The security attack and defense competition of singularity OS is only the first step in the development of the system. Ma Xin is very reasonable. Improving the ecological chain of the system and better serving users are what the source code company needs to do now.

Zhou Xiao watched the live broadcast in his office and said to Xue Ninglu, "the old horse is too modest!"

Ma Xin's summary meeting was indeed too modest. Therefore, after the singularity OS attack and defense drill, the strong security performance and perfect office performance of singularity OS have attracted the attention of more and more users.

From Jiangcheng to Shanghai, Suzhou and Hangzhou, Chengdu and Zheng, major enterprises and institutions, schools, hospitals and other service-oriented public places began to actively replace the singularity OS system.

In addition to enterprises and institutions, major private enterprises are also installing singularity OS.

Security is the most important thing for users, and the super intelligent office performance can also enable the company to save a sum of clerical expenses. Moreover, the system is still free and will not be installed in vain.

Many individual users, especially Xiaobai, also take the initiative to ask the seller to install singularity OS when purchasing computers.

Shen Wei, a girl who had just entered the University, bought a Warwick laptop and chose the singularity OS system.

How troublesome the win system is!

What about the blue screen? What about the system card machine? What if you can't install the software? What if the software is installed on the system disk and the system runs too slowly?

The problems encountered by the system can't be handled by a little girl, and Shen Wei doesn't have a boyfriend.

Now!

How convenient the singularity OS system is. The system security is relatively closed and very safe for users. If there is no problem, just use the system as Xiaoyuan voice assistant. Don't bother your boyfriend.

The boys in the school didn't expect that the competition with themselves was not other boys, but a special system.

It is not only college boys who suffer cross-border competition, but also Penguin security assistant and 306 security assistant.

Penguin network security department and 306 network security department are in a very complicated mood when watching the live broadcast of the source code company.

On the one hand, they hope that the source code company can be proud in front of Western technology companies, because the source code company does not represent itself, and the singularity OS represents the highest level of domestic operating systems.

On the other hand, I am also worried that if the singularity OS is very secure and does not need security software at all, there will be no market for penguin security housekeeper and 306 security housekeeper at all.

The domestic security Housekeeper on the market is indeed free, but it also has its own industrial chain and interest chain behind it.

For example, 306 can never prohibit desktop pop-up advertising. If you accidentally go in, it can get money.

There is also the monopoly of security Housekeeper on user desktop applications.

Computer has the final say, has the final say that you install the software, but if you are computer white, that is the safety master.

For example, if you want to install an input method and there is no commercial consensus between this input method and the security manager on your desktop, the software manager is likely to remind you that this input method is dangerous, and then the countdown will be automatically deleted.

The computer Xiaobai may not pay attention to this problem and cannot install the input method.

This is the logic behind the seemingly free security housekeeper.

Although it is free, it gets more than it charges.

Now such privileges are gone. Instead of being taken away by other security housekeepers or anti-virus software, they are taken away by a system. This feeling is very bad.

Penguin is better. There are other industries besides security housekeeper, but 306 is difficult. Cutting down 306 security housekeeper is almost cutting down more than 306 general income, which is unacceptable.

306 hold a meeting overnight to discuss countermeasures and make a system to compete with singularity OS?

Stop kidding! It's so easy to make a system.

Develop a virus attack singularity OS, and then 306 stand up to eliminate the virus and tell the user 306 cow break! Let the singularity continue to use 306?

Hehe, hundreds of millions of attacks yesterday were invalid for singularity OS. Where can any virus break through the defense line of singularity OS.

The times are moving forward and science and technology are developing.

There is only one way left for 306 to integrate into the singularity OS as soon as possible, contribute to the singularity ecological construction, and occupy the highland of the ecological chain as soon as possible. Only in this way can we have the opportunity to live.

The security competition of source code company on singularity OS is enough to shock the world.

The first one who was most shocked was Warwick.

The strong security of singularity OS makes Warwick firm its determination to equip mobile phones and notebooks with singularity OS.

The second is Ali.

Ali attaches great importance to the security of singularity OS!

Ali data center has the private data of almost everyone in Xia country and the data of users in more than 200 countries around the world.

These data are not only as simple as name and ID card, but also very three-dimensional data for a user.

Through this data, Ali can analyze what your personality is, what you like to do, how your spending power is, where you work, and even know your living habits and health status.

Such important data can never be measured by money.

The data in Ali's hands is also a treasure and vault in the eyes of hackers at home and abroad.

In this case, Ali's servers are attacked as many as billions of times every year, and Ali spends tens of billions of dollars on network security every year.

Even so, Ali will have data security problems, and even some enterprise projects and data leakage problems, causing irreparable losses to Ali and some enterprises.

The high security of singularity OS gives Ali another choice.

Can Ali use the protection mode of singularity OS on the core data near the thigh of the source code company?

At the internal security summit of Ali, we discussed internally whether to protect core data with singularity OS.

This proposal has actually been widely debated.

A security engineer said: "this time, the performance of singularity OS is very excellent, but because it is a newly launched system, the specific security performance still needs to be tested by time. No one can break the security of singularity OS now, but what about the future? In the future, as more and more people understand singularity OS, will there be security vulnerabilities in singularity OS? "

"Although our security mechanism is not perfect, it has been running for so many years and has certain risk resistance. Our data is so important. I suggest not to easily try to change the security protection mode."

"The future of domestic systems must be bright. Even if our current security mechanism is developed by ourselves, we also rely on Western technology. The cards are in the hands of others. No matter how safe it is, I have no bottom in my heart."

After an argument, the news from Warwick shut the engineers up.

Warwick will work with the source code company to establish a computer network security mechanism based on singularity OS, under which all data of Warwick will be placed in the future.