Sun Jian was certainly happy to see the share price of Kunpeng Internet Company soaring at the opening, but he was not surprised at all. The final madness of Nasdaq network technology stocks has not yet come. By then, the total market value of pIc is very likely to exceed the parent company pENG. But after the madness, pIc may fall below the issue price, but pENG will not cash out or protect the market.
…
To the surprise of investors, a large order of 500,000 shares pushed pIc's share price to $47.55...
pIc closed at $49.65 that day, up $30.77, or 163%, with 157 million shares traded and a turnover of $7.379 billion, accounting for 47% of the total Nasdaq turnover that day.
The total market value of pIc is as high as $1174!
The 37.3 million shares held by the Kunpeng Student Aid and Poverty Alleviation Foundation have a market value of nearly 1.852 billion U.S. dollars, equivalent to 15.3 billion yuan. They will be liquidated after one year and are allowed to be listed and traded. They will then buy them back after they fall below the issue price. It is possible to earn 10 billion yuan as soon as it comes out.
Kunpeng Student Aid and Poverty Alleviation Foundation holds 2% of the original shares, which Sun Jian proposed to give to Kunpeng Student Aid and Poverty Alleviation Foundation as an opportunity to make money.
------
“Dear leaders and representatives, the title of my speech here is that with the rapid development of computer technology and Internet technology, Internet access has become a part of our daily lives. It is also a general trend for enterprises, institutions and government departments to work online. The Internet has gradually become One of the important ways for people to obtain knowledge and information in their daily lives has become an important guarantee for the rapid development of the national economy, society, culture and education. Most Internet users do not pay attention to the fact that a lot of the information we transmit to the Internet is sensitive information. , even corporate and national secrets, will attract the attention of hackers and other government organizations. Through backdoors and rogue software in computers and network equipment, they can steal information, tamper with data, release computer virus attacks, and leak sensitive information and secrets. It will cause irreparable losses to individuals, units and government departments. It should cause serious concern in all aspects of society and take measures to protect it. I will talk about my understanding of computer information leakage from the following five aspects and propose ways to strengthen protection. Five measures and four suggestions are provided for the reference of leaders and representatives."
On the morning of March 17, Ni Guanglan, as a member of the ninth political committee, took the stage to read out the submitted proposals.
Sun Jian, member of the Ninth Political Standing Committee, and other representatives sat down and listened carefully. Academician Ni's proposal referred to the views and content published in the pN column by five academicians, including Yan Yuanchao, Sun Zhijie, Chen Yongqing, Li Guoliang and Song Yuanxing. Most of them are Sun Jian's views and content were expressed through the mouths of Yan Yuanchao and others; Liu Hongyu's public opinion war on computer confidence and security actually attracted the attention of Academician Ni. The announcement of this proposal at the conference represented the wishes of the top management.
Sun Jian and Ni Guanglan were still members of the 8th Political Committee. They met many times, cherished each other, and talked happily. They deeply sympathized with the sixty-year-old man's experience, but there was nothing they could do.
Academician Ni was ignored by Liu Zhuanzhi, but he was still a member of Lenovo Group and still received salary from Lenovo Group. If Sun Jian invited Academician Ni to join, he would have offended Liu Zhuanzhi. Lenovo Group is still the largest customer of Kunpeng Software Group. It is impossible to break up with Liu Zhuanzhi because of Academician Ni. Even if Academician Ni is invited to join, the other party will not appreciate it. Academician Ni is a proud intellectual and will not be influenced by money, nor can he be regarded as a "traitor".
If it was for money and material enjoyment, Academician Ni would not have returned to China back then!
Without Ni Guanglan, there would be no Lenovo Computer, but without Liu Zhuanzhi, there would be no Lenovo Group and Legend Holdings. Liu Zhuanzhi’s contribution cannot be compared with that of Academician Ni!
Sun Jian, a second-generation man, knows better than anyone else!
Academician Ni didn’t know that Liu Zhuanzhi was setting a big banner. If Lenovo wants to become a world-class enterprise, it must carry out joint-stock reform, implement management shareholding, and have clear property rights. The company’s rapid development is closely related to the interests of the management. .
Hong Kong Lenovo’s listing on the Hong Kong Stock Exchange is only the first step.
Academician Ni was once an important rook on Liu Zhuanzhi's chessboard, but as Lenovo Group achieved unprecedented success in the development of trade, industry and technology, Academician Ni became a mere relative. Liu Zhuanzhi would not be stingy in allocating a considerable number of shares to Academician Ni, but Academician Ni believed that his contribution was greater than that of Liu Zhuanzhi and was dissatisfied with the shares allocated to him. As a director, he privately treated Liu Zhuanzhi. The money on Lenovo's account in Beijing was lent to Lu Tangping and three Hong Kong businessmen held shares in Lenovo in Hong Kong and were dissatisfied with the fact that they made a fortune. Who can tell the inside story clearly?
Academician Ni began to report Liu Zhuanzhi to the superior department with his real name, which was incompatible with each other!
With the development of Lenovo Group on the right track, Ni Guanglan is dispensable.
In June 1995, the board of directors of Lenovo Group announced the dismissal of Ni Guanglan as chief engineer and director. Since then, he lost his office and job. He was completely eliminated from Lenovo Group. Although he was still receiving salary from Lenovo, he could not do anything else. No one could tell his pain, and no leader from the Institute of Computer Science and Technology of China came forward to speak for him. In anger, he continued to report in real name that Liu Zhuanzhi had illegally lent funds to Daoyuan Company during the listing process of Xiangjiang Lenovo to hold shares...
Ni Guanglan, who is idle at home, saw an eye-catching new column on the pN website on February 5 this year. Academicians Talk about Computer Information Security Series will invite five domestic academicians in computer hardware, software and communications to talk about the process of surfing the Internet. What computer information security and countermeasures should we pay attention to?
The first academician pN editor interviewed was CPU expert Academician Chen Yongqing. The topic was the problem of CPU in computer information security. Academician Chen told everyone that one of the computer information security vulnerabilities appears in CPU, and manufacturers can leave backdoors...
This interview article immediately attracted Ni Guanglan's attention. He searched for information online and found that Chen Yongqing's views were correct. He immediately had the idea to write a proposal on computer information security.
On February 12, Ni Guanglan saw another article interviewing software expert Academician Yan Yuanchao. Academician Yan told everyone that computer information security vulnerabilities can also appear in the operating system, and there can also be backdoors...
"When using the Internet, do not leak personal privacy and protect personal information; do not trust unfamiliar information and strangers on the Internet, and do not click on unfamiliar links to prevent virus software; when using the Internet, do not install viruses at will. Pirated software that has been securely tested and authorized to prevent such pirated software from stealing personal information on your computer."