140 What a terrible meeting ceremony(1/2)
Sweden is one of the five Nordic countries.
For the absolute majority, the most famous one in this country is probably the Nobel Prize.
But in fact, Sweden is also a highly developed country with strong industry and a wide variety of types. Fields such as software development, microelectronics, remote communications and photons are also in the world's leading position.
The Royal Swedish Academy of Sciences is even more famous all over the world.
Near the Orlanda International Airport in Stockholm, the famous Sista Science City is known as Sweden's "Silicon Valley" and is also recognized as the world's second world science and technology park second only to the Silicon Valley in the United States.
The headquarters of Ericsson, a Swedish "national treasure"-level enterprise, is located in this science and technology park.
At this time, an extremely important offline meeting was being held in the conference room on the top floor of Ericsson's headquarters. Not only the executives of the headquarters, but also the executives of most markets around the world were summoned to attend the meeting.
However, the conference room that should have been solemn has become a mess.
"The Chinese have proved the effect of the turbulence algorithm! Oh my God, the effective barrier rate of DDOS has reached an astonishing 95%! Gentlemen, please face this data!"
"I don't know what the R&D center is doing! But if we continue like this, we may very likely leave behind the contract with VeRizon that we just snatched from the Koreans!"
"The whole world knows that the future is the world of turbulence algorithms, but now we have nothing to gain! Do you know that China's cloud service providers have begun to lay out a huge security system based on this algorithm, which is worrying."
"Or there are more troublesome things. With reliable news, Huawei has begun to design network equipment with turbulence algorithm chips to protect network security from the hardware layer. They have begun to contact WindTre. If we cannot come up with the corresponding strategy, then after the contract expires, WindTre may change to purchasing Huawei's new generation of wireless devices. We will lose the entire Italian market."
...
Ken Cartel kneaded his nose until the meeting room started to curse.
"Okay, complaining and cursing will not solve the problem, please be quiet!" said the Ericsson president.
The conference room finally calmed down. Ken Cartel looked at the president of the Asia-Pacific region next to him and asked, "Okay, then Mr. Izzy, how is your contact with you?"
"Huawei applied for invention patents from all countries with its business coverage two months ago. According to the public information we found, the patent owner is still the young man. We have contacted the patent owner, but the email reply from the other party stated that Huawei has fully authorized all patent authorization matters regarding turbulence algorithms."
"Huawei's conditions are still the same as before. The prerequisite is to hope that we can speak out and help them get the most urgent products, but it will be very risky if they do so. As far as I know, Samsung, Cisco, HP, etc. are also in frequent contact with Huawei. Of course, now they are like us, and the negotiations are still stalemate."
"The problem now is that we don't know that Huawei cannot monopolize the entire market with turbulence algorithm chips. In addition to the production capacity, it will also cause countries to impose corresponding sanctions on it at the legislative level. After all, the problem will be very troublesome. But the key to the problem is who will be granted to this technology and how much is the authorized price. Unfortunately, as far as the current situation is concerned, we do not have the advantage in many aspects compared with competitors."
After listening to Carl Izzy's answer, Ken Cartel turned his gaze to the other side of him and looked at the company's chief technology officer.
"After our careful analysis of the source code, the evaluation conclusions are ways to bypass patents, but there are risks. We need enough time to study those codes and find ways to avoid those risks. Of course, this is just a technical suggestion. The legal aspects, especially when we still need the Chinese market, are not included in my considerations."
Ken Cartel still looked at the technical officer: "Kul, please give me an accurate time. If you encounter the worst case, you don't need to consider legal risks. We have to copy similar equipment to meet the basic needs of customers, and how long will it take."
Of course, at this time, Ken Cartel's eyes were definitely not the only one who was looking at him, but the more than a dozen senior executives participating in the meeting were all focused on this technical officer.
Coul Cowper felt the pressure, and hesitated for about ten seconds before speaking: "It's about half a year!"
"I knew." Someone raised his hands and made a helpless gesture with his palm facing upwards.
"God! We spent more than 2 billion US dollars on research and development last year. Did we raise a bunch of people?"
"Half a year? I bet that if Huawei decides to cooperate with Cisco and Koreans, half a year will be enough for them to spread the world in communications and network equipment!"
"Okay, gentlemen, please be quiet!"
Ken Cartel said with a frown.
Then he looked at his technical officer again: "Kul, it's been too long for half a year. I don't quite understand why it takes so long if you already have the source code?"
"First of all, the source code we obtained is not complete, it is just the core part, and the extension function part needs to be supplemented. Secondly, if the core code is not thoroughly studied and imitated directly, it may bring incomprehensible technical risks. It takes time to analyze the code. For example, we have seen many very special equations in the code. Simply put, these equations are structurally a very special type of equation, and they have fixed return values after receiving a specific signal."
"The existence of such equations can be understood as the algorithm testing stage, which detects the algorithm's response capabilities. However, it may also cause systemic risks."
"So, can we just eliminate this kind of equation?" someone asked immediately.
"It is not so simple to eliminate. These equations are embedded in the main function. After removal, they may have unpredictable impact. The core code needs to be completed and tested repeatedly. And I'm just giving an example, we don't know if there are other risks in these codes."
"Wait, if you say this, since there are known risky vulnerabilities, why can't we use them to attack the other party's equipment?" Someone found the loophole in the technician's words.
"This has to be explained from the mathematical principle, because the developer has a constant X, which is known to the developer and unknown to us. This is actually the same as A encryption. The difference is that no one has the private key except the developer! So we have found that the possible risk assessments are all based on similar situations."
"You mean, the developer may have hidden a backdoor in the source code?" someone asked.
"It can only be said that there is this possibility, but there is no evidence. And there is a very interesting setting in the code. It is troublesome to describe it in technical language. Simply put, this is a trigger, which is used to receive authentication codes. According to the instructions, the trigger will start working after authentication, and the system will restore it according to some preset commands."
"To put it simply, even if those equations are really backdoor programs reserved by developers, they may lose their original effectiveness if they are authenticated during actual use. So it is difficult to say that they can use this to attack the other party. Because using this technology to prevent infringement is a very complex but wonderful method. In fact, many of our engineers are very interested in this design." Coul Cowper replied.
"Okay, but half a year is still too long. Four months, Kuhl, you only have four months. In four months, I need a complete solution! Of course, if any department needs cooperation during this period, everyone will cooperate with each other. If any support is needed, you can contact me at any time and let me coordinate. Tell me, Kuhl, is it OK for four months?
"Okay! Mr. Cartel!"
"In addition, continue to maintain contact with Huawei, you can appropriately increase the price."
"OK!"
"After meeting!"
...
In fact, Ericsson is definitely not the only one who has the same idea.
For all network equipment service providers around the world, technical security has always been a very important thing, and this is why everyone invests a lot of money in technology research and development every year.
The more patent rights you have, the more say you have.
Only by maintaining technological leadership can you gain a dominant position in market competition.
For some new breakthrough technologies, before obtaining formal authorization, you must first have the ability to imitate them to make people feel safe.
As for patent bills in various countries...
If the strong one is intellectual property, the weak one is used.
As long as you maintain the market first and spend a few years to sue, it is not a big deal for these giant multinational companies.
Every year, these multinational companies may fight several lawsuits about patent infringement, sometimes they are plaintiffs, sometimes they are defendants. This is not news. Sometimes they win, sometimes they lose, and sometimes they shake hands and talk in half of the lawsuit...
In the highest-end competition, there are all kinds of people, but there are no honest people.
So God knows how many engineers around the world have received the same tasks as Ericsson's chief technology officer.
Imitation, improvement, innovation, pull everyone down the same starting line, everyone continues to compete, whoever falls behind will be eliminated first.
The injured are always technicians fighting on the front line. After all, this kind of task is often the most difficult and hard, and requires long-term use of the brain, so it is very likely that hair loss will occur due to excessive use of the brain or long-term anxiety.
Because I can't do it well and if something goes wrong, I may still have to take the blame.
...
If Ning Wei knew this, he would probably be honored.
Oh……
Lao Han is not fighting alone.
Hundreds or even thousands of senior programmers and algorithm engineers around the world will pull his hair day and night in the next few months. Thinking about it, it is something that will make him excited to explode.
With thousands of high-IQ bald men in the field, when he attends similar international conferences in the future, wouldn’t he be able to stand out with his lush hair?
But at this time, I wouldn't care about thinking about these things.
Because he is already standing outside the building of the International Mathematics Research Center of Yanbei University.
Just now, Lu Dongyi took him to a hotel in the school and settled down first. Now he took him to see his tutor.
This is not the first time he has been here, but he is still a little nervous.
When he came last time, his mentor was appointed to attend a meeting, so he couldn't see him. But this time, Tian Yan was really waiting for him in the office. Although he had never seen this mentor, Lu Dongyi had mentioned it to him a lot.
It can be said that the gods have been in contact for a long time, which gives Ning Wei a very strict feeling.
"Will that director Tian deal with me? I let director Tian go pigeons for a year, he shouldn't scold me if he meets me?" Ning Wei asked.
"Ha...what do you think?" Lu Dongyi sneered.
"I'm not afraid of scolding me. The professors of Jiang University told me that if Director Tian dares to scold me, I will threaten him to change his mentor." Ning Wei said seriously.
"I……"
Lu Dongyi suddenly found that he had nothing to say, well, my junior brother has turned skinned...
"You were led to the destruction by the professors of Jiang University, junior brother!"
"hehe!"
After the bickering, the two of them had already walked into the building.
The research center is still lively.
Many people think that university teachers are relaxed, such as during winter and summer vacations, and this perception is correct.
For some lecturers who are dedicated to teaching positions, they can indeed enjoy the holiday during the winter and summer vacations.
But for those professors who have aspirations, whether they have a holiday depends on whether they have a project.
Cooperation at the national level, provincial level, superior level or enterprise...
Especially in the fields of birth, chemistry, environment and materials, it is hard to say whether there will be weekends when rushing for projects, let alone winter and summer vacations.
Specifically, mathematics is no longer an era where one pen and one piece of paper can solve problems.
Even if you want to use supercomputers during the winter and summer vacations, you have to queue up, and the free computing resources for supercomputers are still limited, so you can buy them with the project funds.
There are also hard-working graduate students and doctoral students, who are about to graduate, but they can't produce results and their thesis is still not up to standard...
To be continued...