Ask M8 exposure, buy M9, it is better to buy it, save 100,000 yuan.

Text | AUTO core ball

Author | Lei Man

Another king fried product is coming in the world.

I advised you before that M7 was too ugly and M9 was too expensive.

 

Such as asking M8, this is not coming?

Just now, the truth of M8 real car was exposed.

 

I took a closer look, and this is the most beautiful boundary in my heart.

From the side face value, it is much stronger than M7.

It’s also better than my boss’s 600,000, and the rushing M9 is much younger.

Crucially, M8 now uses the same original platform as M9.

It’s definitely not M7′ s oriental scenery.

Now Cyrus has confirmed that M8 uses the Rubik’s Cube platform.

Don’t underestimate this Rubik’s cube platform, it can build plug-in hybrid cars, extended-range cars and pure trams.

With this platform, you can get a new car just like going to jiaozi.

M9 is built on the Turing platform upgraded on the Rubik’s Cube platform.

And as you can see from spy photos,

M8 and M9 use the same headlights and taillights.

 

I made some inquiries, and it is very likely that M8 will be listed in December this year.

It was also the year when M9 went on the market, and it was the time to launch a new car.

If you ask me, the price of M8 will definitely be between M7 and M9.

You must agree with this,

That is, the range of 340,000 to 440,000. The configuration is actually very easy to guess.

The M8 low match will be in line with the M7 top match,

The M8 high match is the same as the M9 low match.

On the whole, the length of M8 will reach about 5 meters, with triple screen.

 

Adopting the extended range+pure electric dual power mode,

The extended-range version will be equipped with a 1.5T engine and a dual-motor 330kw power combination.

Intelligent driving, equipped with lidar, equipped with Huawei ADS3.0 advanced intelligent driving,

In terms of mechanical quality, the low gear will be equipped with a variable suspension, which can adjust the hardness.

The high gear may be equipped with air suspension, which can adjust the height.

As for laser projection and zero-gravity seats, it is estimated that they will also be optional.

Seeing this, those who are ready to buy M9 can wait,

After all, the configuration is not bad and the face value is good. The key is to save about 100,000 yuan.

If we really have these configurations, my boss spent 600,000 yuan on the M9 top in March.

It is estimated that he will have to break through the defense. The configuration and price of M8 will save him at least 200,000 yuan.

Should we wait for the party to be blessed?

Buy a car. Listen to me. Don’t be a sucker.

* The pictures in this article are all from the Internet.

Focus on smart cars to help key decisions.

Online celebrity exposed that Joker Xue had been "supported" and cheated to buy a house for his ex-wife.

Online celebrity Li Yutong was exposed by Joker Xue for cheating money and feelings.


1905 movie network news On the evening of September 12th, Li Yutong, online celebrity, published a document in Weibo, revealing that Joker Xue had cheated money and feelings, and had paid a breakup fee of 10 million with Xue. Li Yutong wrote in Weibo that in 2012, they jointly opened a Taobao shop called "UUJULY", which was a pure partner, but suddenly one day Xue confessed to me that he had fallen in love with me deeply. But I can’t be with this man.

Online celebrity said that the two had cooperated to open a Taobao shop.

 

A week later, Joker Xue called to say that Gao Leixin had a miscarriage, and the two divorced, but they needed to claim 10 million divorce fees. Xue promised to stay with me after paying back the money, and the two of them would bear the divorce fees together. One day late at night, I got a call from Xue, saying that Gao Leixin had a pituitary tumor and needed another 10 million to see a doctor, otherwise it would be revealed that Xue had abandoned his illness. Li Yutong also said that two years later, I left this vortex, ended this relationship and gave up everything.

 

Online celebrity Weibo said that the news will continue tomorrow.


This matter has caused a heated discussion on the Internet, and netizens have different opinions. Later, Weibo, the official of Extreme Challenge, reprinted Weibo of Li Yutong and wrote: "Hey, I actually knew you were together for a long time." But this morning, Weibo, the official of Extreme Challenge, said: "Statement: it has been found out. At 23: 53 on September 12th, Guanwei forwarded a Weibo for no reason. Actually, the account was stolen, and the password has been urgently changed! I sincerely apologize to you! "

 "Extreme Challenge" officially reprinted online celebrity Weibo


"Extreme Challenge" officially said that it was stolen.

Before the deadline for publication, Joker Xue didn’t respond to this matter. Fans in Joker Xue left a message in Weibo, online celebrity: "I believe Joker Xue is a good man." "Please prove it with a hammer. Where are the pictures of you two together? What about the chat record? " It is really hard to believe that a crowd of spectators can’t figure out their minds in the fog, but only rely on a piece of paper.


Notice on soliciting topics in the field of special integrated circuits for new generation information and communication technology innovation in 2022

  In order to promote the scientific and technological innovation and industrial development of integrated circuits in our city, we are now openly soliciting topics in the field of integrated circuits in 2022 for innovative subjects in this city. In 2022, it is planned to collect projects in three directions, such as computing chips, analog chips and EDA tools in the field of integrated circuits, and it is planned to support 10 projects, and it is planned to arrange the municipal financial science and technology funds of 42 million yuan. The subject is declared in accordance with the research direction of the second-level title of the guide (such as 1. Energy-efficient in-memory computing chip). In 2022, the specific guidance directions and reporting requirements in the field of integrated circuits are as follows:

  First, the direction of collection

  (A) a new architecture computing chip

  1. Energy-efficient in-memory computing chip

  In order to meet the needs of the Internet of Things, mobile terminals, intelligent unmanned systems and other scenarios for energy-efficient computing, and to solve a series of problems such as "power wall" and "memory wall" in the existing computing architecture, in-memory computing chips based on traditional or new storage devices are developed. Study the in-memory computing unit and its process realization, study the new in-memory computing architecture and key technologies of the system, study the optimal deployment and reconfigurable architecture technology of core typical neural networks based on in-memory computing, and deploy application verification for typical intelligent processing scenarios such as audio and video.

  2. Highly integrated memory and computing integrated chip

  To meet the different requirements of the Internet of Things, intelligent unmanned systems, autonomous driving and other systems for the intelligence, miniaturization, low power consumption and low delay of visual sensors, a highly integrated and energy-efficient system on a chip integrating visual sensing, storage and computing is developed. This paper studies the circuit technology and the joint optimization method of software and hardware to realize sensing signal processing in analog and mixed signal domain. Develop an algorithm for typical intelligent visual perception scenes; Complete the application verification of intelligent visual perception scene for ultra-low power consumption and ultra-high speed requirements.

  (2) High-end analog chips

  3. High-precision ADC chip

  Aiming at the urgent demand for high-precision measurement of analog parameters (such as voltage, current, temperature, pressure, etc.) in intelligent manufacturing, test equipment, instrumentation and other application scenarios, a high-precision ADC chip is developed. Study the design technology of ADC chip with high linearity, low temperature drift, low noise and low power consumption; Research on digital aided analog circuit design technology and high precision device mismatch error calibration technology; The design technology of analog front-end circuit with high signal-to-noise ratio and low harmonic distortion is studied. Complete the functional verification for typical industrial measurement and control scenarios.

  4. High performance clock chip

  Facing the urgent need of high-performance clock time synchronization chip for high-speed data transmission of data center, communication and Internet of Things equipment, a system-level clock chip suitable for clock time synchronization of various industries, such as synchronous timing, high-precision time synchronization and low-jitter arbitrary frequency generation, is developed. Research on intelligent algorithm control time-frequency synchronization chip system architecture; Research on low jitter clock jitter filtering PLL technology, high performance fractional frequency division technology and high precision time error detection technology; Complete application verification or large-scale commercialization for typical scenarios.

  5. Ultra-high definition long-distance HDMI transmission chip

  Aiming at the urgent need of high-speed and low-power data transmission for ultra-high definition long-distance transmission, an HDMI2.1 transmission chip with 48Gbps transmission rate is developed. Research on low-power ultra-high definition video transmitter and ultra-high bandwidth adaptive equalization video receiver; The phase-locked loop technology of low jitter clock and spread spectrum clock, and the generation technology of arbitrary fractional clock based on phase interpolation are studied. Study the real-time bidirectional transmission technology of ultra-high definition video; Research audio embedding extraction and video compression technology; Realize large-scale commercialization of long-distance network cable and optical fiber real-time bidirectional transmission for ultra-high-definition video.

  6. Ultra-high-speed low-power interface chip

  Facing the urgent demand for high-density, low-power consumption and high-reliability data transmission in high-performance computing and data centers, an ultra-high-speed Serdes chip with transmission rate of 100Gbps and above is developed. Research on high-speed and low-power data serialization driving transmission and reception links; The multi-phase ultra-low jitter clock generation circuit and clock phase calibration technology, receiver equalization technology and high-speed interface broadband impedance matching technology are studied. Combined with the specific protocol layer to form a standard chip to complete the application verification of typical scenarios.

  (3) EDA tools

  7. General parametric layout unit design software

  Aiming at the advanced integrated circuit manufacturing process, the general parametric layout unit design software is developed. Study the general description language of parameterized layout unit; The efficient syntax analysis and abstract syntax tree optimization technology of general description language are studied, and the automatic generation technology from virtual layout unit to target layout unit is studied. The reusable high-performance function library of virtual layout unit for complex analog devices is studied. Study the visual editing and debugging technology of virtual layout unit; Study the DRC real-time verification technology of virtual layout unit; Complete the application verification for the back-end layout design requirements.

  8. Integrated EDA tools for integrated circuit testing

  In order to meet the urgent demand of EDA tools for automatic test circuit design to ensure chip quality in integrated circuit design process, an integrated EDA tool for integrated circuit test is developed, which integrates testability design, test generation and fault diagnosis. The method of generating test vectors for logic circuits that support both high fault coverage and high fault discrimination rate is studied, and the high parallel fault simulation technology is studied. Research the testability design method that supports fault testing and fault diagnosis at the same time, and study the logic circuit diagnosis method for multiple faults; Complete the application verification and commercial application of test integrated EDA tools in the design of domestic processor chips.

  9. Analog circuit parasitic parameter extraction and analysis platform

  Aiming at the demand of parasitic parameter extraction and analysis of high-end process analog circuits, a tool platform for parasitic parameter extraction and analysis of analog circuits is developed. The influence of various parasitic effects, including etch effect, CMP effect and raised diffusion structure, on parasitic parameters under high-end technology is studied. The accurate and fast algorithm for extracting parasitic parameters at the chip level is studied. Research on parallel extraction algorithm supporting multi-machine mode; Research on large-scale parasitic parameter analysis technology based on parasitic netlist; Complete the application verification of the chip-level analog circuit parasitic parameter extraction and analysis tool in the actual analog circuit chip design.

  10. Power supply integrity simulation analysis and diagnosis platform

  There is an urgent need for power integrity analysis for multi-scale advanced packaging design, and an efficient and high-precision power integrity simulation analysis and diagnosis platform is developed. This paper studies the polygon alignment and simplified processing technology and field identification technology of multi-layer VLSI layout from centimeter level to nanometer level. Study the grid generation platform of multi-scale structure of system-level advanced packaging structure; The parallel solution technology of ultra-large sparse matrix for solving the field is studied. Study the error diagnosis technology of advanced packaging design layout; Achieve high-efficiency and high-precision simulation and diagnosis of advanced packaged power supply integrity analysis.

  Second, the support amount and cycle

  Fixed funding, the first and second projects are supported by 5 million yuan, and other projects are supported by 4 million yuan. The research content of the subject must cover all the contents listed in the corresponding sub-direction. The project implementation period is generally 2 years, not more than 3 years.

  Third, the reporting requirements

  1. The application subject should have a clear technical route, strong industrial traction, contribution and social benefits, and clear and quantifiable objectives and assessment indicators.

  2. The applicant shall be an enterprise or institution registered in Beijing with independent legal personality, with corresponding scientific research capabilities and conditions and standardized operation and management. Encourage enterprises to take the lead, and Industry-University-Research should use combination.

  3. The applicant and the person in charge of the application shall comply with the requirements of the Measures for the Administration of Beijing Science and Technology Plan Projects (Projects) and the Measures for the Credit Management of Relevant Responsible Subjects in Beijing Science and Technology Plan Management; There is no bad credit record in applying for various scientific research projects (topics) at all levels in the past 3 years. No administrative punishment or illegal record, no bad scientific research integrity record.

  4. If the applicant is an enterprise, in principle, it can participate in no more than one special declaration. The total investment and source of funds of the project should be clearly stated, and corresponding matching funds should be provided. The ratio of matching funds to science and technology funds should not be less than 2:1.

  5. In principle, the person in charge of the declaration shall undertake no more than 2 projects (projects) of Beijing Science and Technology Plan as the person in charge, and the number of projects as the main participants shall not exceed 3 in principle.

  Fourth, the declaration method

  1. Take the online declaration method. After the applicant logs in to the "Beijing Science and Technology Plan Integrated Management Platform-Online Service System" (https://mis.kw.beijing.gov.cn/) through the legal person’s one-card pass to update the information of the applicant, the applicant logs in to the system and binds the applicant, selects the corresponding application type, completes the report of the implementation plan, and uploads the summary of the project (see the annex, the summary of the situation and the assessment indicators are no more than two pages) and other supporting materials required for the application of the project.

  2. The scientific research department of the reporting unit is responsible for reviewing the online reporting scheme, submitting it uniformly within the reporting time limit, downloading and printing the reporting list, affixing the official seal of the unit in duplicate, scanning it into a PDF file and uploading it to the system.

  3. The deadline for project application and acceptance is 24:00 on August 28th, 2022, when the system will automatically shut down.

  4. Advisory services

  Policy consultation telephone numbers: 010-88827942, 010-88827943, 010-88827945.

  Technical consultation telephone numbers: 010-58858680 and 010-58858685.

  Consulting service hours: 9:00-12:00 and 14:00-17:30 (working days).

  Attachment: Summary of topics

Beijing Municipal Science and Technology Commission, Zhongguancun Science Park Management Committee    

August 5, 2022  

Notice on Public Solicitation of Opinions on the Administrative Measures for Internet Information Services (Revised Draft for Comment)

In order to promote the healthy and orderly development of Internet information services, protect the legitimate rights and interests of citizens, legal persons and other organizations, and safeguard national security and public interests, our office, together with the Ministry of Industry and Information Technology and the Ministry of Public Security, drafted the Measures for the Administration of Internet Information Services (Revised Draft for Comment), which is now open to the public for comments. The public can give feedback through the following ways and means:

1. E-mail: law@cac.gov.cn.

2. Mailing address: Network Rule of Law Bureau of National Internet Information Office, No.11 Chegongzhuang Street, Xicheng District, Beijing, 100044. Please indicate on the envelope "Measures for the Administration of Internet Information Services for comments".

The deadline for feedback is February 7, 2021.

National Internet Information Office

January 8, 2021

Measures for the Administration of Internet Information Services

(Revised draft for comments)

Chapter I General Principles

the first In order to promote the healthy and orderly development of Internet information services, protect the legitimate rights and interests of citizens, legal persons and other organizations, and safeguard national security and public interests, these Measures are formulated.

the second These Measures shall apply to engaging in Internet information services and supervising and managing Internet information services within the territory of People’s Republic of China (PRC).

Any organization or individual in People’s Republic of China (PRC) shall abide by the provisions of these Measures when providing Internet information services to domestic users by using domestic and foreign network resources.

Article The state takes measures to monitor, prevent and dispose of illegal and criminal activities that endanger the security and order of national cyberspace and infringe upon the legitimate rights and interests of citizens in China by using Internet information services inside and outside People’s Republic of China (PRC).

Article 4 The state advocates honest and trustworthy, healthy and civilized network behavior, promotes the dissemination of socialist core values, advanced socialist culture and excellent Chinese traditional culture, promotes the formation of a positive, healthy and upward-oriented network culture, and creates a clear cyberspace.

Article 5 The national network information department is responsible for coordinating the national network security work and related supervision and management work, and implementing supervision, management and law enforcement on the national Internet information content.

The State Council telecommunications authorities shall be responsible for the management of the Internet industry nationwide according to their duties, and shall be responsible for the supervision and management of the market access, market order, network resources and network information security of Internet information services.

The public security department of the State Council is responsible for the supervision and management of Internet security nationwide, maintaining public order and safety on the Internet, and preventing and punishing illegal and criminal activities on the Internet. State security organs shall, in accordance with their duties, be responsible for cracking down on illegal and criminal activities that endanger state security by using the Internet according to law.

Other relevant departments of the State Council shall supervise and manage Internet information services within their respective functions and duties.

The responsibilities of supervision and management of local Internet information services shall be determined in accordance with the relevant provisions of the state.

Article 6 The state protects the rights of citizens, legal persons and other organizations to use Internet information services according to law, promotes the popularization of Internet applications and improves the level of Internet information services.

The state encourages Internet information service providers to carry out industry self-discipline, provide services according to law, raise awareness of network security, promote the healthy development of the industry, and encourage the public to supervise Internet information services.

Chapter II Establishment

Article 7 Engaged in Internet information services, belonging to the telecommunications business, shall obtain the telecommunications business license of the competent telecommunications department; If it does not belong to the telecommunications business, it shall be filed with the competent telecommunications department.

Those who have not obtained the business license of telecommunication business or failed to fulfill the filing procedures shall not engage in Internet information services.

Article 8 To apply for the filing of Internet information services, the following materials shall be submitted to the competent telecommunications department through the Internet access service provider:

(a) the sponsor’s true identity certificate and address, contact information and other basic information;

(2) The type and name of the Internet information service to be developed, the domain name, IP address, server and other Internet network resources to be used, Internet network access service providers and other relevant information;

(3) If it is necessary to obtain the permission of the relevant competent department for the service project to be provided, it shall also provide the corresponding license documents;

(4) Safety inspection opinions issued by public security organs;

(5) Other materials that need to be provided.

Article 9 After verifying the materials specified in Article 8, the competent telecommunications department shall put them on record and number them.

Article 10 Engaged in Internet information services, should use the network resources that meet the requirements of the telecommunications authorities, and have the network security and information security management system and technical support measures that meet the requirements of the state.

Article 11 Engaged in Internet information services, belonging to the business of telecommunications, shall apply to the competent department of telecommunications. The competent department of telecommunications shall complete the examination within the time limit prescribed by laws and administrative regulations on telecommunications management and make a decision on approval or disapproval.

Internet information service providers who no longer engage in Internet information services should take the initiative to cancel relevant licenses and put on record.

Article 12 To engage in Internet news information services, an application shall be submitted to the network information department, which shall make a decision on approval or disapproval in accordance with the provisions of the Administrative Licensing Law of People’s Republic of China (PRC). Internet news information service related practitioners shall obtain corresponding qualifications according to law and accept corresponding training and assessment.

Internet information services for cultural, publishing and audio-visual programs shall obtain the permission of the relevant departments.

Engaged in education, medical care, drugs and medical devices and other Internet information services, in accordance with laws, administrative regulations and relevant decisions of the State Council, must obtain the permission of the relevant departments.

The relevant departments shall report the licensing results to the national network information department for the record.

Chapter III Shipping Bank

Article 13 Internet access service providers shall require Internet information service providers to provide corresponding licenses or filing numbers when providing access services for Internet information service providers; Internet network access service providers shall conduct inspection and shall not provide services to Internet information service providers who have not obtained legal licenses or filing numbers.

If users need to obtain corresponding qualifications for services they engage in by using the Internet in accordance with laws, administrative regulations and relevant provisions of the state, they shall provide Internet information service providers with certificates of their legal qualifications. Internet information service providers shall examine the certification documents of users and shall not provide services for users who have not obtained legal qualifications.

If the Internet domain name registered by the Internet information service provider needs to be transferred, the relevant registration information should be changed in the competent telecommunications department in advance. The domain name registration authority and the domain name registration service agency shall not help the domain name holder to transfer the filed domain name.

Article 14 Internet information service providers shall clearly indicate the license number or filing number when providing services.

Where the licensing or filing matters of an Internet information service provider change, it shall go through the formalities of change with the original licensing or filing authority.

Article 15 No organization or individual may set up websites, communication groups, online accounts or mobile intelligent terminal applications for committing crimes, and may not provide Internet services for committing crimes.

No organization or individual is allowed to provide technical support, advertising promotion, payment and settlement, network services and other assistance to others knowing that they use Internet information services to commit crimes.

No organization or individual may resell mobile phone cards, Internet cards or Internet of Things cards. Users who transfer their mobile phone cards, Internet cards and Internet of Things cards that have been registered with real identity information according to law to others shall go through the transfer procedures according to law.

Article 16 Internet information service providers shall establish an information release audit system.

Internet information service providers shall be equipped with network and information security management personnel who meet the requirements of network information departments, telecommunications authorities and public security organs.

Internet information service providers and Internet access service providers shall establish network security and information security management systems and user information protection systems, take safety precautions and strengthen public information inspection.

Article 17 Internet information service providers shall, in accordance with the requirements of the network information department, the competent telecommunications department and the public security organ, establish a security assessment system for new Internet services, conduct a security assessment on the Internet information services they have newly developed through the Internet and obtained business licenses, and report the relevant assessment results to the network information department, the competent telecommunications department and the public security organ.

Article 18 Internet service providers, such as Internet access, Internet information service, domain name registration and resolution, should ensure that the service object is consistent with the necessary real identity information such as identity document information or organization code certificate information when signing an agreement with users or confirming the provision of services, and record relevant information. The verified true identity information shall be kept synchronously during the service period and kept for at least two years after the service is stopped.

Article 19 Any organization or individual that handles and uses Internet services such as Internet access, Internet information services, domain name registration and resolution shall provide true identity information, and shall not violate the requirements of true identity inspection as stipulated in these Measures and commit the following acts:

(a) the use of false identity information, fraudulent use of other people’s identity information, for Internet services;

(2) Obtaining and using Internet accounts and resources registered by others without providing real identity information;

(three) to provide technical support or help for others to evade the requirements of real identification.

Article 20 Internet information service providers shall record the information published by them and the information published by users, and keep it for not less than 6 months.

Internet information service providers and Internet access service providers shall record and keep the information of network logs for not less than 6 months. The specific requirements of network log information shall be formulated separately by the network information department, the competent telecommunications department and the public security organ according to their respective responsibilities.

Share Internet access service resources with others through network proxy, network address translation, etc., and also record and keep log information that can confirm the user’s identity, such as address translation records.

Article 21 Internet service providers, such as Internet access, Internet information services, domain name registration and resolution, shall take technical measures and other necessary measures to prevent, detect and stop the services they provide from being used to commit crimes. Internet service providers, such as Internet access, Internet information services, domain name registration and resolution, shall keep relevant records and report to the network information department, the competent telecommunications department and the public security organ when they find illegal and criminal acts on the Internet.

When the network information department, the competent telecommunications department, the public security organ and other relevant competent departments find that the Internet information service provider violates the requirements of real identity inspection or commits other illegal and criminal acts on the Internet, they shall require the Internet information service provider to take measures such as elimination and suppression, stop relevant services, keep relevant records, and report to the network information department, the competent telecommunications department and the public security organ.

Article 22 Internet service providers such as Internet access, Internet information services, domain name registration and resolution shall provide technical support and assistance to public security organs and state security organs in their activities of safeguarding national security and investigating crimes according to law. The specific requirements for technical support and assistance shall be formulated separately by the public security organs and state security organs in conjunction with the competent telecommunications departments and other relevant departments.

Internet service providers, such as Internet access, Internet information services, domain name registration and resolution, shall perform their duties of supervision and management of Internet information services according to law for network information departments and telecommunications authorities, and provide necessary data support and relevant cooperation.

Article 23 Internet information service providers, Internet access service providers and their staff shall take technical measures and other necessary measures to ensure the safety of personal information they collect and prevent the identity information and log information they collect and use from being leaked, damaged or lost. When information leakage, damage or loss occurs or may occur, remedial measures should be taken immediately, and users should be informed in time and reported to the relevant competent departments in accordance with regulations.

Internet information service providers and Internet access service providers shall establish a system of complaints and reports on network information security, publish information such as complaints and reports, and promptly accept and handle complaints and reports on network information security.

Article 24 The relevant departments shall take technical measures and other necessary measures to prevent, stop and investigate illegal and criminal acts of stealing or obtaining, selling or illegally providing identity information and log information collected and recorded by Internet information service providers and Internet access service providers to others.

The information obtained by the relevant departments and their staff in the process of Internet information supervision and management shall be kept confidential, and can only be used for the needs of relevant supervision and management and law enforcement work, and shall not be leaked, tampered with or illegally damaged, nor sold or illegally provided to others.

Article 25 No organization or individual may, for the purpose of making profits or obtaining other illegal interests, commit the following acts to disrupt the network order:

(a) knowingly publishing false information or providing paid information publishing services;

(two) to provide information services for others to delete, shield, replace or sink;

(3) Reselling, registering and providing a large number of Internet information service accounts, which are used for illegal crimes;

(4) engaging in activities such as false clicking, voting, evaluation and trading, and undermining the integrity system of the Internet.

Article 26 Any organization or individual engaged in Internet information services shall abide by the Constitution and laws, observe public order and respect social morality, and shall not produce, copy, publish or disseminate information containing the following contents, or intentionally provide technical and equipment support or other assistance for producing, copying, publishing or disseminating information containing the following contents:

(1) Opposing the basic principles defined in the Constitution, endangering national security, honor and interests, revealing state secrets, inciting subversion of state power, overthrowing the socialist system, inciting secession and undermining national unity;

(2) Advocating terrorism and extremism, promoting national hatred and discrimination, undermining national unity, undermining national religious policies, and advocating cults and feudal superstitions;

(3) fabricating and disseminating information that disrupts the order of the financial market, and other false information that disrupts the market order and economic order;

(4) fabricating and disseminating false information about dangerous situations, epidemic situations, police situations, natural disasters, production safety, food and drug safety and other aspects that disturb social order;

(5) Counterfeiting or using the name of state organs, social organizations, their staff or other legal persons to disseminate information, or using the name of others to disseminate information for the purpose of committing illegal crimes;

(6) Spreading information that incites illegal assembly, association, procession and demonstration or other information that disturbs social management order and undermines social stability;

(7) Disseminating information about obscenity, violence, gambling, murder and terror, as well as information about abetting crimes, teaching criminal means and methods, manufacturing or trading prohibited articles and controlled articles, committing fraud and other illegal and criminal activities;

(8) Insulting or slandering others, infringing on others’ reputation, privacy, intellectual property rights or other legitimate rights and interests, and information that endangers the physical and mental health of minors and is not conducive to their healthy growth;

(9) Other information prohibited by laws and administrative regulations.

Article 27 Internet information service providers and Internet access service providers shall immediately stop the transmission of information that is listed in Article 26 of these Measures, take measures such as elimination, prevent the information from spreading, keep relevant records, and report to the network information department, the competent telecommunications department and the public security organ.

Network information departments, telecommunications authorities, public security organs and other relevant departments shall, in accordance with their duties, require Internet information service providers and Internet access service providers to stop transmission, take measures such as elimination and suppression, block the dissemination of illegal information, and keep relevant records; For the above information from outside People’s Republic of China (PRC), the national network information department and relevant departments shall notify relevant institutions to take technical measures and other necessary measures to block the spread.

The relevant state agencies shall take technical measures and other necessary measures according to law to block information that is prohibited from being published or transmitted by laws and administrative regulations outside People’s Republic of China (PRC).

No organization or individual may, in violation of state regulations, provide technical support or other assistance for others to obtain and disseminate information that is blocked according to law in the preceding paragraph.

Article 28 Engaged in Internet information services should meet the mandatory requirements of national standards.

Article 29 Internet information service providers and Internet access service providers shall establish emergency mechanisms and take emergency measures in time when necessary.

Chapter IV Supervision and Inspection

Article 30 The network information department, the competent telecommunications department and other relevant departments shall disclose the licensing and filing of Internet information services to the public.

Article 31 Network information departments, telecommunications authorities, public security organs and other relevant departments shall, according to their respective functions and duties, supervise and inspect Internet information services, and promptly investigate and deal with acts that violate the provisions of these Measures.

Network information departments, telecommunications authorities, public security organs and other relevant departments shall perform law enforcement duties such as supervision and inspection according to law, which shall be implemented by two or more law enforcement officers. Law enforcement officers should have the qualification of law enforcement, and should take the initiative to show their law enforcement certificates when enforcing the law, and record the supervision and inspection of law enforcement.

Article 32 When the network information department, the competent telecommunications department, the public security organ and other relevant departments perform law enforcement duties such as supervision and inspection according to law, Internet information service providers and Internet access service providers shall cooperate and shall not refuse or obstruct.

Article 33 Network information departments, telecommunications authorities, public security organs and other relevant departments shall establish supervision and management information sharing and information notification systems, and strengthen communication and cooperation.

When the public security organs find that Internet information service providers and Internet access service providers violate the provisions of these measures and impose administrative penalties according to law, they shall notify the network information department, the competent telecommunications department and other relevant departments, and may suggest that the original license or filing authority cancel the relevant license or filing.

Article 34 Any organization or individual who finds Internet information service providers or Internet access service providers in violation of these measures shall report and accuse the relevant departments.

The network information department, the competent telecommunications department, the public security organ and other relevant departments shall promptly deal with the report according to law, and if it does not belong to the responsibilities of the department, it shall promptly transfer it to the relevant departments for handling. The relevant departments shall keep confidential the relevant information of informants and protect their legitimate rights and interests.

Article 35 After accepting an administrative illegal case, the network information department, the competent telecommunications department, the public security organ and other relevant departments may, in accordance with the provisions and procedural requirements of the Administrative Enforcement Law of the People’s Republic of China, take compulsory measures to seal up or detain electronic equipment, storage media, articles, facilities and places related to the suspected illegal act, and may inquire about bank accounts related to the suspected illegal act.

Chapter V Legal Liability

Article 36 If the network information department, the competent telecommunications department, the public security organ and other relevant departments and their staff violate the provisions of Article 24 of these measures and use the information obtained in the supervision and management of Internet information content for other purposes, the directly responsible person in charge and other directly responsible personnel shall be punished according to law.

Staff of the network information department, the competent telecommunications department, the public security organ and other relevant departments who neglect their duties, abuse their powers, engage in malpractices for selfish ends or take advantage of their positions to ask for or accept other people’s property, which does not constitute a crime, shall be punished according to law.

Article 37 In violation of the provisions of Article 7 and Article 10 of these measures, the competent telecommunications department shall order the Internet access service provider to stop providing access services, confiscate the illegal income, and may impose a fine of less than 500,000 yuan.

In violation of the provisions of the first and third paragraphs of Article 13 of these measures, the competent telecommunications department shall impose a fine of more than 100,000 yuan and less than 1 million yuan, and may order it to suspend related business, suspend business for rectification, revoke its telecommunications business license or cancel the filing number, and impose a fine of more than 10,000 yuan and less than 100,000 yuan on the directly responsible person in charge and other directly responsible personnel.

Internet information service providers, in violation of the provisions of Article 12 of these measures, engage in related Internet information services without authorization, and the network information department or other relevant departments shall, according to their respective functions and duties, order them to stop related Internet information services, confiscate their illegal income, and impose a fine of more than 5 times and less than 10 times of their illegal income; If the illegal income is less than 10,000 yuan or there is no illegal income, a fine of less than 100,000 yuan may be imposed; If the circumstances are serious, the competent telecommunications department shall revoke its telecommunications business license or cancel the filing number.

Article 38 Where an Internet information service provider, in violation of the provisions of Chapter II of these Measures, obtains a license or filing number by fraudulent or bribery means, the original license and filing authority shall revoke its corresponding license or cancel the filing number, confiscate its illegal income and may concurrently impose a fine of less than 1 million yuan.

Article 39 Internet information service providers who violate the provisions of the second paragraph of Article 13, Article 14, Article 16, Article 17, Article 23 and Article 32 of these Measures shall be given a warning by the network information department, the competent telecommunications department, the public security organ or other relevant departments according to their respective functions and duties, ordered to make corrections within a time limit, and their illegal income shall be confiscated; Refuses to correct or if the circumstances are serious, a fine of more than 100,000 yuan and less than 500,000 yuan may be imposed, and the relevant business may be ordered to suspend, suspend business for rectification, close the website, and the relevant business license shall be revoked or revoked by the original licensing authority. The directly responsible person in charge and other directly responsible personnel shall be fined more than 10,000 yuan and less than 100,000 yuan.

Article 40 Internet network access service providers who violate the provisions of the third paragraph of Article 16, Article 23 and Article 32 of these measures shall be given a warning by the network information department, the competent telecommunications department and the public security organ according to their respective duties, ordered to make corrections within a time limit, and their illegal income shall be confiscated; Refuses to correct or if the circumstances are serious, a fine of not less than 100,000 yuan but not more than 500,000 yuan may be imposed, and the relevant business may be ordered to suspend, suspend business for rectification, and the relevant business license shall be revoked or revoked by the original issuing authority. The directly responsible person in charge and other directly responsible personnel shall be fined not less than 10,000 yuan but not more than 100,000 yuan.

Article 41 In violation of the provisions of the fourth paragraph of article fifteenth and article twenty-seventh of these measures, which does not constitute a crime, the illegal income shall be confiscated by the public security organ, and shall be detained for less than five days, and a fine of not less than 50 thousand yuan but not more than 500 thousand yuan may be imposed; If the circumstances are serious, they shall be detained for more than 5 days and less than 15 days, and may be fined more than 100,000 yuan and less than 1 million yuan.

Units that violate the provisions of the fourth paragraph of Article 15 and Article 27 of these Measures shall have their illegal income confiscated by the public security organs, and be fined between 100,000 yuan and 1 million yuan, and the directly responsible personnel in charge and other directly responsible personnel shall be punished in accordance with the provisions of the preceding paragraph.

Article 42 Internet service providers, such as Internet access, Internet information services, domain name registration and resolution, violate the provisions of Article 18, Article 19, Article 20 and Article 21 of these measures, and shall be given a warning by the network information department, the competent telecommunications department and the public security organ according to their respective functions and duties, ordered to make corrections within a time limit, and their illegal income shall be confiscated; Refuses to correct or if the circumstances are serious, a fine of not less than 100,000 yuan but not more than 500,000 yuan may be imposed, and the relevant business may be ordered to suspend, suspend business for rectification, and the relevant business license shall be revoked or revoked by the original issuing authority. The directly responsible person in charge and other directly responsible personnel shall be fined not less than 10,000 yuan but not more than 100,000 yuan.

Article 43 Internet service providers such as Internet access, Internet information services, domain name registration and resolution, etc., in violation of the provisions of the first paragraph of Article 22 of these Measures, shall be given a warning by public security organs and state security organs according to their duties and ordered to make corrections within a time limit; Refuses to correct or if the circumstances are serious, a fine of not less than 100,000 yuan but not more than 500,000 yuan may be imposed, and related businesses may be ordered to suspend business for rectification.

Internet service providers, such as Internet access, Internet information services, domain name registration and resolution, violate the provisions of the second paragraph of Article 22 of these Measures, and the network information department and the competent telecommunications department shall give a warning according to their respective duties and order them to make corrections within a time limit; Refuses to correct or if the circumstances are serious, a fine of not less than 100,000 yuan but not more than 500,000 yuan may be imposed, and related businesses may be ordered to suspend business for rectification.

Article 44 In violation of the provisions of Article 25 of these measures, the network information department, the competent telecommunications department and the public security organ shall, according to their respective duties, give a warning, order it to make corrections within a time limit and confiscate its illegal income; Refuses to correct or if the circumstances are serious, a fine of more than 100,000 yuan and less than 1 million yuan may be imposed, and the relevant business may be ordered to suspend, suspend business for rectification, close the website, and the relevant business license shall be revoked or revoked by the original issuing authority. The directly responsible person in charge and other directly responsible personnel shall be fined more than 10,000 yuan and less than 100,000 yuan.

Article 45 Internet information service providers and Internet access service providers violate the provisions of Article 26 of these Measures, and the network information department, the competent telecommunications department and the public security organ shall, according to their respective duties, order them to make corrections, give them a warning and confiscate their illegal income; Refuses to correct or if the circumstances are serious, a fine of more than 100,000 yuan and less than 1 million yuan may be imposed, and the relevant business may be ordered to suspend, suspend business for rectification, close the website, and the relevant business license shall be revoked or revoked by the original issuing authority. The directly responsible person in charge and other directly responsible personnel shall be fined more than 10,000 yuan and less than 100,000 yuan.

If any unit or individual other than an Internet access service provider or an Internet information service provider violates the provisions of Article 26 of these Measures, the network information department, the competent telecommunications department and the public security organ shall, according to their respective functions and duties, give a warning, order it to make corrections within a time limit, confiscate its illegal income, impose a fine of not less than 10,000 yuan but not more than 500,000 yuan on the individual, and impose a fine of not less than 100,000 yuan but not more than 1 million yuan on the unit.

Article 46 Internet information service providers and Internet access service providers, in violation of the provisions of the first paragraph of Article 27 of these Measures, fail to stop transmitting information prohibited by laws and regulations, take measures such as elimination, and keep relevant records, and the network information department, the competent telecommunications department and the public security organ shall, according to their respective duties, order them to make corrections, give them a warning and confiscate their illegal income; Refuses to correct or if the circumstances are serious, a fine of not less than 100,000 yuan but not more than 500,000 yuan may be imposed, and the relevant business may be ordered to suspend, suspend business for rectification, close the website, and the relevant business license shall be revoked or revoked by the original issuing authority. The directly responsible person in charge and other directly responsible personnel shall be fined not less than 10,000 yuan but not more than 100,000 yuan.

Article 47 In violation of the provisions of the present measures, the competent telecommunications authority revokes the business license of telecommunications business, revokes the business license of telecommunications business or cancels the filing number, and the competent telecommunications authority notifies the relevant Internet access service providers and domain name resolution service providers to stop providing services for them, and informs the relevant departments to cancel the relevant Internet information service licenses.

Article 48 The administrative punishment given by the network information department, the competent telecommunications department, the public security organ and other relevant departments in violation of these measures shall be recorded in the credit file and published.

Article 49 The state has established a blacklist system for Internet information services, and organizations and individuals whose licenses have been revoked or whose records have been cancelled by the competent authorities may not reapply for relevant licenses or records within three years; Organizations and individuals ordered by the competent authorities to cancel their accounts and shut down their websites shall not be provided with similar services by the relevant Internet service providers within three years.

Article 50 In violation of the provisions of these measures, causing damage to others, shall bear civil liability according to law; If it constitutes a violation of public security administration, it shall be punished according to law; If a crime is constituted, criminal responsibility shall be investigated according to law.

Article 51 Internet information service providers, Internet network access service providers, users and other units and individuals who are dissatisfied with the administrative acts made by the relevant departments in accordance with these Measures may apply for administrative reconsideration or bring an administrative lawsuit according to law.

Chapter VI Supplementary Provisions

Article 52 The meanings of the following terms in these Measures:

(1) Internet information service refers to providing users with an Internet information publishing and application platform, including but not limited to Internet news information service, search engine, instant messaging, interactive information service, webcasting, online payment, advertising promotion, online storage, online shopping, online booking, application software download and other Internet services.

(2) Internet network access services refer to services that provide Internet information service providers with network access, including Internet data center services, content distribution network services, Internet access services, etc. The specific business forms include but are not limited to network agency, host hosting, space leasing, etc.

Article 53 The use of the Internet to provide information services to TV terminals shall be managed in accordance with the laws, regulations and rules of the state on radio and television management.

Article 54 These Measures shall come into force as of.

Guangzhou Automobile Aian’s second-generation AION V is officially listed as a new hard-core intelligent driving SUV//starting from 129,800 yuan.

On July 23, 2024, Beijing time, the second generation AION V of Guangzhou Automobile Aian was officially launched, including 7 models, and the price range was 129.8-189.8 million yuan. In addition, within 1 hour and 20 minutes, the order for new cars exceeded 10,000 units, and the official said that the owners who completed the delivery of the cards before September 30 can enjoy one-year free charging rights.

Read the full text in three seconds:

1. This time, the second generation AION V model was launched, and the new car was built on AEP pure electric platform.

2. The appearance and interior of the new car adopt a brand-new design concept, and the maximum battery life can reach 750km.

In terms of appearance, the new car adopts the design language of "blade shadow potential energy", the polygonal headlight group is matched with the double-banner LED daytime running light group, and at the same time, it is matched with the closed front grille, and the front enclosure is designed with a penetrating cooling opening, and it is decorated with a silver-gray front lip.

In terms of body size, the length, width and height of the new car are 4605/1854(1876)/1660(1686)mm and the wheelbase is 2775mm respectively. In addition, the new car also offers 215/55 R18, 225/45 R19 and 225/45 ZR19 tire sizes to choose from.

In addition to the novel design, the biggest feature of the newly designed second-generation AION V is the lightweight optimization of the whole vehicle. The new design and application of new materials bring about a 7% decrease in battery weight; The weight of powertrain decreased by 33%; The weight of the integrated temperature control structure is reduced by 48%, and the kerb quality of the new car is less than 1.8 tons. Lightweight will bring better energy consumption performance and driving performance.

In the interior part, the new car is equipped with a full LCD dashboard and a dual-spoke multi-function steering wheel. The center console is equipped with a suspended multimedia display screen. The car adopts ADiGO5.0 system. The new PAD desktop supports users to switch wallpaper, maps, car models and other scenes individually. The control center, quick components and bottom toolbar support customization and are convenient to use. In terms of configuration, the new car will be equipped with 8-point massage SPA+ rear chaise longue, 9 Belgian Premium speakers, standard VtoL external discharge function, three-mode four-control cold and warm refrigerator and so on. In addition, the front/rear seats can be put down with one button through the mobile phone control, and the cockpit becomes a big bed every second. The main driver and passenger drivers are also equipped with an 8-point massage function, and the car refrigerator can realize the ultra-wide temperature range control of-15 ~ 50, realizing the function of "hot and cold meals".

In terms of intelligent driving hardware, the second-generation AION V is equipped with Orin-x chip, high-thread lidar, 5 millimeter-wave radars and 11 vision cameras, which can provide intelligent driving assistance functions without relying on high-precision maps. In addition, the intelligent driving scheme also introduces adaptive AI learning technology, which can update and optimize the driving path in real time and provide a safer and smoother driving experience. In terms of safety configuration, the second-generation AION V is built with "China-Europe Double Five-Star Safety Body Standard", and the proportion of high-strength steel, ultra-high-strength steel and thermoforming materials used in the whole vehicle is 66%; Unique U-shaped safety air curtain, adding children’s head covering cavity to give the whole family more comprehensive protection; Equipped with multiple early warning and active protection, active and passive safety configuration is high.

In terms of power, the new car adopts a brand-new silicon carbide chip, the electronic control efficiency reaches 99.85%, the motor power is increased to 10.5kW/kg, and the power consumption of the whole car is reduced by 15%. The maximum power of the front motor is 150kW and 165kW respectively, and the maximum torque is 240 Nm. There are three options for battery life, namely 520km, 650km and 750km. In addition, the new car can realize the fast state of charging for 15 minutes and lasting for 370km, and the whole system comes standard with 7kW external discharge function.

Analysis of Tank 300 Train Set with 2.0T Engine

Although cars can improve the convenience of people’s travel, safety is still an unavoidable topic. Therefore, many car companies have begun to upgrade the safety of their models. Of course, for consumers, a car with complete active and passive safety configurations will be more popular. What xiaobian wants to introduce to you today is. As for the outstanding performance of the car, please read it together.

Let’s look at the appearance of the tank 300 first. The front face of the tank 300 looks very fashionable and sporty. The headlights are cute and the shape is very eye-catching. The car is equipped with LED daytime running lights, front fog lights, automatic opening and closing, adaptive far and near light, delayed closing and so on. Coming to the side of the car body, the size of the car body is 4760 mm * 1930 mm * 1903 mm. The car adopts exquisite lines, and the side wall presents a simple design style. With large-sized thick-walled tires, the overall visual effect is very beautiful. Looking back, the rear of the car echoes the front face, the taillights look very concise, and the unique exhaust pipe creates a good gas field.

Coming into the tank 300, the overall visual effect of the interior of the tank 300 is very distinctive, which is very fashionable and generous. The steering wheel of the car is very young and fashionable, and it is made of leather, which gives people a bright feeling. Take a look at the central control, with the 12.3-inch touch-sensitive LCD central control screen, which makes the interior style impressive and gives people a sense of solidity. The dashboard and seats give people a good feeling, too. Let’s take a look. The car is equipped with a fashionable dashboard, which gives people a very simple feeling. The car uses leather seats, which are wide and thick, and the overall comfort and wrapping are not bad.

The rear row space of the tank 300 is still spacious, and there is a certain margin in the head and legs, which can be said to be more than enough for daily use. At the same time, the car is equipped with fatigue warning, anti-lock braking (ABS), LED daytime running lights, brake assist (EBA/BAS, etc.), brake force distribution (EBD) main driver airbag, co-pilot airbag, side airbag curtain, front side airbag and other safety configurations.

This car performs well in terms of space and configuration. As for the design, everyone has everyone’s aesthetics. Xiaobian thinks that if you really want to buy this car, you still have to go offline to actually experience it.

Hongbao Resources (01131) spent $2.97 million to acquire the American biodiesel plant.

Hongbao Resources (01131) announced that on December 14, 2016, the Group completed the acquisition of a biodiesel plant in Arkansas, USA through a subsidiary, at a cost of US$ 2.97 million.

Immediately after the completion of the acquisition, the Group and Solfuels Holdings Pte
Ltd. will beneficially own 51% and 49% of the rights and interests of the biodiesel plant respectively. The biodiesel plant has an annual production capacity of 137,000 metric tons and is expected to be put into operation in April 2017.

The Group is a supplier of integrated energy and shipping solutions, and Solfuels is a leading and experienced biofuel operator, operating a biodiesel plant in the United States. The acquisition marks the first time that the Group has entered the field of renewable energy.

According to the company, with Solfuels’ operational expertise, the group expects to transform the biodiesel plant to adapt to a variety of plateau materials, including yellow oil, animal fat, inedible corn oil and refined vegetable oil, and reduce production costs. The group believes that the production of this biodiesel plant will meet the increasing demand for renewable energy in the US market.

Biden officially became the vice presidential candidate of the US Democratic Party.

Topic: 2008 US Presidential Election


  On August 23rd, Senator Obama of Illinois, who was firmly nominated for the US Democratic presidential nomination, announced that he had chosen Senator Biden of Delaware and Chairman of the Senate Foreign Relations Committee as his running mate. This is a photo of Biden (right) and Obama attending a TV debate in Johnston, Iowa, USA (photo taken on December 12, 2007). Xinhua News Agency/AFP


  Xinhuanet Denver, USA, August 27th (Reporter Wang Wei) Senator Biden of Delaware officially became the vice presidential candidate of the Democratic Party in Denver, Colorado on the 27th.


  That night, after a verbal vote, no one at the scene opposed Biden as the only vice presidential candidate. Speaker of the House of Representatives, Democrat Pelosi, immediately announced that Biden was positive.


  Nomination. Biden made a speech announcing his acceptance of the nomination, and said that he would help Obama, who had been nominated as the presidential candidate, run for the next president, thus officially becoming the Democratic vice presidential candidate.


  Biden emphasized his experience in diplomacy and national defense in his speech. He said that after visiting Georgia, Iraq, Pakistan and Afghanistan, he found that the Bush administration’s policy was an "unfortunate failure", so Americans could not live like this for another four years.


  Biden believes that Obama’s policies can bring changes to the United States, change the tax system, improve the country’s economic situation, develop alternative energy sources, and reduce health care expenses. He also compared Obama’s and Republican candidate John McCain’s policy views on Iraq, Afghanistan and Iran’s nuclear issues respectively, and pointed out that Obama’s judgment in foreign and security affairs is trustworthy and capable of safeguarding national security.


  Biden, 65, has served as a senator for more than 30 years and is currently the chairman of the Senate Foreign Relations Committee. He has rich experience in foreign affairs and national defense affairs and is regarded by American media and political analysts as the best candidate to make up for Obama’s lack of experience in this field.


  After Biden’s speech, Obama unexpectedly appeared at the meeting. He was scheduled to arrive in Denver on the 28th to deliver a speech accepting the presidential nomination in a stadium that can accommodate 75,000 people.


  Obama said that he was proud of Biden as the vice presidential candidate, and thanked New York Senator Hillary Clinton for turning to support him after the primary election failed. In addition, Obama also invited ordinary people to attend his speech on the 28th.

Editor: Meng Xu

One-car multi-energy optimal solution, test drive Haval second-generation big dog Hi4 version

With the increasing prosperity of the automotive market, consumers are increasingly demanding vehicle performance, comfort and intelligence. As an important player in the domestic automotive market, the brand has been committed to providing consumers with high-quality and high-performance automotive products. A few days ago, the test drive of the Hi4 version, this model has set a benchmark for domestic SUVs of the same level with its excellent performance and unique design.

Haval’s second-generation big dog Hi4 version continues the family gene of the Haval brand in appearance design, while injecting more modern and fashionable elements. The body size has not changed, it is still 4705/1908/1780mm, and the wheelbase is 2810mm.

The body lines are smooth, the front face is designed to be atmospheric, and the sharp headlights and the wide air intake grille complement each other to create a strong visual impact. On the side of the body, the waist line design is simple and powerful, and the wheel hub shape is unique, showing a strong sporty atmosphere. At the rear of the car, the two-sided exhaust layout and the layered tail light design further enhance the fashion sense of the whole car.

Entering the car, the interior design of Haval’s second-generation big dog Hi4 version is equally stunning. The overall layout is concise and clear, and each functional area is clearly divided, which is convenient for the driver to operate. The center console is covered with soft materials, which is comfortable to touch and has excellent visual effects. The large-size touch screen integrates various functions such as navigation and multimedia entertainment, making the operation smooth and responsive. In addition, the vehicle is also equipped with an intelligent voice control system, which allows the driver to realize navigation, music playback and other operations through simple voice commands, which greatly enhances the convenience of driving.

In terms of power, the second-generation Big Dog Hi4 version uses a combination of a 1.5T engine and two electric motors. The maximum power of the system is 278kW, which is 378 horsepower, and the peak torque directly reaches 750 Nm. The model also uses a three-power source dual-axis layout, which can realize intelligent dynamic switching of 3 engines and 9 modes. This means that it can be easily controlled whether you are on a bad road or a highway, and you can choose the most suitable working mode.

In terms of driving performance, Haval’s second-generation big dog Hi4 version also performs well. The vehicle is equipped with an efficient power system, accelerating rapidly and with abundant power. During the test drive, the vehicle can easily handle various driving scenarios, whether it is on congested sections in urban areas or on highways. At the same time, the suspension system of the vehicle has also been carefully adjusted to filter out most of the road bumps and provide a comfortable ride experience for drivers and passengers.

In addition, Haval’s second-generation Big Dog Hi4 version is also quite good in terms of intelligence. The vehicle is equipped with a variety of driver assistance systems, such as adaptive cruise, lane departure warning, blind spot monitoring, etc. These systems can provide drivers with all-round assistance in different driving scenarios, greatly improving driving safety. At the same time, the vehicle also supports remote control and OTA upgrades. Drivers can remotely check the status of the vehicle and control some functions of the vehicle through the mobile APP, while OTA upgrades allow the vehicle to keep the latest software version at any time and enjoy the latest functions and optimizations.

During the test drive, you can clearly feel the intelligent driving auxiliary features of Haval’s second-generation big dog Hi4 version. After opening the adaptive cruise on the highway, the vehicle can automatically maintain a safe distance from the car in front and automatically adjust the speed according to the speed of the car in front, which greatly reduces the burden on the driver. In the congested road section of the urban area, the lane departure warning and blind spot monitoring system can remind the driver to pay attention to driving safety in time and effectively avoid potential dangers.

In addition to the intelligent driver assistance system, Haval’s second-generation big dog Hi4 version has also done a good job in energy conservation and environmental protection. The vehicle adopts advanced energy-saving technology, which achieves lower fuel consumption and less emissions by optimizing the power system and improving energy efficiency. This not only conforms to the current environmental trend, but also saves consumers the cost of using the car.

In addition, the Haval brand has always won the trust of consumers with its good after-sales services and reliable quality. In fact, with it, you can not only enjoy a high-quality driving experience, but also get comprehensive after-sales protection. Of course, this is undoubtedly an important factor for consumers to choose the Haval second-generation big dog Hi4 version.

When you drive it, you will find that it is not only a competitive car product, but also an excellent model that can meet the diverse needs of consumers and improve the quality of life. It is believed that with the continuous development and expansion of the Haval brand in the market, the Haval second-generation big dog Hi4 version will definitely become the first choice for more consumers. At the same time, I also believe that the Haval brand will continue to innovate and improve to bring more high-quality and high-performance automotive products to consumers.

Mazda CX-70 official picture was officially released, using a 5-seat layout, which can be called a "reduced version of CX-90"

Mazda, as one of the earliest car manufacturers in Japan, although many of our fans and friends have a variety of views on it, but have to admit that its models, whether in terms of appearance design or handling performance, does have a relatively good performance, in the early years, Mazda 6 with outstanding design, as well as good quality performance, is instantly fire all over the country, won the love and pursuit of many fans, but finally, due to various reasons, led to its suspension of production and sales, which makes many fans feel very sorry, in the face of the current increasingly competitive car market, Mazda in order to attract more fans and friends of the eye, it has also begun to constantly layout and enrich its own new models road. On January 31st, Mazda officially released the official picture of its new mid-sized SUV, the CX-70. According to relevant information, the new car will be built on the same platform as the CX-90, so you can also think of it as a scaled-down version of the CX-90. Let’s follow the editor to learn more about it.

Mazda CX-70, the new car will be first launched in North America in the spring of 2024. In order to meet the needs of different car fans and friends, the car will not only offer a fuel version, but also a PHEV version. In terms of styling design, we can see from the official picture above that, compared to the big brother CX-90, although the Mazda CX-70 looks somewhat similar, upon closer inspection, you will find that the car feels more sporty. The oversized polygonal air intake grille on the front face is blackened internally, and the chrome trim is decorated to enhance the fashion atmosphere that it should have. The large Seagull logo is inlaid in it, adding a bit of due brand recognition. The narrow headlights on both sides, together with the exaggerated vent design on both sides of the front, make it look young and dynamic. The sharp waistline outline of the side body enhances the sense of power it should have. The roof rack, window periphery, and outer rear mirror shell are all blackened, and the multi-spoke rims below are added to further enhance the overall sense of movement. It is worth mentioning that in order to highlight its unique identity, the PHEV version is also equipped with an exclusive logo on the fender.

In terms of body size, according to relevant information, the wheelbase of the Mazda CX-90 is the same as that of the CX-90, but the length of the car will be shorter. In addition, the car adopts a five-seat seat layout. The rear part looks round and full, and the narrow tail lights on both sides echo the headlights. After lighting, it has a good recognition. The blackened spoiler above further enhances the overall youthful and fashionable feeling. In terms of interior design, the Mazda CX-70 basically continues the design style of the CX-90, among which the fuel version of the model adopts a red/black color scheme, the PHEV version of the model mainly uses black as the main color, and the floating central control large screen will integrate many functions. It looks very technological. In addition, the car is also equipped with a head-up display system, Bose stereo, and mobile phone wireless charging. Configuration, three-frame multi-function steering wheel, with exquisite and compact shift mechanism, and Nappa leather wrapped seats, so as to create a comfortable and luxurious interior atmosphere as a whole.

In terms of power, the Mazda CX-70 fuel version is equipped with a 3.3-liter inline 6-cylinder turbocharged engine, divided into 3.3 TURBO and 3.3 TURBO S versions, with a maximum power of 280 horsepower and 340 horsepower respectively. In terms of transmission, it is matched with an 8-speed automatic transmission. The PHEV version is equipped with a 2.5L four-cylinder engine and a 68-kilowatt motor combination, with a combined maximum power of 323 horsepower and a pure electric range of 30 miles (48 kilometers). Overall, the Mazda CX-70, as a new mid-sized SUV in the family, has a relatively good performance in terms of design, interior atmosphere, and power performance. Due to its exterior design, it can be said that it basically caters to the aesthetics of most current car fans. Finally, the question is, do you think the Mazda CX-70 will be officially launched in the future, and how much will the car cost? Welcome to the following to discuss.

(Eighteen/edit)

Note: The pictures are from the Internet, and the rights belong to the original author. Thank you together! This article only represents the author’s personal opinion and does not represent the position of Youshi Auto.