Chapter 8: Lightning

Style: Science Author: Sorceress's FriendWords: 2154Update Time: 24/01/18 13:05:02
MIUI (Miyou) is a third-party mobile operating system developed by Rice Technology that is deeply optimized, customized and developed based on the Android system. It is specially designed for Chinese people's habits and comprehensively improves the native experience.

In recent years, various domestic manufacturers in Daxia have developed their own customized UIs, which have been updated and optimized frequently. The public's user experience has also been improving year by year. After all, brands with poor user experience will not survive long unless the products are irreplaceable.

Due to the development of the Internet, the speed of information circulation has skyrocketed, and the performance of mobile phone hardware has long been transparent. Therefore, the era of simply stacking hardware is almost over. With the same hardware performance, personalized services from major mobile phone manufacturers are particularly important, among which The UI is the top priority.

Each of the four domestically produced companies has their own specialties:

MIUI, the rice that dreams of breaking away from Google

Oppo Color OS gradually loses its personality

Vivo Funtouch OS, a refined iOS imitation

There are always small bugs in Xia Wei’s EMUI

Yes, the top four manufacturers with the largest domestic shipments now all have their own complaints, and each has a "focus" on the tuning of mobile phone software and hardware, that is, flaws.

For example, Rice's fever, Xia Wei's whitening when taking pictures...

The emergence of [Boundary Monument] is regarded by major manufacturers as a sudden appearance of a rare treasure. It feels like lightning and thunder. It is very useful, but it is not irreplaceable.

After all, in addition to patents, what is currently important for technology companies is people and gameplay (software features). At worst, by poaching people with high salaries or imitating them, you can acquire the technology (Note 1).

The person in charge of Miyou, Hong Feng, who had a dangerous hairline, was still working at his desk. After receiving the call from Lei Jun, he looked calm.

"Our team is cracking this software, um, no problem, good."

The brief call ended and he stretched.

At the beginning of the new millennium, Hongfeng worked at Siebel Company as the chief engineer of Web applications. After that, he joined Google America as a senior software engineer and was the main person in charge of the Google Calendar and Google Maps 3D Street View projects.

In 2010, he accepted Lei Jun's invitation to participate in the founding of DaMi, and is now responsible for MIUI business.

Along the way, he had seen many strong winds and waves, but the [boundary monument] he encountered now made him feel something strange.

He invaded the opponent's server, modified the data, and forged the data. With his own team, he couldn't do it for a whole week.

As for cracking the shell of the software itself and getting the source code of the other party, it is even more confusing.

If there is no problem and it is being solved, it is just a verbal response, and it may even be caused by one's own pride.

"Is this software for civilian use?" He frowned, and his thoughts spread to the relevant research results and research directions of major international research laboratories.

[Boundary Monument] The packet security technology of the software. He only thought that this might be the technology of some research laboratory. The language algorithm used to write it was simply not something that could be created by private technicians. If he could get this fruit, how much would it be like? Comfortable.

Of course, all crows in the world are as black as black.

At this moment, the four major domestic manufacturers and the second-tier manufacturers with strong R&D capabilities are basically trying to crack the [boundary monument], but some are doing it secretly, and some are doing it openly, doing one thing in front of others and doing another behind the scenes.



In the early morning, Gu Qing returned to the company to work.

Because the company was first established, the security was still provided by the guards from the Entrepreneurship Incubator, so he came very early every time, and often even slept in the office and went back to the dormitory to wash up during the day.

Wake up the computer with the screen off, click on the silver disc icon, turn your head and blink at the camera on the side.

After successfully scanning the face and entering the password, an interface will open on the display screen.

Rows of data streams are refreshing, and even top hackers will rack their brains and be puzzled when they see these numbers.

"Tsk, it was another four-digit test last night. You are so rich that you can hire so many people to do things.

It would be great if I were so rich..."

Gu Qing was no longer a little rabbit. When he took out [Boundary Monument], a cross-generation optimization software, he had already prepared a set of security measures.

[Xuanwu] A native (ge) safety shield program based on the Yinfu logic language of the Dimension Empire.

It can intelligently and proactively defend, learn optimization algorithms, and perform secondary reverse tracking.

Disadvantages: high power consumption, CPU burning, no advanced artificial intelligence, inability to actively collect data online for big data learning...

Although there are many shortcomings, the advantage is outstanding, that is, safety.

Stable security, even if it cannot be defeated, it will actively close all interactions with the outside world, allowing users of [Boundary Monument] to rely on the functions of the software itself to live their lives.

Of course, [Xuanwu]’s future is still very promising.

Big data learning and optimization, combined with Gu Qing's training algorithm, fully upgraded ontology core, coupled with hardware with sufficient computing power, will not crush the global security system in minutes, but at least it will no longer shrink defenses.

"Rome was not built in a day. You have to eat one bite at a time. I want to be steady and steady..."

Gu Qing observed the information on the data stream, and simultaneously translated the information in his mind that he could only understand. Although the history and technological trends of this world and this era were the same as those in his previous life, he did not want to capsize in the gutter.

He wants to use [Boundary Monument] to tie up part of the capital and partner companies, and then use his own funds to get involved in the hardware field.

The technological war of previous lives. News about being suppressed by monopolies is common. He deeply knows that what is invincible is never software, intelligent big data, but the basic hardware equipment and facilities based on the prosperity of the Internet.

Without high computing power hardware and high-speed network broadband, mobile payment shopping would be a joke, and the amount of calculations required for Double Eleven is not a small number.

And there are no sufficiently developed and cheap train transportation networks and highways. How can online shopping be delivered to customers quickly?

Delivery within the province within three days and delivery across the country within seven days. These services can only be accomplished by relying on the unremitting infrastructure construction of Daxia officials and the efforts of the people.

Rather than what Capital said: "Rely on big data and artificial intelligence to optimize work processes."

Therefore, Gu Qing saw clearly that only if the hardware was hard enough could Jiuzhou Technology be stable.

After dealing with the problems last night, it didn't take long for someone to enter the company and start shua and tie.

Huang Chaoren, with dark circles under his eyes, came to his office cubicle with bread and breakfast in hand.

At this moment, his head was still a little numb, and his ears were even numb.

After yesterday's meeting, he followed Gu Qing's arrangement and exchanged opinions with people from several major manufacturers one by one, and then received countless phone calls.

Some have contacted mobile phone manufacturers, some have contacted organizations for cooperation, and some have even threatened...

Due to the nature of his work, he can't turn off his phone to sleep. He can only be woken up by phone calls one after another. Even if he encounters Rui (sha) Zhi (coin), he can't spray him back.