway of the old airport. This park is built on the top floor of the dock platform, covering an area of 23,000 square meters, with a panoramic view of Victoria Harbour. At the same time, sustainable design also runs through the whole project, including using renewable energy to generate electricity and using recycled rainwater for cooling.

Hong Kong Kai Tak Cruise Terminal Source: Foster+Partners

Hong Kong Polytechnic University Jockey Club Innovation Building

Design: Zaha Hadid Architects, 2014.

Coordinates: No.11 Yucai Road, Hung Hom, Kowloon

Iwanbaan, Jockey Club Innovation Building, Hong Kong Polytechnic University

The project is located in a narrow and irregular site on campus, with a football field in the south and a Kowloon Corridor Expressway overpass on the back. The architectural form combines the characteristics of the tower/platform, forming a smoother combined line.

Indoor and outdoor courtyards provide an informal place for teachers and students to exchange activities, which can be used flexibly. The building extends to the center of the campus, which promotes interdisciplinary cooperation between departments and strengthens exchanges with communities, governments, industries, non-governmental organizations and academia.

Iwanbaan, Jockey Club Innovation Building, Hong Kong Polytechnic University

Hong Kong West Kowloon Station

Design: Aedas, 2018

Coordinates: North of West Kowloon Art Park, Yau Tsim Mong District

Hong Kong West Kowloon Station Source: Aedas official website

Hong Kong West Kowloon Station was opened to the public in September 2018 and is one of the largest underground railway stations in the world. As the "gateway" of Hong Kong, the station should not only interact with the surrounding urban environment, but also make the passengers who arrive or leave Hong Kong feel "in Hong Kong".

The interior of the hall is like a forest. Inclined steel columns support a huge roof that seems to be suspended in the air, and 4,000 glass panels are installed to introduce natural light into the room, allowing passengers to see the city scenery outside even from the lower floor of the station.

Hong Kong West Kowloon Station Source: Aedas official website

Hong Kong-Zhuhai-Macao Bridge Hong Kong Port Travel Inspection Building

Design: Rogers Stirk Harbour+Partners, Aedas, 2018

Coordinates: No.33 Shunhui Road, Lantau Island

Hong Kong-Zhuhai-Macao Bridge Hong Kong Port Travel Inspection Building Source: Aedas official website

The Hong Kong Port of the Hong Kong-Zhuhai-Macao Bridge is the boundary point from which the Hong Kong-Zhuhai-Macao Bridge enters Hong Kong. This bridge is of great strategic significance for promoting the further integration of cities around the Pearl River Delta.

The lower floor of the passenger clearance building receives passengers from Macao and Zhuhai who need to go through entry and customs clearance procedures, while the upper floor is used to handle outbound passengers from Hong Kong. The directional lines of the wavy roof strengthen the simple and clear moving lines in the facility, improve the identifiability and provide route guidance.

Daguan Monuments and Art Museum

Design: Herzog and De Mellon, 2018

Coordinates: No.10, hollywood road, Central

Iwanbaan, the new building and historical building of Daguan Monument and Art Museum

The former Central Police Station, the Central Magistrate’s Office and Victoria Prison are historical buildings in the commercial center of Hong Kong, surrounded by granite walls. It once stood on a hillside overlooking the port from a panoramic perspective, symbolizing the authoritative position of law and order.

One of the key strategies to transform and activate the site is to inject new artistic and cultural vitality into the building complex. Two new buildings are suspended on the surrounding granite walls, cautiously intervening in the existing spatial structure, but at the same time retaining their own characteristics.

The new public space and traffic circulation space are placed underground in Iwanbaan.

Xijiu opera center

Design: Lv Yuanxiang Architects, Revery Architecture, 2018

Coordinates: West Kowloon Art Park, Yau Tsim Mong District

Opera Center, the first large-scale art performance venue in West Kowloon, Hong Kong.

It took eight years to preserve, develop and popularize traditional Chinese opera, an important traditional culture and art in China. Lv Yuanxiang Architects+Revery Architecture and Hong Kong West Kowloon Cultural Administration joined hands to build a world-class performing arts venue.

The overall architectural design combines traditional and modern elements, borrows the concept of "pavilion" in China traditional architecture, and opens the entrance on all sides to accommodate all audiences; The building curtain wall, like the stage curtain, wraps the large theater suspended at a height of 30 meters and the wide atrium space on the ground.

Atrium is a 24-hour public place, which carries traditional art with modern space, so that people who watch or don’t watch the play have the opportunity to feel the charm of the building.

Renovation and expansion of the Hong Kong Museum of Art

Design: Architectural Services Department of the Hong Kong Special Administrative Region Government, 2019

Coordinates: No.10 Salisbury Road, Tsim Sha Tsui

Renovation and expansion of the Hong Kong Museum of Art ?iMAGE28 and Daniel Wong

Founded in 1962, the Hong Kong Museum of Art was originally located in Hong Kong City Hall, and moved to its present site in Tsim Sha Tsui in 1991. It is the first major cultural museum in this city. Unable to cope with the changes in the surrounding urban design, the Hong Kong Government decided to completely renovate and expand the old buildings.

The cubic form of the original building is emphasized and connected with the surrounding environment through the newly placed glass block. A new hovering canopy is set above the main entrance, and two recessed floors are set as an extension. Many early additions to the introverted old buildings were demolished, and framed glass exterior walls extending through several floors were built on the west and south sides to open the view of the port and public space to visitors.

Renovation and expansion of the Hong Kong Museum of Art ?iMAGE28 and Daniel Wong

K11 MUSEA Shopping Center

Design: KPF et al., 2019

Coordinates: No.18 Salisbury Road, Tsim Sha Tsui

Building coastal surface ?K11 MUSEA

With the concept of "A Muse by the Sea", the project has become a brand-new landmark of Tsim Sha Tsui coastal art and culture. The design is full of vitality, and the smooth lines reflect each other with Victoria Harbour. The wall is made of rare Portuguese limestone, and its ladder-like appearance forms a natural landscape facing Kowloon, Victoria Harbour and full of green.

In the interior, KPF cooperates with many international architects, designers and artists to design, to integrate creativity, culture and innovative spirit in a unique space, and to open a dialogue between society and different cultures in different enlightening ways.

M+ Museum

Design: Herzog and De Mellon, TFP Farrells (local cooperative unit), Arup (engineering consulting unit), 2021.

Coordinates: West Kowloon Art Park, Yau Tsim Mong District

Bird’s eye view of M+ museum ?Kevin Mak

M+ is the first global museum of contemporary visual culture in Asia and one of the largest museums of contemporary visual art in the world. The curtain wall of the building facing the Victoria Harbour is equipped with an LED screen to display the artist’s mobile video works, which can be viewed by the public at the West Kowloon Waterfront Corridor and the other side of Hong Kong Island.

The architect connects the underground floor with the ground, providing visitors with an open area across floors. The three-storey zenith allows people to enjoy the exhibits from different observation points. The high-quality fair-faced concrete and exposed load-bearing structure also keep the building in its industrial style.

The sea promenade ?Virgile Simon Bertrand

Hong Kong Palace Museum

Design: Xu Liyan Architects Affairs Co., Ltd., 2022

Coordinates: West Kowloon Art Park, Yau Tsim Mong District

Hong Kong Palace Museum of Culture Source: West Kowloon Cultural District

The museum is located in the West Kowloon Cultural District, with a total construction area of about 30,000 square meters, of which about 7,600 square meters are exhibition halls. Other museum facilities include a 400-seat lecture hall, activity rooms, restaurants and shops.

Architecture shows a new interpretation of traditional aesthetics, which is inspired by three elements: traditional architecture, art and Hong Kong urban landscape. The design of the three atrium spaces of the museum refers to the spatial layout of the Forbidden City, where the central axis is progressive horizontally, and the space of the atrium of the museum is progressive vertically, connecting different buildings into a whole. In the atrium, visitors can enjoy the view of the entrance square of the museum, the Hong Kong Island skyline and Lantau Island, and experience the harmonious beauty between the building and the surrounding scenery.

Performing Arts Complex Theatre (to be completed soon)

Design: UNStudio, AD+RG

Coordinates: West Kowloon Art Park, Yau Tsim Mong District

Located in the West Kowloon Cultural District of Hong Kong, the Performing Arts Complex Theater is a comprehensive space for performances and social gatherings. This 40-hectare seaside cultural zone combines open public space with diverse and rich cultural sites to create a vibrant cultural site in Hong Kong, allowing different artistic fields to interact, collaborate, innovate and develop together.

Effect diagram ?DBOX

2 Murray Road, Hong Kong

Design: Zaha Hadid Architecture Office

Coordinates: 2 Murray Road, Central

This project is located in the heart of Hong Kong Central Business District, and the original site is a multi-storey parking lot. The 36-storey project will create an urban oasis near Chater Garden, from which Central Subway Station and Admiralty Subway Station can be reached within walking distance. The appearance design reinterprets the structural form and layering of the bud of Bauhinia which is about to bloom.

2 Murray Road, Hong Kong

(This article is organized according to the relevant contents of Well-proportioned Space and Urban Landscape-Hong Kong Architecture 1946-2011.)

News network privacy policy

China Labor and Social Security News Network (hereinafter referred to as "we") knows the importance of personal information to you, and your trust is very important to us. We will protect your personal information and privacy in accordance with laws and regulations and with reference to industry best practices. We have formulated this "Privacy Policy" and specially remind you that we hope you can read and understand this privacy policy carefully before using China Labor and Social Security News Network and related services, so as to make an appropriate choice.

This privacy policy will help you understand:

L We will collect and use your information in accordance with the privacy policy, but we will not collect personal information by compulsory bundling just because you agree to this privacy policy.

L When you use or open related functions or use services, we will collect and use relevant information necessary to realize the functions and services. Unless it is necessary to realize basic business functions or according to the requirements of laws and regulations, you can refuse to provide it without affecting other functions or services. We will specify the information to be collected item by item in the privacy policy.

L If you are not logged in, we will guarantee the basic function of information push through the identifier information corresponding to the device. If you log in the account, we will push the information according to the account information.

L Precise geographical location, camera (camera), microphone, photo album (storage), calendar and activity record permissions will not be turned on by default, and will only be used for realizing specific functions or services after your express authorization, and you can also withdraw your authorization. It is particularly important to point out that even if we obtain these sensitive rights with your authorization, we will not collect your information when the related functions or services are not needed.

The following will help you learn more about how we collect, use, store, transmit, share, transfer (if applicable) and protect personal information; Help you understand how to inquire, access, delete, correct and withdraw authorized personal information. This policy is closely related to your use of our services. We suggest that you carefully read and understand all the contents of this policy, and make the choices you think appropriate. We have highlighted the important contents of the terms about your personal information rights and interests in bold, so please pay special attention.

1. How do we collect and use personal information?

2. How do we use similar technologies such as cookie?

3. How do we share, transfer and publicly disclose personal information?

4. How do we store personal information?

5. How do we protect the security of personal information?

6. Manage your personal information

7. Personalized recommendation

8. Terms of use for minors

9. Revision and Notice of Privacy Policy

10. Contact us

1. How do we collect and use personal information?

We will collect the information provided by you voluntarily when using the service, as well as the information generated in the process of using the function or receiving the service through automatic means as follows:

1.1 Registration, login and password reset

1.1.1 Registration and login

A. When you register and log in to China Labor and Social Security News Network and related services, you can create an account through your mobile phone number, and you can improve the relevant network identification information (avatar, nickname and password), which is collected to help you complete the registration.

When you visit our website, you can browse and search anonymously, but you need to register as a news network user before you can use collection, likes, comments, forwarding and other user services.

B. You can also use a third-party account to log in and use China Labor and Social Security News Network. You will authorize us to obtain the public information (avatar, nickname and other information authorized by you) registered on the third-party platform for binding with the user account, so that you can directly log in and use this product and related services. We will use your relevant information within the scope of your authorization. In addition, we may share your account information (avatar, nickname and other information prompted on the page) with a third party after your consent, so that it is convenient for you to register or log in a third party account.

C. In order to ensure the consistency of functions or services, we may re-check the authorized and logged-in accounts and devices on the web side.

1.1.2 Password reset

A. You can receive SMS verification code, set a new password, confirm the new password and reset the password through the mobile phone number bound to your account.

B. Safety tip: Please ensure the safe use of the mobile phone number. If the mobile phone number cannot receive the SMS verification code and the password cannot be reset due to personal reasons, it will be borne by the individual.

C. In order to ensure account security, users are advised to update their passwords regularly.

1.2 Interactive communication

A. When you actively pay attention to and interact with the people’s social number you are interested in, and browse, comment, collect, like or share the content, we will collect the accounts you care about and show you the contents published by the accounts you care about.

B. When you share or receive the shared information and participate in activities, we need to visit your clipboard and read the passwords, sharing codes and links contained in it, so as to realize functions or services such as jumping, sharing and activity linkage.

1.2.1 Message notification

You know and agree that we may send multiple kinds of notices to one or more of your contact information (such as contact telephone number) provided by you in the process of using products and/or services for user message notification, identity verification, security verification, user experience investigation, dispute handling and other purposes; In addition, we may also provide you with commercial information such as services, functions or activities that you may be interested in by SMS or telephone, but please rest assured that if you don’t want to accept this information, you can unsubscribe through the unsubscribe method provided in SMS or directly contact us.

1.2.2 User feedback and service

A. Customer Service and Problems: In order to facilitate contact with you, help you solve problems or record solutions and results of related problems as soon as possible, we may keep your correspondence/call records and related contents (including account information, feedback information, order information, other information provided by you to prove relevant facts, or contact information you left behind). If you consult, complain or provide suggestions for specific businesses, we will use your account information and business information.

B. When you complain or are complained by others, in order to protect your and others’ legitimate rights and interests, we may provide your account number/identity information, contact information and complaint-related contents to the consumer protection department and the regulatory authorities, so as to solve the complaint dispute in time, unless it is explicitly prohibited by laws and regulations.

C. If you use the services of related parties and partners of China Labor and Social Security News Network through our products or services and make a complaint, you agree that we can obtain the personal information provided when you complain from the partner and synchronize it with the corresponding commodity/service provider so that the commodity/service provider can contact you effectively and handle your complaint in time.

D. Questionnaire survey: Other information about you that we may use in order to provide services and improve service quality, including the relevant information you provided when you contacted customer service and the questionnaire reply information you sent to us when you participated in the questionnaire survey; If you don’t want to, you can also refuse to participate in the questionnaire survey.

1.3 search

1.3.1 When you use the search service, we will collect your search keyword information and log information records for analysis so as to show you more relevant search results. Search results, hot list searches and related searches will be displayed according to your search/browsing, personal homepage information and log information.

1.3.2 We may also record the information provided, formed or retained by you when using our service, such as when you use search, you enter query words, click historical words, prompts and clicked links, or filter the search scope and time range, as well as the information submitted when you participate in search operation activities. You have the right to refuse to provide the above information, but this will cause you to be unable to use specific services or functions, or to achieve the intended effect of related services.

1.3.3 The search results include the information in China Labor and Social Security News website and the information of third-party websites. When you visit the third-party websites, your information may be collected by the third-party websites.

1.3.4 In order to provide efficient search service, some of the above information will be temporarily stored in your local storage device, and the content of search results and search history can be displayed to you.

1.4 Operation and security

1.4.1 Operation and safety

We are committed to providing you with safe and reliable products and use environment, and providing high-quality, efficient and reliable services and information is our core goal.

1.4.2 Equipment information and log information

A. In order to ensure the security of software services and your account, the quality and efficiency of service operation, we will collect your hardware model, operating system version number, device name, device configuration, international mobile device identification code, unique device identifier, network device hardware address, IP address, WLAN access point, Bluetooth, base station, software version number, network access mode, type, status, network quality data, operation, use and service. We may associate your equipment information or telephone number with your account of China Labor and Social Security News Network.

B. In order to prevent malicious programs, ensure service security and improve browsing experience, we will collect installed application information or running process information, the overall operation, usage and frequency of applications, application crashes, overall installation and usage, performance data and application sources.

C. In order to analyze the statistical indicators such as application addition, activation, retention and performance, we may call the clipboard to analyze the attribution of relevant statistical information. Please rest assured that we will not collect your private information.

D. We may use your account information, equipment information, service log information, and information that our affiliated units and partners can share with your authorization or according to law for judging account security, application startup activity, identity verification, detection and prevention of security incidents.

1.5 Changes in the purpose of collecting and using personal information

Please know that with the development of our business, the functions and services provided by China Labor and Social Security News Network may be adjusted and changed. In principle, when new functions or services are related to the functions or services we currently provide, the personal information collected and used will be directly or reasonably related to the original processing purpose. In a scenario that is not directly or reasonably related to the original processing purpose, we will collect and use your personal information, and we will inform you again in the form of page prompts, interactive processes and agreement confirmation according to the requirements of laws, regulations and national standards, and obtain your consent.

1.6 Exceptions with authorized consent

Please understand that under the following circumstances, according to laws and regulations and relevant national standards, we do not need to obtain your authorization and consent in advance to collect and use your personal information:

A related to our performance of obligations stipulated by laws and regulations;

B. directly related to national security and national defense security;

C directly related to public safety, public health and major public interests;

D directly related to criminal investigation, prosecution, trial and judgment execution;

E. It is difficult to obtain my authorization for safeguarding your or others’ life, property and other important legitimate rights and interests;

F. Personal information that you disclose to the public by yourself;

G necessary for signing and performing the contract according to the requirements of the subject of personal information;

H. Your personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

I. It is necessary for maintaining the safe and stable operation of software and related services, such as finding and handling the faults of software and related services;

J. necessary for legal news reporting;

K. For academic research institutions, it is necessary to carry out statistical or academic research based on public interests, and when the results of academic research or description are provided to the outside world, the personal information contained in the results is de-identified;

L. other circumstances stipulated by laws and regulations.

It is especially important to remind you that if the information cannot identify you personally alone or in combination with other information, it does not belong to your personal information in the legal sense; When your information can identify you individually or in combination with other information, or when we combine data that cannot be associated with any specific personal information with other personal information, these information will be treated and protected as your personal information in accordance with this privacy policy.

2. Use of Cookie and similar technologies

Similar technologies such as Cookie and device information identification are widely used in the Internet. When you use China Labor and Social Security News Network and related services, we may use related technologies to send one or more Cookie or anonymous identifiers to your device to collect, identify and store information when you access and use this product. We promise that Cookie will not be used for any other purposes than those stated in this privacy policy. We use Cookie and similar technologies mainly to achieve the following functions or services:

2.1 Ensure the safe and efficient operation of products and services.

We may set cookie or anonymous identifiers for authentication and security, so that we can confirm whether you log in to the service safely, or whether you encounter embezzlement, fraud and other illegal acts. These technologies will also help us improve service efficiency and speed up login and response.

2.2 Help you get an easier access experience.

Using this kind of technology can help you avoid repeating the steps and processes of filling in personal information and entering search content (for example, record search, form filling).

2.3 Recommend, show and push content or accounts that you may be interested in.

2.3.1 We may use Cookie and similar technologies to understand your preferences and usage habits, and conduct data analysis to improve products and services, recommend information or functions that users are interested in, and optimize your choice of advertisements.

2.3.2 In the sharing page of China Labor and Social Security News Network, we may use cookie to record browsing activities, which will be used to recommend information to you, troubleshoot related anomalies such as crashes and delays, and explore better service methods.

2.4 cookie removal

Most browsers provide users with the function of clearing the cached data of the browser, and you can clear the corresponding data in the browser settings function. If you clear it, you may not be able to use the services or corresponding functions provided by this website that rely on Cookie because of these modifications.

3. How do we share, transfer and publicly disclose personal information?

3.1 sharing

3.1.1 Sharing principle

A. Principle of authorization and consent: Your authorization and consent are required to share your personal information with our related parties and third parties, unless the shared personal information is de-identified, and the sharing third party cannot re-identify the natural person subject of such information. If related parties and third parties use information for purposes beyond the original authorized consent, they need to get your consent again.

B the principle of legality and minimum necessity: the data shared with related parties and third parties must have a legitimate purpose, and the data shared must be limited to the extent necessary to achieve the purpose.

C. Principle of security and prudence: We will carefully evaluate the purpose of sharing information with related parties and third parties, comprehensively evaluate the security guarantee ability of these partners, and require them to follow the cooperation legal agreement. We will strictly monitor the security of software tool development kit (SDK) and application program interface (API) to protect data security.

3.1.2 Realize sharing information of functions or services.

A. When you use the functions provided by our affiliated parties and third parties in China Labor and Social Security News Network, or when software service providers, intelligent equipment providers and system service providers jointly provide services for you, we will share the information necessary to realize business with these affiliated parties and third parties to recommend and show you specific functions, services or advertisements that are more suitable for you.

B. Login and bind other products: With your consent, when you log in to a third-party product or service with your account, or bind your account with other third-party accounts, we will share your nickname, avatar, attention, fans and other information authorized by you with the aforementioned products or services. When logging in with a third-party account, it may be necessary to write and read the necessary information in the clipboard. This information is only used for login-related purposes and will not collect your private information.

C. Creator of Renshe number: When you use the creator account of Renshe number, we will not share your personal information with other operators without your consent.

D. When you use the third-party applet service accessed by China Labor and Social Security News Network, the applet may use the relevant system authority authorized by you, or you may be required to submit personal information according to the applet function. We will provide the necessary information for this service to the third-party applet serving you according to your authorization. You can refer to the third-party service agreement or privacy policy, or you can withdraw your authorization in the applet.

E. Location service: When you use location-related services, we will share GPS information with location service providers (Gaode map) so that we can return location results to you. When you use search to query weather-related services, we may share GPS information with weather service providers to provide you with more accurate weather services in the region. GPS information is sensitive personal information, and refusing to provide it will only affect the geographical location service function, but will not affect the normal use of other functions.

3.1.3 Realize the sharing of information related to advertisements.

A. Advertising Push and Placement: We may share information with our partners who promote and place advertisements, but we will not share information (name and ID number) that can identify you personally. We will only provide these partners with indirect portrait labels that can’t identify you personally, as well as equipment, network and channel information after de-identification or anonymization, so as to help them improve the effective advertising reach rate without identifying you personally. You can refuse us to push programmatic advertisements to you without affecting your use of other functions or services of China Labor and Social Security News Network.

B. Advertising statistics: We may share the statistical information of analysis and de-identification with service providers, suppliers and other partners, which is difficult to be associated with your identity information, and will help us analyze and measure the effectiveness of advertisements and related services.

C. You can refuse us to push programmatic advertisements to you, without affecting your use of other functions or services of China Labor and Social Security News Network.

3.1.4 Realize the sharing of information between safety and analysis and statistics.

A. Ensure the safety of use: We attach great importance to a good environment for accounts, services and network information services. In order to protect the legitimate rights and interests of you and other users and maintain the information network environment, we may share necessary equipment, account numbers and log information with related parties or service providers.

B. Analysis of product usage: In order to analyze the usage of our services and improve the user experience, we may share the de-identified data such as product source and usage (crash, flashback, usage time, etc.) with related parties or third parties, which is difficult to identify your personal identity by combining with other information.

C. Academic research and scientific research: In order to improve the scientific research ability in related fields and promote the level of scientific and technological development, we may share unmarked or anonymous data with scientific research institutes, universities and other institutions on the premise of ensuring data security and proper purpose.

3.2 Transfer

3.2.1 We will not transfer your personal information to any other third party unless we get your express consent.

3.2.2 With the continuous development of our business, it will be possible for us to merge, acquire and transfer assets, and your personal information may be transferred as a result. In the event of the above changes, we will ask the receiving party to protect your personal information in accordance with laws and regulations and the security standards not lower than those stated in this privacy policy, otherwise we will ask the receiving party to obtain your authorization again.

3.3 disclosure

3.3.1 We will not disclose your information publicly unless we comply with national laws and regulations or get your consent. We will adopt security protection measures that meet industry standards when we publicly disclose your personal information.

3.3.2 We will disclose the relevant account information when we announce the punishment for illegal account and fraud, or we may disclose your account information according to laws and regulations, platform agreement or with your consent because you violate the relevant agreements and rules of China Labor and Social Security News Network, or to protect the personal and property safety of China Labor and Social Security News Network or the public.

3.3.3 Your publicly released works and concerns will be displayed on your personal homepage.

3.4 Exception of obtaining prior authorization when sharing, transferring or publicly disclosing personal information.

Please understand that under the following circumstances, according to relevant laws, regulations and national standards, we don’t need your prior authorization to share, transfer and publicly disclose your personal information:

A. It is related to our performance of obligations stipulated by laws and regulations and industry authorities, or it is necessary to solve lawsuits and disputes, or it is required by administrative and judicial organs according to law;

B. directly related to national security and national defense security;

C directly related to public safety, public health and major public interests;

D directly related to criminal investigation, prosecution, trial and judgment execution;

E. It is difficult to obtain the consent of yourself for safeguarding your or others’ life, property and other important legal rights;

F. Personal information that you disclose to the public by yourself;

G collecting personal information from legally disclosed information, such as legal news reports, government information disclosure and other channels.

4. How do we store personal information?

4.1 Storage location

In accordance with laws and regulations, we will store your personal information collected and generated in the course of domestic operations in People’s Republic of China (PRC). At present, we will not transmit the above information overseas. If we transmit it overseas, we will strictly abide by the relevant laws and regulatory policies of China, and will follow the relevant national regulations or seek your consent.

4.2 Storage life

We only keep your personal information for the period necessary for the purpose of providing China Labor and Social Security News Network and services: we will keep relevant information such as information, comments, likes, collections, etc. when your account has not been withdrawn, deleted or cancelled. We will delete or anonymize your personal information beyond the necessary time limit, unless otherwise stipulated by laws and regulations.

5. How do we protect the security of personal information?

5.1 We attach great importance to the security of your personal information, and will strive to take reasonable security measures (including technical and management aspects) to protect your personal information and prevent the personal information provided by you from being improperly used or being accessed, publicly disclosed, used, modified, damaged, lost or leaked without authorization. At present, China Labor and Social Security News Network has passed the evaluation and filing of national information security level protection (level II).

5.2 We will protect your personal information by using encryption technology, anonymous processing and relevant reasonable and feasible means, and use security protection mechanism to prevent your personal information from malicious attacks.

5.3 We will establish a special security department, security management system and data security process to ensure the security of your personal information. We adopt a strict data use and access system to ensure that only authorized personnel can access your personal information, and conduct security audits on data and technology in a timely manner.

5.4 Although the above-mentioned reasonable and effective measures have been taken and the standards required by relevant laws have been observed, please understand that due to technical limitations and possible malicious means, in the Internet industry, even if we do our best to strengthen security measures, it is impossible to always ensure the security of information. We will try our best to ensure the security of personal information you provide us.

5.5 You know and understand that the system and communication network you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of personal information, including but not limited to using complex passwords, changing passwords regularly, and not revealing your account password and related personal information to others.

5.6 We will formulate an emergency response plan, and start the emergency plan immediately when there is a user information security incident, and strive to prevent the impact and consequences of these security incidents from expanding. Once a user information security incident (leakage or loss) occurs, we will inform you in time according to the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions that you can prevent and reduce risks independently, and the remedial measures for you. We will inform you of the events in a timely manner in the form of push notifications, emails, letters, short messages and related forms. When it is difficult to inform them one by one, we will make an announcement in a reasonable and effective way. At the same time, we will also report the handling of user information security incidents in accordance with the requirements of relevant regulatory authorities.

5.7 Once you leave "China Labor and Social Security News Network" and related services and browse or use other websites, services and content resources, we will have no ability and direct obligation to protect any personal information submitted by your software or websites other than China Labor and Social Security News Network and related services, regardless of whether you log in, browse or use the above software or websites based on the links or guidance of "China Labor and Social Security News Network".

6. Manage your personal information

We attach great importance to your management of personal information, and do our best to protect your rights related to access, correction, deletion, withdrawal of consent authorization, cancellation of account, complaints and reports of your personal information, so as to enable you to protect your privacy and information security. Please note that there may be differences in operation settings between different operating systems and different versions of China Labor and Social Security News Network software; In addition, in order to optimize your experience, we may also adjust the operation settings, so the following guidelines are for reference only.

6.1 Personal Information Access and Management

China Labor and Social Security News Network not only provides personalized information, but also provides rich additional functions and services. We set up individual information management guidelines for users to inform and guide users on how to manage their personal information.

6.1.1 You can query and access your mobile phone number, registration time, social platform account binding, and login equipment through "User icon in the upper right corner"-"Edit Information" on the homepage of China Labor and Social Security News Network.

6.1.2 You can modify your password and bound mobile phone number and email address through "Account Security".

6.1.3 You can inquire about your collection and dynamic records through the Personal Homepage.

6.1.4 You can query, delete and empty your search history with one click through "Search Records".

6.1.5 You can query and delete your collection records through "Collection".

6.1.6 You can query and delete your comments and likes through "Dynamic".

6.2 Description of Personal Information Collection and Management

6.2.1 Personal information that you can’t access: In addition to the information listed above, we can’t provide you with access services for some of your personal information, which is mainly about your equipment information collected to improve your user experience and ensure the security of transactions, and personal information generated when you use extended functions. We will use the above information within your authorization, and you can’t access it, but you can contact us to delete it or anonymize it.

6.2.2 When you find that your personal information is wrong, you have the right to ask us to make corrections or supplements. You can apply for correction or supplement in the way listed in "Editing Materials". It is especially important for you to note that due to security and identification (such as number complaint service), you may not be able to modify some initial registration information submitted at the time of registration. If you really need to modify this kind of registration information, please contact us according to the contact information specified in this privacy policy.

6.2.3 In the following cases, you can ask us to delete personal information:

A. If our handling of personal information violates laws and regulations;

B. If we collect and use your personal information without your consent;

C. If our handling of personal information violates our agreement with you;

D. if we stop service and operation.

Personal information deletion: refers to the act of removing personal information from the system involved in daily business functions, so that it can not be retrieved and accessed. When you or we assist you to delete the relevant information, we may not be able to delete the corresponding information from the backup system immediately because of the restrictions of applicable laws and security technologies. We will securely store your personal information and restrict any further processing until the backup can be cleared or anonymized.

6.3 Change or withdraw the scope of authorization

6.3.1 Change or withdraw account binding

A. You can unbind a third-party account in the User’s Avatar-Account and Security interface;

B. You can also unbind the account of China Labor and Social Security News Network on the interface where the third-party account is located, depending on the functions set by the third-party platform.

6.3.2 Information processing of changing or withdrawing authorization

Specific business functions and services will require your information to be completed. After you withdraw your consent or authorization, we can no longer provide you with the functions and services corresponding to the withdrawal of consent or authorization, and we will no longer process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect the personal information processing previously carried out by this website based on your authorization.

6.4 account cancellation

You can apply for account cancellation in "Account Security" of China Labor and Social Security News Network. Before you cancel your account, we will verify your personal identity, security status and equipment information. For the process and contents of cancellation, please refer to the Cancellation Agreement. You know and understand that the cancellation of your account is irreversible. When you cancel your account, we will delete your relevant information or anonymize it, except as otherwise stipulated by laws, regulations and relevant national standards.

6.5 Respond to your needs

In the following cases, according to the requirements of laws and regulations, we will not be able to respond to your request:

A related to our performance of obligations stipulated by laws and regulations;

B. directly related to national security and national defense security;

C directly related to public safety, public health and major public interests;

D directly related to criminal investigation, prosecution, trial and execution of judgments;

E. There is sufficient evidence to show that the subject of personal information has subjective malice or abuse of rights;

F. It is difficult to obtain the authorization and consent of the person for the purpose of safeguarding the major legitimate rights and interests such as the life and property of the personal information subject or other individuals;

G responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals and organizations;

H. involving trade secrets.

6.6 Complaints and reports

You can make a complaint or report according to our publicity system. If you think that your personal information rights may be infringed, or you find clues that infringe your personal information rights (for example, you think that our collection of your personal information violates the law or the agreement between the two parties), you can contact us, and we will feedback your complaints and reports in time after verification.

6.7 Access Privacy Policy

6.7.1 You can view all the contents of this privacy policy on the registration page or through the www.clssn.com website.

6.7.2 Please understand that the "China Labor and Social Security News Network" and related services mentioned in this privacy policy may be different according to the model of mobile phone, system version, software application version, mobile client and other factors. The final products and services are subject to the "China Labor and Social Security News Network" software and related services you use.

6.8 Stop operation and inform you.

China Labor and Social Security News Network is willing to accompany you all the time. If we stop operating, we will stop collecting your personal information in time, notify you of the notice of stopping operation one by one, and delete or anonymize your personal information.

7. Minors clause

7.1 We attach great importance to the protection of personal information of minors. According to relevant laws and regulations, if you are a minor under the age of 18, you should read and agree to this privacy policy under the supervision and guidance of your parents or other guardians before using China Labor Security News Network and related services.

7.2 We protect the personal information of minors in accordance with relevant national laws and regulations, and only collect, use, store, share, transfer or disclose the personal information of minors when permitted by law, explicitly agreed by parents or other guardians or necessary for the protection of minors; If we find that personal information of minors has been collected without the prior consent of verifiable guardians, we will try to delete the relevant information as soon as possible.

7.3 If you are the guardian of a minor, if you have any questions about the personal information of the minor under your care, please contact us through the contact information published in this privacy policy of the company.

8. Revision and notification of privacy policy

8.1 In order to provide you with better services, China Labor and Social Security News Network and related services will be updated and changed from time to time, and we will revise this privacy policy in a timely manner. These revisions constitute a part of this privacy policy and have the same effect as this privacy policy. Without your explicit consent, we will not reduce your rights under this privacy policy that is currently in effect.

8.2 After this privacy policy is updated, we will issue an updated version on China Labor and Social Security News Network, and remind you of the updated content through the official website (www.clssn.com) announcement or other appropriate means before the updated terms come into effect, so that you can know the latest version of this privacy policy in time.

9. Contact us

9.1 China Labor and Social Security News Network is provided by China Labor and Social Security Newspaper. If you have any complaints, suggestions or questions about the protection of personal information, you can send them to (ldbwlb@163.com), and we will feedback your complaints and reports in time after checking and verifying your user identity.

9.2 If you have any questions, comments or suggestions about the contents of this privacy policy, you can contact us by logging in to the "About Us" entrance on the homepage of the official website of China Labor and Social Security News Network (www.clssn.com).

Liu Shuoyang: a female doctor in the army who contributed to national defense and the army with a pen.

Liu Shuoyang (data map)

Cctv news  "I don’t want to fall, but I want to guard my country. I don’t want to fall, but I don’t want to see my comrades fall. The motherland needs me, and rushing up is a necessary answer for soldiers. The people need me, go up and use the never-retreating pace. "

This poem is forceful, expressing the author’s persistent love for the motherland and the people, and the responsibility and responsibility of a soldier to defend the country. Unexpectedly, however, the author of this poem was a young woman.

In February 2017, the first China National Defense Economics Person of the Year selection campaign was announced. Associate Professor Liu Shuoyang, director of the Economic Management Teaching and Research Section of the Basic Department of the Armed Police Academy, was elected as the first China National Defense Economics Person of the Year and was awarded the title of China Young National Defense Economist, becoming the only young economist in this national selection campaign and the first young economist in the Armed Police Force to receive this honor. The opening poem was written by Liu Shuoyang in tears when he saw the former battlefield after he went to Laoshan to see the school.

Some things may just be destiny takes a hand. When Liu Shuoyang was one year old, her mother made her a small military cap, hoping that Liu Shuo would grow up and become a female soldier and realize her unfulfilled long-cherished wish. In the college entrance examination, although he could choose a local key university, Liu Shuoyang applied for the military school without hesitation. This firmness and persistence were out of "love from the bones". Liu Shuoyang said: "I think I should be a soldier by nature."

He joined the army in September 1996, joined the Party in June 1999, and graduated from National Defense University with a doctorate in economics. He is currently the director and associate professor of the Economic Management Teaching and Research Section of the Armed Police Academy, a senior researcher of the China National Defense Finance Research Association, and a member of the National Security Strategy and National Defense Economic Research Committee of the China Social and Economic System Analysis Research Association. He was awarded the third class merit once, 14 times and 5 times as an excellent teacher. During his study in National Defense University, he was rated as an advanced individual in National Defense University, an outstanding student in National Defense University and an advanced individual in scientific research twice. His papers and consulting reports have won many major military and international awards, and have been given important instructions by the central leaders twice, and the suggestions made have entered the decision-making of the party and the state.

 

Courageously shouldering heavy burdens and diligently cultivating in the front line of teaching

Liu Shuoyang, as the director and associate professor of the Economic Management Department of the Armed Police College, has been working in the front line of teaching for 16 years. In the past 16 years, Liu Shuoyang has devoted himself to teaching, and his courses have been widely praised, and his efforts have also been widely recognized by leaders and students. Due to his outstanding achievements, Liu Shuoyang took the leadership position in the teaching and research section of economic management at the age of 29, and served as the deputy director of the teaching and research section, responsible for the work of the teaching and research section. He became the youngest leader of the teaching and research section of the whole college at that time and took on the heavy responsibility of leading all comrades in the teaching and research section to forge ahead.

The Police Academy of the Armed Police Force is an institution that trains talents for the gold, forest, hydropower and transportation forces of the Armed Police Force. In view of the particularity of the task requirements of the Armed Police Force, Liu Shuoyang led the Economic Management Teaching and Research Section to carry out a series of drastic reforms in terms of teaching staff, teaching material system, curriculum and teaching quality, and the overall construction of the Teaching and Research Section has reached a new level.

The practice of beating and tempering has cultivated Liu Shuoyang, and her teaching level and ability are constantly improving. In 2010, Liu Shuoyang participated in the "China-Tianjin-High" training and teaching competition of the Armed Police Force and won the second prize. In 2012, he won the third place in the teaching basic skills competition for young and middle-aged teachers in the college. Due to his outstanding teaching achievements, Liu Shuoyang has been rated as an excellent teacher for five times. In 2010, at the age of 31, Liu Shuoyang was promoted to associate professor and became the youngest associate professor in the college.

"When I was an associate professor, I was still relatively young. At that time, I just felt that the burden on my shoulders was heavier. Only by redoubling efforts can we live up to the trust of leaders and comrades, and only by making more contributions can we be worthy of the cultivation of the organization. " Liu Shuoyang said.

Striving hard to overcome difficulties is at the forefront of national defense economic research

"The academic achievements are fruitful and the scientific research ability is outstanding." It is the unanimous evaluation of Liu Shuoyang’s scientific research work and level by leaders and comrades. During his doctoral studies at National Defense University, Liu Shuoyang’s scientific research ability and level have further achieved a qualitative leap.

In recent years, Liu Shuoyang has completed a series of important scientific research tasks. After integration of defense and civilian technologies became a national strategy, Liu Shuoyang paid attention to the follow-up study on the major theoretical and practical issues of integration of defense and civilian technologies’s in-depth development, and published a series of important articles in People’s Daily Internal Reference, Xinhua News Agency’s Domestic Dynamic Sample and other important newspapers and periodicals. Among them, two important articles, "Private enterprises’ participation in integration of defense and civilian technologies’s in-depth development needs urgent support" and "Our in-depth development in integration of defense and civilian technologies needs to be guided and standardized", were given important instructions by Comrade Ma Kai, member of the Political Bureau of the Communist Party of China (CPC) Central Committee and vice premier of the State Council, in 2014 and 2016 respectively, which entered the decision-making of the party and the state and made important contributions to promoting "people’s participation in the army". As a result, Liu Shuoyang became the first student in the National Defense University, and so far, the only one whose consulting report has won important instructions from the party and state leaders twice, and was commended by the National Defense University.

In October 2014, with the approval of the Central Military Commission, our army fully implemented military performance management. Liu Shuoyang closely followed the progress of the military performance management pilot, conducted in-depth investigation and research in the pilot units, found problems from practice, analyzed the causes of the problems with theory, and explored solutions. In 2015, he published the important article "Difficulties in Military Performance Management Need to Be Solved" in Xinhua News Agency’s Domestic Dynamic Sample Cleaning, and delivered it to the head of the Military Commission and the former head of the General Logistics Department as a special delivery, which entered the decision-making of the headquarters and made important contributions to promoting the pilot work of military performance management, and was highly praised by the heads and organs.

Liu Shuoyang’s doctoral thesis "Research on Performance-oriented Internal Control System of Military Expenditure" puts forward the idea of establishing performance-oriented internal control system of military expenditure, and constructs the main content and realization path of performance-oriented internal control system of military expenditure, which was awarded as an excellent doctoral thesis of National Defense University.

Since the 18th National Congress of the Communist Party of China, the Supreme Leader, Chairman of the Central Military Commission, has made a series of important expositions on the development of national defense economy. With full political enthusiasm and rigorous style of study, Liu Shuoyang deeply studied Chairman Supreme Leader’s thoughts on national defense economy, and successively published such important articles as "Fundamentals of Promoting China’s National Defense Economic Development", "A New Chapter of the Party’s Guiding Theory for National Defense Economic Development" and "Grand Strategy for Promoting National Defense Economic Development" in top journals such as China Military Science and Military Economic Research, which made important contributions to the deepening of the research on Comrade Supreme Leader’s thoughts on national defense economy.

Hard work has borne rich fruits. In recent years, Liu Shuoyang has published more than 60 academic papers in People’s Daily, Economic Daily, study times, China Military Science, Journal of National Defense University, Journal of Equipment Institute, Military Economic Research, Logistics Academic, integration of defense and civilian technologies and other newspapers, and completed more than 10 national social science funds and provincial and ministerial key projects. In the past three years, Liu Shuoyang’s scientific research achievements have successively won the National Defense University Excellent Scientific Research Achievement Award, the National Defense University Excellent Works Award for Writing and Speaking, the first prize of the "Hanjiang Forum" international seminar organized by the Military Economic Research Center of the China People’s Liberation Army, the first prize of the annual project established by the National Defense Economic Research Center of the National Defense University, the first prize of the doctoral academic forum of the whole army, and the "China ‘ Frontier of national defense economy ’ Young scholars and postgraduate academic forum "second prize and other academic awards for more than 10 times.

"Scientific research is very boring, but scientific research is also very interesting and very fulfilling. As a soldier, I failed to serve the motherland on the battlefield, hoping to contribute to national defense and army building with a pen. " Liu Shuoyang said.

Liu Shuoyang, a doctor who is tireless in teaching and scientific research, is also a fighter who is tenacious and brave in the training ground; She is a gentle and elegant woman, but also a determined and strong soldier. She is not only conscientious in her teaching post, but also fruitful in her scientific research achievements, and she is equally eager for military quality. "Xiao Liu was the first female commander to compete in the training ground of National Defense University, and she led the queue class twice and won the first place", "Teacher Liu is the 100-meter fast girls of our college". Her leaders and students said so.

Can’t be red and delicate, and a uniform is even more heroic; Can’t gallop the battlefield, and a pen can also build national defense. Although Liu Shuoyang is just an ordinary female doctor in the army, she is holding up the mission of strengthening the army with loyalty, writing the feelings of strengthening the army with perseverance and practicing the dream of strengthening the army with hard work!

Key words of autonomous driving in 2024: end-to-end, first share, cost performance.

In 2024, the field of autonomous driving ushered in an unprecedented capital boom. The continuous upgrading of Tesla FSD system and rumors of entering China, like a shot in the arm, have stimulated the market’s infinite reverie of end-to-end autonomous driving technology. The capital market responded quickly, and many self-driving companies in China rushed to the market. Horizon, Wen Yuan Zhixing, Xiaoma Zhixing, Youjia Technology and other companies successfully listed on the Hong Kong Stock Exchange and the US stock market, and the financing and valuation of the self-driving industry continued to rise.

The rise of end-to-end autonomous driving technology

In 2024, autonomous driving technology ushered in the upsurge of end-to-end autonomous driving. Tesla has become a leader in this field with the continuous upgrading of its FSD system. Tesla’s version of FSDV12 introduced a brand-new end-to-end neural network architecture, which realized full automation from perception to vehicle control. The subsequent version of FSDV13.2 further improved the user experience and realized the "point-to-point" automatic driving function. The breakthrough of this technology not only makes Tesla shine in the North American market, but also paves the way for it to enter the China market soon.

At the same time, Huawei, Ideality, Momenta and other companies have also actively deployed in the field of end-to-end autonomous driving. Huawei Gankun has released a high-level Gankun ADS3.0 version that supports intelligent driving in urban areas, and an ADSSE version that can realize high-speed navigation assistance and basic intelligent parking. From 2.0 to 3.0, the intelligent driving ability has been optimized a lot, and many new specific functions have been added, such as NCA traffic around the island, NCA roadside parking function, lateral anti-collision avoidance function, and anti-collision function by mistake. Tramway has experienced a variety of models equipped with Huawei Gankun Intelligent Driving ADS3.0 this year. Among them, the most impressive one is Zhijie S7, which can park in the underground parking lot, find parking spaces and park them without driving, and can also complete the operations of courtesy to pedestrians, reversing and avoiding by itself.

On October 23rd this year, LI announced the industry’s first new generation of dual-system intelligent driving scheme, end-to-end +VLM full push. Then on November 28 th, the intelligent driving from the ideal parking space to the parking space took the lead. In less than a month, the 2024 Ideal AI Talk forecast: the whole scene of high-speed cities will be upgraded to end-to-end +VLM, and will be fully pushed to AD Max users on December 31. Accompanying with the "end-to-end" of the ideal, it has achieved phased results, and for the long-term technical pre-research, the ideal has also adjusted the organizational structure of its own intelligent driving team. Recently, in the face of media interviews, Li Xiang even talked about AI Kan Kan. He regarded artificial intelligence as "the whole of the future", and thought that the appearance of large models would fundamentally change human beings. End-to-end +VLM would break the "inertia thinking" that users used to use smart driving, and let consumers truly realize that smart driving is no longer an "unnecessary choice" but an "optimal solution" for travel life.

"Extreme cost performance" smart driving products are favored.

Consumers’ demand for intelligent driving products is no longer limited to functional perfection and advanced technology, and the level of cost performance has also become an important consideration for their choice.

In order to meet the changes in the smart driving market, Mimo has released three "extremely cost-effective" intelligent assisted driving products, HP170, HP370 and HP570, which fully meet the mass production needs of high, medium and low-priced smart driving models. At present, the second-generation HPilot’s extremely cost-effective NOH smart driving products have entered the delivery state one after another.

On November 29th, Mi Mi Zhixing celebrated its fifth anniversary. According to the internal letter, the company’s intelligent driving products have been equipped with more than 20 models, and the mileage of intelligent driving has exceeded 250 million kilometers, providing services for more than hundreds of thousands of car owners; In the past five years, the average price of bicycles in the industry has been reduced from several hundred thousand yuan to several tens of thousands yuan, which has helped the intelligent upgrading of the logistics industry and delivered nearly 900,000 orders for express delivery, supermarkets and other logistics scenes in China. In terms of technology research and development and product landing, we will continue to increase investment in research and development, ensure that the second-generation smart driving products at the end of the year are delivered at a fixed point in mass production, create an urban map-free NOA scheme with the best cost performance in the industry, and achieve full coverage of the whole country.

DJI Zhijia has successfully opened up the market with the strategy of "extremely cost-effective". DJI has greatly reduced the cost of high-level intelligent driving system through its innovative "in-line platform", which makes the technology that only appeared in high-end models in the past more and more popular in the low-end market. DJI Intelligent Driving System, based on pure vision scheme and independent of high-precision maps and lidar, can realize L2+ intelligent driving function on 100,000-150,000 vehicles. Such cost control not only helps the car factory reduce the production cost, but also promotes the popularization of intelligent driving technology.

Capital feast of self-driving track

In 2024, more than a dozen self-driving companies have submitted listing applications or have been listed. It can be found that self-driving companies have ushered in a "capital feast". On January 5, 2024, Sagitar Juchuang was officially listed and became the "first share of lidar" in Hong Kong stocks. Since the second half of this year, such as Qi Chuxing, Black Sesame Smart, Horizon, etc. have been listed on the Hong Kong Stock Exchange. The latest information shows that Youjia Innovation started its IPO on December 17, and plans to officially list on the Hong Kong Stock Exchange with "2341.HK" as the stock code on December 27.

With the help of many companies including autonomous driving companies, the amount of new share financing of the Hong Kong Stock Exchange has increased significantly this year. According to the data of Deloitte China, as of December 31st, 2024, it is estimated that 69 new shares will be raised in Hong Kong, which is about HK$ 87.6 billion. Compared with HK$ 46.3 billion raised by 70 new shares in 2023, the number of new shares decreased by 1%, while the total amount of financing increased by 89%. In 2024, while the mainland’s new stock market slowed down, more Chinese-funded enterprises went public in the United States and raised more funds. About 53 Chinese companies will raise $1.843 billion, compared with 34 companies raising $855 million in 2023. In 2024, China enterprises listed in the United States, Kykrypton, Wen Yuan Zhixing and Xiaoma Zhixing ranked in the top three.

It’s about health code! Don’t be fooled, look quickly.

  A new scam of health code has appeared.

  99% of people may be fooled!

  Recently, many people have been cheated. Now it is the period of epidemic prevention and control, and health code and nucleic acid certificate are both essential documents. However, the liar has reached out to the nucleic acid detection, so everyone must be vigilant. The routine is as follows:

  1. Are you a "close contact"?

  Fraudsters pretend to be epidemic prevention workers and send phishing link messages to victims, falsely claiming that the victims are close contacts of the confirmed persons in COVID-19, and inducing the victims to click on the links to fill in their personal information. Then, on the grounds that the recent big data travel card has been visited too much and there is a system failure, the SMS verification code is requested to confirm the travel trajectory, and then the money is defrauded.

It's about health code! Don't be fooled, look quickly.

  2. Your courier was tested positive for COVID-19.

  The fraudster phoned you under the guise of "Express Customer Service", falsely claiming that your courier was tested positive for COVID-19 and was destroyed, but you can apply for compensation. After you added a "customer service" friend, the scammer sent you a fake "official website" and induced you to fill in personal payment information to steal your funds. There is still a big pit waiting for you to jump in. Liars induce you to take a loan, transfer the money to the fraudster’s account, and defraud money on the grounds that your payment credit is insufficient, the settlement channel is not opened, and the compensation cannot be received.

  3. Promote specific drugs in COVID-19.

  Criminals pretend to be government departments, pharmaceutical research (medical) institutions, etc., and sell them by making phone calls and sending text messages, falsely claiming that there are "specific drugs" for epidemic prevention, and inducing victims to go to phishing links to buy them, thus obtaining personal bank information and stealing bank balances.

It's about health code! Don't be fooled, look quickly.

  4. Your health code is abnormal.

  The fraudsters pretended to be epidemic prevention and control staff, lied that the victim’s health code was abnormal, and asked the victim to go to the public security organ for verification as soon as possible. After the victim believed it, he offered to transfer the phone to the "Public Security Bureau" for online investigation. Later, the "public security personnel" said that during the inspection trip, they found that the victim had several abnormal economic transactions, which were suspected to be related to a money laundering case, and asked the victim to cooperate with the investigation and check the funds to clear the suspicion, thus defrauding money.

  Police reminder

  1. Please don’t click on unknown links and scan all suspicious QR codes easily, so as to avoid entering phishing websites by mistake and revealing personal information.

  2. The epidemic prevention staff will not ask for bank card account number, password, verification code and other information. If you have any doubts about "flow adjustment" and "health code", please contact the neighborhood Committee and the police station for help.

  3. When you receive a so-called "customer service" call and encounter problems such as package loss compensation, you must carefully verify the identity of the other party through the official platform and consult and confirm the relevant situation.

  4. Public security organs will not handle cases by telephone or internet, and there is no so-called "safe account".

  5. If you are cheated, please keep the evidence and call 96110 for the first time.

It's about health code! Don't be fooled, look quickly.

Source: Hainan Special Zone Daily

Independent research and development of "grinding a sword for ten years" is only for blind people to see pictures and texts.

  People’s Daily Online, Beijing, March 12 (Reporter Ding Yixin) "The touch is good, very uniform, and there is no odor." This is Liu Lili, the Paralympic Integration Manager of the Biathlon Center of this Winter Paralympic Games, who has heard the most comments from foreign athletes on the Chinese and English versions of the venue introduction manual. "Many foreign friends are interested in this in the past two days. Nearly 20 handbooks have been kept in the original venue, because many people want to keep them as souvenirs, and there are only three left at present."

  Origin: Kindness ignites the "spark" of Braille.

  Different from ordinary Braille printed matter, this manual adopts the new green Braille printing technology independently developed by China Academy of Sciences, which has better touch, antibacterial and environmental protection. Song Yanlin is the main person in charge of this technology.

  After entering the Chinese Academy of Sciences for 24 years, Song Yanlin did not study Braille printing at first. About ten years ago, he heard a little girl singing in the street and was immediately touched by the lyrics. "Later, I learned that the song was called" You are my eye "and it was about the blind." It was from then on that Song Yanlin wondered if he could do something for this group with his major.

  Born in chemical research, he aimed at the direction of Braille printing. Traditional braille printing equipment has many disadvantages, such as dependence on imports, high printing cost and easy wear. If we can break through these problems and lower the threshold of braille printing, it will bring more convenience.

  Breakthrough: Solving the Problems of Academia for Decades

  With this goal in mind, Song Yanlin and his team began to study for nearly ten years. "In fact, we spend most of our time solving some basic scientific problems that have not been broken. For example, the Marangoni effect is also a difficult problem that the academic community has discussed for decades. " By solving these scientific problems, they accurately control the formation of various patterns of ink droplets, realize the fine patterned assembly of nano-functional materials "points, lines, surfaces and bodies", and break through the accuracy limit of traditional printing technology.

  Song Yanlin and his team were boiling after learning that they could produce related products for the Beijing 2022 Paralympic Winter Games. "Of course! What we did was originally used in blind schools, and now it can be displayed on a larger world stage. Everyone is looking forward to it and is under pressure. " For this team, this is not only a job, but also a continuation of love and goodwill.

  Now, the original small wish has not only come true, but also entered the stage of international competitions, and Song Yanlin is also very proud. "Serving the Winter Olympics, helping the disabled with science and technology, different Winter Olympics, different warmth." He wrote such a copy in a circle of friends.

  Future: Let blind friends enjoy convenience in more scenes.

  "Friends who haven’t been exposed to Braille don’t know that traditional Braille feels hard and has a pungent smell. It is easy to wear and tear after a long time, and its life is not long." Song Yanlin told reporters that in order to provide more targeted help, he would also try to blindfold himself to experience the feeling of blind people reading. "When you close your eyes, your sense of smell will be particularly sensitive and the smell will be more obvious." Chemistry is Song Yanlin’s old job. His team designed special materials to make the ink not only have no irritating smell, but also increase the fragrance.

  However, the ingenuity of scientific researchers does not stop there. Even after they have achieved the precise formation of ink droplets and broken through many difficult problems in academic circles, they are not satisfied, but want to extend this technology to more application scenarios.

  Traditional Braille is printed on special high-strength fiber paper by metal washing, which is not only expensive, but also limited by materials, so it is difficult for Braille to get more applications.

  Regarding the process of braille printing, Song Yanlin gave an example of coffee stains: a drop of coffee will spread when the solid surface is dry, forming a point with thick edges and uneven middle. "This process is uncontrolled, but in our technology, by controlling the interaction between the surface of the substrate and the droplets, the whole drying behavior is controlled and accurate printing is realized. In this way, almost all kinds of solid surfaces you think of can be printed in Braille. "

  In this way, Song Yanlin and his team are also drawing a bright future blueprint for Braille printing. "In the future, Braille printing will become a more universal technology. At present, many parties have contacted us and want to add Braille tips to the packaging of food and medicine to help blind friends better integrate into society. "

Good business environment, convenient logistics and transportation, and fast payment … The "magnetic attraction" of the China market is getting more and more sufficient

CCTV News:Yiwu, Zhejiang, known as the "world supermarket", is the largest small commodity distribution center in the world, with more than 15,000 overseas merchants from more than 100 countries and regions resident in Yiwu. They worked hard here and brought China’s goods to all parts of the world. On March 27th, we met an entrepreneur from Niger, an African country, and listened to his entrepreneurial story.   

Ding En is a trader from Niger, Africa. This year is the 13th year that he started his business in Yiwu. Compared with when he first came here, he bought goods alone in Yiwu International Trade City. Now he has started as a "shopping guide" for foreign customers.

Today, Ding En can be said to be a "star boss" in the trade city, and he can meet friends and merchants he knows almost every few steps. For more than 10 years, the good local business environment in Yiwu has also helped Ding En’s entrepreneurial development. The policy of facilitating foreigners’ stay and stay, promoting the payment convenience of overseas personnel, and improving the foreign-related government service platform have all made Ding En feel the warmth of home.

Ding En, head of a foreign trade company in Yiwu, Zhejiang, said, "They will call Chinese to help us do business, and our relationship is very good. I started my business alone, but now there are more than 20 employees working for me. "

Ding En said that as long as customers need it, they can buy anything in Yiwu. Now his foreign trade company is involved in the export of daily necessities, industrial products and other commodities, and its business has expanded to 16 countries in Africa, and it can export more than 300 containers every year, and he is also planning to arrange a larger warehouse for himself.

At present, Yiwu has gathered more than 6,000 Africans from more than 40 countries. Ding En has also grown from a young man who used to look for the direction of life in the vast grasslands of Africa to the president of the Yiwu African Chamber of Commerce, bringing more African partners to "pursue dreams".

Ding En said, "Every day, people call us to ask questions about China, how to make plans, how to apply for visas, how to pay, and how to buy air tickets to do business in China. (I think) if you choose to do business all over the world, you should choose China. "

Yiwu, Zhejiang: Convenient logistics attracts more foreign businessmen to flood into diversified modes of transportation to help trade.

In Yiwu, Zhejiang, there are many foreign entrepreneurs like Ding En. The good local business environment has made their business grow, and the convenient logistics and transportation have also made their business touch the world.

Chen Long, a trader from Germany, has been doing foreign trade with his wife in China for 7 years, and the goods are mainly sold to Germany, Russia, Brazil, Argentina and other countries. He told reporters that the convenient logistics and transportation in China has made his business bigger and bigger.

In the interview, the reporter learned that the logistics and transportation in Yiwu are becoming more and more diversified, such as railway, sea, air and sea-rail combined transport & HELIP; … All these give trade more choices. This year is the tenth year of the China-Europe train in Yiwu, and the transportation scope has covered more than 50 countries and more than 160 cities abroad.

At the starting station of the China-Europe train in Yiwu, Zhejiang, a train has set off, loaded with auto parts, solar panels, daily necessities and other items, which can reach Europe in 17 days.

In order to ensure the timely delivery of export commodities, railway transportation has also been upgraded intellectually and digitally.

At present, Yiwu Central Europe Train has brought more than 2 million kinds of goods to all parts of the world. In order to meet the market demand, new transportation routes are constantly expanding.

In addition, the "LCL" mode of Yiwu CEIBS also allows more small orders to be exported smoothly.

In the customs clearance of logistics, the implementation of the early tax rebate policy has also effectively eased the pressure of capital circulation of trading enterprises and stimulated market vitality.

Fire is rare! Hundreds of large-scale mountain fires are burning in the United States and many people are killed.

       CCTV News:Continue to pay attention to the mountain fires in America. In the past few days, under the influence of drought, strong wind and high temperature weather, mountain fires have raged in many States in the western United States. At present, California, Oregon and Washington, which are located on the west coast of the United States, are still the States with the most serious fires.

       San Francisco, California is one of the big cities most affected by mountain fires. At noon on the 9th local time in San Francisco, the landmark Golden Gate Bridge could have overlooked the San Francisco skyline, but now it has almost disappeared into the smoke. Although it is noon, it is already very dark, and the whole city is completely like night. Under the orange sky, you can see that the cars on the road are all lit, and the shops on both sides of the road are also brightly lit. The mountain fire lasted for many days, and local residents were also concerned about the progress of the fire. Many people stood on the street to take pictures.

one

one

one

       The total area of fire in 12 States is equivalent to the whole of New Jersey.

       According to the data released by the National Inter-departmental Fire Center on the 11th, at present, hundreds of large-scale mountain fires are burning in 12 states in the western United States, with an area of 18,400 square kilometers, equivalent to the whole area of New Jersey. More than 28,000 firefighters and support personnel are carrying out fire fighting operations. According to USA Today’s website, at present, mountain fires have caused at least 26 deaths, including at least 20 deaths in California, 5 deaths in Oregon and 1 death in Washington State.  

one

       In California, there are still 24 large-scale mountain fires burning, 68,000 people have received evacuation orders and more than 3,900 buildings have been destroyed. On the 11th, California Governor gavin newsom said that the rare fire is evidence of global warming and climate change.

       500,000 people in Oregon received an evacuation order.

       In addition to California, many mountain fires in Oregon, Washington and other States are also extremely serious. The fire threatened people’s lives and a large number of people were forced to evacuate.

one

       Oregon Governor Brown said on the 11th that the state’s fire area has exceeded 4,000 square kilometers. In addition to the dead, dozens of people are still missing. It is expected that the death toll will continue to rise. At present, 500,000 people in Oregon have received evacuation orders, more than 10% of the state’s total population, and 40,000 of them have been evacuated. Oregon emergency management officials said on the 11th that they were preparing for a possible "mass death".

one

       Governor of washington Insley said on the 11th that in the past five days, the state’s fire area exceeded 2,500 square kilometers. Insley once again said that such a serious fire is not normal and is the result of climate change caused by human activities.

       In the three states on the west coast where the fire was the most serious, smoke covered the sky. On the 11th, in San Francisco, Seattle, Portland and other cities, air pollution caused by mountain fires was further aggravated. Public health experts advise residents to stay at home, close doors and windows, and use air purification equipment. Some experts suggest setting up "air pollution shelters" for the homeless, but some experts worry that gathering places will trigger the further spread of the COVID-19 epidemic.

       Three one-year-old babies were killed in a Washington state family.

       According to American media reports, on the 8th, a couple in Washington State tried to escape from a mountain fire with their one-year-old son. Because of the fierce fire, they abandoned their car and escaped halfway. When rescuers found them the next day, the child was dead and the couple was severely burned.

one

       Jacob Hylander and Jamie Hylander are a young couple who usually live in Renton, King County, Washington. Last weekend, Mr. and Mrs. Hylander took their one-year-old son to their house in rural Okanagan County for a holiday. Because of their remote location and no cell phone signal, they probably didn’t receive the mountain fire warning, and when they found the mountain fire coming, it was too late. The family fled by car at midnight on the 6th. On the morning of the 9th, search and rescue personnel found them on the banks of the Columbia River. At that time, both husband and wife suffered third-degree burns, and their son Yuri showed no signs of life.

       A similar tragedy happened in Oregon. On the 8th, in Marion County, Oregon, Wyatt tofte, a 13-year-old boy, and his grandmother Peggy Moso were also killed by the fire. Wyatt’s mother Angela was also burned all over her body and was seriously injured.

Disrupting, swearing, playing funeral music … The intrusion of online classes in many places has attracted the attention of network police.

  Recently, the information about the invasion of online courses in many places has attracted much attention.

  According to Beijing Youth Daily, on September 5th, students of Shenyang Institute of Urban Construction, Liaoning Province were maliciously intruded by others while surfing the Internet, and swiping the screen "I love you, teacher" disturbed the classroom order. Chengdu Business Daily-Red Star News reporter noticed that students in many places in China said that they had been invaded by online classes: when students were surfing the Internet through Tencent conferences, nails and other platforms, some strangers suddenly poured into the live broadcast room, some people abused teachers and students, some people played funeral music, and even distributed obscene pornographic videos.

  Fu Jian, a lawyer of Henan Yulong Law Firm, said that in the online class, he publicly insulted others, derogated from others’ personality, and was suspected of infringing on the right of reputation, and was also suspected of violating the Law on Public Security Administration Punishment; If you distribute obscene pornographic videos, you are suspected of spreading obscene articles, and the criminal responsibility of the disseminator should be investigated according to law.

  Who’s involved?

  Some netizens set up QQ group to exchange "invasion experience"

  On September 7th, the reporter used "online class explosion" and "online class invasion" as the key words, and found on several social platforms that many netizens with domestic IP addresses said that they were inexplicably invaded by strangers during online class, and the intruders interfered with the class and made many excessive things, such as opening wheat to make noise, insulting students and teachers, playing funeral music, telling obscene jokes and distributing obscene pornographic videos. Some online classes will suddenly break into 20 or 30 people, who use the names of some online hot words or famous stars as ID names and publish some unbearable remarks.

  The reporter used "meeting" as the key word to search for groups on QQ, and immediately joined several QQ groups. The reporter found that people in QQ group often send Tencent meetings or nail the meeting number and password, and some group friends directly forward the meeting link in the group. Click on the link to see that the group name is "Meeting Room of Class Four, Grade Two" and so on.

  One of the more active groups, the group administrator often sends such a paragraph: "You can’t provoke the teacher in the live broadcast room, you can ignore the teacher. No yellowing (pictures, videos) and no abuse. Play and play, make trouble, don’t make fun of the law. "

  A group friend told reporters that he had been playing "online class invasion" for three days and shared his "experience" — — When you enter the online class, you don’t want to make pornographic pictures, swear, or go too far. You can play songs. If the teacher calls the police, you should leave the meeting quickly, so you don’t have to worry about being investigated by the police or being banned.

  In these so-called intruders’ QQ groups, friends in the group will chat and exchange information about the invasion, take pictures or videos of their own invasion and send them to the group, and some people will send online class information to the group for everyone to join … … The reporter noticed that in a QQ group of this kind, a netizen named "Xiaofei" is very active. If a netizen reminds students in the group not to invade online classes in Grade Three or Grade Three, he will speak and say, "What does it matter if they can’t get into high school and college?" He said that he had dropped out of school.

  Up to now, some QQ groups have been dissolved, and reporters have reported the remaining QQ groups one by one.

  Online students:

  It may be a classmate who leaked the meeting number and password.

  Xiao An, a sophomore in Sichuan, told reporters that he was very angry because his class was also invaded on September 5. At that time, they were having a class, and suddenly two or three people came in, forced to turn on the microphone, or played music or abused teachers and students. The intruder also said that some students in the class posted the meeting number and password on the social platform, and they saw the information before entering the conference room.

  The intruder stayed in Xiao ‘an’s class for more than 10 minutes, so the teacher had to turn off the microphones of all the staff. These people went to the chat area to insult the students. Xiao An said that the online class meeting number and password can now be searched on some social platforms, and some people leaked the information at will. In Xiao ‘an’s view, it may be students who leak information, perhaps for fun or because they don’t want to study.

  Teacher Wu, a high school teacher in a school in Sichuan, told reporters that she knew that three colleagues had been invaded while surfing the Internet through the nail platform recently. Many intruders will burst into the classroom inexplicably, either talking nonsense or talking nonsense on the public screen. In the class of one of Mr. Wu’s colleagues, dozens of people suddenly poured into the online class meeting room, all smoking with bare arms.

  Teacher Wu said that it is wrong for intruders to do this for whatever reason. She hopes that these meeting numbers and meeting passwords are not provided by students. In order to prevent the invasion of online classes, Ms. Wu also spent time studying how to take online classes. For example, she prefers to set permissions through Tencent meetings. But this also has disadvantages. If the host doesn’t notice that a student has entered the meeting, this person will not be able to attend the meeting in time.

  Public security organs:

  Attention has been paid to the phenomenon of online course intrusion.

  The reporter noticed that the network police in Shenzhen and Tianjin have voiced through Weibo, saying that they are concerned about the invasion of online classes.

  The media reporter also consulted the customer service of several online live broadcast platforms, and some customer service responded that "in this case, you can submit a report and feedback" and "no relevant complaints have been received at present. If the situation is true, the platform will ban the relevant accounts".

  The reporter noted that as early as the beginning of 2020, WeChat official account, the official WeChat of the Network Security Bureau of the Ministry of Public Security, had issued a document stressing the safety of online classes. It is mentioned that all kinds of educational mobile Internet applications (referred to as educational apps) are booming, but they also increase the original security risks. The online "cloud classroom" has become an important channel for the majority of primary and secondary school students to learn online during the epidemic prevention and control period. However, some online class platforms in primary and secondary schools pop up advertisements during class, and even appear illegal and harmful information such as pornographic gambling, which seriously undermines the online education and teaching order and infringes on the physical and mental health of minors.

  The network security department of the public security organ helps the online classroom, actively cooperates with the education authorities, strengthens safety supervision according to their duties, organizes all parties to carry out safety protection, and cracks down on illegal and criminal acts according to law. The public security organs will resolutely investigate and deal with the acts of publishing and disseminating illegal and harmful information related to pornography and gambling. We will crack down on suspected criminal offences according to law, fully purify the online environment, and earnestly safeguard network security.

  Zhao Zhanling, a lawyer of Beijing Yunjia Law Firm, said that the legal liability of the participants in the online class invasion mainly depends on their specific behaviors. If the intruder insults teachers and students, it may only constitute a civil tort and infringe on the reputation rights of teachers and students. If you play obscene articles, you may be suspected of a criminal offence. It is not illegal or criminal to disturb the classroom by talking more and playing music, but it is not suitable on the moral level.

  Fu Jian, a lawyer of Henan Yulong Law Firm, said that in the online class, he publicly insulted others, derogated from others’ personality, and was suspected of infringing on the right of reputation, and was also suspected of violating the Law on Public Security Administration Punishment; If you distribute obscene pornographic videos, you are suspected of spreading obscene articles, and the criminal responsibility of the disseminator should be investigated according to law.

  (The names in the text are all pseudonyms except Fu Jian and Zhao Zhanling.)

  Chengdu Business Daily-Red Star Journalist Chen Qingyuan