Top of the Big Era

Chapter 2813: A Thousand-Mile Embankment Destroyed by an Ant Hole

Zhou Buqi found someone to organize a seminar on the understanding of open source. This is a large-scale seminar, and it can be said that there are many strong players.

Recently, the Internet Association has just released the top 10 websites in China, which are Penguin, Baidu, Weidian, Toutiao, Taobao, Sohu, Pengyou.com, Sina, NetEase, and Weibo.

However, this statistics is the data on the PC side.

The mobile side is not called website traffic, but App traffic.

For example, Weibo, Weibo's website traffic refers specifically to PC traffic. If the traffic of the mobile Weibo App is added up, there will be no traditional three major portals such as Sohu, Sina, and NetEase.

But even so, these 10 major websites also cover the 7 most powerful Internet companies in China, and Ziweixing has as many as 4 websites.

The 7 giants all sent people to participate in this seminar.

No one would refuse the invitation of Boss Zhou.

It can be seen that Zhou Buqi has established good connections in China over the years.

One of the focuses of the discussion is to revolve around a very popular hot word in the domestic IT industry - big data.

In the past year, big data has stepped out from behind the scenes and officially entered the practical stage.

The so-called big data application is the ability to extract valuable data from massive information to accurately locate customer needs and apply it to social management, medical care, transportation, financial services and other aspects.

"For example, when a patient is doing an electrocardiogram, the doctor can analyze, monitor and predict the accumulated data. E-commerce can judge customer preferences based on the number of online purchases in each period and optimize the arrangement of goods."

Zhang Minsheng, vice president of Tsinghua University and vice president of the Institute of Communications, spoke at the seminar.

In addition, many industries such as finance and logistics can analyze and extract big data to explore customer needs and reduce transaction costs.

Especially logistics.

"At present, government departments need to recognize the value and importance of big data as a strategic asset; the demand for big data processing and business analysis in various industries and enterprises is also growing. Next year, it is expected that these data and information will flow and exchange to serve the real industry, and a diversified innovative development pattern will emerge, such as application to smart city and urbanization construction, to improve the government's management capabilities and public service levels for cities."

Mr. Zhang Minsheng's words are very important.

Compared with these private entrepreneurs, he is a member of the system, a "family member".

Then the most critical point is here.

How did the big data technology in China develop?

In fact, it comes from an open source product Hadoop from the United States.

Not only in China, but all big data systems in the world are rectified and improved by the Hadoop solution. Without Hadoop, it would be difficult to present the massive amount of information in the world in specific applications.

For example, mobile payment, e-commerce, logistics... including buying train tickets online, will encounter serious development restrictions. From queuing to buy tickets in the past to buying tickets online now, this practical convenience is backed by the convenience brought by open source solutions.

The highest-ranking person at the seminar was Secretary-General Meng.

His surname is Meng and his name is Gang.

He is Meng Houkun's biological father.

This time he came here specifically to support Zhou Buqi.

However, this is a major strategic issue concerning the fate of the country, so he cannot be too partial and must take it seriously. He asked in a deep voice: "Why should we use the open source solution of the United States? Can't we do it ourselves?"

Zhou Buqi smiled, "Robin, tell me?"

Li Yanhong shook his head with a smile, and then slowly said: "Six or seven years ago, Baidu organized a group of the best Internet experts in the country to develop our own big data system, which cost a lot of money. But after it was done, there was a big gap in performance with the open source solution Hadoop. Not only the performance gap, but also the cost gap in later maintenance."

After a pause, he continued: "Had OOP is an open source project jointly developed by the Apache Foundation of the United States and Yahoo. It is a public welfare foundation in the technology industry. In addition, since it is an open source solution, developers around the world can participate, continuously optimize the structure and performance, and then share it globally, which can save a lot of money for all companies engaged in big data processing. "

Secretary-General Meng nodded, took a pen in his hand to take notes, and said while writing: "There are three advantages, one is stronger performance, one is lower cost, and one is global technology sharing, which can keep pace with the times."

As soon as this was said, many people nodded secretly.

I think this secretary-general is very capable.

From Mr. Li's words, most people can only hear two advantages, that is, strong performance and low cost.

In fact, there is another huge advantage that is hidden deeper!

That is globalization.

Using open source solutions means global synchronization, and foreign countries will not secretly develop some leading technology and quietly leave domestic Internet companies behind.

Everyone is standing on the same platform to share information.

If your technology explodes, I will also benefit.

This is the biggest advantage of adopting open source solutions for technologically backward countries.

This is even more true in the field of big data processing.

Because the technical content of this field is too high.

It is so high that it is "unique".

To this end, Zhou Buqi added, with a bit of self-deprecation, "After Baidu gave up that plan, I took those scientists to Ziweixing. I wanted to continue this mission and create something truly our own for our country." Distributed processing framework. But after three or four years, this project was stopped. Ziweixing now uses Hadoop’s general solution.”

People in the IT field present were not surprised by this.

But there are still many outsiders.

Zhou Buqi could only explain further, "In fact, even Silicon Valley technology giants such as Microsoft, Amazon, Facebook, Oracle, and IBM all use Hadoop solutions in big data processing. It is not Ziweixing technology. No, it’s because there are scientists from all over the world behind Hadoop, and all scientists who are good at big data processing are contributing to Hadoop. A successful open source project can have huge technical and cost advantages.”

Mr. Li smiled and nodded, "The field of big data is unique."

Secretary-General Meng lowered his head to record it, and then asked a key question, "Open source has so many benefits, but what are the disadvantages? What are the disadvantages?"

When it comes to this, Lao Zhang has a say. He raised his hand and spoke: "Three months ago, Sohu encountered a very serious blackmail incident, which came from the open source strategy. It was not Hadoop, but it was also a member of the open source community. Database retrieval scheme.”

Blackmail is an illegal matter, and Secretary-General Meng took it very seriously, "What's going on?"

Lao Zhang said: "Open source means open to the whole world, which means that everyone in the world can conduct in-depth research and analysis. But not everyone in this world is a good person. Some people have technical advantages. , to study open source solutions, not to optimize and improve them, but to find loopholes in open source solutions and then use them to make illegal profits.”

This is something that almost every IT company will encounter.

One is a spear and the other is a shield, a battle between offense and defense.

It is the core area of ​​network security.

Viruses, Trojans, etc. are all for ordinary people and are all for children. The top network security attacks must find a breakthrough from the bottom of the system framework.

This is what it means to destroy a thousand-mile embankment in an ant nest.

No matter how well a big company does a big project, if you find an "ant nest" in it, you can launch a fierce attack on it.

If you can't hold on, then you can only pay the money and admit defeat.

Technology giants like Baidu, Ziweixing, Microsoft, and Google will certainly not be afraid. They have the best engineers to defend and fight, so evil can prevail over good.

However, once many small and medium-sized companies encounter it, it is often difficult to cope with it.

Sohu has no technical ambitions and has become a target.

If you can't defend it, you can only spend money to eliminate the disaster.

This is a very important function of Weidian Security Guard - recommending system vulnerability patches to users.

Every system vulnerability is an "ant nest".

If discovered, it must be blocked immediately.

However, this is mainly for B-side organizations. A certain organization or company provides enterprise-level network security services. For ordinary people, it is not really necessary. It is nothing more than taking advantage of the user's fear and using this function to increase the activity of the Micropoint Security Guard product.

On the surface, Micropoint Security Guard helps users patch vulnerabilities, which is a good thing!

However, hackers who can use this kind of low-level vulnerability attack are all top hackers in the industry. If these people join a technology company, they can earn an annual salary of several million.

Why do you still do illegal things as a hacker?

Because you can make more money!

With this kind of technical strength, how much money can you make by attacking ordinary people?

Of course, we have to focus on those wealthy enterprise-level targets.

If you really want to attack ordinary people, there are really a thousand and ten thousand ways. It is not something that security guard software can fix by patching some outdated system vulnerabilities.

Therefore, for ordinary people, there is no need to repair this kind of system vulnerability. The main thing is to choose good anti-virus software to defend against computer viruses and not let your computer be invaded by some low-end hackers.

Like many beautiful girls.

If you encounter the pursuit of some ordinary men, you have to guard against it; if you are really attracted by Zhou Buqi, how can you be so defensive? Does defense make sense? Just obediently take off your clothes, wash them, spread your legs and wait.

Wen Zhixia had already seen through this.

She had even predicted that her best friend from college, Yang Xiaoyao, would become her husband's bed partner sooner or later. It was useless for her to guard against her. She couldn't guard her at all. She might as well just let nature take its course and gain the man's favor.

Chapter 2813/3238
86.87%
Top of the Big EraCh.2813/3238 [86.87%]