Ten years ago, military computers used WINDOWS, Red Flag Linux, and Galaxy Kirin operating systems on client computers and stand-alone computers. Since the military network was completely isolated from the outside world, and access gateways at all levels were equipped with military-specific firewalls, Every computer is equipped with a jammer, so data security is relatively high.
However, with the development of information technology, the WINDOWS system and the locally optimized Red Flag system of Linux have exposed more and more shortcomings and bugs, and the military's self-developed system project has also been put on the fast track.
While Daxia is vigorously developing its own network supporting facilities, it pays more and more attention to information security day by day. The promotion of domestic domain names a few years ago was one of the key projects.
Even six years ago, in a "Notice on Supplementary Bidding for the Supply of Compulsory Energy-Saving Products for Information Agreements" that only involved the procurement of more than 30 computers, the relevant departments clearly stated for the first time: "Windows is not allowed to be installed on all computer products. 8 operating system.”
Although the document does not provide any explanation for the relevant provisions, anyone with an online IQ knows that there must be a big problem with Windows 8.
Then Microsoft began to vigorously promote Win 10, pushing Win 8, which had high hopes, into the shadows.
Against this background, some experts who participated in the meeting said bluntly: "The military network is physically isolated from local networks, and gateways at all levels are equipped with customized firewalls. Combined with other strict security measures, theoretically, the security risks of the operating system are not great." .However, in view of the sensitivity of military information security, the security issues of the use of military computer operating systems cannot be ignored.
Since 2003, Microsoft has disclosed the source code of Windows XP and other software to more than 60 major countries around the world, including us, through the Government Security Program, allowing government personnel in relevant countries to conduct security checks on Microsoft products. review.
It needs to be acknowledged that these measures can ensure that the security risks of using relevant operating systems are within control.
However, starting in 2014, Microsoft officially stopped providing support services for the Windows XP operating system, and the source codes of the Vista system and Win7 system are no longer open for government review. They also force the use of foreign cryptographic algorithm technology and no longer support our country. algorithm, the underlying software of the system relies more on cloud servers, and all application information including emails, documents, and address books will be synchronized to Microsoft's servers in the United States.
The use of domestic operating systems is undoubtedly reliable in terms of military user information security. However, this security requirement should not be at the expense of reducing military combat effectiveness. Domestic operating systems need to have higher quality assurance in terms of basic functional requirements such as process management, program control, and human-computer interaction.
Galaxy Kirin and Hongqi Linux can only be said to be qualified for use on the intranet in terms of basic functions. Once connected to the Internet, the data protection capabilities of the firewall are still not as good as Microsoft's Win 11, and in process management, program control, human-computer interaction, etc. In terms of actual support for basic functions, it cannot compare to the Cangqiong system.
Therefore, my suggestion is to agree to incorporate the core source code of the Gonggong system into the cooperation project, and let us and Jiuzhou Technology jointly develop the operating system to ensure that the system control is in our hands, and that we can reskin it and make a commercial system, so that Users use commercial systems to compare and optimize. "
This expert's long speech was undoubtedly recognized by most people.
It not only solves the problems of the opponents, but also takes into account the views of the supporters, and even provides science popularization to some people who are not very clear about the situation.
But after Mr. Zheng thought for a moment, he discovered that there was something wrong with this expert's plan.
He asked a very profound question. “Foreign companies such as Microsoft once offered tens of billions of dollars to purchase the core source code of the Gonggong system, but Jiuzhou Technology did not agree.
How can we let Jiuzhou Technology share it? You must know that almost all the achievements of Jiuzhou Technology in the field of software engineering are inseparable from this core source code. This is what people rely on for survival. "
…
The meeting fell into silence.
After all, the kind of idiot who thinks that all enterprises in Daxia should contribute their results to Guo Jia for free cannot enter the door of this conference room.
Now Jiuzhou Technology is no longer just a first-level confidential unit. It is also a leader in Daxia's semiconductor industry and a provider of core technologies. In the future, Jiuzhou Technology is destined to leave a large number of textbooks and professional books related to semiconductors. legendary company.
Directly asking for the core code of someone else’s system, no one dares to come forward to do this. Even asking, you have to think twice and make countless drafts before you dare to make insinuations in a private capacity.
Wait, private identity?
Several eyes focused on General Zheng.
Youzhi said: "You have a good personal relationship with Mr. Gu from Jiuzhou Technology. Is that okay?"
Gu Qing, who was still admiring the Gobi scenery, didn't know that a group of people were plotting to get his little baby.
Even when he left that afternoon, Mr. Zheng didn't come to see him.
However, a few days later, Gu Qing suddenly received a call from Professor Zhuang. Professor Zhuang said that he would bring some of his most popular students over to ask Boss Gu to go out the back door to solve work problems.
The young boss Gu simply didn't believe that such a proud protégé would not be able to find a job, so he chose and was of course given a warm welcome.
Mr. Zhuang's favorite student, no matter how bad he is, he is still better than the newly hired researchers.
On December 10th, Zhuang Youwei brought Yongyuan and several of his proud students to Jiuzhou Science and Technology Community.
After many layers of identity checks, the group finally arrived at Gu Qing's office.
"Oh, I almost had to peel off the old man's skin to check if I wanted to come in here."
Professor Zhuang's first complaint when they met made Gu Qing smile bitterly and shake his head.
"Our company's overseas executives encountered some security problems during this period. Fortunately, the security force was sufficient, so there were no problems. Therefore, the security inspection work in the park recently has been much more complicated and detailed than before. After all, safety is no small matter. You always understand."
Professor Zhuang waved his hand and said to the person behind him: "This is the hottest genius in Daxia right now, Gu Qing."
"The Sword Comes"
Then he faced Gu Qing, pointed at the people behind him, and introduced them one by one: "The man wearing black-rimmed glasses is my favorite student, Yongyuan. After returning from abroad, he has been engaged in the research and development and teaching of industrial software.
The young man wearing gold-rimmed glasses next to me is a good prospect that I recently discovered. His name is Zhang Hui, and he used to be engaged in system development. "
Although the two men had already been thoroughly investigated through big data comparison, Gu Qing still took the initiative to step forward and shake hands.
"Hello."