You can break through the 18-year-old threshold of dating software by setting it at will.

  When the society is still debating whether minors should ban smart phones, it is undeniable that mobile phones have become an important tool in children’s lives, which not only provides the benefit of convenient contact, but also has the harm of being addicted to games. Some minors register dating software and step into the dating territory that belongs to adults; Some children even blindly expand their circle of friends by pushing friends through WeChat, which opens a dangerous door. In the interview, the reporter found that in reality, there have been many cases in which minors have been sexually assaulted by others through making friends through mobile APP and WeChat.

  case

  High school girls’ mobile phone friends were molested.

  A few months ago, Xiaoya, a high school girl, met Xiao Tao, a boy two years older than herself, through a mobile dating APP. Looking at the other person’s head, Xiaoya inevitably had a good impression on him. Across the screen, the two people’s behavior and words and deeds are also less scruples, and even some ambiguous words and deeds. After a few days of chatting on dating software, the two met in a big shopping mall.

  However, meeting is not as famous as meeting. Xiao Tao’s appearance is far from the avatar on dating software, and even a little rustic. Xiaoya was unhappy and ignored Xiao Tao’s love, playing games in the video game area by herself.

  In fact, 17-year-old Xiao Tao secretly went to work in the city from other places without telling his parents, and just found a job. Making friends by mobile phone has become an important way for him to integrate into the life of big cities. Xiao Tao is full of expectations for this meeting and is looking forward to a beautiful relationship. Looking at Xiaoya’s back playing games, he couldn’t help hugging Xiaoya from behind. I didn’t think about it, but I was strongly resisted and sternly reprimanded by Xiaoya.

  Xiao Tao was poured a pot of cold water by Xiaoya’s indifferent attitude, and then she thought that she had spent 100 yuan to buy coins for Xiaoya to play games, which made her feel even more lost. So he childishly hid each other’s bags, called Xiaoya to the underground garage, and angrily told Xiaoya to ask 100 yuan for money to recover economic losses.

  When he got the money back, Xiao Tao was still angry. On the spur of the moment, he pushed Xiaoya to the wall and reached out and touched the privacy of the other party. When he was just arrested by the police, Xiao Tao didn’t feel that this move could be a big deal, and he didn’t realize that it was a crime. In the end, Xiao Tao was sentenced by the court for compulsory indecency.

  Although one is the victim and the other is the defendant, when handling this case, Feng Miaomiao, deputy director of the First Procuratorate of Xicheng Procuratorate, felt sorry for both children. If it weren’t for the mobile dating software, the lives of two minors would have been completely different. Now, one is forced to molest, leaving a psychological shadow, and one is imprisoned when he first enters the society. In a sense, he is a victim.

  "How can two minors register for dating apps?" While handling the case, Feng Miaomiao paid more attention to this mobile dating software. There are also many criticisms of this software on the Internet, one of which is the low age limit threshold, which has a bad influence on minors.

  Just one month after Xiaoya’s case happened, the National Network Information Office launched a special rectification campaign against the chaos of the network audio platform, and this software is also under the rectification. It was not until last month that the software was restored to the shelves and the registration threshold was raised to 18 years old.

  survey

  False age registration lacks supervision

  The reporter downloaded the dating APP full of fashionable gimmicks involved in the case, and the user agreement has been highlighted: "If you are under 18 years old, please read and fully understand this agreement with the legal guardian, and use the software and related services with the consent of the legal guardian."

  The reporter registered with the mobile phone number. In the process of improving the information, the page prompts: "Filling in the correct information will help match, and we will protect your private information." The reporter found that if you are under 18 years old, the system will prompt that the setting failed and you can’t continue. As long as you choose to reach the age of 18, you can pass. You don’t need to upload your ID card, and there is no additional verification procedure, so you can register successfully, and then you can choose someone who matches you to chat.

  The reporter also registered another dating software that has been installed more than 100 million times. Although there is no special clause about minors in the user agreement, there is also an age threshold in the registration process. You can’t choose a date of birth under the age of 18 to register, but you can choose a date of birth that reaches the age of 18, and you can register successfully. There is also no substantive audit procedure.

  Prosecutor Feng Miaomiao said that setting a threshold based on age is helpful to prevent minors from stepping into the social circle of adults, receiving some bad information or suffering illegal harm, which is beneficial to the protection of minors. However, this threshold that can be broken only by users’ arbitrary settings is ineffective. For minors who are curious or have practical needs, it is as easy as blowing off dust to falsely report their age. And it is hard for them to really realize that what will be waiting for them when they enter the online world of adults with a pass that does not meet their real age?

  The reporter learned that in the previous cases of sexual assault on minors, it was also revealed that the dating software company did not verify the identity information of the registered personnel, which led to the problem that minors could register and log in by falsely reporting their age, and there were huge loopholes in management. Some procuratorates also specially issued procuratorial suggestions to relevant authorities to urge them to strengthen supervision and management of online dating platforms.

  The painful cases and the procuratorial suggestions of the procuratorate all show that the problem that the dating software does not verify the identity and the minors may be illegally infringed needs to be solved urgently.

  Prosecutors in Feng Miaomiao said that the technologies of uploading ID cards and even face recognition are very mature, which can completely verify identity and shield false information. However, for these software companies, strict identity audit will inevitably cause some users to resist, which will affect the registration and usage of users, and enterprises certainly have no incentive to do substantive audit.

  find

  Wechat QR code is more dangerous to push friends.

  In the interview, the reporter learned that in addition to using mobile APP to make friends, there is also a way of making friends among middle school students — — Friends circle pushes each other, that is, authorizing others to send their photos and WeChat QR codes to friends circle and WeChat group for divergent communication. In this way, children quickly develop "friends" and meet more strangers. Others push each other and even spend some money to let others help them push.

  For most adults, WeChat friends are usually family, friends and people who have work contacts and life contacts, and the circle of friends has certain privacy. Except Wechat business and promoters, most people don’t spread their QR codes and open their circle of friends at will.

  Minors are keen on this more open and almost undefended way of making friends than adults, and they also put themselves in a very dangerous situation.

  In a real case, Tingting, a 14-year-old middle school student, met a girl of the same age in another school in an extra-curricular cram school. When Tingting learned that the other classmate could help push the circle of friends, she also wanted to try this way of making friends out of curiosity.

  After being pushed the QR code and photos to the circle of friends in a nine-square grid, there were indeed many more people who took the initiative to chat with Tingting through WeChat. Tingting had a good talk with one of the boys. Although Tingting is strictly controlled by her parents and students are not allowed to use mobile phones at school, Tingting still takes the opportunity to chat with each other. After the first meeting between the two sides, Tingting reported that she was raped by the other side. After investigation, the man often looks for "prey" by adding WeChat friends.

  According to the reporter’s understanding, there are far more cases in which minors are invaded by strangers because of WeChat’s mutual promotion of friends.

  Even if the age threshold of dating software is in name only, there is still a threshold after all, and WeChat Twitter can be said to be irresponsible. In the police investigation, the middle school student who objectively bridged Tingting’s acquaintance with a strange man said that he was not familiar with both of them, but only vaguely had an impression of helping Tingting push her friends. As for their true identity and surname, who knows nothing. After helping to push friends, she deleted both of them’ WeChat.

  This middle school student often helps her peers push friends in their circle of friends. Some people even send her a few dollars red envelope to help her push friends. When the number of friends added by the other party meets the demand, she deletes the information of pushing friends. In this way, she can earn some pocket money.

  "This way of making friends seems incredible to adults, but it is very common among students ‘ Market ’ 。” Shi Liang, assistant prosecutor, told reporters that some students are proud of having a large number of WeChat friends and even compare with each other, eager to open their doors to the adult world in this way to show their social skills and personal charm.

  Unfortunately, children think this is just a way to meet more friends, but in the eyes of the "hunters" who are waiting for an opportunity, this "open" way of making friends is itself an ambiguous signal.

  suggestion

  The dating platform should verify the identity essence.

  Shi Liang said that many minors’ psychological cognition and physical development are unbalanced. They feel that they have almost the same physique as adults and have gained the ability to enter the adult world. But in fact, their awareness of society, self-prevention awareness and self-protection ability are far from perfect, and they are easily tempted or hurt.

  "The Internet has become indispensable in modern society. We can’t hinder social progress because the Internet may harm minors, but we can keep up with relevant supporting measures. In the final analysis, it is still that our adult society did not do its own work, did not establish enough protection mechanisms, and did not do effective education and communication, so that children were exposed to danger. " Shi Liang said.

  Prosecutor Feng Miaomiao suggested that the dating platform should be required to carry out substantive identity verification, such as uploading ID cards and face recognition, through administrative mandatory provisions, at least the self-discipline rules of trade associations, and at the same time pay attention to protecting the privacy of minors. This not only protects minors, but also helps to reduce the possibility of other online dating crimes. As an Internet and software enterprise, it should also shoulder social responsibilities, and not turn a blind eye to the possible signs of illegal crimes in order to pursue the number of users and economic benefits. Industry supervision departments should strictly manage, intensify inspection and punishment, and purify the network environment. (Reporter Sun Ying Illustration Feng Chenqing)

  (The minors involved in the article are all pseudonyms)

How can Milan restart after the Champions League exit and paying for the summer window?

After the end of the two-round series, AC Milan failed to go any further, but fell at the feet of its sworn enemy in the same city. As the defending champion, Milan’s performance has been stumbling this season. Although the Champions League has reached the semi-finals, the league competition for the fourth place is in jeopardy. A series of wrong operations last summer laid the foundation for this chaotic season. How to restart the Rossoneri revival requires Milan to think and choose together.

[The four-game losing streak has made the Milan summer window even more inefficient]

Even after 16 years in the semi-finals, Milan’s Champions League journey this season is quite bitter and embarrassing. In two rounds, I suffered a double kill from my rival Inter Milan in the same city. Counting the Super Cup and the second round of the league, I was defeated by my opponent four times in a row, losing 7 goals but not scoring 1 goal. No matter what ranking Milan will end up in this season, it is a fact that Milan’s four-game losing streak in the derby is absolutely zero, which makes the team miserable both inside and outside.

Losing the Champions League to a deadly enemy and competing for the fourth place is in jeopardy. For a defending champion, this is definitely an unacceptable result. Coach Pioli has almost overdrawn his prestige in this stumbling season. Although he helped Milan to return to the Champions League and win a Serie A championship, the successive fiasco in January has made him "stand in prison" in the hearts of many fans, and the four-game losing streak in the Derby is even more "solid".

The total score of 0-3 is not good-looking, and Pioli’s use of troops is also debatable. But in the last two weeks, Milan has already run out of ammunition and food. In the first round, Leo was injured and the midfielder Ben Nasser was damaged; In the second round, defender Jiafu went off halfway, and Kalulu, who came off the bench, made a big mistake carelessly. The rest of the players are almost drained by the long season, and Gill, Special Olympics and krunic have all shown fatigue; Mesias and Tonali struggled hard, but they were powerless.

The bigger gap between the two sides actually lies in the rotation of the lineup. On the starting Milan may be equal to Inter Milan, but in the long-distance running of the season, Milan’s replacement lineup seems to be weak. Last summer, five players, such as Decatur, Origgi, Adelie, Dester and Franks, who were introduced and returned, failed to meet expectations and were not even included in the Champions League registration list. Only German defender Jiafu and youth training teenager Pobega showed certain value.

From the appearance lineup in the Champions League stage, we can also see Milan’s inefficiency last summer-Decatur, who invested heavily, only played in the first leg against Tottenham in the knockout stage; The only new aid with a starting record in the knockout round is Zhongwei Jiafu; In the two wars against Naples, not even a new aid started. Milan lost Casey and romagnoli last summer, and Ibrahimovic was close to retiring, but the Rossoneri hardly got any new blood, and it was almost doomed that they gradually declined at the end of the season. Inzaghi can let Lu Kaku play the league, Zhe Ke play the Champions League, and Milan can only hope that Gill will stick to his teeth.

[The concept is different, but the operation is different]

Therefore, the gap between Milan and Inter Milan in this series is actually the gap between the summer window transfer results. In the past year, both teams have experienced brain drain, and Inter Milan chose to fill it with mature players, such as Lu Kaku, acerbi and mkhitaryan. However, Milan chose to invest in young players to "scratch the lottery". Except for Origgi, who signed for free, all the other players are young people under the age of 23.

Two different strategies have different advantages and disadvantages. Inter Milan’s choice can bring more instant fighting power to the team. The third-line parallel is closely related to the performances of mkhitaryan and Lu Kaku. acerbi’s aging and growing stronger offset the negative impact of skrinjar’s "defection", so that Inter Milan will not lose its fighting power because of the absence of the core central defender. However, the cost of the lineup is high and the age is high. Even if the Champions League income is more than 100 million euros this season, the Nerazzurri’s loss has reached 100 million euros.

In contrast, Milan pays more attention to the long-term growth of the lineup, but it also loses experience and ability. Apart from Gill and Kyar, there are no core players over 30 in Milan. The cost of the lineup is also relatively controllable. With the Champions League results this season and the breakthrough in sponsorship, the Rossoneri, which had suffered losses for years, are expected to have a financial balance or even a small profit this season. But investing in young players requires patience, and not every bet can be rewarded. Germany’s Zhongwei Jiafu performed well in the second half, but in the first half, he experienced several months of "slow fire"; Decatur, who has high hopes, has not adapted yet.

But on the other hand, the operation of Inter manager Mallota is still more sophisticated than that of Milan director Paolo Maldini. In recent years, Inter Milan has lost its lineup every year, but Mallota, a seasoned player, has played a perfect game. After Lu Kaku left, he signed Zhe Ke, while Eriksson signed Chaer Hanoglu when he suffered from heart problems. Instead, it was the teams of Rome and Milan who took most of the damage for Inter Milan. Even if Inter Milan’s financial problems are frequently reported in newspapers, Mallota can still guarantee the team’s basic set at the league level.

But Maldini’s operation was too idealistic last summer. Hong Niao Fund hopes to invest in young players, but it is free to choose the specific target. However, the Milan uniform team did not supplement the backcourt when Kathy and romagnoli left the team. Instead, they introduced an attacker with unclear characteristics and outstanding strength, Decatur. Every time Maignan is in a hurry, many Milan fans will think, how nice it is to spend this 32 million yuan on a lower back!

Start all over again, but who will get a second chance? 】

Outside the stadium, Milan also sent ominous signals more than once. Before the first leg of the Champions League, Maldini called Hong Niao Capital and asked for more investment. After the exit, he once again pointed the finger at the management, claiming that "the management’s strategy" decided the transfer operation. In fact, the relationship between local managers and investment funds in Milan has always been subtle. In 2020, even Bo Ban was fired after firing at the employers. This time Maldini chose to fire, which made people worry whether he would make the same mistake again.

Both Eliot and Hong Niao Capital are obviously profit-seeking, hoping that the value of the team will gradually increase. But on the other hand, Maldini received a lot of financial support. Last summer, Milan’s net investment was the first in Serie A, and 32 million euros of Decatur also set a new record in the American-funded era. While criticizing the management strategy, the resource allocation and choice of trader Maldini are equally worth examining. However, with the exit from the Champions League, the contradiction between the two sides seems to be open again. Before starting again, perhaps the Rossoneri will have to face internal friction first.

Nature’s subversive discovery: Everyone has a "sixth sense"? Will future computers run on human brain cells? | This week is worth reading

Biology and medicine

The subversive discovery in Nature is that everyone may have a "sixth sense", but they just don’t realize it.

@ Academic Jingwei Nature

Why are fingerprints unique? Cell reveals the mystery of fingerprint formation

@ Academic Jingwei Cell

Common sugar substitutes in zero-sugar drinks may increase the risk of heart disease and thrombosis.

@ Science Circle Nature

Cell accidentally found that there are these similarities in the brains of fighters and onlookers.

@ Academic Jingwei Cell

Computer artificial intelligence

New posture of scientific research: let GPT-3 help you.

@ qubit arXiv

When organ-like intelligence shines into human reality: will the future computer run on human brain cells?

@ biological exploration Frontiers in Science

A snapshot can restore a video! AAAI 2023 proposes a new snapshot compression imaging algorithm.

@ qubit AAAI 2023

Materials and chemistry

Wang Qing/Huang Xingyi Nature: Energy storage materials, a major breakthrough!

@ nanohuman Nature

The key role of the latest Nature: H in superconductivity in Electronic Science and Technology University of China.

@ nanohuman Nature

Using metal atoms to construct the skeleton of polymer, it is the longest metal polymer so far.

@ Global Science Angewandte Chemie International Edition

Astronomy and physics

The asteroid "Dragon Palace" contains about 20,000 kinds of organic molecules.

@ Global Science Science

Study on local structure in disordered materials by neutron scattering

@ Keai KeAiNuclear Analysis

The most powerful explosion in the universe

@ 京京京京京京京京 arXiv

Cover image source: Unsplash

IOT Card and Industry 4.0: The Future Trend of Intelligent Manufacturing

In recent years, with the rapid development of Internet of Things technology, IOT card has become a topic of great concern. As a special SIM card, IOT card can transform various items into IOT devices that can be connected to the Internet, giving them the ability of wireless communication. In this paper, we will discuss the reasons why IOT card is a hot topic, as well as its application and development trend.

First, why has the IOT card become a hot topic?

IOT card has become a hot topic for the following reasons:

The rise of smart home: With the gradual popularization of the concept of smart home, people’s demand for smart home equipment is also growing. IOT card can connect smart home devices with the Internet, thus realizing remote control and data sharing, which greatly facilitates people’s lives.

Application expansion of Internet of Things: Internet of Things technology has been more and more widely used in smart cities, intelligent manufacturing, intelligent transportation and other fields, and the IOT card, as an important part of Internet of Things equipment, has attracted more attention.

Advantages of low cost and power consumption: IOT card adopts low-power wide area network technology (LPWAN), which has the advantages of low cost, low power consumption, low bandwidth and long-distance transmission. This means that IOT cards can be applied to a wider range of fields and further promote the development of the Internet of Things.

Second, the application of IOT card

The application scope of IOT card is very wide, mainly reflected in the following aspects:

Smart home: IOT card can connect all kinds of smart home devices to the Internet, such as smart door locks, smart lighting, smart home appliances and so on. These devices can realize remote control and data sharing through the Internet, which is convenient for people’s lives.

Smart city: IOT card can connect all kinds of devices in the city to the Internet, such as smart bus, smart parking, smart street lamps and so on. These devices can realize intelligent management through the Internet, and improve the service level of the city and the quality of life of residents.

Intelligent medical care: IOT card can connect all kinds of medical equipment to the Internet, such as telemedicine and health monitoring. These devices can be implemented through the Internet.

Realistic on-site monitoring, telemedicine, etc., to improve the efficiency and quality of medical services.

Intelligent transportation: IOT cards can connect transportation equipment to the Internet, such as intelligent vehicles and intelligent traffic lights. These devices can realize intelligent management through the Internet and improve traffic efficiency and safety.

Intelligent manufacturing: IOT card can connect industrial equipment to the Internet, realize intelligent management of industrial equipment, and improve production efficiency and quality.

Third, the development trend of IOT card

The future development trends of IOT cards mainly include the following points:

Large-scale application: With the gradual popularization of Internet of Things technology, IOT cards will be more widely used, which will further promote the development of Internet of Things.

Industry consolidation: The industrial chain of IOT cards will be gradually integrated, and enterprises in different links will cooperate more closely, thus realizing the standardization and scale of IOT card production.

Improvement of low-power technology: the core technology of IOT card is low-power technology, and the future IOT card will pay more attention to the improvement and application of low-power technology.

Improvement of security: With the increasing application of IOT cards, the security of IOT cards will become an important issue. In the future, the IOT card will strengthen the security guarantee and improve the trust and satisfaction of users.

The combination of AI and IOT card: The combination of artificial intelligence and IOT card will bring more innovative applications, thus further promoting the development of IOT technology.

IV. Conclusion

In a word, as a key component of the Internet of Things, IOT card has a wide range of application scenarios and broad development prospects. With the continuous development of technology and the continuous expansion of application scenarios, I believe that IOT cards will be more widely used in smart homes, smart cities, smart medical care, intelligent transportation, intelligent manufacturing and other fields in the future. At the same time, the industry consolidation of IOT card, the improvement of low-power technology, the improvement of security and the combination with artificial intelligence will also become important trends in the future development of IOT card.

[This article was originally issued by the official Qingyi IOT Card, and the source of reprinting needs to be noted]

What can one server do?

A wave of 1500 people were organized before the activities of Alibaba Cloud servers, and 200 people were organized. But I am not organized now.

But when organizing this activity, I learned that everyone has a common question:Is this server use? ?

When it comes to the server, many people may say distributed, do calculation, crawl, and procedure background service, multi-person cooperation, etc.

In fact, these ordinary people can not use it, I will say that everyone can use it.

Everyone must have a work folder when you work, the students are your own courseware, exam, prepare for interview, and so on.

The friend who has already worked, there will be a file that puts your own important document, MarkDown, Pictures, Resume, etc.

Such an important folder, and we have to update every day, and we are worried about the computer is lost, or it is broken, suddenly these are not seen.

So we want to back up.

There is also our frequent personal computers and working computers to synchronize some private information, rather than passing on WeChat.

These are the use scenarios of Git private service, and it is very easy to use.

Everyone also knows GitHub, Gitee can also engage in private warehouses to back up, synchronous files, but their documents may put a lot of important information, including their own passwords, key classes, and put it above. It is not necessarily safe. You are not afraid of which major bugs will leak your information [wit]

More crossed, GitHub and Gitee are speed-off. After all, the functional positioning of people is not a network disk.

There is a large file in the project (more than a few hundred m), such as PDF, PPT, etc. It will make you suffocate.

Later, I will send a document to tell, how do you have a git private service!

This can be used to generate a download link of the file, or the local file can also be transmitted to the server.

It is equivalent to making an object store, in fact, cloud manufacturers also have objects stored.

However, we can do one, not enough, very classmates, you should not know how object storage, in fact, we can use the server to be a similar company.

I have been deployed on the server with a tool written by Go now. Used to pass files with the server, or create a temporary download link for some files.

These are direct command lines,

In this way, I wrap the command package into a shell command, want to pass the file, directly uploadTomyServer, and then return to the downloadable link, this file also passed to my server.

I also put my project code on GitHub:

Interested exciting friends can go to learn a wave, and give a star. Haha.

Do a website, for example, everyone knows how to write a few lines of code with HTML, but how to show someone else?

If you use your own computer to do a server, you can only access your website with your device in the same router, and this device can not have your website.

Because your IP is not a public IP.

If there is a cloud server, it is a public network IP, your website can make anyone visit.

Or a service you provide allows anyone to use.

For example, in the second example, we can develop a file storage, this service, I only put the command line to others, others can use my service to generate a link, of course their files have passed to me. On the server.

Again a way of use.

I have previously organized the activities of the server, Ali Cloud gave me an Excel, let the face are the list of friends who buy servers here, I will directly put this list directly to the group, let everyone check, appear in list You can find me to cash back, do you have anything.

There are several big problems that do this:

  • Everyone is going to download Excel, do contrast, there will be someone to change the content of Excel and then say it is bought from you, I can’t make a comparison with Excel.
  • Excel has a personal information from others, which is unstoppable.
  • If everyone uses Excel inquiry, private letter I cash back, one is nearly two thousand people to find me cash back, my WeChat is imposed, this becomes physical activity.

How should I do it?

I simply write a query page, the backend logic is to read an Execl form, everyone enters her Ali Cloud ID in the query page, if in Excel, the page will return the QR code of the cash back group, everyone can be independent Scan code is plus group.

In this way, I will finally send an equal red envelope directly in the cash group, is it great to reduce human cost?

Of course, I generated the QR code of 17 cash back groups. According to certain rules, they show friends passing through the query.

It is such a very ordinary query page.

After the query passes, the cash back group is displayed.

But to deploy on the server, because there is no public network IP, others can’t use your service.

Learn Linux

Learning Linux actually engaged in a virtual machine on your computer, or you can also learn the dual system, but this is very testing how your computer performance is.

If you have a server, it is a separate computer. How do you Hoho Huoho, and you don’t have to shut down a year, you can always run your task, and your local computer is completely isolated.

More convenient, you are now in the system, such as Centos, want to do an experiment, need to be on the unbantu, if it is a cloud server, the replacement system is in the background point, one button is reloaded, the cloud manufacturer basically supports all the system installation of.

We usually play Linux is often equipped with various environments, then this Linux is played by yourself (generally unwarring use root permission), in short, the environment is unable to reload, basically reload.

The cloud server reloading the system is too convenient.

There is also an environment where you are not easy to match. If you play this environment later, you will go back to this previously matching environment rather than re-fitting the system.

Then you can save the function with the cloud server, you can play a mirror package in the moment you match the environment. If the environment is broken, you will fall back to the status of the last mirror package. This is very fragrant.

Summarize

In fact, there are still many other uses, but I just say that everyone is universally used.

The above, the three points mentioned: git private service, document storage service, build a website, I will send a hand to do your hand, truly use the server to improve our work learning efficiency!

Regarding the activities of the free collar server, I will not organize so many people also involve the cash back. Some of the friends do not look at the group information, then directly private letter and I complain, I am really handling, body and mind Too much.

If you want to buy a server, you can purchase this link:

Https://www.aliyun.com/minisite/goods?taskpkg=1111ydsrwb&pkgsid=1959&recordid=962642&usercode=roof0wob

Now is the double eleven event, or the activity price is over, and it will be over in December.

The price is really very cheap now, 60 blocks for new users can buy one year,But I will no longer be cash out, everyone can buy it yourself through the link..

If you want to register a new number, pay attention to real-name certification requires a new ID card.

It is recommended to buy these two servers, which is all, cost-effective.