Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 460: Sharing?

Ten years ago, military computers used Windows, Red Flag Linux and Galaxy Kirin operating systems on client computers and stand-alone computers. Since the military network was completely isolated from the outside world, and access gateways at all levels were equipped with military-specific firewalls,

Every computer is equipped with a jammer, so data security is relatively high.

However, with the development of information technology, the Windows system and the locally optimized Red Flag system of Linux have exposed more and more shortcomings and bugs, and the military's self-developed system project has also been put on the fast track.

While Daxia is vigorously developing its own network supporting facilities, it pays more and more attention to information security day by day. The promotion of domestic chn domain names a few years ago was one of the key projects.

Even six years ago, in a "Notice on Supplementary Bidding for Compulsory Energy-Saving Products for the Supply of Information Agreements" that only involved the purchase of more than 30 computers, the relevant departments clearly stated for the first time: "Windows installation is not allowed on all computer products.

8 operating system."

Although the document does not provide any explanation for the relevant provisions, anyone with an online IQ knows that there must be a big problem with Windows 8.

Then Microsoft began to vigorously promote win 10, pushing win 8, which had high hopes, into the shadows.

In this context, some experts at the conference naturally said bluntly: "The military network is physically isolated from local networks, and gateways at all levels are equipped with customized firewalls. Combined with other strict security measures, theoretically, the security risks of the operating system are not great."

However, in view of the sensitivity of military information security, the security issues of the use of military computer operating systems cannot be ignored.

Since 2003, Microsoft has disclosed the source code of Windows 2000, Windows

Conduct a security review.

What needs to be acknowledged is that these measures can ensure that the security risks of using relevant operating systems are within control.

But since 2014, Microsoft has officially stopped providing support services for the Windows

Algorithms and the underlying software of the system rely more on cloud servers. All application information, including emails, documents and address books, will be synchronized to Microsoft servers in the United States.

The use of domestic operating systems is undoubtedly reliable in terms of military user information security. However, this security requirement should not be at the expense of reducing military combat effectiveness. Domestic operating systems have basic functional requirements such as process management, program control, and human-computer interaction.

There is a greater need for higher quality assurance.

Galaxy Kirin and Hongqi Linux can only be said to be qualified for use on the intranet in terms of basic functions. Once connected to the Internet, the data protection capabilities of the firewall are still not as good as the current Microsoft win 11, and in process management, program control, human-computer interaction, etc.

In terms of actual support for basic functions, it cannot compare to the Cangqiong system.

Therefore, my suggestion is to agree to incorporate the core source code of the Gonggong system into the cooperation project, and let us and Jiuzhou Technology jointly develop the operating system to ensure that the system control is in our hands, and we can reskin it to make a commercial system, so that

Users use commercial systems to compare and optimize."

This expert's long speech was undoubtedly recognized by most people.

It not only solves the problems of the opposition, but also takes into account the supporters.

But after Mr. Zheng thought for a moment, he discovered that there was something wrong with this expert's solution.

He asked a very profound question. "Companies such as Microsoft once offered tens of billions of dollars to purchase the core source code of the Gonggong system, but Jiuzhou Technology did not agree.

How can we get Jiuzhou Technology to share it? You must know that almost all of Jiuzhou Technology's achievements in the field of software engineering are inseparable from this core source code. This is what people rely on for survival."



The meeting fell into silence.

Those idiots who think that all enterprises in Daxia should contribute their results to Guo Jia for free are unlikely to enter the door of this conference room.

Now Jiuzhou Technology is no longer just a first-level confidential unit, it is also a leader in Daxia's semiconductor industry and a core technology provider. In all future semiconductor-related textbooks and professional books, Jiuzhou Technology is destined to leave behind a large number of

A legendary company.

Directly asking for the core code of someone else's system is something no one dares to come forward to do. Even asking requires careful consideration and countless drafts before perhaps daring to make insinuations in a private capacity.

Wait, private identity?

Several eyes focused on General Zheng.

Youzhi said: "You have a good personal relationship with Mr. Gu from Jiuzhou Technology. Is that okay?"

Gu Qing, who was still admiring the Gobi scenery, didn't know that a group of people were plotting to get his little baby.

Even when he left that afternoon, Mr. Zheng didn't come to see him.

However, a few days later, Gu Qing suddenly received a call from Professor Zhuang. Professor Zhuang said that he would bring some of his best students over to ask Boss Gu to go out the back door to solve work problems.

The young boss Gu simply didn't believe that such a proud protégé would not be able to find a job, so he chose it, and of course he was warmly welcomed.

Mr. Zhuang's favorite student, no matter how bad he is, he is still better than the newly hired researchers.

On December 10th, Zhuang Youwei brought Yongyuan and several of his proud students to the Jiuzhou Science and Technology Community.

After many layers of identity checks, the group finally arrived at Gu Qing's office.

"Oh, if I want to come into your kid's place, I almost have to peel off the old man's skin for inspection."

Professor Zhuang's first complaint when they met made Gu Qing smile bitterly and shake his head.

"Our company's overseas executives encountered some security problems during this period. Fortunately, the security force was sufficient, so there were no problems. Therefore, the security inspection work in the park recently has been much more complicated and detailed than before. After all, safety is no small matter.

You always understand."

Professor Zhuang waved his hand and said to the person behind him: "This is the hottest genius in Daxia right now, Gu Qing."

Then he faced Gu Qing, pointed at the people behind him, and introduced them one by one: "The one wearing black-rimmed glasses is my favorite disciple, Yongyuan. The one next to him wearing gold-rimmed glasses is a good talent I discovered recently."

Although the two men had already been thoroughly investigated through big data comparison, Gu Qing still took the initiative to step forward and shake hands.

"Hello."
Chapter completed!
Prev Index    Favorite Next