Chapter 460 Sharing?
Ten years ago, military computers used WINDOWS, Red Flag Linux, and Galaxy Kylin operating systems on clients and stand-alone computers. Since the military network was completely isolated from the outside world, and the access gateways at all levels were equipped with military-specific firewalls, and each computer was equipped with a jammer, the data security was relatively high.
However, with the development of information technology, the WINDOWS system and the Red Flag system optimized after Linux localization have exposed more and more shortcomings and bugs, and the military's self-developed system projects have also been put on the fast track.
While vigorously developing its own network supporting facilities, Daxia attaches more and more importance to information security. A few years ago, the promotion of domestic CHN domain names was one of the key projects.
Even six years ago, in a "Notice on Supplementary Bidding for Information Protocol Supply Mandatory Energy-Saving Products" involving only more than 30 computer procurement tasks, the relevant departments clearly stated for the first time: "All computer products are not allowed to install Windows 8 operating systems."
Although the document did not explain the relevant provisions, anyone with an IQ online knows that Windows 8 must have big problems.
Microsoft then began to vigorously promote Win 10, putting Win 8, which was once highly expected, into the cold palace.
Against this backdrop, some experts at the meeting said, "The military network is physically isolated from the local network, and customized firewalls are installed at all levels of gateways. Combined with other strict security measures, theoretically, the operating system security risks are not great. However, given the sensitivity of military information security, the security issues of using military computer operating systems cannot be ignored.
Since the year 1003 of the Xia Yin calendar, Microsoft has disclosed the source code of software such as Windows 2000 and Windows XP to more than 60 major countries around the world, including us, through the "Government Security Program", allowing government personnel of relevant countries to conduct security reviews of Microsoft's products.
It should be acknowledged that these measures can ensure that the security risks of using related operating systems are within a controllable range.
But since the year 1014 of the Xia Yin calendar, Microsoft has officially stopped Windows XP operating system provides support services, and the source code of Vista system and Win7 system is no longer open for government review. It also forces the use of foreign cryptographic algorithm technology and no longer supports our Daxia algorithm. The underlying software of the system relies more on cloud servers. All application information including emails, documents and address books will be synchronized to Microsoft's servers in the United States.
Using domestic operating systems is undoubtedly reliable in terms of military user information security. However, this security requirement should not be at the expense of reducing the combat effectiveness of the army. Domestic operating systems need to have higher quality assurance in terms of basic functional requirements such as process management, program control, and human-computer interaction.
In terms of basic functions, both Galaxy Kirin and Red Flag Linux can only be said to be qualified for use in the intranet. Once connected to the Internet, the data protection capability of the firewall is still not as good as the current Microsoft Win 11, and in terms of actual support for basic functions such as process management, program control, and human-computer interaction, it is even more inferior to the Cangqiong system.
Therefore, my suggestion is to agree to include the core source code of the Gonggong system in the cooperation project, and let us and Jiuzhou Technology jointly develop the operating system to ensure that its system control is in our hands, and we can change the skin to make a commercial system, so that users can use the commercial system to compare and optimize. "
The expert's long speech was undoubtedly recognized by most people.
It not only solved the problem of the opponents, but also took into account the views of the supporters, and even popularized science for some people who were not very clear about the situation.
But after a little thought, Mr. Zheng found that there was something wrong with the expert's plan.
He raised a very profound question. "Foreign companies such as Microsoft have offered tens of billions of dollars to purchase the core source code of the Gonggong system, but Jiuzhou Technology did not agree.
How can we let Jiuzhou Technology share it? You must know that all of Jiuzhou Technology's achievements in the field of software engineering are almost inseparable from this core source code. This is what they rely on for survival."
...
The meeting fell into silence.
After all, the kind of idiot who thinks that all companies in Daxia should contribute their achievements to Guo Jia for free cannot enter the door of this conference room.
Now Jiuzhou Technology is not only a first-level confidential unit, it is also a leader in Daxia's semiconductor industry and a core technology provider. In all future textbooks and professional books related to semiconductors, Jiuzhou Technology is destined to leave a lot of space for a legendary company.
No one dared to ask for the core code of the system directly. Even asking required careful consideration and countless preparations before asking in private.
Wait, private?
Several eyes focused on General Zheng.
A straightforward person said, "You have a good personal relationship with Mr. Gu of Jiuzhou Technology. Is it okay?"
Gu Qing, who was still enjoying the Gobi scenery, didn't know that a group of people were plotting to get his little baby.
Even when he left that afternoon, Mr. Zheng didn't come to see him.
However, a few days later, Gu Qing suddenly received a call from Professor Zhuang, who said that he would bring a few of his favorite students to find Boss Gu to solve work problems through the back door.
The young boss Gu simply didn't believe that such a proud protégé would not be able to find a job, so he chose and was of course given a warm welcome.
Mr. Zhuang's favorite student, no matter how bad he is, he is still better than the newly hired researchers.
On December 10th, Zhuang Youwei brought Yongyuan and several of his proud students to the Jiuzhou Science and Technology Community.
After many layers of identity checks, the group finally arrived at Gu Qing's office.
"Oh, if I want to come into your kid's place, I almost have to peel off the old man's skin for inspection."
Professor Zhuang's first complaint when they met made Gu Qing smile bitterly and shake his head.
"Our company's overseas executives encountered some security problems during this period. Fortunately, the security force was sufficient, so there were no problems. Therefore, the security inspection work in the park recently has been much more complicated and detailed than before. After all, safety is no small matter. You always understand.”
Professor Zhuang waved his hand and said to the person behind him: "This is the hottest genius in Daxia right now, Gu Qing."
Then he faced Gu Qing, pointed at the people behind him, and introduced them one by one: "The man wearing black-rimmed glasses is my favorite student, Yongyuan. After returning from abroad, he has been engaged in the research and development and teaching of industrial software.
The young man wearing gold-rimmed glasses next to me is a good prospect I recently discovered. His name is Zhang Hui, and he used to be engaged in system development. "
Although the two men had already been thoroughly investigated through big data comparison, Gu Qing still took the initiative to step forward and shake hands.
"Hello."