Breaking‼️
美東時間1月5日傍晚,川普以國家安全為由,用行政命令方式禁止阿里支付寶、微信支付、QQ錢包在內的8款中國應用程式(App)。
行政命令發佈後45天,禁止任何人與實體與這8款中國應用程式(App)進行交易。
按照日程,美國下任政府將在15天後,1月20日上任。
—
美國商務部長在同一時間發聲明表示,已指示商務部按行政命令執行禁令,「支持川普總統保護美國人民隱私與安全,免於受到中國共產黨的威脅。」
—
▫️8款App:
支付寶(Alipay)、掃描全能王(CamScanner)、QQ錢包(QQ Wallet)、茄子快傳(SHAREit)、騰訊QQ(Tencent QQ)、阿里巴巴旗下海外短視頻應用VMate、微信支付(WeChat Pay)和辦公型App WPS Office。
圖三:美國商務部聲明
圖四:美國國安顧問聲明
—
▫️白宮行政命令全文:
The White House
Office of the Press Secretary
FOR IMMEDIATE RELEASE
January 5, 2021
EXECUTIVE ORDER
- - - - - - -
ADDRESSING THE THREAT POSED BY APPLICATIONS AND OTHER SOFTWARE DEVELOPED OR CONTROLLED BY CHINESE COMPANIES
By the authority vested in me as President by the Constitution and the laws of the United States of America, including the International Emergency Economic Powers Act (50 U.S.C. 1701 et seq.) (IEEPA), the National Emergencies Act (50 U.S.C. 1601 et seq.), and section 301 of title 3, United States Code,
I, DONALD J. TRUMP, President of the United States of America, find that additional steps must be taken to deal with the national emergency with respect to the information and communications technology and services supply chain declared in Executive Order 13873 of May 15, 2019 (Securing the Information and Communications Technology and Services Supply Chain). Specifically, the pace and pervasiveness of the spread in the United States of certain connected mobile and desktop applications and other software developed or controlled by persons in the People's Republic of China, to include Hong Kong and Macau (China), continue to threaten the national security, foreign policy, and economy of the United States. At this time, action must be taken to address the threat posed by these Chinese connected software applications.
By accessing personal electronic devices such as smartphones, tablets, and computers, Chinese connected software applications can access and capture vast swaths of information from users, including sensitive personally identifiable information and private information. This data collection threatens to provide the Government of the People's Republic of China (PRC) and the Chinese Communist Party (CCP) with access to Americans' personal and proprietary information -- which would permit China to track the locations of Federal employees and contractors, and build dossiers of personal information.
The continuing activity of the PRC and the CCP to steal or otherwise obtain United States persons' data makes clear that there is an intent to use bulk data collection to advance China's economic and national security agenda. For example, the 2014 cyber intrusions of the Office of Personnel Management of security clearance records of more than 21 million people were orchestrated by Chinese agents. In 2015, a Chinese hacking group breached the United States health insurance company Anthem, affecting more than 78 million Americans. And the Department of Justice indicted members of the Chinese military for the 2017 Equifax cyber intrusion that compromised the personal information of almost half of all Americans.
In light of these risks, many executive departments and agencies (agencies) have prohibited the use of Chinese connected software applications and other dangerous software on Federal Government computers and mobile phones. These prohibitions, however, are not enough given the nature of the threat from Chinese connected software applications. In fact, the Government of India has banned the use of more than 200 Chinese connected software applications throughout the country; in a statement, India's Ministry of Electronics and Information Technology asserted that the applications were "stealing and surreptitiously transmitting users' data in an unauthorized manner to servers which have locations outside India."
The United States has assessed that a number of Chinese connected software applications automatically capture vast swaths of information from millions of users in the United States, including sensitive personally identifiable information and private information, which would allow the PRC and CCP access to Americans' personal and proprietary information.
The United States must take aggressive action against those who develop or control Chinese connected software applications to protect our national security.
Accordingly, I hereby order:
Section 1. (a) The following actions shall be prohibited beginning 45 days after the date of this order, to the extent permitted under applicable law: any transaction by any person, or with respect to any property, subject to the jurisdiction of the United States, with persons that develop or control the following Chinese connected software applications, or with their subsidiaries, as those transactions and persons are identified by the Secretary of Commerce (Secretary) under subsection (e) of this section: Alipay, CamScanner, QQ Wallet, SHAREit, Tencent QQ, VMate, WeChat Pay, and WPS Office.
(b) The Secretary is directed to continue to evaluate Chinese connected software applications that may pose an unacceptable risk to the national security, foreign policy, or economy of the United States, and to take appropriate action in accordance with Executive Order 13873.
(c) Not later than 45 days after the date of this order, the Secretary, in consultation with the Attorney General and the Director of National Intelligence, shall provide a report to the Assistant to the President for National Security Affairs with recommendations to prevent the sale or transfer of United States user data to, or access of such data by, foreign adversaries, including through the establishment of regulations and policies to identify, control, and license the export of such data.
(d) The prohibitions in subsection (a) of this section apply except to the extent provided by statutes, or in regulations, orders, directives, or licenses that may be issued pursuant to this order, and notwithstanding any contract entered into or any license or permit granted before the date of this order.
(e) Not earlier than 45 days after the date of this order, the Secretary shall identify the transactions and persons that develop or control the Chinese connected software applications subject to subsection (a) of this section.
Sec. 2. (a) Any transaction by a United States person or within the United States that evades or avoids, has the purpose of evading or avoiding, causes a violation of, or attempts to violate the prohibition set forth in this order is prohibited.
(b) Any conspiracy formed to violate any of the prohibitions set forth in this order is prohibited.
Sec. 3. For the purposes of this order:
(a) the term "connected software application" means software, a software program, or group of software programs, designed to be used by an end user on an end-point computing device and designed to collect, process, or transmit data via the Internet as an integral part of its functionality.
(b) the term "entity" means a government or instrumentality of such government, partnership, association, trust, joint venture, corporation, group, subgroup, or other organization, including an international organization;
(c) the term "person" means an individual or entity;
(d) the term "personally identifiable information" (PII) is information that, when used alone or with other relevant data, can identify an individual. PII may contain direct identifiers (e.g., passport information) that can identify a person uniquely, or quasi-identifiers (e.g., race) that can be combined with other quasi-identifiers (e.g., date of birth) to successfully recognize an individual.
(e) the term "United States person" means any United States citizen, permanent resident alien, entity organized under the laws of the United States or any jurisdiction within the United States (including foreign branches), or any person in the United States.
Sec. 4. (a) The Secretary, in consultation with the Secretary of the Treasury and the Attorney General, is hereby authorized to take such actions, including adopting rules and regulations, and to employ all powers granted to me by IEEPA, as may be necessary to implement this order. All agencies shall take all appropriate measures within their authority to implement this order.
(b) The heads of agencies shall provide, in their discretion and to the extent permitted by law, such resources, information, and assistance to the Department of Commerce as required to implement this order, including the assignment of staff to the Department of Commerce to perform the duties described in this order.
Sec. 5. Severability. If any provision of this order, or the application of any provision to any person or circumstance, is held to be invalid, the remainder of this order and the application of its other provisions to any other persons or circumstances shall not be affected thereby.
Sec. 6. General Provisions. (a) Nothing in this order shall be construed to impair or otherwise affect:
(i) the authority granted by law to an executive department, agency, or the head thereof; or
(ii) the functions of the Director of the Office of Management and Budget relating to budgetary, administrative, or legislative proposals.
(b) This order shall be implemented consistent with applicable law and subject to the availability of appropriations.
(c) This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person.
DONALD J. TRUMP
THE WHITE HOUSE,
January 5, 2021.
同時也有10000部Youtube影片,追蹤數超過2,910的網紅コバにゃんチャンネル,也在其Youtube影片中提到,...
「data collection example」的推薦目錄:
- 關於data collection example 在 唐家婕 - Jane Tang Facebook 的最佳解答
- 關於data collection example 在 โปรแกรมเมอร์ไทย Thai programmer Facebook 的最佳解答
- 關於data collection example 在 Amy韓國代購 Facebook 的最讚貼文
- 關於data collection example 在 コバにゃんチャンネル Youtube 的精選貼文
- 關於data collection example 在 大象中醫 Youtube 的最佳貼文
- 關於data collection example 在 大象中醫 Youtube 的最佳解答
data collection example 在 โปรแกรมเมอร์ไทย Thai programmer Facebook 的最佳解答
ในวิชา "วิทยาการคำนวณ" ระดับชั้น ม. 5
ได้ดึงวิชา data science (วิทยาศาสตร์ข้อมูล)
มาปูพื้นฐานให้เด็กๆ ได้เรียนกันแล้ว นับว่าเป็นโชคดี
เพราะวิชาพวกนี้เป็นของสูง กว่าจะสัมผัสก็คงตอนป.ตรี โท เอก
...Continue ReadingIn the subject of ′′ Calculation Theology ′′ class. 5
Pulled data science (data science)
Let's master the foundation for kids to learn. It's considered lucky.
Because these subjects are high to touch. It's probably in the middle of the year. Tri To Aek
Which I will review the content to read roughly. The content is divided into 4 chapters.
.
👉 ++++ Chapter 1-Information is valuable +++++
.
Data science in the textbook. Used by Thai name as ′′ Information Science ′′
This chapter will mention Big Data or big data with lots of valuable information.
And so much role in this 4.0 s both public and private sector.
.
If you can't imagine when you played Google search network, you'll find a lot of information that you can use in our business. This is why data science plays a very important role.
.
It's not surprising that it makes the Data Scientist s' career (British name data scientist) play the most important role and charming and interesting profession of the 21th century.
.
Data science, if in the book, he defines it
′′ Study of the process, method or technique to process enormous amounts of data to process to obtain knowledge, understand phenomena, or interpret prediction or prediction, find out patterns or trends from information.
and can be analysed to advise the right choice or take decision for maximum benefit
.
For Data science work, he will have the following steps.
- Questioning my own interest.
- Collect information.
- Data Survey
- Data Analysis (analyze the data)
- Communication and Results Visualization (Communicate and visualize the results)
.
🤔 Also he talks about design thinking... but what is it?
Must say the job of a data scientist
It doesn't end just taking the data we analyzed.
Let's show people how to understand.
.
The application design process is still required.
To use data from our analytics
The word design thinking is the idea. The more good designer it is.
Which Data Scientists Should Have To Design Final Applications
Will meet user demand
.
👉 ++++ Chapter 2 Collection and Exploration +++++
.
This chapter is just going to base.
2.1 Collection of data
In this chapter, I will talk about information that is a virtual thing.
We need to use this internet.
2.2 Data preparation (data preparation)
Content will be available.
- Data Cleaning (data cleansing)
- Data Transformation (data transformation)
In the university. 5 is not much but if in college level, you will find advanced technique like PCA.
- Info Link (combining data)
2.3 Data Exploration (data exploration)
Speaking of using graphs, let's explore the information e
Histogram graph. Box plot diagram (box plot). Distributed diagram (scatter plot)
With an example of programming, pulls out the plot to graph from csv (or xls) file.
2.4 Personal Information
For this topic, if a data scientist is implementing personal data, it must be kept secret.
.
Where the issues of personal information are now available. Personal Data Protection is Done
.
.
👉 ++++ Chapter 3 Data Analysis ++++
.
Divided into 2 parts:
.
3.1 descriptive analysis (descriptive analytics)
Analyzing using the numbers we've studied since
- Proportion or percentage
- Medium measurement of data, average, popular base.
Correlation (Correlation) relationship with programming is easy.
.
.
3.2 predictive analysis (predictive analytics)
.
- numeric prediction is discussed. (numeric prediction)
- Speaking of technique linear regression, a straight line equation that will predict future information.
Including sum of squared errors
Let's see if the straight line graph is fit with the information. (with programming samples)
- Finally mentioned K-NN (K-Nearest Neighbors: K-NN) is the closest way to finding K-N-Neighborhood for classification (Category)
*** Note *****
linear regression กับ K-NN
This is also an algorithm. One of the machine learning (machine learning, one branch of AI)
Kids in the middle of the day, I get to study.
.
.
👉 +++ Chapter 4 Making information pictured and communicating with information +++
.
This chapter doesn't matter much. Think about the scientist after analyzing what data is done. The end is showing it to other people by doing data visualization. (Better summoning)
.
In contents, it's for example using a stick chart, line chart, circular chart, distribution plan.
.
The last thing I can't do is tell a story from information (data story telling) with a message. Be careful when you present information.
.
.
.
*** this note ***
😗 Program language which textbooks mentioned and for example.
It's also python and R language
.
For R language, many people may not be familiar.
The IT graduate may be more familiar with Python.
But anyone from the record line will surely be familiar.
Because R language is very popular in statistical line
And it can be used in data science. Easy and popular. Python
.
But if people from data science move to another line of AI
It's deep learning (deep learning)
Python will be popular with eating.
.
.
#########
😓 Ending. Even I wrote a review myself, I still feel that.
- The university. 5 is it going to be hard? Can a child imagine? What did she do?
- Or was it right that I packed this course into Big Data era?
You can comment.
.
But for sure, both parents and teachers are tired.
Because it's a new content. It's real.
Keep fighting. Thai kids 4.0
.
Note in the review section of the university's textbook. 4 There will be 3 chapters. Read at.
https://www.facebook.com/programmerthai/photos/a.1406027003020480/2403432436613260/?type=3&theater
.
++++++++++++++++++++
Before leaving, let's ask for publicity.
++++++++++++++++++++
Recommend the book ′′ Artificial Intelligence (AI) is not difficult ′′
It can be understood by the number. End of book 1 (Thai language content)
Best seller ranked
In the MEB computer book category.
.
The contents will describe Artificial Intelligence (A) in view of the number. The end.
Without a code of dizzy
With colorful illustrations to see, easy to read.
.
If you are interested, you can order.
👉 https://www.mebmarket.com/web/index.php?action=BookDetails&data=YToyOntzOjc6InVzZXJfaWQiO3M6NzoiMTcyNTQ4MyI7czo3OiJib29rX2lkIjtzOjY6IjEwODI0NiI7fQ&fbclid=IwAR11zxJea0OnJy5tbfIlSxo4UQmsemh_8TuBF0ddjJQzzliMFFoFz1AtTo4
.
Personal like the book. You can see this link.
👉 https://www.dropbox.com/s/fg8l38hc0k9b0md/chapter_example.pdf?dl=0
.
Sorry, paper book. I don't have it yet. Sorry.
.
✍ Written by Thai programmer thai progammerTranslated
data collection example 在 Amy韓國代購 Facebook 的最讚貼文
Gardner(顧能) semi 2015 seminar summary
Section1
半導體2015成長率1%
每一種consumer devise成長趨緩
除了dram價格波動較大,供應商較少
Section2
Big challenge about iot, shorten the gap between end user & ur solution
Chip vendors need to go to a market partner instead of old system company
System company put all functions into one solution but can't customize for one new iot company
Oil gas hollipoten in India put 300 million to get oil driving information ... 3-4 weeks for collecting info -> testing & they need to shorten the cycle time ... Allow them do 3-4 times at the same time from buying technology system ... Which is iot opportunity (3-4 weeks -> 3-4 hrs)
Understand industry need & design
Put together entire solution & sell them for end user
Example
It & iot system
Info collection into enterprise & respond solution from system
Have to work with company deeply & understand their need & provide iot solution
So chip company need to become system integrator
Product off the shelf & design individual & choose a good end user partner
Section3
十字路口的中國智能手機的市場
非常多的手機品牌在中國市場,整合一直在發生
How many oem will be here in 2018? Continue integration ...
Nokia will out smartphone mkt slowly
中國手機市場已經飽和,中國手機品牌佔70-80%市場,除去蘋果和三星
所以中國手機必往海外巿場走,聯想,小米,華為是主要中國手機廠商,擁有最大機會。
宇龍,TCL,中興為二階廠商。
金立,oppo,天宇,Vivo,魅族為三階廠商。
和其他白牌和ODM....
印度白牌起來相當快但主要硬件提供廠商為大陸
第二第三階需借船出海,與當地廠商合作
第三第一階需買船出海,收購當地品牌,例如買Motorola
Lenovo buy IBM, Motorola but ASP keep low under RMB1,000, will bring more Motorola brand phone into China for higher ASP
Huawei smartphone improve, ASP RMB3,000
Others need to manufacture three diff type(三家營運商) & diff ASP smartphone
互聯網15%手機銷售,淘寶CoC 天貓BoC,例如小米,華為(3型號),Apple(1)..
例如,雙11紅米賣40-50萬台因為降RMB100
淘寶較多灰色部分,例如走私品牌
大陸最愛小米,iphone,三星,酷派...
小米策略,低價,銷售管道,黃牛拿到本錢->黃牛渠道,小米正常管道沒貨,客戶買黃牛,減少庫存壓力,增加市場廣告,華強南北都在賣小米,達到6000萬台下一步?
4G 21%在中國在2015,40%在2016,LTE供應端驅動的市場,chip maker hope, chip asp higher, enter earlier in lte, 營運商想加速但沒辦法,3G庫存高,中國要降低補貼,4G基地台要普及,缺乏官方旨令所以緩慢。
消費者不需換,入門門檻增高,一個月付30元流量低銷,等於低收入一個月通話費,4G手機比較貴
20%中國消費者8000台,2000台,付RMB100每月,4G,RMB2000
30%,RMB1000手機
50%,隨便不在乎
大部分消費者覺得4G沒有意義
mobile data based service
通過流量可以給消費者更多服務,雙卡也可綁消費者者,增加營收
半導體在中國
AP/BB mtk qcom sprd(Intel)有中國支撐有intel技術支援
Total:MTK45%,QCOM35%
4G:15%,QCOM40%,hisilicon 12%
China support high tech locally -> mutual fund(money)1200億 manufacture,existing fund 1000億 技術方面上巿公司,銀行借貸/稅收減免
通過市場自動運作非完全官方指令,集資->上市->流通
大公司對應,併購案興盛,地雷多
例如高通下單中芯,lntel投資展訊,MTK投資政府基金
Summary
選擇性找partner和投資正確
更高規給中國,sony很好
合作中國本土,更快找到機會
了解供應商roadmap,貼近市場
貼近政府策略方向
中國大陸和臺灣好溝通