Recommend Meitu’s Pinterest, how to rely on machine learning to attract attention?

Recommend Meitu's Pinterest, how to rely on machine learning to attract attention?

Freestocks/flickr

Pinterest, which has 100 million monthly active users, is increasingly relying on machine learning to help uncover new internet insights.

Users around the world visit Pinterest to explore, save, and share photos and articles. Help users find content they love, and users will naturally be retained: 30% of interactions on Pinterest and 25% of Pinterest internal purchases come from Pinterest-recommended content. To recommend the right content, Pinterest uses state-of-the-art, data-driven technology and conducts a lot of experimentation.

So how does Pinterest use machine learning?

Mohammad Shahangian, lead discovery science engineer at Pinterest, said: "My main job is to find a way to solve the content discovery problem. We experiment with very small changes to the algorithm, and every attempt has an improvement or a downside."

Exclusive advantage: based on interest

Recommend Meitu's Pinterest, how to rely on machine learning to attract attention?

TheStreet

In fact, this is not unrelated to the characteristics of Pinterset: one of its strengths is that Pinterset is a community built around users’ interests, and users will sort the products, articles, and images they find on the Internet by interest.This means that instead of guessing a user’s interests by clicking patterns or time spent on a page, as other social networking sites do, Pinterest can directly use algorithms to measure the relationship between 75 billion entries in its database that are likely to be grouped under the same interest.

"Many companies try to derive user interest from inputs or signals," says Mr. Shahangian. "But on Pinterest, users clearly signal what they are interested in."

Users who visit Pinterest continue to add to the social landscape of users, collected items, and favorite boards. This data allows Pinterest to provide more accurate content for user homepage feeds, search results, and related content recommendations. Recommendations based solely on what users care about are not ideal, and recommendations for similar content are easy to repeat.

For Mohammad Shahangian, "If you collect one kitchen sink, should we recommend more sinks or something that will make your kitchen look new?"

Constantly testing in practice

To make these decisions, Pinterest engineers experimented with a variety of machine learning algorithms. They studied how well these algorithms worked on related and unrelated items, and how they affected the active levels of real users.

Mohammad Shahangian said: "We do experiment directly on Pinterest, but a lot of times we do a lot of preparation before experimenting."

Of course, there is no way to know whether a user will like the new recommendation without conducting actual testing. "I can’t pay someone to tell me whether a user will like the new recommendation," says Mohammad Shahangian. But by studying whether the content recommended by the algorithm will be classified as an interest by real users, it is relatively reliable.

Previously, Pinterest changed the message flow on the user’s homepage from purely chronological attention to the user’s message, to an algorithm-generated message flow, which increased the user’s active level by one-fifth to one-tenth. Subsequent algorithm improvements will bring additional improvements.

"Pinterest has come a long way throughout the improvement process," says Mr. Shahangian. "Personalisation has greatly increased user engagement rates."

Improved image search function

Pinterest has also been improving image search to help users better find similar images. Pinterest engineers worked with researchers at the Vision and Research Center at the University of California, Berkeley, to develop the technology. It now uses deep learning algorithms to automatically identify objects in images. This way, users can click on those objects to find relevant items in Pinterest.

Dmitry Kislyuk, a visual search engineer at Pinterest, said: "This is not a classification algorithm to distinguish between cats and dogs. We want to find similarities between images in real time."

He says the visual search tool works well for finding home decorations and fashion items in Pinterest, and in the future Pinterest hopes to improve its auto-sorting function to better serve other search needs, such as helping users find new recipes that are similar.

Speaking about using deep learning to classify images more efficiently, Pinterest visual search engineer Andrew Zhai said: "I think our model will become more semantic and better."

While Pinterest engineers focus on perfecting object recognition and search, they also plan to develop an app that will allow smartphone users to photograph real-world objects and then get recommendations for related items on Pinterest.

"The field of deep learning, computer vision is very exciting right now," says Mr. Kislyuk. "The world is changing so fast that top technologies change every two months."

Via fastcompany

Recommended reading:

Pinterest completes Series G financing, the total amount of 553 million US dollars does not meet expectations

The designer who created the classic look of Apple Mac will join Pinterest to be responsible for product design

Leifeng.com’s original articles are prohibited from being reproduced without authorization. For details, please refer to the instructions for reprinting.

Aauto Quicker -W spent HK$ 12.3 million to buy back the stock price of HK$ 48.9-49.15, which affected the market value structure.

Risk warning: The above contents are only the opinions of the author or guest, and do not represent any position of Hexun, and do not constitute any investment advice related to Hexun. Before making any investment decision, investors should consider the risk factors related to investment products according to their own conditions and consult professional investment consultants when necessary. Hexun tries its best to prove the authenticity, accuracy and originality of the above contents, and does not make any guarantee or commitment to this.

Cars, houses, computer cameras … public property is occupied casually and disposed of in front of you.

  In addition to public money, some people are also eyeing public things.

  A cadre in Yanfeng District, Hengyang City, Hunan Province took advantage of his position to take possession of Canon cameras and lenses worth 43,500 yuan purchased by the unit; A village party secretary in Shouguang City, Shandong Province, privately arranged for the postman to deliver the party newspapers and periodicals subscribed by the village Committee to his home for ten years … … Looking at the reported cases in recent years, it is not uncommon for party member cadres to take advantage of their authority or position to occupy or illegally occupy public property. Some people can take everything from high-value cars, houses and computer cameras to small bags of fertilizer and newspapers in order to get rid of the public oil. As everyone knows, this kind of behavior is not as simple as taking advantage, but a serious violation of discipline and even illegal behavior.

  The first kind of practice is to directly occupy public property. The actor either doesn’t give a penny, or pays some money symbolically, and takes the public property for himself. Here, according to the different objects of occupation, it can be divided into two types. If the public property that I am not in charge of is occupied, the first paragraph of Article 101 of the Regulations on Disciplinary Actions shall apply: "Take advantage of the influence of authority or position to occupy public or private property that I am not in charge of, or occupy public or private property by paying money symbolically", "If the circumstances are minor, give a warning or a serious warning; If the circumstances are serious, he shall be dismissed from his post within the party or be placed on probation; If the circumstances are serious, expulsion from the party will be given. " Then, what if it is the public property that I am in charge of, managed and handled? This should be regarded as an illegal act of corruption, and if it meets the conditions of a large amount stipulated in the criminal law, it constitutes a crime of corruption. In 2015, the revised regulations on disciplinary action adhered to the principle of separation of discipline and law, and deleted the contents that were duplicated with criminal law, public security management punishment law and other laws and regulations, which were followed by the latest revised version. Therefore, the discipline and law convergence clause in the general rules of the regulations can be applied to this behavior, and the responsible person should be investigated for the corresponding party discipline and legal responsibility.

  The second type of practice is illegal occupation of public property. It is different from the subjective purpose of directly encroaching on public property. The former aims at possession and infringes on the ownership of public property. The purpose of this behavior is only to occupy and infringe on the right to use public property. Some of the occupied public property is for personal use, including for their own use, family and friends. For this kind of behavior, the first paragraph of Article 102 of the Disciplinary Regulations has a special provision: "Taking advantage of the influence of authority or position and occupying public property for personal use in violation of relevant regulations for more than six months, if the circumstances are serious, give a warning or a serious warning; If the circumstances are serious, the punishment within the party shall be revoked. " In addition to personal use, some people engage in profit-making activities by occupying public property, or lend public property to others for profit-making activities, which is more serious in violation of discipline. Therefore, Article 102 of the Regulations on Disciplinary Actions against Party Discipline has correspondingly increased the punishment. As long as there is such an act, it will be punished, and the punishment level will be as high as "expulsion from the Party".

  It should be noted that there is still a problem of transformation in illegally occupying public property. In reality, if the actor takes advantage of his power or position to occupy public property for more than six months, he should return it without returning it, or the use value has been exhausted (will be exhausted) and cannot be returned, the nature of the behavior has changed and it has become an "occupation behavior", which should be dealt with according to the specific circumstances in accordance with Article 101 of the Party Disciplinary Regulations or criminal law and other relevant laws and regulations.

  The ancients had a story of "no family letters under the candle", which was as small as candlelight and could distinguish between public and private property, which was really admirable. Public is public, private is private, and party member cadres should be clearly distinguished. Taking some public property, wiping some oil and water, and rubbing some benefits seems to be a small matter, but this is often the starting point for many corrupt behaviors. Over time, it will inevitably lead to the overturning and sinking of life. Only when party member cadres abide by the principle of "distinguishing between public and private, putting public before private, and self-denial and dedication to public service", will the voice in their hearts be extremely clear and firm: "If it’s not mine, I won’t take it." (Duan Xiangyu, website of the State Supervision Commission of the Central Commission for Discipline Inspection)

  Discipline and law link:

  Article 101 Whoever, by taking advantage of his authority or position, encroaches on public or private property that he is not in charge of, or encroaches on public or private property by paying money symbolically, or pays gratuitously or symbolically to receive services or use labor services, if the circumstances are relatively minor, shall be given a warning or a serious warning; If the circumstances are serious, he shall be dismissed from his post within the party or be placed on probation; If the circumstances are serious, he shall be expelled from the party.

  … …

  Article 102 Whoever takes advantage of his authority or position to occupy public property for personal use in violation of relevant regulations for more than six months, if the circumstances are serious, shall be given a warning or a serious warning; If the circumstances are serious, he shall be dismissed from his post within the party.

  Those who occupy public property for profit-making activities shall be given a warning or a serious warning; If the circumstances are serious, he shall be dismissed from his post within the party or be placed on probation; If the circumstances are serious, he shall be expelled from the party.

  Lending public property to others for profit-making activities shall be handled in accordance with the provisions of the preceding paragraph.

  — — Excerpted from the Regulations on Disciplinary Actions in the Communist Party of China (CPC).

The spring of artificial intelligence creation has come, and the "hidden rules" of ancient poetry are taught by computer.

  Xinhua News Agency, Beijing, March 12th Special feature: The spring of artificial intelligence creation is coming.

  Xinhua News Agency reporter Peng Qian Liu Si

  "Early spring rain Chu Qing, willow filar silk caught the shore warbler. The painting boat is full of smoke and waves, and the small bridge is light. "

  Who would have thought that this is a poem created by artificial intelligence with "early spring" as the key word. The author "Nine Songs" was developed by a student team led by Professor Sun Maosong of Tsinghua University Computer Science and Technology Department for three years.

  Xiao Bing, Microsoft’s chat robot, "narrowly beat" human opponents with a Chinese-style song "Peach Blossom Dream" in the variety show "Wit". When the singer sings such an archaic sentence as "In the boundless night rain, the past is like the wind, the peach blossoms in the ear laugh at the spring breeze, and you and I meet in the dream", many viewers think that this is made by human beings.

  The spring of writing poetry, composing music, painting and artificial intelligence has come quietly … …

  Technically, "familiar with 300 Tang poems"

  Zhou Ming, vice president of Microsoft Asia Research Institute, is a literary lover. He and the research team taught Xiao Bing to write modern poetry, and composing music is a new skill.

  Zhou Ming said that neural machine translation, chatting robot, reading comprehension and creation are the four main aspects of the application of natural language processing technology, and the difficulty is gradually increasing. Creation is at the top of the pyramid and it is the most difficult to break through.

  "In the beginning, people couldn’t find how to model creation because it was emotional. Writing poems and writing lyrics are all things with flying literary talents and sudden inspiration, which are difficult to capture. " He said. Thanks to the progress of deep learning and neural network technology in recent years, artificial intelligence creation has won many brilliant achievements.

  Zhou Ming introduced that writing songs by Xiao Bing is a process of "encoding and decoding". The researchers first trained artificial intelligence robots with popular songs. After sufficient training, you can start writing: after inputting the song theme in the form of keywords, it will be coded into a language that artificial intelligence can understand, and the robot will decode and output it in a way that people can understand, becoming a lyric; Then combine this word with the original keyword as a new input, and you can get the second sentence, and so on to get the whole song word. Similarly, you can also input lyrics and translate them into music scores, that is, you can regard music scores as natural languages, thus completing computer lyrics and music scores.

  "Nine Songs" learning to write poetry is also "familiar with 300 Tang poems, and you can recite them even if you can’t write poetry".

  Yi Xiaoyuan, the founder of "Nine Songs" and a graduate student in Tsinghua University, has input more than 300,000 ancient poems since the Tang Dynasty as a corpus, and used the deep learning model to make computer learning. In addition to the rules for leveling and rhyming poems, no artificial rules are given, but computers are allowed to learn the "hidden rules" in ancient poems themselves.

  "We don’t know the rules of how computers make such poems," said Sun Maosong, which is a "black box" phenomenon of deep learning. In his view, each ancient poem is like a necklace, and the beads on the necklace are words. In the deep learning model, the necklace is completely broken up, and then the implicit association between each bead and other beads is given different weights through automatic learning. When writing a poem, put different beads back into a new necklace.

  The ancients wrote poems mostly to express their feelings, and the style was sad, which also made the poems written by "Nine Songs" somewhat "sad for spring and autumn". The team hopes to make the "Nine Songs" more positive by strengthening the training of some relaxed emotional samples. In addition, how to write a longer poem on the basis of ensuring the consistency of the whole poem is also a new challenge.

  In artistic conception, "Kung Fu is beyond poetry"

  In addition to writing poems and composing music, artificial intelligence has evolved new skills such as writing novels and painting. The science fiction novel "The Day when a Computer Writes a Novel" created by artificial intelligence developed in Japan deceived all human judges and was successfully shortlisted for the Japanese Fiction Literature Award. Google artificial intelligence can also create paintings, and some paintings have been sold at a high price of $8,000.

  Artificial intelligence has defeated human beings in the fields of chess and cards, video games, etc. Does the latest progress in the field of artistic creation mean that it is not far from surpassing human beings in this respect?

  Zhou Ming believes that at present, artificial intelligence creation is only based on the imitation of big data, which is far from the creative intelligence of real human beings. "There is not enough data for training artificial intelligence creation, such as the data for composing lyrics; Secondly, the inspiration is not enough, because the data alone is just a follower, writing words and composing music are familiar, and there is no feeling of sudden inspiration in generate. "

  In Sun Maosong’s view, at present, artificial intelligence creation is a limited creativity, which theoretically does not exceed the creative space unconsciously defined by predecessors in the practice of poetry creation for thousands of years. The ancients wrote poetry as "Kung Fu is beyond poetry", often based on experience, with content and artistic conception, but it is difficult for machines to "express their aspirations" or "express their feelings through scenery" for the time being.

  Experts believe that the fear that artificial intelligence surpasses human beings in the field of creation is alarmist. "In areas that need deep connotation or inspiration, such as music creation, poetry and prose, I personally think that machines are basically unlikely to reach the state of people, but they will assist people’s creation." Zhou Ming said.

  However, artificial intelligence can improve the efficiency of professional creators. "If you can’t think of using a word when writing, artificial intelligence will think of a word for you and let you find that you can write like this." For ordinary people, artificial intelligence creation systems such as "Nine Songs" can lower the threshold of creation and realize the dream that "everyone can be a poet, painter or musician".

  Sun Maosong said that the team plans to upgrade the "Nine Songs" system in the future, so that it can judge the quality of people’s poems, such as whether there are mistakes in rhyme and level tone, whether words are unsatisfactory or sentences are incomplete, and help people improve their creative skills; You can also conduct "humanistic calculation" and quantitative analysis and research on ancient documents through big data.

  In addition to the creation itself, the study of machine creation can also bring unexpected benefits to other fields of artificial intelligence, and open up innovation in many fields and interdisciplinary subjects.

  "Before letting Xiao Bing learn music creation, we never thought that music can also be processed by natural language technology," Zhou Ming said. "So once the natural language breaks through, it can drive the breakthrough of cognitive intelligence and the whole artificial intelligence, and there will be many scenes that were unimaginable before."

Directly hit the Bangkok Auto Show | Hongri’s many new cars appeared in the brand and went abroad to "make friends"

According to the data of China Automobile Industry Association, in 2023, the production and sales of new energy vehicles in China were 9.587 million and 9.495 million respectively, up by 35.8% and 37.9% year-on-year, and the market share reached 31.6%. Compared with the same period, the global sales volume of new energy vehicles was 14.653 million, and the sales volume of new energy vehicles in China accounted for nearly 65%, which is why China’s production and sales volume of new energy vehicles remained the first in the world for nine consecutive years. The data shows that after years of development and precipitation, China has basically built a new energy automobile industry chain that takes into account both independent research and development strength and market core competitiveness.

Based on this, more and more domestic new energy automobile brands and products are accelerating to go abroad and actively explore more possibilities in overseas markets. On March 26th, the 45th Bangkok International Auto Show will officially kick off, with many new energy automobile brands from China participating, including hybrid electric vehicles, pure electric vehicles and fuel cell vehicles. Among hundreds of dazzling models, the reporter noticed that the domestic micro-electric vehicle industry leader — — Hongri Automobile Group also brought its products of Hongri, Weiao and Hongxida to the auto show.

1-1.jpeg

It is understood that this is the second time that Hongri Automobile Group has participated in the Bangkok Auto Show. Five real cars including Hongri X9, S1MAX, BOMA EV, Hongxida ID2 and JM07 all landed in Bangkok, and the number of exhibitors reached a new high.

Liu Shubin, director of the international trade department of Hongri Automobile Group, told the reporter that several products under the group have attracted the attention, consultation, negotiation and ordering of foreign multinational customers. "Hongdou is a low-speed car with two doors and two seats, and its compact design mainly caters to the needs of female consumer groups. Many customers from Europe have expressed their hope to transform Hongdou into a model that meets the L6E standard. To this end, the Group is constantly striving to adjust its products to meet this demand. As a high-speed passenger car, Weiao is deeply favored by Southeast Asian consumers with its spacious space and affordable price, and has become an explosive product in Southeast Asian market. Hongxida series products, which focus on three-wheeled vehicles, are widely praised for their diverse styles, outstanding quality and strong practicality. "

2-1.jpeg

Regarding the active participation in overseas auto shows, Liu Shubin believes that "overseas auto shows are an important communication platform for the global auto industry. As a company with a highly international vision, Hongri Automobile Group’s participation in overseas auto shows is an important part of the global strategic layout. At the auto show, we can show our unique brand concept and innovative product design, thus attracting the attention of consumers around the world; At the same time, through in-depth interaction with overseas markets, we will better understand the needs and preferences of international consumers and provide strong support for future product development and marketing. Finally, the brand influence and the double expansion of sales channels will be realized. "

3-1.jpg

"At present, the scale of Hongri Automobile Group in overseas markets is in a stage of continuous expansion." According to reports, after in-depth market research and strategic layout, the Group has achieved remarkable results in Southeast Asia. We have established stable cooperative relations with customers in more than 20 countries, such as Pakistan, Thailand and the Philippines, and further consolidated our market position by signing agency agreements.

4-1.jpg

Improving the competitiveness of products is the only way for Hongri Automobile Group to achieve stability and prosperity. In order to achieve this goal, the Group has continuously increased investment in R&D, optimized the performance and endurance of new energy vehicles, focused on establishing a perfect after-sales service system, and provided timely and professional technical support and maintenance services for overseas users. In the face of the variability and complexity of overseas markets, Liu Shubin pointed out that the Group also made efforts from three other aspects:

First of all, continue to deepen the layout of existing markets, strengthen cooperation with countries and regions such as Southeast Asia and Europe, and enhance the market share and brand influence of hot-selling products.

Secondly, actively respond to the green development trend of the global automobile industry, increase R&D investment in the field of new energy vehicles, and introduce more new energy vehicle products that meet international environmental protection standards to meet the demand of environmental protection and energy-saving vehicles in overseas markets.

Finally, we will further strengthen strategic cooperation with overseas partners, jointly explore and develop emerging markets, expand overseas sales channels and service networks, and provide consumers around the world with a more convenient and efficient car purchase and car use experience.

5   .jpg

At present, Hongri Automobile Group has three production bases in Rizhao, Shandong, Binzhou, and Jinzhai, Anhui, and has built two R&D centers in Qingdao and Shanghai, independently developing 177 patents and mastering three core technologies of micro electric vehicles. At the same time, we have carried out comprehensive cooperation with Zeba Co., Ltd. in the research and development of micro electric vehicles, and worked with international first-class modeling teams such as Central Academy of Fine Arts, North America and Europe to build high-quality models that meet consumption expectations.

In the past two years, based on the continuous improvement of R&D capability, production capacity and market competitiveness, Hongri Automobile Group has actively and stably delivered high-quality new energy automobile products and services to all parts of the world. With the increasing brand influence and the accumulation of word of mouth, the Group’s process of going abroad is about to enter a new stage of rapid development, making friends with China Zhizao abroad into reality, and gradually realizing the transformation from flow to retention.

Worms, spyware … What weapons are there in the US network arsenal?

  A few days after the ransomware "Want to Cry" raged around the world, the tracing behind the scenes finally got a little clue: Kaspersky Lab in Russia and Symantec in the United States said on the 15th that this ransomware may be related to a hacker organization called lazarus. In this cyber attack, they made malicious ransomware by using the hacking tool "Eternal Blue" leaked from the National Security Agency (NSA) network arsenal.

  Reuters once reported that 90% of the expenditure on network projects in the United States was used to develop hacker attack weapons, which could invade the "enemy’s" computer network, monitor people, and paralyze or block infrastructure. Cyber security experts accuse the United States of investing heavily in developing hacking tools instead of self-defense mechanisms, making the global network environment "more insecure".

  Compiled by Wen Junhua, all-media reporter of Guangzhou Daily

  "The ransomware is not developed by the US National Security Bureau, but by criminal gangs, which may be criminals or foreign governments." Bossert, Assistant to the US President for Homeland Security and Counter-Terrorism, said in response to the "Want to Cry" ransomware incident on 15th, but he evaded the question whether the hacking tools leaked by US intelligence agencies would lead to more cyber attacks in the future.

  In fact, the leak of the NSA network arsenal that caused the ransomware rampage was disclosed as early as last August. At that time, a hacker organization named "Shadow Intermediary" claimed to have broken into the "Formula Organization" hacker organization under the NSA and stolen its network arsenal. The "shadow middleman" leaked some of the hacking tools and data through social platforms, and publicly auctioned the complete data package at a high price of 1 million bitcoins (worth about 568 million US dollars), but the hawking did not attract response and widespread attention, and eventually it was auctioned.

  Since then, the "shadow middleman" has tried several times to sell the NSA network arsenal without success. Its latest exposure of NSA network weapons was released in mid-April this year. The organization said that NSA had invaded the international banking system to monitor the capital flow between some banks in the Middle East and Latin America. The hacking tool "Eternal Blue" of NSA network arsenal is believed to have been leaked by "shadow middleman".

  Although the profit-making purpose of the "shadow middleman" has not been realized, the statement that the hacking tools it stole originated from NSA is considered to be highly reliable. Last year, when the "shadow middleman" released some hacking tools and data, Snowden, the exposer of the "Prism Gate" incident, provided an NSA "malware implantation operation manual" to prove that the cyber weapons peddled by the "shadow middleman" carried NSA’s virtual fingerprints. For example, NSA’s "Malware Implantation Operation Manual" instructs operators to use a special 16-bit string "ace02468bdf13579" when using a malware program SECONDDATE. Among the dozens of hacking tools leaked by "Shadow Broker", the tool SECONDDATE is one of them, and its related code contains a large number of this string.

  When it comes to the NSA network arsenal, you can’t avoid the "equation organization". This hacking organization is considered to be a "unwilling to admit" department of NSA, similar to the "fantasy bear" hacking organization in Russia. Before being caught by Kaspersky Lab in 2015, Equation Organization was secretly active for 15 years. According to media reports, because the time and money spent on malware development, mobile technology breakthrough and target blockade are all funded by the state, the project resources are almost unlimited, and Equation Organization has become the "best" hacker organization in the world.

  Iran, Russia, Pakistan, Afghanistan, India, Syria, and Mali are among the top 500 infections in 42 countries made by Formula Organization previously announced by Kaspersky Lab. Due to the built-in self-destruction mechanism of malware, the attack of Equation Organization is difficult to be tracked. Therefore, the hacker tools leaked from this arsenal and some previously exposed attack methods can only represent the tip of the iceberg of the NSA network arsenal.

  Some NSA cyber weapons

  The "Equation Organization" under NSA was discovered and named by Kaspersky Lab. The name comes from their preference for using powerful encryption methods in cyber attacks. In the previous network attacks, they used various attack methods, such as worms, hard disk viruses, spyware, and network-based attacks.

  Fanny worm virus

  Fanny worm is the most powerful worm, which can invade the network isolated by the gateway. Fanny worm virus uses a unique USB-based control mechanism, which is mainly realized by USB disk infection.

  There is a hidden storage area in the U disk to collect basic system information from the isolated network. When the U disk infected with worms is inserted, the collected information can be immediately sent to the attacker in the networked state. If attackers want to run instructions on the network environment isolated by the gateway, they can store the instructions in the hidden space of the U disk through a worm. When the U disk is inserted into the target computer, the worm will automatically recognize and run the instructions.

  "Shenzhen" virus

  It is reported that "Shenzhen" is the first destructive virus specially written for industrial control system, which contains the vulnerability intrusion technology of Fanny worm virus, and can attack Windows system and Siemens SIMATIC WinCC system by using seven vulnerabilities. It is said that it was jointly developed by the United States and the Israeli government.

  The structure of "Shenzhen" virus is extremely complicated and its concealment is super strong. After the computer operator inserts the infected U disk into the USB interface, this virus will gain control of the industrial computer system without any operation.

  During the attack on Iran’s nuclear facilities, the virus suddenly changed the engine speed in the centrifuge. This sudden change was enough to destroy the centrifuge’s operation ability and could not be repaired. After the centrifuge was out of control, the virus still sent a report of "working normally" to the control room, so that the centrifuge was destroyed without anyone knowing. spyware

  Regin spyware is an advanced stealth malware discovered by Symantec in 2014, which can avoid the detection of conventional anti-virus software. The malware has been accused of being used to monitor the government, companies and individuals since 2008 and is considered to be associated with the NSA.

  Symantec pointed out that Regin spy tool uses a number of stealth technologies, which requires a lot of time and resources, indirectly indicating that it is a product developed by a "country". Regin malware allows hackers to launch a series of remote Trojan attacks, including stealing users’ passwords and data, intercepting users’ mouse clicks, capturing screenshots from infected computers, monitoring network traffic, and analyzing emails from Exchange databases. Hard disk virus

  A report by Kaspersky Lab has revealed that NSA may have implanted a virus in the hard disk firmware to rewrite the hard disk firmware of the infected computer.

  According to the report, because the virus is written into firmware, it can be activated after the hard disk is powered on. This malicious firmware creates a secret information repository, which can effectively prevent military-level disk erasure and reformatting, so that sensitive data stolen from victims can still be used even after reformatting the driver and reinstalling the operating system.

  PHP intrusion code

  Equation organization has been found to use malicious PHP intrusion code to attack loopholes in Oracle’s Java software framework or IE browser, ranging from scientific and technological product evaluation to various websites of Islamic Jihad forum. This invasion is as precise as surgery, which can ensure that only one specific target is infected. In an invasion case, the PHP script of Equation Organization also paid special attention to avoid infecting the IP addresses of Jordan, Turkey and Egypt.

Year of the loong’s first day at work? These three tips will help you to be full of energy tomorrow

Today is the eighth day of the Lunar New Year.
It is also the last day of the Spring Festival holiday.
An important reminder:
I will go to work tomorrow!
Everyone is about to start from
Switch "Vacation Mode" to "Work Mode"
How to adjust the state
Welcome to the first day of construction
Please check these tips.
↓↓↓
01
It is very important to return to work.
There are ways to deal with "post-holiday syndrome"
Going to work after the holiday is worried that you can’t find the state?
Feeling listless?
Difficulties in getting up, anxiety, excessive internal heat, fatigue and irritability.
What should we do?
Don’t panic!
maybe"Postholiday syndrome"Incoming
"Postholiday syndrome"
Is "sign"Not a "disease"
"Post-holiday syndrome" refers to a series of problems that arise when people suddenly enter the tense state of work from the relaxed state of holidays, and the balance between physiology and psychology is broken.
But it is called "sign" rather than "symptom" because it is a functional disorder, not an organic lesion, and it is not a disease. Everyone can return to normal work and life after a little recovery, so don’t worry too much ~
How to deal with "post-holiday syndrome"
Try the following methods.
Yue Xiaodong, a professor at the School of Psychology of Capital Normal University, pointed out
Going to work after the holiday is not in the state
It is inappropriate to attribute it to "laziness"
Because the whole rhythm of life in the early stage was out of order.
The autonomic nerve is also messed up.
It’s not that the motive is not in place
But energy can’t keep up.
Most people need a transition period.
You can try these methods to find your status.
Adjust sleep schedule
Three meals diet rule
Moderate sports activities
Actively adjust mentality, etc.
02
Set the alarm clock to check the road conditions.
The first working day in year of the loong never starts late.
Tomorrow (February 18th) is Sunday.
But it’s also a working day.
Pay attention to setting the alarm clock.
Don’t be late tomorrow ~
The first day to work
Morning and evening peak road conditions need attention
Spring Festival travel rush Return+First Day of Resumption of Work
Increased traffic pressure
Traffic control departments of several cities have released
Early warning and travel tips for congested road sections
Beijing
There is no limit to the tail number of motor vehicles tomorrow
8:00 to 9: 00 and 17: 30 to 19:30 are the peak hours.
Zhengzhou
The peak period is from 7:30 to 8:30 tomorrow morning.
Wuhan
Four types of roads have high risk of traffic congestion.
Pay attention to the release of the local traffic control department
Get road information
Please plan ahead for work.
Travel modes and routes
Try to avoid construction and easy-to-slow sections.
03
Start working healthily, don’t ignore the cold wave, keep warm.
From today (February 17th)
Year of the loong’s first cold wave
Will affect our country from west to east.
Many areas will have severe ups and downs.
Accompanied by a wide range of rain and snow
There is freezing rain in Henan, Hubei, Hunan and Guizhou.
There is heavy snowfall in Xinjiang and Heilongjiang.
Don’t worry about collecting thick clothes.
Add clothes in time to guard against colds!
a new year
Let’s start together when we are full of energy.
I wish everyone a good start.
(Source: CCTV News)
Reporting/feedback

Solar term Chengdu | Great cold, snow has fallen in Xiling Snow Mountain.

Original title: Solar Term Chengdu | Great Cold, Xiling Snow Mountain has fallen heavily.

Every winter comes to an end.

It’s a cold year to welcome the Spring Festival.

January 20, 2024

-great cold

Winter goes and spring comes, and the years flow.

Great cold is the poetic end of winter.

It is also the beginning of a new round of solar terms.

There are three Hou in the great cold

One wait: the chicken begins to milk.Milk, used as a verb here, means reproductive feeding. Everything has been sleeping for a whole winter. At this moment, they feel the budding spring air. Chickens began to hatch chicks, and the world ushered in new life.

The second stage: the bird is severely ill.About five days after the great cold, falcons, such as eagles, will hover around in the air looking for food to replenish their energy to resist the cold.

Third stage: Shui Ze’s abdomen is firm.In another five days, the ice in the northern waters will be frozen to the center of the water, solid and thick.

The Great Cold Day in Old Chengdu:

Wei sumptuous food

Source: Dai Shuliang’s old Chengdu folk festival painting "Great Cold"

Tail teeth originated from the custom of worshipping the land as "teeth" The so-called February is the first tooth, and it will be the "tooth" every second and sixteenth day, and it happens to be the tail tooth on December 16th of the lunar calendar. Under normal circumstances, the worship of the tail teeth usually begins at 4 or 5 pm on December 16. When the tail tooth worships the land Lord, the altar will be set in front of the land Lord. There will also be a altar at the door or back door to worship the foundation owner. Sacrificial offerings include sacrificial rites (chicken, fish and pig), four fruits (four kinds of fruits, among which citrus and apple are necessary), and "spring rolls", that is, moist cakes, which are filled with bean sprouts, carrots, shredded bamboo shoots, shredded pork and coriander, and are wrapped with peanut powder, which tastes delicious. Tail teeth originated from the custom of worshipping the land Lord as "teeth" The so-called second day of February is the first tooth. From now on, every second day and sixteenth day will be the "tooth", and it happens to be the tail tooth on December 16th of the lunar calendar.

Laba porridge

When the great cold comes, every household in old Chengdu will eat Laba porridge, which means that the grain is abundant and people and animals are prosperous. Ordinary people will cook residual vegetables, noodles and red beans into porridge on this day. Rich people should add delicious dishes such as meat, chicken and delicacies when cooking porridge. Nowadays, people cook laba porridge with whole grains and peanuts and red dates.

Appreciate plums

When plum blossoms "bloom alone", it is also a good time to enjoy plum blossoms in a year. In the cold season, going to Du Fu’s thatched cottage to enjoy plums is also a custom that has been preserved in old Chengdu. Not only Du Fu Caotang, but also People’s Park, Cultural Palace, Baihuatan and other places at that time can see plum blossoms in full bloom.

Today’s cold day in Chengdu:

Sauna

In the cold winter, sauna has become a popular way of health care for many people. Sauna can not only keep warm, but also relax and detoxify.It is undoubtedly a pleasant option in winter..

Pick oranges

Winter is the season when oranges are ripe, and golden sweet oranges are covered with branches, which is the warmth and sweetness of winter. In this cold season, tasting a fresh orange can not only moisten the taste, but also bring you warm comfort.

Xiling Snow Mountain reproduces the most beautiful snow scene in the middle of winter.

"It’s easy to dry sand and soft roads when it’s slightly wet, but it’s warm and snowy and sunny when it’s cold." After an unusually warm "March 9th", today, on the third day of entering the "April 9th", along with the "Great Cold" solar terms, there is also a big reversal of cold and warm.

Affected by the nationwide cooling, Xiling Snow Mountain ushered in the first heavy snowfall in 2024. In a few hours, the whole mountain was covered with a large quilt of edelweiss, and the thickest place was at least 10cm. Xiling Snow Mountain has opened the most beautiful snow scene mode in winter. Snow leaves are stained with frost, and the sky is full of clouds and clouds at sunrise. Such a beautiful Xiling Snow Mountain is waiting for you!

Great cold solar terms meet cold wave crit

Quick freezing "doubles", adding cold to cold.

Remind friends to pay attention to keeping warm and keeping out the cold.

Editor | Deng Ying

-Recommended reading-

Strong cooling is coming! Will it snow in Chengdu?

Recent popular videos

Editor in charge:

The Table Tennis World Cup will be held in Macau, China in April 2024.

On December 11th, according to Mi Gu Sports, the ITTF announced that the men’s singles World Cup and the women’s singles World Cup will return at the same time, and the competition will be held in April, 2024 at the Galaxy Variety Hall in Macau, China.

Liu Guoliang, Chairman of the Board of Directors of WTT World Table Tennis Federation, First Vice Chairman of ITTF and Chairman of China Table Tennis Association, said: "In April next year, the men’s and women’s singles World Cup will return to Macau, and table tennis fans from all over the world are welcome to gather in Macau again."

[Source: Mi Gu Sports]

Disclaimer: The copyright of this article belongs to the original author. If there is any source error or infringement of your legitimate rights and interests, you can contact us through email, and we will deal with it in time. E-mail address: jpbl@jp.jiupainews.com

Reporting/feedback