The difference is caused by a lack of deep understanding of data security.
First of all, the security of personal user data is not as ordinary people think. It has been leaked. Everyone, including banks and decoration companies, has obtained it.
However, they all ignore these things, including but not limited to: Internet browsing history, user online consumption records, memos, personal privacy social relationship chain address books, etc.
Internet browsing history can reflect the user's "real needs", and the user's consumption records and authorized geographical permissions will accurately locate a person's area or even community.
This data will label a user with countless detailed labels, and the user will no longer be just a single individual.
Users will become a collection, and advertisers can accurately place ads through these accurate labels;
Generally speaking, these permissions and data are not so easy to obtain, but who makes today's smartphone software all "big eaters"?
It stands to reason that a typing software needs to use storage and cloud data services, but why does it need to locate permissions?
A video software is just for playing videos. How can the permissions required be listed in a table?
The upper echelons of Daxia actually understood very well. The reason why they did not suppress them at the beginning was also for the sake of development.
"Reckless and loose restrictions will give enterprises the fastest development speed."
And the same goes for [Boundary Monument].
The use of software, as its functions increase, will inevitably require users to agree to more permissions. Of course, at Jiuzhou Technology Company, these data are well protected by Xuanwu.
However, there is a kind of good, which is called self-good.
Daxia official is pragmatic. It will listen to you with a smile, but it will also carefully observe what you do.
In fact, this kind of thing is done by relevant departments, but who made Jiuzhou Technology Company follow the procedures of a confidential unit?
Gu Qing took a deep breath to calm his breathing.
He had long expected that such a day would come, but he did not expect to discuss data security issues with this unit.
Although, from a security perspective, this unit is the most secure...
However, it came just in time,
Gu Qing looked at everyone sincerely and spoke to break the silence.
"Both of us can create a cloud computing service company, and the legal person and 51% of the company's equity belong to you.
Within Daxia, including Xiangjiang, Ryukyu and other places, all user data of Daxia can be handed over to this company led by you.
Our company is responsible for the technical issues of the cloud computing service company, and you provide hardware support. "
Gu Qing felt that his proposal could be said to be very sincere.
I will give you all the control over user data and so on, and all he needs is a large server that he can use with peace of mind.
Yes, what cloud server companies are doing in the cloud is also based on real servers.
This thing can easily cost hundreds of millions of dollars to start with, and it also costs a lot of money to maintain.
Although Mr. Zheng is not very technical, he understands scientific thinking and policy regulations, and can clearly hear what the experts say.
That's it, after several back and forth discussions.
Yunzhong Jiulong Big Data Industry Development Co., Ltd. was established on July 4, 2018, under the witness of accompanying personnel from relevant departments. Of course, both parties were required to register with the Administration for Industry and Commerce within July.
That night, Gu Qing signed a series of treaties.
Since Jiuzhou Technology Company mainly provides technical services, it is stipulated at the specific network technology level that as long as Daxia users who use Jiuzhou Technology Company's products in the future, all service requests and data storage will be handled by Jiulong Big Data Industry Development Co., Ltd. in the cloud. Server processing in Daxia.
This of course also includes ensuring privacy and security and encryption authentication services.
Moreover, any "qualified" institution in Daxia will be able to query the corresponding data through the key obtained through "application".
Moreover, for the purpose of regulatory review, "relevant departments" can view and analyze the data in the servers of Yunzhong Jiulong Big Data Industry Development Co., Ltd. in Daxia at any time in accordance with the law.
From the perspective of social security and data security, the president of Jiuzhou Technology Company is a good young man of the new century who understands justice, understands rules, and is proactive and cooperative.
From a personal perspective and a company development perspective, although this choice tied a safety rope to the data and restricted Gu Qing and the company, freedom with restrictions is the freedom that can be realized. (This is also a point of view that the author wants to export.)
Like in the anime, it is impossible for a private company to master everyone's data without any supervision, at least in this land.
For example: As long as there is a real need, software that has been granted call permissions and recording permissions, even without hacking, can still grasp your call data, who you called, and what voice content was output through your mobile phone.
If there is hacking behavior, such as hacker spyware such as fei code software, the software can black screen and monitor the user's every move.
As an ordinary user, his data may be "not valuable", but what if it is the data of 10 million users? What about the data of 100 million users? What about the data of one billion users?
These are aspects that the public basically never thought about in 18 years.
What belongs to the public is given to those elected by the public.
This meeting solved the general direction and overall problems. It was almost Gu Qing alone facing the "discussions" with the review team.
Then came the implementation issues and server establishment issues of Yunzhong Jiulong Big Data Industry Development Co., Ltd.
These two problems may be a problem for ordinary companies, but they are not a problem at all for the military.
Finally, General Zheng patted Gu Qing's shoulder again very affectionately.
"You are a good boy. When many people hear about supervision, their first reaction is indifference or even dissatisfaction.
We will not let any of our partners down. If you encounter any minor problems, you can contact us through Anhetang. In the future, we will also choose a good comrade to serve as the legal person of this company. "
In this way, after walking around the research building, the review team left the Jiuzhou Intelligent Home Appliance Machinery Manufacturing Factory.
Gu Qing stood at the gate, watching the car lights as the group of people drove away, his eyes dark.
This is the first time he has truly extended his right hand of kindness, and it seems that the parties concerned also came with good intentions.
Shenlong's take-off does not need to rely on outsiders, but it does need the unity of its own people.
For the convenience of reading next time, you can click "Collect" below to record this reading record (Chapter 131 Big Data of Nine Dragons in the Cloud (For the Protector: Mosen Yuhai, more updates will be added)), and you can see it when you open the bookshelf next time!
If you like "Technology: Breaking the Global Hegemony", please recommend this book to your friends (QQ, blog, WeChat, etc.), thank you for your support! ! ()