Ron Burrows
Bio
Stories (57/0)
Expert interpretation | Construction of Internet information service algorithm security supervision system
At present, the information process of human society is rapidly changing from digitalization and networking to the intelligent stage. With the development of artificial intelligence, big data and other new information technology, algorithms are widely used in Internet information services to provide personalized, accurate and intelligent information services for users. At the same time, the unreasonable application of the algorithm also affects the normal communication order, market order and social order, and brings severe challenges to the maintenance of ideological security, social fairness and justice and the legitimate rights and interests of netizens.
By Ron Burrows2 years ago in 01
The regulations on the recommendation of Internet Information Service algorithms will come into effect today.
The regulations on the recommendation of Internet Information Service algorithms jointly issued by the State Internet Information Office and other four departments will come into effect on March 1. For ordinary users, the algorithm can not be touched or understood, but it is widely affecting us to obtain Internet information services through various platforms.
By Ron Burrows2 years ago in 01
Take stock of 10 misunderstandings of network security, how many have you been hit?
" Under the dual challenges of network security situation and compliance, the formulation of network security strategy has become an important aspect of enterprise planning. However, many enterprises inevitably go into misunderstandings when formulating security policies.
By Ron Burrows2 years ago in 01
Talking about "Internet + Information Security Management" of Electric Power
With the popularization of Internet technology, network and information security are also facing new threats. As the central power enterprise under the jurisdiction of the five provinces and regions, China Southern Power Grid occupies an important position in China's power and energy industry. Power network and information system are now widely used and are developing at a high speed, and are becoming the core of the development of power information technology. The network and information security management of electric power has become an important part of electric power operation management.
By Ron Burrows2 years ago in 01
Talking about "Internet + Information Security Management" of Electric Power
With the popularization of Internet technology, network and information security are also facing new threats. As the central power enterprise under the jurisdiction of the five provinces and regions, China Southern Power Grid occupies an important position in China's power and energy industry. Power network and information system are now widely used and are developing at a high speed, and are becoming the core of the development of power information technology. The network and information security management of electric power has become an important part of electric power operation management.
By Ron Burrows2 years ago in 01
Talking about "Internet + Information Security Management" of Electric Power
With the popularization of Internet technology, network and information security are also facing new threats. As the central power enterprise under the jurisdiction of the five provinces and regions, China Southern Power Grid occupies an important position in China's power and energy industry. Power network and information system are now widely used and are developing at a high speed, and are becoming the core of the development of power information technology. The network and information security management of electric power has become an important part of electric power operation management.
By Ron Burrows2 years ago in 01
New Computing Power, New pattern and New momentum-- "calculation of East and West" detonates the great development of data center
Since 2020, the development of digital economy has become the basic "national policy" to support the long-term development of our country. The State Council issued the "14th five-year Plan for the Development of Digital economy", which put forward directional instructions on how to develop data centers.
By Ron Burrows2 years ago in 01
When the activity is going on, 2022 data center model project is being solicited!
Since the 18th CPC National Congress, the digital economy has been promoted to the national strategy. The important position of "data" is pointed out in the "14th five-year Plan for the Development of Digital economy" issued by the State Council. We should take data as the key element, strengthen the construction of digital infrastructure, improve the governance system of digital economy, and jointly promote digital industrialization and industrial digitization, so as to provide strong support for the construction of digital China. According to the data of 2021 Global Digital economy Conference, the scale of China's digital economy has ranked second in the world for many years in a row. The second issue of Qiushi magazine, published on January 16, published an important article by Xi Jinping, general secretary of the CPC Central Committee, state president, and chairman of the Central military Commission, entitled "constantly strengthening, optimizing, and expanding China's Digital economy." it is clearly stated in the article that the development of digital economy is of great significance and is a strategic choice to seize the new opportunities of the new round of scientific and technological revolution and industrial reform.
By Ron Burrows2 years ago in 01
Security Compliance protects the Digital Transformation of Enterprises-- looking at the Future Development trend of Security from the implementation of the measures for Network Security Review
Recently, thirteen departments, including the State Internet Information Office, jointly revised and promulgated the measures for Network Security Review (hereinafter referred to as the measures), which will come into force on February 15, 2022. Since its implementation on June 1, 2020, the original measures have played an extremely important role in ensuring the supply chain security of critical information infrastructure and maintaining national security.
By Ron Burrows2 years ago in 01
What is the difference and connection between the popular Web3 and the meta-universe?
At present, people pay close attention to two concepts in the field of information technology-Web 3 (or Web 3.0) and meta-universe. These two hot areas represent the new direction of the future development of the digital world. Judging from some current reports, some people may think that they refer to the same thing, which is understandable. After all, both technologies are at the conceptual stage, and it is difficult for anyone to explain their definitions more thoroughly. But in fact, although they are related in some important respects, they have different definitions, so there are many differences between the two.
By Ron Burrows2 years ago in 01
How to implement risk-based Security Policy
On the other hand, a risk-based security approach can determine the real risk of the most valuable assets to the enterprise, and can give priority to spending money on projects that can reduce the risk to an acceptable level. The security policy constructed by risk-based decision-making enables enterprises to set more practical and realistic security goals and spend their resources in a more effective way. This approach can meet compliance requirements and can be used as a natural result of a robust and optimized security state.
By Ron Burrows2 years ago in 01
Sadie's point of view: Google wins the case, is the intellectual property risk alert in software compatibility lifted?
In the process of developing Android, Google copied 0.4 per cent of Oracle's Java API code for compatibility and was awarded $8.8 billion. This kind of behavior is more common in software development, especially in software companies at a backwardness disadvantage, and how to identify it is related to the development of the whole software industry, so this case is called an epic intellectual property dispute in the industry. Recently, the U.S. Supreme Court concluded that Google constitutes fair use. The intellectual property Research Institute of Sadie Research Institute believes that there is uncertainty in the identification of such acts, the positive impact on the domestic software industry can not be exaggerated, and it is still necessary to prevent and control related intellectual property risks.
By Ron Burrows2 years ago in 01