标签归档 乐上海 2021魔都新茶论坛

通过admin

Central Meteorological Observatory: There will be heavy rainfall again in Beijing, Tianjin and Hebei today, and there will be continuous rainfall in Northeast China in the next three days.

  CCTV News:The Central Meteorological Observatory issued a daily weather warning. The Central Meteorological Observatory continued to issue a blue rainstorm warning this morning. In the next 24 hours, the Beijing-Tianjin-Hebei region will be affected by the eastward movement of the westerly trough, and there will be a heavy rainstorm in the local area. The specific rainfall areas are in central and southern Hebei, southern Beijing and Tianjin. The main rainfall period is from the afternoon of the 11th to the morning of the 12th. Due to the high overlap with the areas affected by the previous rainstorm, it is reminded to strengthen prevention and do a good job of defense.

  In addition, this year’s No.6 typhoon "Kanu" landed in Korea around 10 am yesterday. Affected by its peripheral cloud system, yesterday, heavy rains occurred in parts of northeast Jilin and eastern Heilongjiang, and heavy rains (100 ~ 152 mm) occurred in Yanbian, Jilin and Qitaihe, Heilongjiang. There are 6 ~ 8 gusts in Liaodong Peninsula and eastern Shandong Peninsula. This morning, the intensity of Kanu was obviously weakened. However, in the next three days, the residual cloud system of Kanu will be combined with the westerly trough, bringing continuous rainfall to the Northeast. In the coming week, the northeast region will show a state of rainy and few photos.

  Today, from day to night, there are heavy rainstorms in parts of southwestern and eastern Heilongjiang, southern Jilin, northeastern Shanxi, central and southern Hebei, southern Beijing, Tianjin, Guanzhong area of Shaanxi, southeastern Gansu, southwestern Sichuan Basin, southern Yunnan, southwestern Guangxi, most of Guangdong, southwestern Fujian, northern and southwestern Hainan Island, etc. Among them, there are heavy rains in central Hebei, southwestern Sichuan Basin, and southeastern Guangxi coastal areas (100. There are 4 ~ 6 winds and gusts 7 ~ 8 in parts of southern and eastern Heilongjiang, eastern Jilin, Liaoning and Shandong Peninsula.

  On 12-13, there will be moderate to heavy rain, local heavy rain or heavy rain in central and eastern Heilongjiang, central and eastern Jilin and eastern Liaoning, and the public should take precautions against secondary disasters caused by heavy rain; Rainfall in other parts of the country tends to weaken.

通过admin

Oppose data hegemony and improve data security governance ability

  [insight]

  Author: Tian Linan (Assistant and Associate Professor, Dean of Law School, People’s Public Security University of China)

  In the information age, under the background that data is an important factor of production, social wealth and strategic resources, some western countries, led by the United States, pursue "data hegemony" and act as the "data police" of the whole world, making great efforts to double standards and be exclusive in data open flow and protection blockade. We should adhere to the overall national security concept, be alert to data hegemonism, constantly improve data security governance capabilities, defend data sovereignty, and promote foreign-related rule of law.

  one

  In 2018, the United States passed the Clarifying the Legal Use of Data Abroad Act (hereinafter referred to as the "Cloud Act"), which directly aims to solve the problem of cross-border data retrieval in the case of "United States v. Microsoft Corporation" and empower the US government to require electronic communication and remote computing service providers to disclose the domestic and foreign data of users under their control; The deeper purpose is to expand the jurisdiction of the United States over data and expand the right of the United States to obtain overseas data. On the surface, this kind of acquisition right is two-way. For example, in 2019 and 2021, the United States signed the "Cloud Act" agreement with Britain and Australia respectively. However, this two-way is extremely severely restricted. The United States can force its enterprises to provide data collected and stored in any country according to the "Cloud Act", but if other countries want to access data in the United States, they will be restricted by the "Cloud Act". It must not only meet more than ten harsh conditions of "qualified foreign government", but also pass several rounds of review in the United States and finally be decided unilaterally by it; Even if the agreement is signed, the procedure of obtaining data from the United States is extremely complicated and long, and there is a risk of being rejected at any time. It can be seen that in the acquisition of data resources, the United States implements "long arm jurisdiction" over other countries’ data; In terms of data sovereignty, the United States implements double standards; In "data diplomacy"In fact, the United States pursues data hegemony.

  In fact, American "data hegemonism" is no longer news, and the predecessor of "data police" is "data theft". At least since 2007, the National Security Agency has been implementing the top secret electronic monitoring program "Project Prism" to provide data for the president’s daily briefing. After being exposed in 2013, countries have accused the United States of stealing other countries’ data and eroding other countries’ sovereignty, but the United States still does not give up "data hegemony." On the one hand, the United States makes great efforts to promote data to flow into the country. For example, the "Three-Country Agreement between the United States, Mexico and Canada" signed in 2020 ostensibly ensures the free transmission of data across borders, and actually facilitates the flow of data to the United States; Legislation such as the Health Insurance Circulation and Responsibility Act, the Financial Services Modernization Act, and the Family Education Rights and Privacy Act in the United States have given the corresponding data extraterritorial enforcement power. On the other hand, the United States tries its best to prevent data from flowing out. For example, in 2020, the United States adopted the so-called "Clean Network Plan", which further restricted data from being accessed by foreign countries and "non-Americans" through national security exceptions while "de-China" data software and hardware. In addition, the "made in America" goods are transported to other countries, accompanied by user and environmental data collection, and there is no doubt whether they will be provided to the US government.

  two

  Data hegemonism is often disguised as equality, cooperation, freedom, democracy, rule of law, security and so on, which is somewhat confusing. Beware of data hegemony and say no to it, we must recognize its essence, form and harm.

  The essence of American data hegemony is "American priority" and data colonialism. After political hegemony, military hegemony, economic hegemony, cultural hegemony, public opinion hegemony and scientific and technological hegemony, the United States began to promote data hegemony. Data hegemony is a new form based on the integration of many former forms, and it pays special attention to the combination and application with technological hegemony. In-depth analysis of data will be derived far beyond the value of data itself, and even play a great role in manipulation. The power to control data not only involves leading the development of big data, artificial intelligence, 5G, Internet of Things and cloud computing, but also includes the comprehensive utilization of personal privacy, social dynamics and even state confidential information. After being monopolized by one country, it will lead to the seizure of other countries’ wealth, ideological control, even regime subversion and national slavery.

  Data hegemony is not only manifested in long-arm jurisdiction legislation, bilateral or multi-party agreements, but also in the form of unilateral or joint sanctions and malicious control. The United States and its allies are playing the "data security" card, discrediting some scientific and technological products in China and being suspected of stealing data. If they all threaten national security, Huawei and its 70 affiliated companies will be included in the US "entity list" ban; Later, it was also said that the UAV made in China had data risk, and issued a "threat warning" to China equipment. In fact, with regard to industries such as China’s 5G technology and artificial intelligence, the United States shows not so much hegemony in technology or data as only allowing "one dominant company" to panic in technology or data.

  Data hegemony hinders countries from realizing data interests and sharing the dividends of scientific and technological progress, and even harms national sovereignty, resulting in the retrogression of pluralistic and stable world order. Data hegemony such as "preemptive sovereignty" and "exclusive possession" has nothing to do with international justice, but only serves American self-interest; It has nothing to do with global common development, but only to safeguard American hegemony. The United States will impose its own data standards on others, suppress other countries, and "prosper and perish", which will limit and deprive countries of data sovereignty, network sovereignty and even national sovereignty. In particular, the vast number of developing countries will lose the opportunity to develop the digital economy and make use of the advantages of backwardness, and the uneven development of the world will intensify.

  three

  China is not a "data hegemonic country", but it must not become a "data vassal country". To oppose data hegemony and defend data sovereignty, we should uphold the data concept of equal data sovereignty, safe data flow, and desensitized data sharing and governance, and explore data governance rules that can win the recognition of the widest countries.

  Establish a data security concept. General Secretary of the Supreme Leader pointed out that "there is no national security without cyber security" and "national data security must be effectively guaranteed. It is necessary to strengthen the security protection of key information infrastructure, strengthen the national key data resource protection capability, and enhance the data security early warning and traceability capability. " Data security is the foundation of cyberspace security, which involves not only individual information rights and property rights, but also group interests and national security. In 2020, the Government of China launched the Global Data Security Initiative, which promoted the formulation of global data governance rules based on the principle of respecting the sovereign equality of cyberspace and the concept of building a community of human destiny. China’s data security is different from the "data risk prevention" of data hegemony, which often makes unwarranted accusations and carries out targeted so-called blockade and sanctions. China’s data security concept adheres to the overall national security concept, aiming at establishing and improving the data security governance system and improving the data security guarantee capability.

  Establish a view of data sovereignty. General Secretary of the Supreme Leader pointed out that "the principle of sovereign equality established by the Charter of the United Nations is the basic norm of contemporary international relations, covering all fields of state-to-state exchanges, and its principles and spirit should also be applied to cyberspace". As a special type of network sovereignty, data sovereignty should be established as well. China has always been a staunch advocate and supporter of network sovereignty, and opposes data long-arm jurisdiction, because it belongs to expansive jurisdiction with no basis in international law, and ignores one country’s judicial or law enforcement sovereignty and even interferes with other countries’ sovereignty. In 2015, the Action Plan for Promoting the Development of Big Data issued by the State Council expressed "data sovereignty" at the official level for the first time, demanding to enhance the ability to protect cyberspace data sovereignty and safeguard national security.

  Protect local data, standardize cross-border data flow, and achieve a balance between the two. We oppose data hegemony, and at the same time give consideration to data security and free flow through data classification management, partial data localization, and partial data exit security review. The Measures for Network Security Review, which came into effect on February 15th, 2022, added provisions on data processing activities and data security review for network platform operators who have a large number of personal information listed abroad, so as to prevent China users’ data from becoming a tool for other countries to analyze and monitor China. This is not only a manifestation of data sovereignty, but also conducive to ensuring the safe flow of data to the maximum extent. At the same time, it is helpful to support the data security law, network security law, personal information protection law, etc., and build a sound data security governance system.

  Promote the rule of law concerning foreign affairs in data. General Secretary of the Supreme Leader pointed out that "the global governance system is in a critical period of adjustment and change, and we should actively participate in the formulation of international rules and be participants, promoters and leaders in the process of global governance reform". At present, when dealing with cross-border data flow, developed countries are the dominant rule makers. We should speed up the strategic layout of foreign-related data rule of law work, take the fundamental interests of China and the common interests of most countries as the basic starting point, and at the same time consider the combination point with the rules of developed countries, actively influence, participate in and even lead the formation of the international governance framework of data rules, so as to achieve an equal and mutually beneficial data governance pattern. At the same time, actively promote the formulation of bilateral agreements and multilateral treaties on data, and drive the transformation to a global cooperative governance model with more regional rules.

通过admin

Interpretation of Red Flag H6 Configuration 2.0T+ Automatic Manual Integration (AT)

Nowadays, the first thing for consumers to buy a car is to see whether this car is rich in configuration, and it is no exception to nature. So whether this car is a mule or a horse, let’s take a look at its actual performance.

First of all, from the appearance, the design of the front of Hongqi H6 is quite individual and looks very cold. The headlights are very in line with the aesthetics of consumers, and the visual effect is still good. The car is equipped with LED daytime running lights, front fog lights, automatic opening and closing, adaptive far and near light, delayed closing and so on. Coming to the side of the car body, the size of the car body is 4990 mm * 1880 mm * 1455 mm. The car adopts avant-garde lines, and the side wall feels very sharp. With large-sized thick-walled tires, the overall visual effect is very unique. In the design of the rear end, the overall shape of the rear end of Hongqi H6 echoes the front end. The taillights look fashionable and atmospheric, and with the unique exhaust pipe, they are very calm.

Sitting in the car, the interior looks very simple and the overall design is very domineering and stylish. The steering wheel of the car is eye-catching, made of real leather, carbon fiber/suede, and its practicality and face value are not bad. From the central control point of view, with the 12.6-inch touch-sensitive LCD central control screen, the interior design is quite layered, and the overall design of the central control is very good. Let Xiaobian introduce the dashboard and seats. The dashboard design is remarkable and very eye-catching. The car uses a leather /Alcantara mixed seat, which is spacious and thick, with exquisite materials and comfortable ride.

Hongqi H6 is matched with an automatic manual transmission (AT) gearbox, with a maximum power of 185KW and a maximum torque of 380N.m, with good power performance.

In addition, the car is equipped with car networking, driving mode selection, remote control key, interior atmosphere light, engine start and stop and other configurations.

Do you have a lot of ideas after reading today’s story? The car introduced today is not only eye-catching in space, but also has reached the mainstream level in various configurations, and there is nothing to be picky about driving experience and space experience.

通过admin

Implementing the national cyberspace security strategy requires strengthening the security protection of key information infrastructure.

Liu Duo, Dean of China Information and Communication Research Institute.

In today’s world, network information technology is changing with each passing day, and it is fully integrated into political, economic, cultural, social, ecological, national defense and other fields. The network security situation is complex and severe, and the security risks and threats are increasingly prominent. Recently, the National Network Information Office issued the National Cyberspace Security Strategy, which aroused widespread concern from all walks of life. The Strategy implements the "Four Principles" of the Supreme Leader General Secretary on promoting the reform of the global Internet governance system and the "Five Propositions" on building a community of cyberspace destiny, and clarifies China’s major position on the development and security of cyberspace, which is the overall guide and fundamental follow-up of China’s cyberspace security work under the new situation. The Strategy points out that the protection of critical information infrastructure is a basic requirement and an important task for maintaining the national cyberspace security, and it is necessary to pay equal attention to technology and management, and to protect and deter at the same time, and effectively strengthen the security protection of critical information infrastructure.

First, strengthening the protection of key information infrastructure is of great significance.

National key information infrastructure refers to information facilities related to national security, national economy, people’s livelihood and public interests, including basic information networks such as public communication, radio and television transmission, important information systems in energy, finance, transportation, education, scientific research, water conservancy, industry, medical and health care, social security, public utilities and other fields, as well as important Internet application systems. Key information infrastructure is the artery of economic and social operation, and strengthening security protection is the top priority of network security work.

The information network is developing in the direction of high speed, mobility, security and ubiquity, and its position and role in economic and social development are increasingly prominent. In recent years, China’s network infrastructure capacity has been significantly improved, and the popularization of a new generation of high-speed networks has been accelerated. The transmission rate of optical fiber networks has reached 400Gb per second, and that of 4G wireless networks has reached more than 100Mb per second, covering all cities and major towns. Research on 5G and ultra-wideband technologies has been further advanced; Cloud data centers and big data industries are booming; The Internet of Things is widely used, and more and more devices and terminals are connected to the information network. The network information technology is deeply integrated with power grid, highway network and railway network, and the intelligent comprehensive information infrastructure with internet of everything, ubiquitous perception and integration of air and space is accelerated, which greatly improves the networking, digitalization and intelligence level of economic activities and effectively promotes economic and social development.

With the deep integration of network information technology and economic society, the threat of network security is spreading from online to offline, and the security risk of economic and social development is increasing. China’s key information infrastructure is facing greater risks and weak network security prevention and control capabilities, making it difficult to effectively deal with national and organized high-intensity cyber attacks. Once attacked, it may lead to major network security incidents, even traffic disruption, financial turmoil, power paralysis, and seriously threaten economic and social security and even national security. This is not only a problem faced by China, but also a common problem faced by countries with relatively high level of informationization in the world.

Strengthening the protection of key information infrastructure has become a common choice for all countries to ensure economic and social security. At present, more than 60 countries have issued cyberspace strategies, and regard key information infrastructure as an important object of network security. Recently, the United States has successively issued "Cyberspace Strategy" and "National Action Plan for Cybersecurity", emphasizing the importance of security protection of key information infrastructure and advocating the strategic concept of both offensive and defensive. The European Union issued the "Network and Information Security Directive", requiring key information infrastructure operators such as energy and transportation to take necessary security measures.

Two, China’s key information infrastructure security work steadily.

The CPC Central Committee and the State Council attached great importance to the safety protection of key information infrastructure. Under the unified leadership of the Central Network Information Leading Group, all relevant departments accelerated the construction of legal system, strengthened safety supervision and management, and improved safety technical standards. The safety protection of key information infrastructure in China has achieved initial results.

(1) Laws and regulations have been gradually improved. One isThe promulgation of "National Security Law" takes the lead in putting forward clear requirements for the autonomous control of key information infrastructure, and provides legal guarantee for the management, protection and inspection of key information infrastructure.The second isThe promulgation of the Network Security Law has raised the security protection of key information infrastructure to the national strategic level. The Cyber Security Law further clarifies the category of national key information infrastructure, stipulates the division of responsibilities and accountability methods for the security protection of key information infrastructure, and makes institutional arrangements for key information infrastructure construction requirements, operator obligations, security review, data storage, risk detection and evaluation, etc.The third isInitiate the revision of "Administrative Measures for Communication Network Security Protection" to further improve the overall level of China’s communication network security and enhance the ability to prevent and protect network security incidents in view of new situations and new problems.

(2) The management system has been continuously improved. One isWe carried out nationwide network security inspection of key information infrastructure, continuously strengthened risk assessment and security prevention of key information infrastructure, and especially strengthened the investigation of security risks of important information systems in lifeline industries such as finance, electricity and transportation, and achieved remarkable results.The second isImprove the network security review system of various industries, conduct network security review of important information technology products and their providers entering the Chinese market, ensure product safety and controllability, and guard against security threats such as illegal control and backdoor loopholes.The third isVigorously carry out pilot demonstrations of network security in the telecommunications and Internet industries, play a typical leading role, guide basic telecommunications enterprises, Internet enterprises and security enterprises to increase investment in network security, and enhance their ability to respond to network security threats.

(3) Technical capabilities have been effectively improved. One isFormulate industry security standards. The telecommunications and Internet industries have formulated and completed more than 60 communication network security protection standards, including "Fixed Communication Network Security Protection Requirements". Finance, energy and other industries have also issued information system security level protection standards, effectively improving the security protection ability and level of industry information systems.The second isImprove the security protection technology level of key information infrastructures such as vulnerability mining, intrusion detection and virus prevention, and focus on breaking through new security technologies such as network mapping and attack traceability, and further enhance the anti-interception, anti-attack and recovery capabilities of key information infrastructures.The third isIn view of new technologies and services such as mobile Internet, big data, cloud computing and industrial Internet, we have formulated special security protection strategies and issued a series of standards to improve the level of protection technology.

At the same time, China’s key information infrastructure security protection still faces challenges that cannot be underestimated, mainly in the following aspects: the core technology is subject to people, and the potential security risks are huge; The protection system of key information infrastructure is still not perfect, and the ability system of government-enterprise linkage, monitoring, early warning, response and recovery needs to be improved; The research and development of defense technology related to information infrastructure is in the primary stage; Network security talents can not better meet the development needs.

Third, further enhance the security protection capability of key information infrastructure.

Protecting critical information infrastructure is one of the nine strategic tasks established in the National Cyberspace Security Strategy. It is necessary to focus on the overall goal of building a network power, take the overall national security concept as a guide, enhance risk awareness and crisis awareness, coordinate the relationship between security and development, openness and autonomy, highlight the dynamic and comprehensive protection concept, and strive to improve the security protection level of key information infrastructure.

(1) Strengthen the foundation and promote safety through industrial development.Development is the greatest security, and we should effectively enhance the supply capacity of network facilities and services and the innovation and development capacity of technology industries.One isAccelerate the evolution and upgrading of infrastructure, implement the strategy of "Broadband China" in depth, accelerate the construction of all-optical networks and a new generation of mobile communication networks, and build a high-speed ubiquitous cyberspace that integrates heaven and earth.The second isStrengthen independent innovation of core technologies. We will promptly break through key core technologies such as core devices, high-end chips and operating systems, and advance the development and industrialization of new technologies such as 5G, industrial Internet, high-performance computing and artificial intelligence.The third isImprove the self-control level of key software and hardware products. Strengthen the guidance of policy funds, give full play to the role of market mechanism, promote the demonstration and application of domestic software and hardware products, cultivate a number of leading enterprises with industrial integration capabilities, and expand their own brands.

(2) Take multiple measures to ensure safety with the protection system.Safety is the premise of development, and a long-term protection mechanism is formed by comprehensively using legal system, administrative supervision and other means.One isIn combination with the promulgation of the Cyber Security Law, we will revise existing laws and regulations, speed up the introduction of supporting systems such as key infrastructure protection, data security management and network security review in various industries, and improve the infrastructure security standard system.The second isFurther promote the protection of key information infrastructure, clarify the principles, objectives and institutional measures for the protection of key information infrastructure, improve the network security protection system with hierarchical protection and dynamic adjustment, and formulate supporting systems for the registration, filing and updating of key information infrastructure assets.The third isPromote network security review, strengthen the safety management of industrial supply chain, and conduct security review of important information technology products and services used by party and government organs and national lifeline industries to eliminate security risks.

(three) both offensive and defensive, with technical means to support security.In view of the new problems and risks caused by new technologies and services on the Internet, we should strengthen the research and application of network security technology.One isStrengthen the monitoring and disposal of cyber threats, improve the overall dynamic perception, early warning and protection, and emergency response capabilities, strengthen joint attack and joint defense and threat information sharing, and promote the construction of cross-industry and inter-departmental infrastructure security threat information sharing platforms.The second isUse advanced technologies such as big data and cloud computing to strengthen correlation analysis and improve emergency response capabilities.The third isImprove the ability of key protection technologies such as intrusion detection, anti-virus and vulnerability mining, and pay special attention to the research and development of killer and asymmetric technologies.

(4) Serving the overall situation and strengthening safety with talent teams.Talent is the first resource. The competition in cyberspace is, in the final analysis, talent competition.One isOptimize the network security talent echelon, formulate the network and information security talent training plan, form a talent training mechanism combining higher education with social training, and build a talent echelon with sufficient personnel, excellent quality, professional support and reasonable structure.The second isEstablish a flexible talent incentive mechanism, promote the reform of the property rights system, income distribution system and transformation mechanism of scientific and technological achievements, break the unreasonable constraints on talents, and build a globally competitive talent system.The third isPromote international talent exchange and cooperation, strengthen the intelligence of high-tech talents, and attract more overseas leading talents and talents in short supply. Support high-end talents in the field of network information security to carry out academic exchanges such as cutting-edge technologies and standards overseas.

通过admin

499 yuan can realize the whole house Mesh networking! Xiaomi whole house routing evaluation: completely say goodbye to the dead corner of the signal

First, preface: Xiaomi launched a new whole house routing Mesh networking scheme to solve the pain point of signal dead angle.

With the popularity of WiFi 6, more and more families have upgraded their routes just to enjoy the extremely fast networking experience.

However, based on the characteristic that the higher the speed in the 5GHz band, the worse the wall penetration. If the home is loaded with walls, ceilings or floors, the signal loss will be obviously attenuated. For example, if you change rooms, the mobile phone is playing games or brushing videos, there will be obvious jams and disconnections. At this time, you have to use 2.4GHz to connect.

However, 2.4GHz is now in a relatively saturated state, and it has also become the hardest hit area. Bluetooth mouse, Bluetooth headset, smart home, microwave oven and other devices may cause channel congestion.Under such circumstances, the stability performance of 2.4GHz is even worse than that of traffic surfing, and the experience is very worrying.

In fact, in order to achieve the effect of whole house coverage, it is only necessary to build a Mesh network, which is also the most popular whole house coverage scheme at present.

The Xiaomi whole house wireless router received by Fast Technology is the protagonist we want to test.

499 yuan can realize the whole house Mesh networking! Xiaomi whole house routing evaluation: completely say goodbye to the dead corner of the signal

Mesh, as a complete set of distributed network solutions, is also a solution with low barriers for users to get started. Its advantages are very clear: simple networking, seamless roaming handover, and free addition of sub-routes to realize regional wireless enhancement.

Xiaomi whole house routing supports self-developed Mesh technology, which can be networked by wired, wireless and mixed methods, and can also form a unified whole house network with many Xiaomi /Redmi routers.

In terms of specifications, this router supports WiFi 6 technology, and provides a total of 5 Gigabit wired network ports (4 mother routes and 1 child route), while wireless supports a large bandwidth of 160Hz, with 4 independent antennas, and the maximum theoretical wireless rate of 2.4GHz and 5GHz dual-frequency concurrency is 2976Mbps.

The positioning of Xiaomi’s whole house routing is an entry-level WiFi 6 router. This configuration can be said to be full of sincerity.

Next, let’s take a look at the performance of this Xiaomi whole house route in terms of signal, coverage and experience.

499 yuan can realize the whole house Mesh networking! Xiaomi whole house routing evaluation: completely say goodbye to the dead corner of the signal

Second, the appearance: pure white appearance, fashion and simplicity, and all the mother and son routes have built-in four antennas.

499 yuan can realize the whole house Mesh networking! Xiaomi whole house routing evaluation: completely say goodbye to the dead corner of the signal

Xiaomi’s whole house routing adopts mother-child design, all of which are pure white+square shape, which continues Xiaomi’s simple but not simple design as always.

The bus route with a slightly larger size is 89.5 × 89.5 × 213.5 mm; The child routing size is 89.5×89.5×153.7, which is slightly smaller.

This sub-and-bus route has built-in four antennas, which all use 1GHz CPU and 256MB memory, and all support 2×2 2.4GHz Wi-Fi and 2×2 160MHz 5GHz Wi-Fi.

After being powered on, the 1 mother and 1 child can automatically network in 0 steps, which greatly reduces the trouble for users to manually change the configuration.

499 yuan can realize the whole house Mesh networking! Xiaomi whole house routing evaluation: completely say goodbye to the dead corner of the signal

499 yuan can realize the whole house Mesh networking! Xiaomi whole house routing evaluation: completely say goodbye to the dead corner of the signal

The above picture shows the sign of NFC on the top of the parent route, but unfortunately the child router (below) is not equipped with NFC function.

Guests at home need to connect to WiFi, and they can connect to the Internet through NFC at the touch of a supported mobile phone. Even if you forget your password, you don’t have to worry, which saves the trouble of asking.

499 yuan can realize the whole house Mesh networking! Xiaomi whole house routing evaluation: completely say goodbye to the dead corner of the signal

Xiaomi Mesh WiFi6 is printed on the bottom, indicating that Xiaomi’s self-developed Mesh intelligent connectivity function is supported, and multiple networks can be established by wired, wireless and mixed methods.

Even for complex apartment types, only one parent route is needed to connect 9 sets of routes, and it is easy to set up a whole-house network to achieve whole-house coverage.

499 yuan can realize the whole house Mesh networking! Xiaomi whole house routing evaluation: completely say goodbye to the dead corner of the signal

A list of interfaces of the parent route, including Mesh (short press)/Reset (long press) button, four adaptive WAN/LAN ports with 1Gbps rate, and power interface.

499 yuan can realize the whole house Mesh networking! Xiaomi whole house routing evaluation: completely say goodbye to the dead corner of the signal

The interfaces of sub-routes are relatively simple, including Mesh (short press)/Reset (long press) button, a 1Gbps WAN/LAN adaptive network port and power interface.

The network port can be connected to the parent routing network port or lower-level computer equipment, which is convenient for users to expand the use scenarios of different rooms.

499 yuan can realize the whole house Mesh networking! Xiaomi whole house routing evaluation: completely say goodbye to the dead corner of the signal

Charging port, instruction manual and network cable of the sub-bus route attached in the package.

3. Mesh networking and speed transmission test: In the 5G band, there is also 316Mbps at the far end of the whole house without inductive switching.

Xiaomi’s whole house routing supports 3000M wireless rate, that is, from 2.4G band with 574Mbps rate and 5G band with 2.4Gbps rate, reaching a total rate of 2976Mbps.

Moreover, one parent route and one child route are respectively equipped with four external signal amplifiers, that is, a total of eight external signal amplifiers.

The maximum number of connections can support 256 WiFi devices and 200 Bluetooth devices, which is more than enough for ordinary houses.

499 yuan can realize the whole house Mesh networking! Xiaomi whole house routing evaluation: completely say goodbye to the dead corner of the signal

The environment we tested is an office, with an area of about 300~400 square meters, which is at least twice as large as the conventional residential environment.

The red dot is the installation position of the parent-child route, and the distance between them is about 8 meters, and the black dot is the test position.

Let’s take a look at the performance of Xiaomi’s whole house wireless routing.

1. Roaming test

499 yuan can realize the whole house Mesh networking! Xiaomi whole house routing evaluation: completely say goodbye to the dead corner of the signal

Xiaomi wireless routing supports Mesh networking, which is very simple to get started. Just enter the gateway address of the parent route and manually complete the routing configuration, and it can automatically complete Mesh networking.

This process is very insensitive, and it can be easily completed if you want to network in different ways, such as wired, wireless and mixed.

If it only covers the whole house, it is suggested that the location of the parent route should be fixed first, and then the child route should be placed in the dead corner of the signal after the networking mode is set, thus completing the network coverage of the whole house.

Moreover, the bus route can be connected with up to 9 sets of routes, and even if there are more walls and more complicated apartment types, it can achieve a smooth connection experience without dead ends.

499 yuan can realize the whole house Mesh networking! Xiaomi whole house routing evaluation: completely say goodbye to the dead corner of the signal

We also tested the signal strength of roaming and walked around the office randomly.

The signal strength of the slave route reached 57dB before the automatic switching roaming.

After automatic switching to the sub-route, the signal strength is further reduced to 36dBm, and the average delay is about 24 ms.

This process is basically non-inductive, avoiding the problem of attenuation of 5GHz WiFi+WiFi 6, and making the whole house available.

If there are high requirements for signal strength and transmission speed, more sub-routes can be set, which can make the signals in all rooms basically reach a very good level.

— — transmission speed

Xiaomi Wireless Routing makes the antenna into a built-in antenna, so what about its signal, intensity and transmission rate in different environments? Let’s directly measure its performance.

499 yuan can realize the whole house Mesh networking! Xiaomi whole house routing evaluation: completely say goodbye to the dead corner of the signal

The PC used for testing is also in the test point 1 position with the parent route.

At this time, the PC device is in a wired 1000Mbps link, the wireless rate of the mobile phone is 2.4Gbps, and the signal strength is -19dBm.

In 10 seconds, 1.1GB of data was transmitted to the PC, and the highest speed reached 944Mbps, which can be regarded as gigabit full of blood.

499 yuan can realize the whole house Mesh networking! Xiaomi whole house routing evaluation: completely say goodbye to the dead corner of the signal

When both PC and mobile phone are wireless, at test point 1, the handshake rate of PC is 2.4Gbps, that of mobile phone is 2.4Gbps, and the signal strength is -21dBm.

In the pure wireless environment, it is very easy to be disturbed by the environment, but the mobile phone transmits 608MB of data to the PC within 10 seconds, and the speed is about 510Mb/s, which is still very ideal.

499 yuan can realize the whole house Mesh networking! Xiaomi whole house routing evaluation: completely say goodbye to the dead corner of the signal

At this point, we separated a wall at test point 2, the handshake rate was 2.4Gbps, and the signal strength was obviously blocked, reaching -49dBm.

Within 10 seconds, the mobile phone transmitted 552MB of data to the PC, and the maximum speed was about 463Mbps, so the loss was not too obvious.

499 yuan can realize the whole house Mesh networking! Xiaomi whole house routing evaluation: completely say goodbye to the dead corner of the signal

At test point 3, the handshake rate of the mobile phone dropped to 1152Mbps, and the signal strength was -56dBm.

Within 10 seconds, the mobile phone transmitted the maximum data of 377MB to the PC, and the maximum speed was about 316Mbps.

499 yuan can realize the whole house Mesh networking! Xiaomi whole house routing evaluation: completely say goodbye to the dead corner of the signal

At test point 4, the child route is connected at this position, but the distance from the parent route is long, at least about 10 meters.

Handshaking rate of mobile phone is 2.4Gbps, and signal strength is -42dBm.

Within 10 seconds, the mobile phone transmitted the maximum data of 412MB to the PC, and the maximum speed was about 347Mbps.

The following figure is a summary of the table:

499 yuan can realize the whole house Mesh networking! Xiaomi whole house routing evaluation: completely say goodbye to the dead corner of the signal

Fourth, summary: only 499 yuan can cover the best choice of the same price in the whole house.

1. Entry level also has excellent experience. Mesh realizes 5G+WiFi 6 coverage of the whole house.

This whole house wireless routing brought by Xiaomi, although it focuses on entry-level Mesh routing, has achieved the best existence in the same price range while focusing on affordable prices.

We actually measured this route. Although the antenna is built in, the coverage rate is not compromised. In a room of 300~400㎡, the basic coverage can be achieved by only one parent route and one child route. The wall-crossing experience is also excellent, and the signal strength is also very ideal.

If you encounter a residential environment with a slightly larger area and more walls, it is recommended to put a sub-route in one room conditionally, so that the whole house can enjoy the carefree experience brought by 5GHz WiFi+WiFi 6 and bid farewell to the signal dead angle completely.

Thanks to the characteristics of wireless roaming, you can play games and watch videos in any room, without worrying about dropped calls and jams caused by node switching.

2. The small functions of secret-free network access and secret-changing synchronization are very worry-free, which adds extra points to Mijia ecology.

With more and more ecological products of Xiaomi, this router also has unique functions that are different from other routers.

For example, smart devices that are not connected to the network are exempt from encryption, and all smart homes are directly synchronized.Although it looks unremarkable, if you encounter a lot of smart homes, you have to reconnect after changing the hot password. I believe this workload is very headache.

Although these functions are insensitive, they can’t be without them, which makes users worry enough about their daily use and adds a lot of points to the ecological experience of Mijia.

There are also these features of NFC, which can connect with friends and relatives at home, and you can connect to the internet with a touch of your mobile phone, avoiding the embarrassment of remembering your password.

It can be said that Xiaomi has achieved the experience of "no one has me, and people have me" in these small functions.

3, the most competitive price of the same kind is only 499 yuan.

The most eye-catching thing is its price.Some e-commerce companies have killed the starting price to around 499 yuan.We must know that the cheapest e-commerce can buy in the market is around 599 yuan. Xiaomi once again shows the true nature of "price butcher" and gives full play to its very strong competitiveness.

If you want to experience the carefree experience of full-house coverage without dead ends, or have a headache about large-sized network coverage and don’t know how to choose, and the budget is not high, then I think this millet full-house routing is your best choice.

499 yuan can realize the whole house Mesh networking! Xiaomi whole house routing evaluation: completely say goodbye to the dead corner of the signal

通过admin

The 12th Award of "The Grandmaster" sweeps the golden statue, after Zhang Jiahui and Zhang Ziyi are crowned emperor


"The Grandmaster" sweeps 12 awards to become the biggest winner

    Movie Network News On the evening of April 13, the 33rd Hong Kong Film Awards ceremony was grandly held at the Hong Kong Cultural Center. Continuing to "sweep" the trend without suspense, it won 12 awards including Best Film, Best Director, and Best Actress. Among the important awards, Cheung Ka-fai was the only one given by Best Actor. The high-profile "Pure Hong Kong Film" won 3 awards, so that this year’s Hong Kong Film Awards did not fall into the trap of "Senior Recognition Conference", and Hong Kong director Mai Junlong also took away the Best Supporting Actress and Best Visual Effects two awards for his debut film.

"The Grandmaster" sweeps 12 awards like a package Wong Kar WaiBackstage praise for newcomers

    There are 20 awards in total at this year’s Academy Awards, and Wong Kar-wai’s "The Grandmaster" took away 12 including Best Film, Best Director and Best Actress. "The Grandmaster" is Wang Kar-wai’s second time after winning the Best Director trophy at the Academy Awards. Wang Kar-wai said when accepting the Best Director Award on stage: "The last time I stood here was in 1994. In fact, I have come not far, but it has been 20 years since I came here again. This award is worth a thousand words. It is fate and my honor to have come all the way with the team."

    In a subsequent backstage interview, Wong Kar-wai expressed that he was happy for all the staff who won the award today, and felt that they had made a lot of efforts for "The Grandmaster" in the previous three years. In addition, he also said that tonight is worth remembering, because we have seen the emergence of many newcomers, allowing him to see new hopes for Hong Kong movies. "The Grandmaster" became the big winner of the night. In fact, it was completely unexpected for everyone. At the beginning of the year, "The Grandmaster" was shortlisted for two Oscars, which has won a lot of credit for the Chinese people. What’s more, the Academy Awards have always pursued "art and art first". This time, the Academy Awards have been waiting for Wong Kar-wai for too long!


Zhang Jiahui deserves his title as "Best Actor"


Best Male Actor Zhang Jiahui’s Testimonials Become Singing, Best Female Actor
Zhang ZiyiNo suspense

     With his outstanding performance in "Guild Wars", Zhang Jiahui won the best actor, which is also well deserved. When Miriam Yeung presented the award, she said "if you pay, you will get something" very apt. Zhang Jiahui has forcefully walked out of the "rise road" of middle-aged men through "Guild Wars". As early as last June, he won the best actor award at the Shanghai International Film Festival for the film, which made his popularity soar. This award is also expected. Zhang Jiahui should not be humorous. As soon as he took the stage, he asked "How much did you bet?" He made the audience laugh, thanked all the filmmakers, and said that he had been "determined by movies" since he was 8 years old. He sang the classic soundtrack "Sound of Silence" from "Guild Wars" on stage, which was even more impressive.

     Zhang Ziyi seemed to have the ability to forcefully turn "The Grandmaster" into "The Legend of Mr. Gong Er", and there was no suspense in winning the Best Actress Award. She had already won eight Best Actress trophies, including the Golden Horse Award, the Hong Kong Film Critics Society Award, and the Asian Film Awards, and the Academy Award was the ninth. "International Chapter" was very excited when she took the stage to accept the award. She was the first to thank Tony Leung, the male lead of "The Grandmaster", and even said that no matter what the result tonight was, he would be recognized as "Best Actor".

    The actors shortlisted for Best Actress this year are all extraordinary in strength. Among them, Cheng Xiuwen is already nominated for Best Actress at the Hong Kong Film Awards for the 11th time, but it is a pity that she continues to "accompany" tonight. As for Yan Zhuoling, the newcomer in "Wild Dance", we can only borrow Zhang Jiahui’s words "just support it", after all, there are so many senior seniors.


Hui Yinghong cried excitedly on the stage

Best male partner Zhang Jin burst into tears, Best female partner Hui Yinghong burst into tears

    Hui Yinghong, who won Best Supporting Actress for "Zombie," burst into tears backstage, confessing that she had never been confident that she would lose to Li Xinqiao ("Guild Wars") or Carina Lau ("Carina Lau"), and did not expect to win the award today. "I was born in Hong Kong movies, and I have always wanted to come back to make Hong Kong-made films. This is my first time making a Hong Kong-made film to win an award. I am very grateful to Mai Junlong for letting me win an Academy Award. It means a lot to me."


Zhang Jin "broke out cold" to win the male match
  

    Zhang Jin, who has always been known as the "son-in-law of Hong Kong", broke out this time. With his excellent performance in "The Grandmaster", he defeated the previous favorites Peng Yuyan and Tong Dawei to win the best supporting actor. The moment the award was announced, he and his wife Cai Shaofen hugged tightly. Cai Shaofen was so excited that he cried several times at the scene. Zhang Jin said on stage: "There are rumors in the rivers and lakes that I can win the award if I shoot Wang Jiawei’s play, and I really got it." The joy is beyond words, and he also thanked Cai Shaofen for "following the wind and rain" all the way.


Jackie Chan amused the audience at the scene

Lin Zixiang sang live that Jackie Chan never won a gold statue and the male lead shouted "dissatisfied"

    "Wild Dance" won two trophies at the beginning of the Academy Awards. In addition to the "young" new director and best new actor awards, the best original film song award also added to "Wild Dance". The new director Huang Xiuping’s acceptance speech backstage was touching. "Many people think that young people in Hong Kong are useless, have no direction and no goal, but" Wild Dance "shows everyone that in fact many young people in Hong Kong are very talented and simple, and they can do their best to do what they think is valuable. Thank you very much." Another award for "Wild Dance" was Best New Actor, and the winner, Cai Hanyi, thanked many people and said he was ready to take on the challenge of every new role.

    There were many small surprises in the awards and performances at the Academy Awards tonight. Liang Luosi’s appearance made his partner Yu Wenle very "cautious", and Yu Wenle also asked Liang Luosi about his current relationship situation at the scene, which made Liang Luosi slightly "embarrassed". Well-known Hong Kong singer Lin Zixiang sang classic songs such as "Like a Dream" and "Men Be Self-improvement", which set off a small climax on the scene. His expression was intoxicated and was evaluated by netizens as "singing K at the Academy Awards". As soon as Jackie Chan, the "big brother" who awarded the Best Film Award, took the stage, he was "angry" and shouted that he had not won the Academy Award for Best Actor in 53 years of filming, which caused the audience to burst into laughter.

    The awards were selected in two rounds by members of 12 Academy Awards affiliates, including the Hong Kong Film Directors Association and the Hong Kong Screenwriters Association, as well as professional media workers. This year’s Hong Kong Film Awards put forward the theme of "light and shadow of the times". Chairperson Chan Ka-shang believes that "the reason why Hong Kong films have grown slowly without any support over the years is because they have been closely responding to the demands of society and audiences in different times."

通过admin

How much is the Mercedes-Benz Maybach S450?

Promotion Dates: 2020-08-23 to 2021-08-31

Mercedes-Benz, the passion for innovation never dies. As car inventors, we never stop to explore, create, subvert, innovate, and persevere in what we want!


Beijing Mercedes-Benz Center 2020 Maybach S450 S680 S680 two-color spot car, supports financial installment purchase of cars, and can be sold nationwide.

Manufacturer’s guide price:

S450 1.4588 million

Maybach S680 2.9988 million

Maybach S680 Duotone Collector’s Edition 3.1988 million

In-store car, Maybach S450 cash discount and decorative gift package, please consult the contact number at the bottom of the article for details!

Mercedes-Benz Beijing Center sincerely invites you to come to the store for tasting.


For those who know a little bit about cars, looking at the Maybach S-Class and the ordinary Mercedes-Benz S-Class is the same as looking at the Volkswagen Phaeton and Passat. At first glance, there is no difference. However, upon closer inspection, the Maybach S-Class’s mid-net is larger and thicker than the ordinary (the current mid-net is more different), and the car paint is also more textured. Although the shape is similar, Maybach’s graceful and luxurious atmosphere is completely unmatched by the ordinary Mercedes-Benz S-Class.


For many people who don’t know the car, it is too close to the ordinary Mercedes-Benz S-Class except for the C-pillar. Therefore, after the owner increases the price and brings it back to the Maybach S-Class, he needs to do two more things (these two things will also cost about 50,000 yuan): First, replace the Mercedes-Benz logo of the whole car with the Maybach logo; Second, replace the wheel hub with a retro pie hub. In short, it is to make it as close as possible to the Maybach S680 with the strongest aura. After this change, the courtesy of walking anywhere will be much higher.


Many people say that the vertical C-pillar of the Maybach S-Class allows VIPs to hide behind the C-pillar, adding a sense of mystery and dignity. Yes, hiding behind really feels like this, but I think in addition to the sense of mystery and dignity, the back row of the Maybach S-Class is indeed much stronger than the Mercedes-Benz S-Class.


First of all, the Maybach S’s legroom is unrivaled. After our measurement, its rear longitudinal space has reached 105cm. This data is too exaggerated. Let alone the crossed legs we often say, even if you squat in front of the rear seat, it looks very empty.


Secondly, the Maybach S-class rear seat layout is similar to that of the aircraft business class. The design of the half-pack and the rendering of the ambient light make it feel more luxurious than the three-seat ordinary Mercedes-Benz S. Speaking of seats, I have to mention one more thing. Maybach S-class seats can make you feel the urge to sleep at any time, like sitting on a Chivas first-class sofa, like stepping on a thick cashmere blanket, which is much more comfortable than the seats in the aircraft business class (sorry for not doing first class), which is commonly known in the running shoe industry as the feeling of stepping on shit. So we said earlier that local tyrants can place an order for this set of seats.


Furthermore, all the glass in the back of the Maybach S is equipped with an electric sunshade, which can create a dim atmosphere during the day. With the extremely comfortable semi-reclining seat, lying in the car is almost the same as sleeping in the bed at home. This is an experience that no car in the same class can give you, not even the much more expensive Bentley and Rolls-Royce. This is also the core selling point of the Maybach S-Class.


As the inventor of the automobile, Mercedes-Benz has a glorious history of 134 years, and now the three-pronged star emblem is widely used in China. In 2017, China became the first single market in the world for Mercedes-Benz to break through the sales mark of 600,000 years. Looking to the future, Mercedes-Benz will continue to offer outstanding products, services and brand experiences to the vast number of Chinese consumers, fulfilling its long-term commitment to the Chinese market. At the same time, Mercedes-Benz will continue to practice corporate social responsibility through the Mercedes-Benz Wish Fund and actively participate in many social welfare undertakings to help the healthy and sustainable development of Chinese society.

通过admin

Guilin Binyue price reduction is coming! The lowest price 63,800, today’s great discount

Welcome to [Autohome Guilin Promotional Channel], we bring you unmissable car purchase benefits! Currently, the much-watched Geely model is having an exciting promotion in Guilin. This popular compact SUV is now offering a car purchase profit of up to 12,000 yuan, and the minimum starting price has been reduced to only 63,800 yuan. This undoubtedly brings a very attractive car purchase opportunity to consumers in Guilin. If you are interested in this model, be sure to click "Chatti Car Price" in the quotation form to get the latest preferential policies and get a higher discount limit. Hurry up, this may be the best time to realize your car purchase dream!

桂林缤越降价来袭!最低售价6.38万,今日钜惠

The exterior design of the car series is unique and dynamic. The front face adopts a sharp family-style design. The air intake grille is exquisite and atmospheric, and it is matched with a streamlined body to create a strong sense of sports. The overall style is stylish and energetic, attracting the attention of passers-by whether it is urban driving or rural travel.

桂林缤越降价来袭!最低售价6.38万,今日钜惠

The side lines of the colorful design are smooth, the body size is 4330mm x 1800mm x 1609mm, and the wheelbase reaches 2600mm, creating a spacious and dynamic body ratio. The front wheelbase is 1551mm and the rear wheelbase is 1562mm, ensuring good driving stability. The tire size is 215/65 R16, and it is matched with a delicate wheel design, which not only enhances the visual impact of the vehicle, but also provides the driver with a comfortable and stable driving experience.

桂林缤越降价来袭!最低售价6.38万,今日钜惠

In terms of interior, Binyue is dominated by modern minimalist style, creating a refined and comfortable interior environment. The spacious cockpit is equipped with an 8-inch central control screen, which is clear and easy to operate, and integrates rich multimedia functions. The steering wheel is made of plastic material, although not genuine leather, it feels stable and supports manual up and down adjustment to adapt to the needs of different drivers. The seats are made of leather/fabric mixed and matched materials to provide good touch and support. The main and passenger seats are equipped with front and rear adjustment, backrest adjustment and high and low adjustment (2 directions) to ensure the comfort of long-distance driving. In addition, the front and rear seats are equipped with USB ports, including 1 in the front row and 1 in the rear row, to meet the entertainment needs of passengers. The overall interior design emphasizes the balance between practicality and texture, providing drivers with a convenient and warm experience.

桂林缤越降价来袭!最低售价6.38万,今日钜惠

The 1.5L L4 engine in the car series Colorado can provide 126 horsepower output and a maximum torque of 152 N. m. This engine is matched with a 5-speed manual transmission, providing the driver with stable performance.

Overall, the evaluation of Autohome owners reveals the charm of Colorado. Its young and fashionable design not only meets the needs of young consumers, but also shows an extraordinary aura in actual use. As a car with a sense of fashion and practicality, Colorado undoubtedly stands out among many models, becoming an ideal choice for more car owners who pursue individuality and quality.

通过admin

2023 Mercedes-Benz G500 offers more than 1.8 million installments

  Tianjin Fengchi International Trade Co., Ltd. is located in the bonded area of Tianjin Port Free Trade Zone, dedicated to the distribution of luxury and super luxury brand cars, such as: Porsche, BMW, Audi, Land Rover, Toyota, Bentley, Rolls-Royce, etc. For more preferential details, please contact: Lin Manager 18920101728 (same as WeChat)

  The overall exterior interior design of the 23 Mercedes-Benz models is basically unchanged, but the configuration has been adjusted. Among them, the G350 does not support optional variable suspension, rear LCD screen, geometric multi-beam of light headlights, adaptive high beam, etc. These configurations are optional on older models. The overall configuration and optional configuration of the Mercedes-Benz G500 are basically unchanged, and can be equipped with night components matte version, night components enhanced version, AMG appearance components, etc.

  The 23 Mercedes-Benz G500 still adopts the classic right-angle shape on the side, combined with 19/20-inch sports wheels and professional off-road tires. Perhaps in terms of comfort, the G500 may not be satisfactory, but in terms of off-road ability, the car has the reputation of "the king of off-road".

  The interior and functions of the Mercedes-Benz G500 have changed. The high-level layering of the NAPPA leather, the 12.3-foot dual screen, the geometric shape multi-ray LED headlights, the Voice of Berlin audio and its Mercedes me interconnection are also available. It also adds some fashion trends and technology to this hardcore off-road. The zero-hundred acceleration of the new Mercedes-Benz G500 takes only 5.9 seconds.

  In addition to the tough-guy appearance, the Mercedes-Benz G500 also has a good performance in the interior. The dual 12.3-inch high definition display screen is paired with the off-road mode of the display screen specially developed for the G-class off-road vehicle, which can not only give real-time feedback on the height, slope, inclination, steering angle of the terrain, but also provide vehicle information such as low-speed gears and differential lock data in working mode. At the same time, the car also has the Voice of Berlin sound, 64-color ambient lights, active multi-copy seat components and Mercedes-Benz intelligent human-machine interaction system. Whether it is off-road capability or technical configuration, the car can be called the mainstream of the mainstream.

  In terms of power, the Mercedes-Benz G500 is equipped with a 4.0T twin-turbo engine with a maximum power of 310kW and a maximum torque of 610N · m. It is matched with a 9AT automatic gearbox with a 100-kilometer acceleration time of 5.9 seconds. At the same time, the G500’s proud OurHours four-wheel drive system, non-load-bearing body and three 100% differential lock systems are also retained. Such a fully armed, not only the greatest capital of the G500 to go over the mountains, but also the face of the owner.

  Company Name: Tianjin Fengchi International Trade Co., Ltd.

  Contact number: 18920101728 (with WeChat) Lin Manager

  Address: No. 99, Tianbao Avenue, Tianjin Port Free Trade Zone

  Disclaimer: The above car purchase discount information is provided by the comprehensive dealer of this website. Due to market factors, the price fluctuates greatly, and it is only for the reference of car purchase. Its authenticity, accuracy and legality are the responsibility of the dealer. This website does not provide any guarantee and does not assume any legal responsibility.

通过admin

Hot search first! Just now, Evergrande responded

China Fund News, Amman

In response to the "bankruptcy protection" issue that has been circulating on the Internet, China Evergrande has just issued a clarification announcement.

On August 18, China Evergrande issued a clarification announcement saying: The company is currently proceeding with overseas workout as planned. Since the group’s US dollar bonds are governed by New York law, the company applied to the US court for recognition of the overseas workout agreement arrangement under the legal system of Hong Kong and the British Virgin Islands (BVI) in accordance with Chapter 15 of Title 11 of the United States Code, which is part of the normal overseas reorganization process and does not involve bankruptcy applications.

Evergrande’s share price tumbled

This morning, news of "Evergrande filing for bankruptcy protection in the United States" topped the hot search lists.

China Evergrande Group filed for bankruptcy protection in New York on Thursday under Chapter 15 of the US Bankruptcy Code, which allows US assets to be protected when companies make restructuring arrangements elsewhere, according to court documents.

Evergrande said in court filings that it was seeking approval for restructuring talks in places including Hong Kong, the Cayman Islands and the British Virgin Islands. Evergrande said creditors could vote on the restructuring this month and could get approval from courts in Hong Kong and the British Virgin Islands in the first week of September. Evergrande proposed a bankruptcy protection hearing on September 20.

Bankruptcy court records also show that Evergrande subsidiaries Skybase Holdings and Jingcheng also filed for Chapter 15 bankruptcy protection on the 17th.

On the morning of the 18th, Hengda Automobile and Hengda Property opened with a straight-line drop of more than 17%. Although it was approaching midday, there were gradually a lot of favorable interpretations, and as of the close, Hengda Automobile was still down 16%.

Evergrande’s property losses narrowed to about 9%.

Lawyer’s Interpretation: Filing for Bankruptcy Protection Does Not Mean Bankruptcy

The news broke, and several lawyers gave their interpretations of the relevant regulations.

Du Jinsong, a barrister practicing in Hong Kong, told the Securities Times that Evergrande’s initiative to file for bankruptcy protection was mainly to prevent potential litigation in advance. According to the listing rules, Evergrande needs to clarify or disclose as soon as possible because "any legal action in different jurisdictions has potential conflicts."

In an interview with the media, Li Haiquan, a lawyer at Shen Yihe Law Firm in Shanghai, pointed out that applying for bankruptcy protection is not the bankruptcy that ordinary people understand. "When the creditor and the debtor can no longer negotiate to solve the debt problem, or the two sides lose trust, applying for bankruptcy protection will help the debtor to help the company save itself through the bankruptcy reorganization process."

Li Haiquan said that after entering the bankruptcy process, bankruptcy reorganization, bankruptcy settlement and bankruptcy liquidation can be carried out. Enterprises take the initiative to apply for bankruptcy protection, generally seeking bankruptcy reorganization and bankruptcy settlement, and try to avoid entering the bankruptcy liquidation process.

Hu Guifen, a partner lawyer at Guangdong Facheng Huijun Law Firm, also told the media that bankruptcy protection is not the bankruptcy in the general public’s understanding. Bankruptcy protection is a legal way for debtors to seek help from the court when they are facing debt difficulties and have the possibility of workouts and other solutions to avoid assets being competed by multiple parties to exacerbate the crisis and gain buffer time. Bankruptcy protection under the context of the US Bankruptcy Law is similar to the procedures of pre-reorganization and bankruptcy reorganization in the Chinese mainland’s Enterprise Bankruptcy Law. It is one of the legal ways for enterprises to resolve debt difficulties under the auspices of the court.

copyright notice

"China Foundation News" has the copyright to the original content published on this platform and is prohibited from reprinting without authorization, otherwise it will be investigated for legal responsibility.

Authorized reprint Cooperation contact: Mr. Yu (Tel: 0755-82468670)

Original title: "Hot search first! Just now, Evergrande responded"

Read the original text