Almighty Technology Giant

Vol 2 Chapter 206: : One stroke

Undoubtedly, Ye Hua talked about the issues that users are most concerned about. In this era of increasingly advanced Internet, the protection of privacy and information is becoming more and more difficult, and more and more people cannot live without the Internet. But at the same time, more and more people gradually feel that they are exposed to the sun like red fruit, and it has become a magic weapon for some Internet companies to make profits.

In a sense, acquiring information is equivalent to acquiring wealth.

Ye Hua's speech on the stage has undoubtedly won the favor and resonance of many users. He shouted that this is a principled and bottom line giant. Such enterprises and entrepreneurs are respected and deserve to make a lot of money.

However, the smiles at the scene gradually stabilized.JPG

The thoughts of the big brothers are completely different from those of ordinary users. When they heard Ye Hua explain this, they were defamated in their hearts: To make it worse, you Ye Hua is dumping the pot, the product has not yet been released. As for the listing, you have to play with it. You dumped the pot first and then said. Is this a hint that something really happened in the future? Don't come to the coastline. If you find it, you will deny Sanlian?

The big brothers here are also emotional with embarrassment. This young man is much smarter than they think. This kind of person is really difficult to overcast him, because he basically does not give you the opportunity Conditions.

Ye Hua is indeed a cautious person, but he doesn't mean to shake the pot. Even if it is, the pot he throws is strongly supported by all users.

There is indeed a large profit to be made, but Ye Hua does not dig an uncertain pit for himself because he earns more. He has more ways to make money. Why?

It's just that outsiders can't understand it. After all, the open man can understand it.

Ye Hua continued: "The so-called 'zero trust architecture' is a new paradigm of security in the era of the digital network economy. The development of technology will make us face more and more severe network security challenges. Sixty percent of the threats to network security Both are external attacks. "

Speaking of this, Ye Hua suddenly laughed at himself: "Just a little song, our coastline company's network is no longer under attack all the time. I can also tell you that 99.99% are from external attacks, and ..."

Ye Hua paused suddenly, which was very intriguing. He also said that he was so light and careless.

At the same time, a lot of network organizations or hackers around the world suddenly felt a little confused, even an inexplicable chill. These people are obviously paying attention to this conference and can be sure that they are the people who have attacked the shoreline company network.

Some organizations and group hackers hurriedly released the news as soon as possible, withdrawing, transferring, etc. without any hesitation.

Ye Hua's words really frightened them. Generally, only insiders can see the doorway, network attack or invasion. The real superb technology is that the attacker does not know who the attacker is, or even himself. Was attacked or hacked.

Ye Hua's words were very interesting, 99.99% were from external attacks.

What does this mean?

The problem is not with the problem itself.

It means that he not only knows that the company's network has been attacked, but also knows it is very specific. He suddenly said such a sentence at the conference, just like the United States will issue a conference report when it encounters the same problem, saying which network is here Attacked and so on.

It seems that Americans have bad Internet technology, and they are attacked and invaded at every turn. It is really wrong to think so.

In fact, when the Americans issued such a report, the attackers of the parties saw it very vainly.

A report is published, which is equivalent to telling the attacker that it is realizing. I know what you have done. It also specifically refers to which module was attacked, how it was attacked, and what impact and loss it caused. Clearly, can it be true for an attacker? God knows how many things you still don't know?

And Ye Hua's remarks at the moment also have the same meaning, the implication is that everything you attackers do is within the scope of my surveillance.

It can be seen that this is exactly the manifestation of powerful technology. We must know that if the technical capabilities are not good enough, it is impossible to find the other party.

On the stage, Ye Hua still eloquently argued: "... When faced with complicated and endless network security problems, we start from architectural security, passive defense, and active defense, so that we can achieve threat intelligence prediction and finally achieve invasion and anti-invasion. Therefore, the proposal and practice of the "Zero Trust Architecture" will become a necessary means to maintain network security. "

"The essence of the so-called" zero trust "is actually identity-centric access control. In simple terms, do not trust anyone; the subject of authentication, authorization, and encryption should be only the user itself. By default, the access control policy should be a dynamic Process, based on the diverse data environment of the device and the user. "

"The coastline company's artificial intelligence driving system is based on 'zero trust' to promote the reconstruction of the security architecture. We have continuously improved, optimized, upgraded, and restructured based on Google's 'zero trust security architecture solution framework'. The link includes security modules such as identity-centric, business security access, dynamic access control, intelligent identity resolution processing, etc., ensuring a reliable solution for identity security confirmation in the context of the 5G era. "

As soon as this word came out, the official was forced to die, and Google was very injured. He has been in this field for almost ten years. When Ye Hua talked about the "zero trust architecture", Google people were very hilarious. Coffee is so mad, of course, happy to die, once the smile gradually arrogant. .JPG.

Now the goose ...

Google's people smile again.JPG

"Zero-trust architecture is a large systematic project on the use of network security. It cannot be achieved overnight. This requires comprehensive advancement of security planning, gradual migration, matching of management rights and responsibilities, and adaptation of usage habits. I am proud that we believe that the coastline company is enough to provide a set of solutions in the context of the 5G era and the era of big data. I believe this solution is also an important content of today's conference. We do not confirm the network security architecture of the unmanned autonomous driving system. "I believe that the implementation of driverless driving is extremely irresponsible for the safety of the lives and property of users and consumers."

At the end, Ye Hua faced the audience, bowing slightly with the attention of many eyes and lenses.

The audience reiterated warm applause once again. The calibration conference of the UU reading book www.uukanshu.com developer technical system solution also continued as Ye Hua stepped down to the stage and came to his seat. Next is the real highlight. .

Today ’s voting on the calibration plan will determine the establishment of future standards for autonomous driving systems. This is the establishment of the standard system for Huaxia people in the automotive industry as a global leader. This is exciting for countless people. The moment is also a moment worthy of a close-up of a domestic media book.

It can be said that there is no doubt that the Huaxia people or Ye Hua and the Coastline Company are the biggest winners on the scene. Super-class companies sell standards, not to mention one or two, but the establishment of a set of systematic standard schemes.

This is either the rhythm of "family bucket" if you don't, it's very strong.

All parties are very impressed. After today, Ye Hua and Coastline will soon become the spiritual leaders of the global automotive industry.

This may be a miracle that is difficult to copy, and even impossible to copy. Being an outsider in the automobile industry, but becoming a spiritual leader of the industry, if it is not happening, I am afraid no one will believe it, sigh, Wei Tan technology is really powerful.

...

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like