More from: china

Trade News Moves the Market

This just in via email from Oak Partners, Inc. <>

The Week on Wall Street

Stocks fell sharply at the start of last week over trade tensions, then recovered with help from strong earnings and indications that U.S.-China trade talks would continue. Even so, the major indices had a down week. The S&P 500 lost 0.76%, while the Nasdaq Composite fell 1.27%, and the Dow Jones Industrial Average declined 0.69%.

In contrast, the MSCI EAFE benchmark for international stocks rose 0.19%.[1][2]

The Latest Trade Developments

A broad selloff occurred Monday after China announced it would respond to increased U.S. tariffs by boosting its own import taxes on $60 billion of U.S. products. Friday morning, the Street breathed a sigh of relief as the Trump administration decided to delay 25% tariffs planned for imported cars and car parts; they had been slated to take effect on May 18. Just hours later, President Trump announced an end to U.S. tariffs on metals coming from Canada and Mexico.

At midweek, Secretary of the Treasury Steven Mnuchin told reporters that he expected the U.S. to resume trade negotiations with China in “the near future.”[3][4][5]

Earnings Season Winds Down

The first-quarter earnings scorecard is nearly complete, as more than 90% of S&P 500 companies have reported actual Q1 results.

Stock market analytics firm FactSet notes that 76% of these firms have beaten consensus earnings-per-share estimates. Overall earnings for S&P 500 components have surpassed expectations by 5.4%. Both these percentages are above 5-year averages.[6]

Final Thought

The market is quite sensitive to trade developments at the moment, and it is unclear whether this will be a short-term trend or a long-term influence on prices. While the U.S. prepares its next moves, China also is preparing its response to any new U.S. tariffs, which could include manipulating its currency.







Unboxing the AllWinner 10.1″ Quad Core Tablet

It’s a craze.

They may use names like “iRulu”, “Dragon Touch”, “Afunta”, Yuntab”, “Osgar”, “Accmart”, “GaziGazi”, “Atoah”, “Weize”, “Neutab”, or “Tagital”. They may be black or white, but some are purple, blue, or red.

They are simple, plain, no nonsense: they know why they are there.

They are quick, easy, and down to business. They may cost you anywhere from $30 to several hundred dollars, all depending upon how well you can negotiate.

And they are totally in the raw: unlocked, rooted, and ready for you to try your most creative ideas and strangest approaches without any preconceived notions or inhibitions.

They are the AllWinner tablets.

Both the 10.1″ J-Q133 and the 7″ J-Q733 have the AllWinner quad core A33 processor with the enhanced battery management technology and run the current production version of Android, KitKat 4.4 (September 2013). Android 5.0 Lollipop is just starting to be available now, but only in the Nexus and Samsung devices.

On the 7″ tablet is described as follows:

  • Type: Tablet PC
  • Products Status: Stock
  • Screen Size: 7″
  • Processor Manufacture: AllWinner
  • Processor Type: A33 quad core
  • Processor Main Frequency: 1.3GHZ
  • Hard Drive Capacity: 4GB/8GB
  • Memory Capacity: 512MB
  • Touch Screen Type: Capacitive Screen
  • Display resolution: 800×480
  • Battery Life: 2—3 hours
  • Feature: Bluetooth, Wifi, Webcams, Multi Touch, G Sensor, Camera
  • Operating System: Android 4.4
  • Weight: 0.55kg
  • Place of Origin: Guangdong, China (Mainland)
  • Model Number: J-Q733
  • Color:Black/White/Red/Pink/Blue/Purple/Yellow/Green
  • CPU: Allwinner A33 Quad Core Cortex A7 1.3GHZ
  • Battery: Built-in 3000mAH
  • Cameras: Front & rear 0.3MP
  • OS: Android 4.4
  • Screen resolution: 800*480 ( 1024*600 HD screen optional )

The 10.1″ tablet is described as follows:

  • CPU A33 Quad-Core,ARM Cortex A7 family CPU1.3GHZ
  • LCD 10.1″TFT touch panel, 16:9, 1024*600 screen resolution
  • Touch screen 5 points capacitive touch
  • RAM DDR3 512MB/1GB optional
  • Storage Built-in nand flash 8GB
  • External memory Support micro SD card maximum 32GB
  • Webcams 0.3 MP front and rear camera
  • Audio devices Built-in one speaker, built-in microphone, 3.5mm earphone jack
  • 3G Internet Support for external
  • Wifi Internal wifi module, IEEE 802.11b/g/n wireless
  • G-sensor Rotate screen, support 3D games
  • Bluetooth yes
  • Ethernet Support
  • Multimedia Image formats: BMP, JPG, GIF, PNG
  • Video formats: AVI, MP4, FLV, 3GP, MKV, WMV (1080p) etc
  • Audio formats: MP3, WMA, OGG, AAC, WAV etc
  • Game Built-in 3D Accelerator. Support 3D games
  • I/O 1 x Micro USB OTG, 1 x DC In Jack, 1 x 3.5mm Earphone Jack , 1 x TF Card Slot
  • Battery Build in 4500mAH polymer li-ion battery
  • Working time 4 hours
  • System Languages English, French, German, Dutch, Italian, Japanese, Korean, Russian, Spanish, Polish, Czech , Turkey, Greek, Portuguese, Simplified Chinese, Traditional Chinese, etc
  • Housing ABS
  • Color White/Black
  • Weight Net: 0.56kg: Gross: 0.96kg
  • Dimension Tablet size: 26.4*16.6*0.7 cm; gift box: 30.2*21.1*5.6 cm
  • Packing Carton size: 44*31*33cm, 10pcs/carton, gross weight: 12kg

Next — inside the case.

Next Smart Phone not a Smart Phone

Note: this article is the writers personal opinion. It is based upon almost 40 years of experience in small computers and communications, but it is still an opinion. It is presented AS IS. All use is at your own risk.

According to an article in Network World over half (65%) of persons choosing a new phone will not choose a smart phone, but a less featured ordinary “dumb” phone. Images showing November 2010 survey results can be seen here and here. Apparently, owners of any Android variety are more likely to upgrade to a full smartphone than other types, with most people choosing to buy a phone that lacks even basic Internet or texting.

The survey found that 49% of current Android owners traded up from a not-smartphone while 13% switched from a BlackBerry device. 11% of Android owners are on their second Android device, compared to repeat buyers of iPhone at 26% and BlackBerry at 32%. It is rather astounding that 11% of a random sample would even be on a second Android… Android is essentially only two-years old.

The most common business reason given for refusing to buy a smart phone were that the high cost of ownership and requisite service contracts was not justifiable: very few felt the devices were too complicated for them to utilize. A Dutch friend of mine once told me that in Holland phones are $5 each and include all capabilities: no roaming charges, not extra fees: they buy several and keep them in a basket for out of town guests to use. By comparison the cost to Americans of nearly $100 per month with a multitude of restrictions, abusive early cancellation penalties, and piles of extra add-on fees, is rather repugnant.

For business this should be awake up call: clearly consumers are tired of expensive and deceptive contracts that add more charges after the fact. Of course telephone companies have pulled this for years, but with the mobile market it has been far more abusive than before. The net result of American mobile plan pricing is apparently to discard 65% of the market by charging drastically more than the market will bear. Watch for a severe adjustment as enabling factors are already in place: China and other foreign powers are rapidly buying up foreign markets.

All that would be required to completely own the American mobile market is for a Nokia, a Wal-Mart or another large Chinese corporation to decide to offer a no hassles plan everywhere in the US with a flat $20 fee. The existing top heavy mobile corporations that are charging substantially above market price are not likely to adjust fast enough to survive: their thinking seems to be that they can control the market, which is a fantasy that can exist only until competition recognizes this low hanging fruit waiting to be eaten and simply takes over.

There is no such thing as a free lunch: there is only temporarily above market pricing followed by a market adjustment. Such a take over could be achieved in one or two months, suddenly resource starving the existing American players with an extreme interruption in their cash flow that would force them to either accept their rival as their Hegemon by stock exchange or merging, or at least forcing them to sell off their towers and fiber and drastically resize human assets sufficiently to meet payroll in the third month. With something like a $32b trade imbalance right now China does have the cash required. At that point market terms could be set by the survivor, most likely a 50% correction (prior $60/month average – minimum $20/month)/2 resulting in a flat market price near $39.95/month.

The Real Reason Open Source is Growing: Paranoid Politicians

Note: this article is the writers personal opinion. It is based upon almost 40 years of experience in small computers and communications, but it is still an opinion. It is presented AS IS. All use is at your own risk.

As a consumer advocate and somewhat self-interested business owner, my evaluation of any circumstance or potential change involves the instinctive question as to how it will affect me, or more candidly, how it will hurt me and what I can do to protect myself. Everyone does that. What really waves a red flag is when someone is less than transparent with us: employment interviews, contracts, or whatever.

In a United States where Constitutional Law is a variable which can be changed upon a whim for government convenience, where citizens are forced to stand spread eagle in front of a machine that electronically removes all their clothing so that their naked bodies (lots of links to this, and here, and here, and here,  and a story of how one man successfully protected his constitutional rights here, and it actually has created a new market for privacy protection, see here) are studied in detail  in a back room with promises that the powerful image processing computers they use cannot possibly save the image file for use later (see here and here and here and here), such as for evidence, or to send 50,000 of those images back to the factory for “technical” reasons, even if they whipped out their cell phone and took a pic of the computer screen, and then those citizens are sexually assaulted and their genitals actually fondled by minimum wage ‘security’ personnel who can’t get a job anywhere else, under the unsupportable excuse of airport ‘security’ (so far as we know to this date not one terrorist has ever been caught by this system, although many citizens with medical problems have had their urine dumped all over them, etc.), it is not too difficult to see how someone could find a clause in that 1,000 page “Homeland Security Act” that allows everything on anyone’s computer to be provided to some ‘security’ agency for the same excuse that they sexually assault the young women who wear dresses in airports: ‘just in case there might be something in there’ of interest. The only thing this systematic dehumanization of American Citizens does is restrict travel.

The US Constitution refers to both as Unreasonable Search. It is highly illegal from the most fundamental level. So far as we know to this date not one terrorist has ever been caught by this system: the only thing this systematic, criminal, dehumanization of American Citizens does is restrict travel.

Don’t get me wrong on this:  I have seen pictures taken by a modification of the typical Airport Porn Machine, er full body scanner, which is mounted in an unmarked “ZBV” (Z Backscatter Van) cruising the streets in southwestern towns and used to scan vehicles to find illegals. Look here and here and here. Most of the pics have been quickly censored by the perpetrators, since they are in a position to do that to cover their tracks. I am told several thousand of those vans are out there, working, right now. I have not made one complaint about it. I really don’t care if they scan people ad infinitum in airports, or city streets, or anywhere — BUT DON’T RUB IT IN OUR FACE. Have a little professionalism about how you law enforcement types break the law. Demonstrate enough respect for our Constitution that you don’t violate our most fundamental Rights of Citizenship by treating American Citizens as if they are middle ages European serfs. Scan me anytime you feel like it BUT DON’T TELL ME ABOUT IT.

If ‘security’ agencies can get away with forcing young women to stand spread eagle in public and submit to genital groping for no reason other than they are wearing a dress and ‘there might be something under there’ in front of dozens of witnesses then shouldn’t it be far easier to excuse cyber spying that no one can prove is happening? Note that it is not good enough if the young woman takes off her dress in public and stands there humiliated wearing nothing but her panties so there can be no possible doubt that she is not concealing anything: a young man in California did this already and a group of German protesters did this also: the ‘security’ person must stroke up and down the citizen’s inner thighs and then feel around their genitals.

This is heinous. There is no excuse for this. And the extreme outrage in this whole lie is that the demographic most likely to actually BE trying to conceal something are exempt from the whole procedure because ‘it is against their religion’. It is against most American Citizen’s religions also, but that doesn’t seem to matter as American Citizens are not likely to perpetrate acts of violence in revenge.

How bad is merely copying information from some business’s PCs compared to such systematic and highly illegal public dehumanization of American Citizens without so much as a mildly plausible excuse? Why would there be any qualms at all about illegally spying on American businesses if it is considered perfectly acceptable for government to line up Free Citizens and treat them like 6th century European serfs? There probably are not.

For two decades, at least a few of us denizens of planet Earth have pondered the implications of allowing Microsoft inside our corporate firewall: Microsoft is proprietary software, therefore we normally cannot know (at least without packet sniffers and a lot of hard work) what Microsoft software *really* is doing because we cannot inspect the actual code. Who knows what it will do because of defects in design or coding, or from unintended malware or virus programs, or most importantly of all, from under the table deals with data mining corporations and government agencies intent on voyeurism with the money to buy off Microsoft and get their own little secret code segments added to Windows for the collection and transmittal of my private, highly confidential, information. Information whose unauthorized disclosure could get my company fried under Sarbanes Oxley or HIPPA or 42CFR.

There has always been some following to conspiracy theories — there are doubtlessly still people who are absolutely certain that the earth is really flat and all the space flights merely elaborate government hoaxes. But the conspiracy theorists gain some credibility when Microsoft Windows code segments leak out with little data blocks marked “NSA Block #1” and “NSA Block #2”, and certain folders, such as C:\Users\username\AppData\Local\Microsoft\Windows\TemporaryInternetFiles\Content.IE5 which don’t exist if I try to find them while using Microsoft Windows but very much do exist and contain a complete history of my web browsing if I examine that same disk with a non-Microsoft OS, such as Linux. There are nine (9) such folders on my Windows 7 install: one in each user account and another in the Windows and System32 folders.

The damning part of this isn’t that a history of all content browsed is collected but rather that such extreme effort has been expended to conceal the fact from the business owner. One does begin to wonder if the conspiracy theorist nuts do have a valid concern at least part of the time. Everything you see on your computer and everything you type on your computer goes through your computer. It might be encrypted on the Internet, it might be scrambled and encrypted on your disk, but at some point in time it was readable. And if you could read it using your computer, then your computer *could* secret it away in nice, plain, readable form, so it *could* be forwarded to some interested third party without your knowledge or consent.

One of the more important forces driving adoption of Linux as “the” operating system a company will use on most of its computers is not just acquisition cost, or legal cost to maintain license records, or cost of special anti-malware software, but a reasonable fear that a huge, ultra rich corporation, might possibly care more about their own profit than the business’ privacy. In one of my businesses, the penalty is $240,000 per unauthorized disclosure of protected customer health information, so it matters.

Now consider how a foreign government which is a rival or antagonist to the United States government must think. The United States has no moral hindrance to dehumanizing their own citizens in a way that would result in immediate execution of the perpetrator in most countries, and probably spies on businesses electronically. Would the Americans spy on their rivals and enemies as well? Oh yeah.

According to an article in the Wall Street journal, Saturday-Sunday, January 8-9, 2011 (Review, page C3):

In the past, foreign governments have rushed to install the latest version of Microsoft Office or Google’s Chrome browser because it was hard to imagine that Washington would tinker with technology to advance its strategic interests. But just a few weeks before Mr. Putin publicly endorsed open-source software, FBI Director Robert Mueller toured Silicon Valley’s leading companies to ask their CEO’s to build back doors into their software, making it easier for American law enforcement and intelligence gathering agencies to eavesdrop on online conversations. The very possibility of such talks is likely to force foreign governments to reconsider their dependence on American technology.

Half a decade ago I remember France jettisoned 50,000 Windows computers and replaced them with Mandrake Linux. China has of late been often in the news due to their isolationist / control policy concerning Internet use, to the point there are sometimes references to “The Great Fire Wall of China”. The WSJ article also observed:

… more governments are likely to start designating Internet services as a strategic industry, with foreign firms precluded from competing in politically sensitive niches.

The article mentions that Turkey is already considering a ‘national search engine’ and a ‘national email system’ and that Russia, China, and Iran have similar ongoing discussions. Remember the fight between Google and China last year, and the situation between Iran and RIM when Iran demanded the ability to read all Blackberry emails. The article says India, Saudi Arabia, and the United Arab Emirates made similar demands on RIM last year.

And so the mechanism that is propelling open-source software into global dominance may not be technical superiority, or freedom, or even an elitist attitude: the driving force may simply be the lust for power and control, or paranoia about what someone else could do, or perhaps just reasonable caution.

And that necessitates another very important point for American Security — more important to our national security than making teenage girls submit to having their thighs caressed by a guard who says they ‘might have something under their dress’ as a condition of being allowed to fly home for the holidays: Microsoft is the largest employer of non-American H-1B visa programmers in the US — often from Asian countries who are our rivals. Can we Americans be absolutely positive that none of those 5,000 plus foreigners added their own countries’ little back doors, for their own purposes? I doubt that there is really any way that anyone can know with absolute safety. If you doubt this could happen, remember the Department of Homeland Security has already been compromised by a root kit hidden on Sony music CDs: one employee played one music CD in his computer, and the root kit spread through out the one place in America that is supposed to be the very most secure.

We had better spend our time and money fixing that problem first — a terrorist back door leaking our nation’s top security information via Microsoft Windows will hurt us far worse than a little school girl who just wants to get home from university.

FaceBook Virus or Ethics Violation?

FaceBook presently seems to be demanding a cell phone number as a condition of logging on. It could be a virus forwarding mobile phone numbers to China or Siberia for posting unauthorized charges to cell phones to steal money, or it could be FaceBook actually pulling the same stunt themselves for the same reason — to place unauthorized charges on the cell phones. It cannot be to authenticate customers as they are already authenticated through providing a valid non-public (not yahoo, hotmail, msn, etc.) email address.