Ten years ago, military computers used WINDOWS, Red Flag Linux, and Galaxy Kylin operating systems on client computers and stand-alone computers. Since the military network is completely isolated from the outside world, and access gateways at all levels are equipped with military-specific firewalls, Every computer is equipped with a jammer, so the data security is relatively high.

However, with the development of information technology, more and more shortcomings and bugs have been exposed in the WINDOWS system and the red flag system optimized locally in Linux, and the military self-developed system project has also been put on the fast track.

While Daxia is vigorously developing its own network supporting facilities, it pays more and more attention to information security every day. The implementation of domestic chn domain names a few years ago was one of the key projects.

Even six years ago, in the "Notice on Supplementary Bidding for Compulsory Energy-Saving Products for Information-based Agreement Supply" that only involved the procurement of more than 30 computers, the relevant department clearly stated for the first time: "All computer products are not allowed to install Windows 8 operating system."

Although the document does not give any explanation to the relevant clauses, anyone with an online IQ knows that there must be a big problem with Windows 8.

Then Microsoft began to vigorously promote Win 10, and put Win 8, which had given high hopes, into the limbo.

Against this background, some experts at the meeting naturally said: "The military network is physically separated from the local network, and gateways at all levels are equipped with customized firewalls. Combined with other strict security measures, the operating system security risks are not that great in theory. However, in view of the sensitivity of military information security, the use security of computer operating systems for military purposes cannot be neglected.

Since 1003 in the Xiayin star calendar, Microsoft has released the source code of Windows 2000, Windows XP and other software to more than 60 major countries around the world, including us, through the "government-government security plan", allowing relevant national government-government personnel to Conduct security reviews of Microsoft products.

It needs to be admitted that these measures can ensure that the security risks of using the relevant operating system are within a controllable range.

However, since 1014 in the Xiayin star calendar, Microsoft has officially stopped providing support services for the Windows XP operating system, and the source codes of the Vista system and the Win7 system are no longer open for government review, and the use of foreign encryption algorithm technology is no longer mandatory. Supporting our Daxia algorithm, the underlying software of the system is more dependent on cloud servers, and all application information including emails, documents, and contacts will be synchronized to Microsoft's servers in the United States.

The use of domestic operating systems is undoubtedly reliable in terms of military user information security. However, this security requirement should not be at the expense of reducing the combat effectiveness of the army. Domestic operating systems need to have higher quality assurance in terms of basic functional requirements such as process management, program control, and human-computer interaction.

In terms of basic functions, Galaxy Kylin and Red Flag Linux can only be said to be qualified for use on the intranet. Once connected to the Internet, the data protection capabilities of the firewall are still not as good as the current Microsoft Win 11, and in terms of process management, program control, human-computer interaction, etc. In terms of actual support for basic functions, it is even worse than the Sky system.

Therefore, my suggestion is to agree to incorporate the core source code of the Gonggong system into the cooperation project, and our staff and Kyushu Technology will jointly develop the operating system to ensure that the control of the system is in our hands, and we can change the skin to make a commercial system, so that Users use commercial systems to compare and optimize. "

The expert's tirade has undoubtedly won the approval of most people.

It not only solved the problems of the opposition, but also took into account the views of the supporters, and even conducted popular science for some people who were not very clear about the situation.

But Mr. Zheng thought for a while, and found that there was something wrong with the expert's plan.

He asked a very profound question. "Foreign companies such as Microsoft once quoted tens of billions of dollars to purchase the core source code of the Gonggong system, but Kyushu Technology did not agree.

How can we let Kyushu Technology share it? We must know that almost all the achievements of Kyushu Technology in the field of software engineering are inseparable from this core source code. This is what people depend on for survival. "

...

The meeting fell silent.

After all, the kind of idiot who thinks that all enterprises in Daxia should contribute their achievements to Guo Jia free of charge cannot enter the door of this conference room.

And now Kyushu Technology is not only a first-level confidential unit, it is also a leader in the semiconductor industry in Daxia, and a provider of core technology. In the future, Kyushu Technology is destined to leave a lot of textbooks and professional books related to semiconductors. The legendary company of length.

Directly asking for the core code of other people's systems, no one dares to come forward to do this matter. Even asking has to be carefully considered, and countless drafts have been written before perhaps daring to make indirect remarks in a private capacity.

Wait, private identity?

Several eyes focused on General Zheng.

You Zhiqi said: "You have a good personal relationship with Mr. Gu of Kyushu Technology, is it okay?"

Gu Qing, who was still admiring the scenery of the Gobi, didn't know that there was a group of people plotting to want his little baby.

Even when he left that afternoon, Mr. Zheng didn't come to see him.

However, a few days later, Gu Qing suddenly received a call from Professor Zhuang. Professor Zhuang said that he would bring some of his best students over to ask Boss Gu to walk through the back door to solve work problems.

The young boss Gu didn't believe that such a talented student would not be able to find a job, so he chose, of course, with a warm welcome.

No matter how bad Mr. Zhuang's favorite students are, they are better than the new researchers.

On December 10th, Zhuang Youwei brought Yongyuan and several proud students to the Jiuzhou Science and Technology Community.

After layers of identity checks, the group finally arrived at Gu Qing's office.

"Hey, I almost took the old man's skin off to check if I wanted to enter your place."

Professor Zhuang's first complaint made Gu Qing smile wryly and shook his head.

"Our company's overseas executives have encountered some safety issues during this period. Fortunately, the security force is sufficient, so there are no problems. Therefore, the security inspection work in the park has been more cumbersome and detailed than before. After all, safety is no small matter. You always understand."

Professor Zhuang waved his hand, and he said to the people behind him, "This is the hottest talent in Daxia right now, Gu Qing."

Then he faced Gu Qing, pointed to the people behind him, and introduced them one by one: "This person wearing black-rimmed glasses is my favorite student, Yongyuan. Since returning from abroad, he has been engaged in the research and development and teaching of industrial software.

The young man wearing gold-rimmed glasses next to me is a good seed I discovered recently. His name is Zhang Hui, and he used to be engaged in system development. "

Although the two had been thoroughly investigated through big data comparison, Gu Qing still took the initiative to come forward to shake hands.

"Hi there."

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like