In yesterday's World Internet Conference in Wuzhen - Internet Development Forum, the 2020 "World Internet Leading Scientific and Technological Achievements Release Activity" was held in Wuzhen, *** released 15 world Internet leading scientific and technological achievements, including Tencent, Alibaba, Baidu, Microsoft, Qianxin and other 15 domestic and foreign representative leading scientific and technological achievements were evaluated. The company's first-ever "Internet" program was launched in the United States in January of this year.
Chianxin endogenous security framework: the protection of the digital era requires endogenous security
Chianxin launched a new generation of enterprise network security framework (endogenous security framework), was honored as the 2020 World Internet Leading Science and Technology Achievements.
"The arrival of the digital era has completely broken the boundaries of the network world and the physical world, bringing new security risks. The previous static border protection idea is no longer adapted to the needs of the new era, and the protection of the digital era requires endogenous security." At the conference of leading technology achievements, Qi Xiangdong, Chairman of QIANSHENG Group, introduced that endogenous security refers to the built-in and constantly self-growing security capabilities in the information technology environment, and that through the "one center and five filters", a ubiquitous network security is established at five levels: network, data, application, behavior, identity, and "immunity". "The company's newest product is a new, more advanced version of the company's newest product, which is now available for sale in the marketplace.
At the leading results release event, Qi Xiangdong demonstrated the network security defense model: through the demonstration video, you can clearly and graphically see that, in the face of network attacks, the new generation of enterprise network security framework (endogenous security framework) between different regions, through the deep network access protection and other measures to limit the horizontal movement of cross-regional network attack paths, and continue to eliminate the external risk and exposure of assets surface; within the same region, it combines active protection and passive trapping technologies to discover and remove the intruder's internal strongholds, repair vulnerabilities and defects, and ensure internal network security. Finally, combined with external security information and big data analysis, the implementation of rapid security response and disposal, to block the threat outside the government and enterprise organizations.
Qi Xiangdong said, a new generation of enterprise network security framework (endogenous security framework) not only for the government and enterprise organizations to establish a "pre-emptive prevention and control" of the security system, but also to make network security gradually from the edge of the core, from the external to the endogenous, from "compliance" to "combat". The company's network security is also gradually moving from the edge to the core, from external to internal, from "compliance" to "combat", and promoting the development of network security to the infrastructure, service-oriented mode.
"For the digital era of network security planning 'ten projects and five tasks', applicable to almost all application scenarios, can guide different industries to output network security architecture in line with their characteristics, to build a dynamic and comprehensive network security defense system, all-round to meet the needs of the digital era of security. security needs in the digital era." The company's business is to provide the best possible service to its customers," he said.
It is understood that Chianxin's new generation of enterprise network security framework (endogenous security framework) related components, has obtained more than 1,000 invention patents and computer software copyrights in the field of network security, and another 850 invention patent applications are under review.
At the previous main forum, Qi Xiangdong said that network security is the bottom board of digital technology, without network security, the role of digital technology will be greatly reduced. "The barrel has a short board is not filled with water, but the bottom of the barrel has a hole in the bottom board can not be filled with water, we should be good at making up for the short board, but also pay attention to the reinforcement of the bottom board". Qi Xiangdong believes that in the digital age, to build a network security base plate, rely on data-driven endogenous security framework.
Tencent meeting practice: into the first award-winning video conferencing products
This year, the outbreak of the epidemic caught everyone by surprise, enterprises stopped working, schools closed, trade suspension ...... on all aspects of China's economic and social life has had a significant The impact of the outbreak has been significant. Tencent meeting through the creation of multi-party audio and video collaboration capabilities, for domestic and overseas to build a borderless communication bridge, highlighting the power of "technology for good".
It is reported that after the outbreak of the epidemic, Tencent Conference urgently deployed and quickly opened up the 300-party conference capacity, and rapidly expanded capacity at the first time. In 8 days, Tencent Conference expanded its capacity by more than 100,000 cloud hosts and invested more than one million cores of computing resources to complete the service coverage of more than 100 countries and regions around the world. This move set an unprecedented record in the history of China's cloud computing, reflecting the Chinese speed of technological products, while also further guaranteeing the interaction and economic development of various industries, including governments, enterprises, schools, etc., in the anti-epidemic experience, trade and other aspects.
Behind the speed, there is even more technology. In order to support large-scale online collaboration, Tencent's conferencing solution includes a number of powerful Tencent self-developed basic technology supports, including TDSQL, a high-performance, financial-grade, highly available distributed database technology developed independently after more than a decade of research and development. based on TDSQL support, Tencent's conferencing can smoothly support the needs of more than 100 million users, and is fearless of any sudden increase in traffic and failure disasters, providing users with high-speed, smooth, stable, and reliable services. Tencent Conference provides users with high-speed, smooth, stable, and reliable services and experiences at all times.
According to the Report on the Social Value and Future Development of Online Conferencing released by Peking University's Internet Development Research Center, Tencent Conferencing saved 71.4 billion RMB in social costs between January and May this year, and brought great social value and contribution to many levels, including technology, culture, and economy.
AliCloud's Shenlong Architecture: The Third Generation of Virtualization Technology in the Cloud Computing Industry
Yesterday, the Shenlong cloud server architecture independently developed by AliCloud was selected as one of the world's leading Internet technology achievements. Simply put, Shenlong solves the virtualization performance loss problem that has plagued the cloud computing industry for years, allowing servers to perform at a higher level of performance and be more stable.
From the evaluation of the conference, Shenlong architecture is a typical representative of the third generation of virtualization technology in the cloud computing industry, which is born for the cloud, and not only solves the pain point of virtualization performance loss on the cloud, but also makes the performance of cloud servers go beyond that of physical machines. Today's Dragon architecture carries more than 80% of China's technology enterprises to the cloud, and is widely used in a variety of industries such as healthcare, new government affairs, intelligent manufacturing, Internet, and education.
Jiang Jiangwei, partner of Alibaba and head of basic products of Alibaba Cloud, said when receiving the award, "Shenlong is one of the key innovative technologies of Alibaba Cloud, which can accelerate the universalization of cloud computing." It is reported that Aliyun's self-developed Shenlong architecture, accelerated by transferring virtualization to dedicated hardware, can integrate the high performance of the physical machine with the flexibility of the virtual machine, virtualization loss is almost zero, the performance is stronger than the traditional physical machine, and can be expanded at any time, which greatly reduces the cost of customers.
360 hologram cyberspace mapping system: lighting up the "dark forest" of cyberspace
The 360 hologram cyberspace mapping system, which was honored as one of the World Wide Web's Leading Science and Technology Achievements, was designed to provide the most accurate and efficient way for customers to map their cyberspace, and to provide the most efficient way for customers to map their cyberspace.
360 Chief Scientist Pan Jianfeng said that at the technical level, 360 holographic star map cyberspace mapping system will be cyberspace detection, data analysis and mapping capabilities to a new level, combined with self-developed Vscan detection engine and 360 security data, can be transformed into a local perspective of the global vision, which can help to transform the reactive response to the proactive monitoring and active warning.
At the application level, 360 holographic star map mapping system has accumulated billions of data from the entire network, relying on the knowledge base and the overall ability of the security expert team, can help the party, government, military and enterprise multi-end user, to realize the risk of cyberspace proactive detection, early warning, support for the cybersecurity situational awareness, tracking and tracing of high-level threats, as well as continuous updating of global security risks.
At the same time, in the 360 new generation of network security capabilities system of empowerment and command, 360 holographic star map cyberspace mapping system can also be with the whole system of intelligence cloud, vulnerability cloud, check and kill the cloud, analysis cloud and other security infrastructure, the establishment of continuous operation and synergistic mechanism, to create a joint defense and control of the systematic security protection force.