Chapter 1165 Cooperation Operation Department
The responsibility of Jiuzhou Technology's Cooperation Operation Department is to lead or participate in the product development and market bidding of cooperative enterprises, and at the same time build a bridge of communication between Jiuzhou Technology's R&D technology and cooperative enterprises, promote the integration of cooperative enterprises and company technology, and competitive advantages in cost, product supply capacity and function.
Jiuzhou Technology's Engineering Procurement Department will actively participate in the preparation of customer bids together with the Cooperation Operation Department.
Participating in market bidding will enable the procurement department to understand the needs of customers for supporting products, and fully understand Jiuzhou Technology's commitment to cooperative enterprises in the early stage of the order fulfillment process to ensure that the solution meets customer needs and can be delivered in time.
Production procurement and administrative procurement are responsible for daily procurement operations and communication with cooperative enterprises, timely processing of procurement requests and solving problems between the two parties.
From the perspective of the industry, Jiuzhou Technology's procurement department and operation department directly regard cooperative enterprises as core customers, but the authority they exercise is not simple "procurement", but the management of cooperative enterprises and material management under Jiuzhou's industrial system.
After all, the procurement department of a general enterprise can only do procurement and price negotiation.
In addition to procurement and operation, Jiuzhou Technology has also developed a complete value judgment process for cooperative enterprises to ensure that the company selects cooperative enterprises that best meet the interests of its own company, and at the same time ensure that Jiuzhou Technology gives equal opportunities to all partners of the same level.
The selection team for technology decentralization is generally composed of relevant expert teams and the technology R&D department. This team manages the selection process for partner enterprises to accept technology.
The feedback office of cooperative enterprises is a subordinate department of the President's Office. If the cooperative enterprise has any dissatisfaction in its dealings with Jiuzhou Technology, there is a special help center responsible for collecting feedback and complaints.
Each technical cooperation project has a corresponding interface person within Jiuzhou Technology, who is responsible for the interface and communication with the cooperative enterprise. The cooperative enterprise can also send important events and serious violation complaint information to the official mailbox of Jiuzhou Technology (
), which is specially set up for this purpose to ensure the confidentiality and rapid response of the feedback information.
"Build a long-term cooperative relationship based on trust, honesty and candor. Resolutely avoid damaging the overall highest interests of Jiuzhou Technology and its partner companies due to local or departmental interests.
Abide by business ethics. If at any time the supplier feels that the implementation of this policy is discounted or contrary to it, please report your concerns to the office of Jiuzhou Technology's Cooperation Operation Department. We will investigate and handle the matter in accordance with the principles of respecting facts, being cautious and thorough, and keep the confidentiality of the person who gives feedback."
Yu Chengdong whispered these words on the contract with a cold look in his eyes.
Today, he is responsible for the introduction of two technologies, regional special network communication and dual satellite system positioning technology of Jiuzhou Technology.
The company has given a lot of budget, but not too much.
"When using these two technologies, regardless of the frequency of use, you must pay for installation and use. We, Xia Wei, agree with this.
In our opinion, this technology is one of the core competitiveness of mobile phones, and there is no hesitation.
However, your company requires that the service sign a confidentiality agreement with the user separately, all information must be transmitted through encryption, and no data interface is provided to our company. I think we need to discuss this requirement.
Our company's Hongmeng system has the highest standard security certification from multiple authoritative institutions at home and abroad, including the world's first ISO/IEC 27701 certification, Daxia's highest standard EAL4+ security certification.
And our Hongmeng system needs to provide different levels of security protection according to the corresponding security policy from the beginning of the generation of each protection level of data in its storage, use, and transmission throughout its life cycle.
Each data will be marked with a corresponding label when it is generated. This label will accompany it throughout its life and guide each node of the super virtual terminal to provide it with consistent security protection.
At the same time, the access control system of the super virtual terminal supports access control strategies based on labels to ensure that data can only be stored, transmitted and used between nodes that can provide sufficient security protection. Devices with low security levels cannot access some sensitive and high-risk data in devices with high security levels.
Therefore, for sensitive information of users, our company cannot hand it over to any other company. "
Yingshu looked at Yu Chengdong, who was serious and full of justice, with a calm look. He waited until the other party finished speaking before he supported the microphone at hand.
"The user data will be fully handled by Yunzhong Jiulong Big Data Service Company. I believe that once users are eager to use these two technologies, it is usually when the signal environment is poor. In a potentially dangerous environment, our company believes that it is appropriate to hand over important data to the world's safest and fastest-responding big data service company.
Or do you think that your company's data security protection capabilities and information transmission capabilities can already exceed Yunzhong Jiulong Big Data Service Company?"
Yu Chengdong was speechless when he heard this answer.
He opened his mouth slightly and his eyes were stunned.
Since Jiuzhou Technology entered the field of intelligent systems, all service requests and data storage of its products have been processed by the Daxia domestic servers of Yunzhong Jiulong Big Data Industry Development Co., Ltd.
As an insider, Yu Chengdong clearly knew that this company was a special enterprise in which Jiuzhou Technology exchanged technology and certain intellectual property rights, and Daxia Panda Electronics Group, with Daxia Junfang background, held 51% of the shares.
The most important thing is that this company is already responsible for some official data security services abroad. In the world of network data security, the young man in front of him may not be scary, but the genius behind this young man is the real devil.
The network engineers in his own company usually think hard about how to achieve the data protection capabilities of Yunzhong Jiulong, so it is naturally impossible to defeat the other party in this regard.
Zeng Xin, the head of Yunzhong Jiulong Big Data Company, sat aside, looking at Yu Chengdong's embarrassed expression, thinking about helping him out.
Said: "In fact, for data security issues, our company is only a small company that has been established for a few years. Xia Wei has always made great achievements in this regard. We should learn from each other and make progress together.
If Xia Wei is willing, our company can also be responsible for part of your company's data security services."
Hmm?
Yu Chengdong opened his mouth and wanted to take out his own Xia Weiyun technology. But looking at the retired experts next to the other party, he finally smiled reluctantly: "Our company's data security services are at the world's top level. I believe that we can definitely make progress by learning together."