Chapter 460 Sharing?
Ten years ago, military computers used WINDOWS, Red Flag Linux and Galaxy Kirin operating systems on client computers and stand-alone computers. Since the military network was completely isolated from the outside world, and all levels of access gateways were equipped with The military has a dedicated firewall and each computer is equipped with a jammer, so data security is relatively high.
However, with the development of information technology, the WINDOWS system and the locally optimized Red Flag system of Linux have exposed more and more shortcomings and bugs, and the military's self-developed system project has also been put on the fast track.
While Daxia is vigorously developing its own network supporting facilities, it pays more and more attention to information security day by day. The implementation of domestic chn domain names a few years ago was one of the key projects.
Even six years ago, in a "Notice on Supplementary Bidding for Compulsory Energy-Saving Products for the Supply of Information Agreements" which only involved the procurement of more than 30 computers, the relevant departments clearly stated for the first time: "All computers Products of this category are not allowed to install the Windows 8 operating system ”
Although the document does not provide any explanation for the relevant provisions, anyone with an online IQ knows that there must be a big problem with Windows 8.
Subsequently, Microsoft began to vigorously promote Win10, pushing Win8, which had once had high hopes, into the shadows.
In this context, some experts participating in the meeting said bluntly: "The military network is physically isolated from the local network, and gateways at all levels are equipped with customized firewalls. Combined with other strict security measures, in theory, the operation The system security risks are not great, but in view of the sensitivity of military information security, security issues in the use of military computer operating systems cannot be ignored.
Starting from Xia Yin 1003. Through the "Government Security Plan", Microsoft has disclosed the source code of Windows 2000, Windows XP and other software to more than 60 major countries around the world, including us, allowing government personnel in relevant countries to conduct security reviews of Microsoft products.
What needs to be acknowledged is that these measures can ensure that the security risks of using relevant operating systems are within control
However, starting from Xia Yin 1014, Microsoft officially stopped providing support services for the Windows In our Daxia algorithm, the underlying software of the system relies more on cloud servers. All application information, including emails, documents, and address books, will be synchronized to Microsoft's servers in the United States.
Using domestic operating systems is undoubtedly reliable in terms of military user information security. However, this security requirement should not be at the expense of reducing military combat effectiveness. Domestic operating systems need to have higher quality assurance in terms of basic functional requirements such as process management, program control, and human-computer interaction.
In terms of basic functions, Galaxy Kirin and Hongqi Linux can only be said to be qualified for use on the intranet. Once connected to the Internet, the data protection capabilities of the firewall are still not as good as Microsoft's Win11, and in process management and program control , Human-computer interaction and other basic functions are not even comparable to the Cangqiong system.
So, my suggestion is to agree to incorporate the core source code of the Gonggong system into the cooperation project, and let us and Jiuzhou Technology jointly develop the operating system to ensure that the system control is in our hands and can be reskinned. A commercial system allows users to use commercial systems to compare and optimize. ”
This expert’s long speech has undoubtedly been recognized by most people.
It not only solves the problems of the opponents, but also takes into account the views of the supporters, and even provides science popularization to some people who are not very clear about the situation.
But after Mr. Zheng thought for a moment, he discovered that there was something wrong with this expert's plan.
He asked a very profound question. "Foreign companies such as Microsoft once quoted tens of billions of dollars to purchase the core source code of the Gonggong system, but Jiuzhou Technology did not agree.
How can we get Jiuzhou Technology to share it? You know Almost all of Jiuzhou Technology’s achievements in the field of software engineering are inseparable from this core source code. This is what people rely on for survival.”
……
The meeting fell into silence.
After all, the kind of idiot who thinks that all enterprises in Daxia should contribute their results to Guo Jia for free cannot enter the door of this conference room. Now Jiuzhou Technology is no longer just a first-level confidential unit, it is also a leader in Daxia's semiconductor industry and a core technology provider. Jiuzhou Technology is destined to leave a large number of semiconductor-related textbooks and professional books in the future. legendary company.
To directly ask for the core code of someone else's system, no one dares to come forward to do this. Even asking, you have to think twice and make countless drafts before you dare to make insinuations in a private capacity. .
Wait, private identity?
Several eyes focused on General Zheng.
Youzhizi said: "You have a good personal relationship with Mr. Gu from Jiuzhou Technology, is that okay?"
Gu Qing, who was still admiring the scenery of the Gobi, did not know that a group of people were plotting at this moment. I want my own little baby.
Even when he left that afternoon, Mr. Zheng did not come to see him.
However, a few days later, Gu Qing suddenly received a call from Professor Zhuang. Professor Zhuang said that he would bring some of his best students over to ask Boss Gu to go through the back door to solve work problems.
The young boss Gu simply didn't believe that such a proud protégé would not be able to find a job, so he chose and was of course given a warm welcome.
Mr. Zhuang’s favorite disciple, no matter how bad he is, he is still better than the new researchers.
On December 10th, Zhuang Youwei brought Yongyuan and several of his proud students to Jiuzhou Science and Technology Community.
After many layers of identity checks, the group finally arrived at Gu Qing’s office.
“Oh, if I want to enter your place, I almost have to peel off the old man’s skin for inspection.”
Professor Zhuang's first complaint when they met made Gu Qing smile bitterly and shake his head.
“Our company’s overseas executives encountered some security problems during this period. Fortunately, the security force was sufficient, so there were no problems. Therefore, the security inspection work in the park recently has been much more complicated and detailed than before. , After all, safety is no small matter, you always understand."
Professor Zhuang waved his hand and said to the person behind him: "This is the hottest genius in Daxia now, Gu. Qing."
Then he faced Gu Qing, pointed to the people behind him, and introduced them one by one: "This guy wearing black-rimmed glasses is my favorite student, Yongyuan, who has been engaged in industry since he came back from abroad. Software development and teaching.
The young man next to me wearing gold-rimmed glasses is a good prospect that I discovered recently. His name is Zhang Hui, and he used to do system development. ”
Although the two men had already been thoroughly investigated through big data comparison, Gu Qing still took the initiative to step forward and shake hands.
"Hello."
(End of this chapter)