Technology: breaking the hegemony that monopolizes the world
Chapter 8 Lightning
MIUI (米柳) is a third-party mobile phone operating system based on the deep optimization, customization and development of the Android system under Rice Technology. It is specially designed for the habits of Chinese people and comprehensively improves the native experience.
In recent years, various domestic manufacturers in Daxia have their own customized UI, high-frequency updates and optimizations, and the user experience of the public has also increased year by year. After all, brands with poor user experience will not last long unless the product is irreplaceable.
Due to the development of the Internet, the speed of information dissemination has leapt, and the performance of mobile phone hardware has long been transparent, so the era of pure hardware stacking is almost over. Under the same hardware performance, the personalized services of major mobile phone manufacturers are particularly important, and among them The UI is the top priority.
Each of the domestic four has its own specialty:
Dreaming of breaking away from Google's rice MIUI
Oppo Color OS gradually losing its personality
Vivo Funtouch OS, a fine imitation of iOS
There are always small bugs for Xiawei EMUI
Yes, the four major manufacturers with the largest shipments in China now have their own complaints, and each of them has a "focus" on the tuning of mobile phone software and hardware, that is, defects.
For example, the fever of the rice, the whitening of Xia Wei's photo...
The birth of [Boundary Monument] is a sudden appearance of a treasure in the eyes of major manufacturers. It has the feeling of lightning and thunder. It is very useful, but it is not irreplaceable.
After all, in addition to patents, the current technology companies are more important than people and gameplay (software functions). The big deal is that technology can be obtained by poaching people with high salaries or imitating them (Note 1).
The person in charge of Miyou, Hongfeng, whose hairline is a bit dangerous, is still working at his desk at this moment. After receiving a call from Lei Jun, he looks natural.
"This software, our team is cracking, um, no problem, good."
After the short call ended, he stretched himself.
Since the beginning of the millennium, Hongfeng has worked in Siebel as the chief engineer of web applications, and then entered Google America as a senior software engineer, and is the main person in charge of Google Calendar and Google Maps 3D Street View projects.
In 2010, he accepted Lei Jun's invitation to participate in the founding of Rice, and is now in charge of MIUI business.
Along the way, he has seen a lot of strong winds and waves, but the [Boundary Monument] he encountered now made him feel a little strange.
Invading the other party's server, modifying data, forging data, relying on my own team, I couldn't get it done for a whole week.
As for cracking the shell of the software body and obtaining the source code of the other party, it is even more at a loss.
There is nothing wrong with it, if it is being cracked, it is just a verbal coping, and even one's own ego is at work.
"Is this software for civilian use?" He frowned, and his thoughts spread to the relevant research results and research directions of major international research laboratories.
[Boundary Monument] The packet security technology of the software, he only thinks that this may be the technology of some research laboratory, and the language algorithm used for writing is not something that folk technicians can create. If you can eat this fruit, how much will it be? Comfortable.
Of course, all crows in the world are generally black.
At this moment, the four major domestic manufacturers and the second-tier manufacturers with strong R\u0026D capabilities are basically trying to crack the [Boundary Monument], but some are sneaky, some are aboveboard, and they do one thing in front of the other.
...
In the early morning, Gu Qing went back to work in the company.
Because the company was first established, the security was still relying on the gatekeepers of the business incubator, so he came very early every time, and often even slept in the office, and went back to the dormitory to wash during the day.
Wake up the computer in the off-screen state, click on the silver disc icon, turn your head and blink at the camera on the side.
After successfully swiping the face and entering the password, an interface opens on the display.
Rows of data streams are refreshed, and even top hackers have to rack their brains to understand these numbers.
"Tsk, it was another four-figure temptation last night, you are really rich, and you can invite so many people to make trouble.
If only I were so rich, it would be great..."
Gu Qing is no longer a bunny. When he took out the cross-age optimization software such as [Boundary Monument], he had prepared a set of security measures.
[Xuanwu] A security shield program based on the Yinfu logic language of the Dimensional Empire.
It can intelligently and actively defend, and learn optimization algorithms to perform secondary reverse tracking.
Disadvantages: high power consumption, burning CPU, no advanced artificial intelligence, unable to actively collect data online for big data learning...
Although there are a lot of shortcomings, the advantages are very prominent, that is, safety.
Prudent security, even if it really can't beat it, it will actively shut down all interactions with the outside world, allowing users of [Boundary Monument] to rely on the software's main function to live.
Of course, the future of [Xuanwu] is still very promising.
Big data learning optimization, together with Gu Qing's tuning algorithm, enrich and upgrade the core of the ontology, coupled with hardware with sufficient computing power, not to mention crushing the global security system every minute, but at least it will no longer shrink the defense.
"Rome wasn't built in a day. Meals have to be eaten at a bite. I have to be steady and steady..."
Gu Qing observes the information on the data stream, and simultaneously translates the information that he can understand in his mind. Although the history and technological trends of this world and this era are the same as those in the previous life, he does not want to capsize in the gutter.
He wants to use [Boundary Monument] to tie up part of the capital and partner companies, and then use his own funds to get involved in the hardware field.
The technological war of the previous life. The news of being monopolized and suppressed is not uncommon. He deeply knows that what is invincible will never be software, intelligent big data, but the basic hardware equipment and facilities based on all the prosperity of the Internet.
Without hardware with high computing power and high-speed Internet broadband, mobile payment and shopping is a joke, and the amount of computing on Double Eleven is not a small number.
And without a sufficiently developed and cheap train transportation network and highways, can online shopping be delivered to customers quickly?
Three-day delivery within the province and seven-day delivery across the country, these services can only be completed by relying on the infrastructure construction of the Daxia government and the efforts of the people.
Instead of what the capital said: "Optimize the workflow by relying on big data and artificial intelligence."
So Gu Qing sees very clearly that Kyushu Technology can move steadily if the hardware is strong enough.
After dealing with the problem of last night, it didn't take long for someone to enter the company and start (shua) business (tie).
With dark circles under his eyes, Huang Chaoren came to his cubicle with bread and breakfast in hand.
At this moment, his head is still a little numb, and even his ears are still numb.
After yesterday's meeting, he followed Gu Qing's arrangement and exchanged views with people from several major manufacturers one by one, and then received countless calls.
Some mobile phone manufacturers contacted, some organizations contacted and cooperated, and even threatened...
Due to the nature of his work, he still can't turn off the phone to sleep, and can only be woken up by phone calls. Even if he encounters Rui (sha) Zhi (coin), he can't spray back.
PS: Continue to ask for recommendation tickets and favorites, this is really important... Note 1: This is the case with byte code plagiarism, where many function names are the same, and even misspelled functions are copied intact-== The déjà vu of copying answers from students. Of course, this matter is too common, and the warlock will write about it later, but after all, it is an outsider. If there are mistakes, please point them out, and I will try my best to correct them. Please be gentle.
You'll Also Like
-
Football career: From winning the championship to becoming a legend
Chapter 375 12 hours ago -
Siheyuan: Cao Liang's rise
Chapter 221 12 hours ago -
Genshin Impact: Without the Eye of God, the Original Man Witnesses the Original
Chapter 1460 12 hours ago -
Pirates: I help Robin and Queen become stronger together
Chapter 194 12 hours ago -
Zerg: I am the real white moonlight in the Zerg
Chapter 182 12 hours ago -
Plant elves, popular on the Internet by planting
Chapter 362 12 hours ago -
Pokemon: Pick up the Mystical Pokémon Diancie at the beginning
Chapter 1277 12 hours ago -
Help, I've become a paper man
Chapter 318 12 hours ago -
Lord of the People: I recruited the goddess of heaven
Chapter 913 12 hours ago -
Naruto: Sukuna Jinchuriki, I am Uchiha
Chapter 194 12 hours ago