Chapter 219: After the press conference

Style: Science Author: Sorceress's FriendWords: 4321Update Time: 24/01/18 13:05:02
Please support the genuine version...

Okay, Yanzu,

to the starting point,

Come and meet.

Changed back to content at 12:10

Judging from the tree diagram of the organizational structure, the top-level Jiuzhou Technology Group headquarters has 21 functional departments and several core laboratories.

These functional departments and core laboratories are the command center of the entire group, responsible for the group's resource allocation, strategic development, overall coordination, and supervision and inspection.

Later, the group's secondary units were divided into three categories: entity industrial companies, holding subsidiaries and wholly-owned subsidiaries, which were divided according to business segments, geographical areas and special businesses.

Each of the above second-level units can also have many third-level units.

Below the third-level units, there can be fourth-level, fifth-level units, and so on.

Eventually the tree grows big and has deep roots, with "endless descendants."

At present, the functional departments are dominated by the President's Office, which provides overall coordination.

Other functional departments are currently complete, including the Legal Department, Finance Department, Security Department, Semiconductor Department, Titanium Department, Operations Public Relations Department, and Design Department, while the newly established Data Management Department, Group Supervision Department, Procurement Management Department, Capital Operations and Equity The management department, global partnership department, and other departments are vacant.

There are also laboratories. The current semiconductor laboratory and Titanium Machinery R&D Laboratory are on the right track, but they still lack talents. The Software Engineering Department's Software Engineering Laboratory is staffed

The newly established Hetu Software Laboratory, Biopharmaceutical Research Laboratory, and Electronic Hardware Laboratory just existed in Boss Gu's folder.

"The company will usher in the first batch of high-quality software developers after the New Year. I know that some of you are versatile and can also do some software development yourself, so this time you have the opportunity to earn bonuses.

Those who have ideas confidently log in to [Boundary Monument], search for 'internal software development exam', and after successful registration, go to the assessment center on the second floor of the administrative office building of the head office to take the exam according to arrangements.

Afterwards, you will need to be more proactive in communicating with the software development team, and work together as early as possible to create industrial software that you like to use.

Everyone also knows the nature of our business. It would be too dangerous if we had to use other people's software to design anything.

The first floor of Building 1 is the reception hall and rest area, the second floor has a large area for product display, and the third floor is the conference site. Staff canteen on the fourth floor

【Boundary Monument 1.0】Performance acceleration, browser advertising optimization, intelligent management of battery 20M

[Boundary Monument 1.1 Enterprise Customized Edition] Three-level performance acceleration, APP advertising optimization, and intelligent battery management. 21M

[Boundary Monument 1.11] Exclusive Edition: This model features three-speed acceleration, privacy green shield to protect your big data, and intelligent battery management. 22M

[Boundary Monument-Safety Shield 1.0] The first function is Security Shield detection, which scans mobile phone vulnerabilities and software infringements. It can detect violations including but not limited to mobile phone software and hardware secretly opening the network to upload user information, recording user private information, stealing corporate documents, etc. Illegal conduct.

The second function is the boundary monument guardian mode. When this function is turned on, the mobile phone will establish an intelligent shadow system and enter the "boundary monument guardian mode". That is, any information you enter will deceive the software's records, keeping your privacy highly confidential, and the mobile phone will The software and hardware require you to provide private information. In this mode, you can choose to provide virtual false information and continue to use the software and hardware function, or reject its behavior and give up using the function.

Wang Teng

The tentative monthly salary is 8K, and the company will start paying six insurances and one fund in July.

During this period, building the company team and listing [Boundary Monument] are a test for us. Subsequent option incentives and year-end bonuses will depend on our contribution.

The achievement of the 3,000 yuan basic salary increase for the navy is the number of forwards and likes of our publicity copy, and the number of replies to posts in large forums and post bars.

Tentatively, it is ten to one, that is, if any piece of data has ten valid amounts, the commission will be one dollar.

Use our [boundary monument] to kick rice and punch apples. The golden bell protects the security of your information and the nine-yang magic power protects the battery of your mobile phone.

Bidding purchase: Ordinary cities: RMB 30-200 per thousand impressions Key cities: RMB 60-200 per thousand impressions Core cities: RMB 100-300 per thousand impressions Scheduled purchase: Ordinary cities: RMB per thousand Exposure 50 yuan Key cities: 100 yuan per 1,000 impressions Core cities: 150 yuan per 1,000 impressions

Without changing the baseband chip and antenna design, signal quality can be optimized by algorithms

The baseband chip includes a CPU processor, channel encoder, digital signal processor, modem and interface module. These modules are responsible for converting the original signal into a bandpass signal suitable for transmission in the channel. The antenna is responsible for transmitting the bandpass signal. I understand that the algorithm optimization you mentioned is about source encoding and source decoding. This should be possible. There are two main types: one is to improve signal quality through signal processing, which generally corresponds to source decoding. In a strict sense, it should not improve the "signal quality", but another way to improve the quality of the signal we feel is to use artificial intelligence, such as reinforcement learning, to change the source encoding to make it more suitable for the current communication network. This is used to reduce the bit error rate and improve signal quality.

1. Weak artificial intelligence.

It can replace manpower to handle work in a certain field. The current level of artificial intelligence in the world is mostly at this stage. Just like AlphaGo, which has surpassed the human level of Go. Although it has surpassed the highest level of human beings in the world of Go, it is still far behind in other fields, so it is only weak artificial intelligence.

2. Strong artificial intelligence.

With the same level of intelligence as humans, it can complete most of the work in life for ordinary people. This is also the goal that all artificial intelligence companies currently want to achieve. After reaching this point, it will become a reality that robots will replace a large number of human jobs and enter our daily life.

3. Super artificial intelligence.

The development speed of artificial intelligence is very fast. When artificial intelligence develops to the stage of strong artificial intelligence, artificial intelligence will be able to learn through various collectors and networks like humans. It will undergo multiple upgrade iterations every day. At that time, the intelligence level of artificial intelligence will completely surpass that of humans.

Guardian One

If you could write about American financial monopoly capitalism, China's bureaucratic monopoly capitalism, and the protagonist's starry sky development strategy, it would be no problem in just a few hundred thousand words.

Xia Wei: 1.5 billion;

Rice: billion;

Yijia: 900 million;

opo: 700 million;

And the chip process is from 90 nanometer technology to the next generation 45 nanometer, the next generation is 28 nanometer, the next generation is 14 nanometer, and then 7 nanometer and 5 nanometer.

The operating principle of the lithography machine is actually relatively simple.

The first is the light source component. The laser emits light. After correction, it enters the energy controller, beam shaping device and other equipment, and then enters the photomask station.

The photomask made by the design company is placed on the photomask stage, and then projected to the exposure stage through the objective lens.

An 8-inch or 12-inch wafer is placed on the exposure table. It is coated with photoresist and is photosensitive. Ultraviolet light will etch circuits on the wafer. . .

【Boundary Monument 1.0】Performance acceleration, browser advertising optimization, intelligent management of battery 20M

[Boundary Monument 1.1 Enterprise Customized Edition] Three-level performance acceleration, APP advertising optimization, and intelligent battery management. 21M

[Boundary Monument 1.11] Exclusive Edition: This model features three-speed acceleration, privacy green shield to protect your big data, and intelligent battery management. 22M

[Boundary Monument-Safety Shield 1.0] The first function is Security Shield detection, which scans mobile phone vulnerabilities and software infringements. It can detect violations including but not limited to mobile phone software and hardware secretly opening the network to upload user information, recording user private information, stealing corporate documents, etc. Illegal conduct.

The second function is the boundary monument guardian mode. When this function is turned on, the mobile phone will establish an intelligent shadow system and enter the "boundary monument guardian mode". That is, any information you enter will deceive the software's records, keeping your privacy highly confidential, and the mobile phone will The software and hardware require you to provide private information. In this mode, you can choose to provide virtual false information and continue to use the software and hardware function, or reject its behavior and give up using the function.

Wang Teng

The tentative monthly salary is 8K, and the company will start paying six insurances and one fund in July.

During this period, building the company team and listing [Boundary Monument] are a test for us. Subsequent option incentives and year-end bonuses will depend on our contribution.

The achievement of the 3,000 yuan basic salary increase for the navy is the number of forwards and likes of our publicity copy, and the number of replies to posts in large forums and post bars.

Tentatively, it is ten to one, that is, if any piece of data has ten valid amounts, the commission will be one dollar.

Use our [boundary monument] to kick rice and punch apples. The golden bell protects the security of your information and the nine-yang magic power protects the battery of your mobile phone.

Bidding purchase: Ordinary cities: RMB 30-200 per thousand impressions Key cities: RMB 60-200 per thousand impressions Core cities: RMB 100-300 per thousand impressions Scheduled purchase: Ordinary cities: RMB per thousand Exposure 50 yuan Key cities: 100 yuan per 1,000 impressions Core cities: 150 yuan per 1,000 impressions

Without changing the baseband chip and antenna design, signal quality can be optimized by algorithms

The baseband chip includes a CPU processor, channel encoder, digital signal processor, modem and interface module. These modules are responsible for converting the original signal into a bandpass signal suitable for transmission in the channel. The antenna is responsible for transmitting the bandpass signal. I understand that the algorithm optimization you mentioned is about source encoding and source decoding. This should be possible. There are two main types: one is to improve signal quality through signal processing, which generally corresponds to source decoding. In a strict sense, it should not improve the "signal quality", but another way to improve the quality of the signal we feel is to use artificial intelligence, such as reinforcement learning, to change the source encoding to make it more suitable for the current communication network. This is used to reduce the bit error rate and improve signal quality.

1. Weak artificial intelligence.

It can replace manpower to handle work in a certain field. Most of the current global artificial intelligence levels are at this stage. Just like AlphaGo, which has surpassed the human level of Go. Although it has surpassed the highest level of human beings in the world of Go, it is still far behind in other fields, so it is only weak artificial intelligence.

2. Strong artificial intelligence.

With the same level of intelligence as humans, it can complete most of the work in life for ordinary people. This is also the goal that all artificial intelligence companies currently want to achieve. After reaching this point, it will become a reality that robots will replace a large number of human jobs and enter our daily life.

3. Super artificial intelligence.

The development speed of artificial intelligence is very fast. When artificial intelligence develops to the stage of strong artificial intelligence, artificial intelligence will be able to learn through various collectors and networks just like humans. It will undergo multiple upgrade iterations every day. At that time, the intelligence level of artificial intelligence will completely surpass that of humans.

Guardian One

If you could write about American financial monopoly capitalism, China's bureaucratic monopoly capitalism, and the protagonist's starry sky development strategy, it would be no problem in just a few hundred thousand words.

Xia Wei: 1.5 billion;

Rice: billion;

lock, you can see the clear positioning.

"Speaking of which, it's not good to be locked up for a long time. Let's send a voting post and suggestions to the email channel."

The one above moved his mouth, and [Xuanwu] broke his leg in a hurry.

However, these "enthusiastic customers" did not know that the person reviewing the letters was not an employee but an artificial intelligence with no emotion.

"Sir, there is an email that mentions one thing. You need to pay attention to advertising shooting. The preparation of these promotional content materials will be put on the agenda, and they will also be used for subsequent listings on platforms such as Taobei and Jindong."

[Xuanwu] collects and organizes information like a butler, making Boss Gu feel much more relaxed.

Of course, Dong Qi and Bloomberg will not have it easy.

The communication was communicated by Boss Gu through the [Boundary Monument] internal communication, and the result was shouted out in the office of the incubation park.

"Doing commercials? No money!"

Vice President Dong looked indifferent and continued: "A group of people from your factory went to Pudong and spent all the budget on eating, drinking and having fun. Now they still need to find finance to get millions to shoot advertisements? No money, not even hundreds of thousands." .”

Shooting commercials generally requires a crew to shoot, but the cost of bringing a family and a group of people, as well as equipment, must be taken into account.

[Xuanwu] also did market research. A short film of about 30 seconds, including the director’s fee, is about 100,000 yuan. However, this is a very common quote from a small company. For a large company, there is no upper limit, and the lower limit is also 300,000 yuan. rise.

For Jiuzhou Technology Company, whose current financial situation is not healthy, Dong Qi made it very clear: If you want money, you won’t have it.

However, [Xuanwu] still thoughtfully prepared a poverty plan for his master.

0 gold (system leader Blake

And the chip process is from 90 nanometer technology to the next generation 45 nanometer, the next generation is 28 nanometer, the next generation is 14 nanometer, and then 7 nanometer and 5 nanometer.

The operating principle of the lithography machine is actually relatively simple.

The first is the light source component. The laser emits light. After correction, it enters the energy controller, beam shaping device and other equipment, and then enters the photomask station.

The photomask made by the design company is placed on the photomask stage, and then projected to the exposure stage through the objective lens.

An 8-inch or 12-inch wafer is placed on the exposure table. It is coated with photoresist and is photosensitive. Ultraviolet light will etch circuits on the wafer.

In order to facilitate reading next time, you can click "Collect" below to record this reading record (Chapter 219 After the Press Conference), and you can see it next time you open the bookshelf!

If you like "Technology: Breaking the Global Hegemony", please recommend this book to your friends (QQ, blog, WeChat, etc.), thank you for your support! ! ()