Ron Burrows
Bio
Stories (57/0)
Information security in 315: search results are manipulated; "free WiFi" traps; high-speed downloads; harassing phone calls from browsing the web; children's watches become "walking voyeurs"
2022-03-16 original text Included in the collection # 3.151 In the information age, the issue of information security is not only in the field of information technology, but also has become a major security issue in the field of consumption.
By Ron Burrows2 years ago in 01
Information security in 315: search results are manipulated; "free WiFi" traps; high-speed downloads; harassing phone calls from browsing the web; children's watches become "walking voyeurs"
2022-03-16 original text Included in the collection # 3.151 In the information age, the issue of information security is not only in the field of information technology, but also has become a major security issue in the field of consumption.
By Ron Burrows2 years ago in 01
Changing tactics to win: preventing blackmail software attacks
There are great challenges in defending against this threat. Enterprises should focus on the initial access vectors and supply chain risks that can systematically determine the precursors of data theft and blackmail software attacks, so as to strengthen protection. By properly collecting relevant data and parameters, monitoring open source and external attack surfaces is an important magic weapon for enterprises to identify and prevent attacks.
By Ron Burrows2 years ago in 01
Intelligent data Center Summit in 2022, East, West, East, West, Home and double carbon Special Field to promote the Development of data Center
At the beginning of 2022, the state made great moves in the construction of data centers, officially announcing the completion of 8 national computing hub nodes and 10 national data center clusters. The overall layout design of the national integrated big data center system has been completed, and the super project of "counting the East and the West" has been officially launched in an all-round way.
By Ron Burrows2 years ago in 01
Do you understand the evolution of the data center value equation?
" Click the blue word to follow us. As enterprise data centers shift from an owner-owned model to a hybrid model that includes a range of management services, that is, a multi-cloud ecosystem that balances local ownership and managed services, enterprise businesses are trying to keep up with the times. To understand future trends, Simon issued an insight briefing that carefully studied how and why the data center value equation developed, and how the shift to a new value equation could be the secret of success.
By Ron Burrows2 years ago in 01
Since the 18th CPC National Congress, the digital economy has been
Since the 18th CPC National Congress, the digital economy has been promoted to the national strategy. The important position of "data" is pointed out in the "14th five-year Plan for the Development of Digital economy" issued by the State Council. We should take data as the key element, strengthen the construction of digital infrastructure, improve the governance system of digital economy, and jointly promote digital industrialization and industrial digitization, so as to provide strong support for the construction of digital China. According to the data of 2021 Global Digital economy Conference, the scale of China's digital economy has ranked second in the world for many years in a row. The second issue of Qiushi magazine, published on January 16, published an important article by Xi Jinping, general secretary of the CPC Central Committee, state president, and chairman of the Central military Commission, entitled "constantly strengthening, optimizing, and expanding China's Digital economy." it is clearly stated in the article that the development of digital economy is of great significance and is a strategic choice to seize the new opportunities of the new round of scientific and technological revolution and industrial reform.
By Ron Burrows2 years ago in 01
The "counting of the east and the west" is hot, and this year's new infrastructure is still a key area of national investment and development.
" In February this year, China launched the project of "calculating the number of the East and the West". This year's "Government work report" pointed out that effective investment should still be expanded this year, and new infrastructure is a very important aspect. So, how is the progress of China's new infrastructure construction at present? What is the focus of this year's work? On the morning of March 7, the Information Office of the State Council held a press conference, and Lin Nianxiu, vice minister of the National Development and Reform Commission, gave an answer. The following is the full text:
By Ron Burrows2 years ago in 01
Security high-frequency words in the two sessions: network security, data security, vehicle network security.
At present, the digital economy is becoming a new engine driving economic growth. In the aspect of escorting the high-quality development of digital economy, network security has increasingly become an important factor that can not be ignored. During the two sessions of the National people's Congress this year, a number of CPPCC members and NPC deputies made suggestions and suggestions on network security.
By Ron Burrows2 years ago in 01
The Ministry of Industry and Information Technology completes the task of ensuring the security of the opening ceremony of the Beijing Winter Paralympic Games
On the evening of March 4, the opening ceremony of the Beijing Winter Paralympic Games was held at the National Stadium "Bird's Nest". The relevant departments and bureaus of the Ministry of Industry and Information Technology and the relevant departments and systems of the Ministry of Industry and Information Technology worked closely, scrupulously performed their duties and fought continuously to complete the tasks of radio security, information communication and network security for the opening ceremony of the Winter Paralympic Games.
By Ron Burrows2 years ago in 01
Expert interpretation | Building a landing support system for algorithm governance
With the rapid development of network information technology, big data, cloud computing, algorithm and artificial intelligence and other technologies are widely used in social networking, shopping, tourism, medical, job hunting, video and other platforms and application scenarios. The emerging format of the Internet has brought great convenience to people and shaped people's new way of life. At the same time, due to the fast iterative speed of information technology update, various development forms, and more and more complex emerging formats, big data mining and algorithm through user behavior analysis, as well as historical data mining, bring convenience to the personalized service of users, and inject new momentum into economic and social development. However, the unreasonable application of algorithms such as algorithm discrimination, "big data killing familiarity", induced addiction, violation of laws and bad information recommendation also touches on such issues as user information security and rights and interests protection. and has a profound impact on the normal communication order, market order and social order, and brings new challenges to China's existing laws and regulations and regulatory governance system.
By Ron Burrows2 years ago in 01