Swiss blockchain intelligent hardware company
- the following data sources and scores are from the in depth analysis report on business model innovation and investment opportunities of China's blockchain instry published by foresight Instry Research Institute
< H2 > - original title: Analysis on the current situation and development trend of China's blockchain instry in 2019, widely applied and accelerating the construction of Digital China; Midstream blockchain application and technical servicesapplication fields of downstream blockchain. The upstream hardware, technology and infrastructure mainly provide the necessary hardware, technology and infrastructure support for blockchain application. The hardware equipment includes mining machinery, ore pool, chip manufacturer, etc; General technologies include distributed storage, decentralized transaction, data service, distributed computing and other related technologies
the downstream application fields include the combination of application blockchain technology and existing instries, mainly including financial instry, logistics instry, right protection, medical health, instrial energy and many other fields. As an emerging technology, blockchain has many downstream application fields and great development potential
the application and service of midstream blockchain includes the construction of infrastructure platform and the provision of technical service support. The construction of infrastructure platform is divided into general infrastructure chain and vertical domain infrastructure chain; Technical service support includes technical support and service support. Similar to upstream technology, technical support is responsible for providing buyers with a series of technical support based on blockchain procts, such as blockchain security protection; Service support includes a series of services such as digital asset trading place, digital asset storage, media community, etc
analysis of instrial chain of blockchain instry
legal representative: Xu Rong
time of establishment: April 28, 2018
registered capital: RMB 10 million
enterprise type: limited liability company (invested or controlled by natural person)
address: 205, building 3, No. 6, Jiapin third Street, Shatou street, Panyu District, Guangzhou City
Blockchain is a new application mode of distributed data storage, which is an important concept of bitcoin. At present, there are 35 stocks associated with the blockchain concept in the A-share market, of which 6 blockchain concept listed companies are traded on the Shanghai Stock Exchange, and 29 blockchain concept listed companies are traded on the Shenzhen Stock Exchange
according to the correlation of blockchain, the leading stocks of blockchain concept stocks are most likely to be born from Xinchen technology, luyitong and Sifang Jingchuang
Xinchen Technology: on September 29, 2016, the company said in the interaction that the company is now doing research and development of blockchain technology
Lu Yitong: the company plans to raise 67.9691 million shares of additional shares of RMB 24.57 per share, and the total amount of supporting funds will not exceed RMB 1.670 billion, which will be used to pay the cash consideration of this transaction, construct the block chain ASIC chip instrialization project, artificial intelligence ASIC chip R & D center, chip proct marketing and service network, etc
Sifang Jingchuang: on May 31, 2016, the inaugural meeting and the first general meeting of the financial blockchain cooperation alliance (Shenzhen) was officially held in Shenzhen Wuzhou Hotel, and the company was one of the members of the meeting
I think it is possible. Firstly, AI is to cultivate centralized intelligence on closed data platform, and blockchain is to promote centralized application in open data environment
blockchain is a secure, distributed and constant database shared by all parties in the distributed network. This database can record transaction data (either on or off the chain), and it is easy to audit. In short, blockchain is "a technology that allows strangers to trust a shared record of an event.". I think blockchain technology can provide solutions to the following pain points of AI
help AI explain itself (and let us believe it) : AI black box encounters interpretability problems. A clear audit trail can not only improve the credibility of the data, but also improve the credibility of the model, and provide a clear way to trace the machine decision-making process
improve the effectiveness of artificial intelligence : secure data sharing means more data (and more training data), and then there will be better models, better actions, better results... And better new data. In the end, network effect is the most important thing
rece barriers to market access : let's step by step. Blockchain technology can protect your data. So why can't you store all your data in private, or maybe sell it? You might. First of all, blockchain will promote the establishment of cleaner and more organized personal data. Secondly, blockchain will promote the emergence of new markets, such as the data market (which is relatively easy to implement); For example, the model market (this is much more interesting); There may even be an AI market in the end (see what Ben Goertzel is trying to solve with singularity net). Therefore, simple data sharing and new markets, together with blockchain data verification, will provide smoother integration, thus recing the entry threshold of small enterprises and recing the competitive advantage of technology giants. In the efforts to rece the entry threshold, we have actually solved two problems, namely, providing more extensive data access and more effective data monetization mechanism
increase trust in human beings: once part of our tasks are handed over to the automatic virtual agent, clear audit trail will help robots trust each other (and help us trust them). With itemized data and coordinated decision-making, coupled with robust mechanisms to reach a quorum (highly relevant to swarm robots and multi-agent scenarios), this will ultimately increase machine to machine interaction (outlier ventures, 2017) and transactions. Rob may expressed a similar concept in his recent email briefing
the situation of recing catastrophic risk: the AI with specific smart contract written in Dao can only perform those actions, and there is no more (so its action space is also limited)
at present, some enterprises and projects are doing the integration of blockchain and AI, such as atmatrix (decentralized robot), green running (home energy virtual assistant), ethventures (investment in digital token), etc
to learn more about blockchain, please pay attention to pinecone blockchain
their company knows the blockchain system very well
we have cooperated with their family, which is really good.
Article 2 the information network refers to the network system and network application system of each unit of the State Grid Corporation of China, including network system, network service system, application system, security system, network storage system, auxiliary system, etc
Article 3 this regulation is applicable to the operation and management of computer information network of all units in the State Grid Corporation of China. The information network operation and management of all power grid operation enterprises and information service enterprises of the State Grid Corporation of China shall strictly implement this regulation, and the corresponding operation regulations and Implementation Rules for operation and management shall be prepared according to this regulation
Article 4 the rules and regulations on the operation and management of information networks issued by various units shall not conflict with the relevant national laws and the rules< Article 5 quoted standards and reference documents:
(1) regulations of the people's Republic of China on the security and protection of computer information system
(2) Interim Provisions of the people's Republic of China on the management of computer information network international networking
(3) measures for the implementation of Interim Provisions of the people's Republic of China on the management of computer information network international networking
(4) International Federation of computer information networks Measures for the administration of Internet Security and protection (V) measures for the administration of the access channels of the Internet of computer information networks (VI) measures for the administration of the Internet of public computers in China (VII) measures for the administration of public multimedia communications in China (VIII) Interim Provisions on the interconnection of private networks and public networks (IX) Interim Provisions on the confidentiality administration of computer information systems (x) And state secret communications Interim Measures for approval of office automation and computer information system Bit information network refers to the information network within the management scope of the unit, including local area network, Wan and network application system interconnected with subordinate units< Article 7 the science and Technology Information Department of the State Grid Corporation of China is responsible for the inspection, supervision and assessment of the operation and management of the information network of all units in the system of the State Grid Corporation of China. The information centralized management departments of regional, provincial power grid companies and prefecture (city) power supply companies are responsible for implementing the requirements of the superior information centralized management departments, and inspecting, supervising and assessing the operation and management of the information network of their own units and their subordinate units
Article 8 each unit shall make it clear that the operation management department or organization is responsible for the daily operation, maintenance and other management work of the information network within its management scope< Article 9 the information network of each unit shall be implemented 7 × Run 24 hours. All units shall arrange personnel with corresponding professional and technical level to work for 5 hours on legal working days × On site ty for 8 hours. The rest of the time should be arranged off-site ty, and ensure that in case of system problems, the ty personnel can rush to the site in time. Seven principles should be implemented in important period × 24-hour on-site ty to ensure the normal operation of key application systems
Article 10 when on ty every day, the person on ty shall regularly inspect the information network, and monitor the operation of the information network in real time through effective technical means and measures, and record and analyze the operation data of the system. Once the fault is found, it should be reported and handled in time
Article 11 the person on ty shall keep a log. The personnel on ty shall conscientiously implement the shift handover system and the reporting system of major events
Article 12 each unit shall set up a special ty telephone to inform users and report to the superior network operation and management department for record. The on ty telephone number should be 7 × There's a 24-hour answer< Article 13 each unit shall define the information network operation and management department and have a clear division of responsibilities
Article 14 the information network operation and Management Department of each unit shall set up network security, network management, system management, database management, operation ty and other posts corresponding to its network scale, and clarify the division of responsibilities of each post according to the situation of the unit. Relevant technical posts must be undertaken by special personnel with corresponding technical level, and each unit shall conct professional technical training and assessment on them on a regular basis
Article 15 the key posts of information network management, system management and network security of each unit shall implement the standby system of main post and Deputy post. When the main post is absent, the Deputy post should be able to perform the relevant work instead of him< Section 3 work order management article 16, Work order must be filled in:
(1) troubleshooting (including system recovery)
(2) defect elimination
(3) system upgrade and configuration change
(4) system commissioning and shutdown
(5) other operations that may affect the system operation
the work order style is shown in Table 1
Article 17 the work ticket shall be applied by the special person and issued by the qualified work ticket issuer. The work ticket issuer shall not concurrently be the person in charge (supervisor) of the work
Article 18 the responsibility of the work ticket issuer is to carefully review all the contents filled in the work ticket, including the necessity of the work, whether the work is safe, whether the operation steps filled in the work ticket are appropriate, whether the person in charge (supervisor) and operators are appropriate, and whether the safety protection and emergency measures are adequate
Article 19 the responsibilities of the person in charge of the work (supervisor) are to organize the work correctly and safely, organize the operators to complete the preparation of safety measures and technical measures before work, and strictly implement the work order, etc
Article 20 the responsibility of the operator is to conscientiously implement the work content specified in the work order under the supervision of the person in charge (supervisor)
Article 21 the numbering of work order shall be standardized. The content of work ticket shall include: number, work content, place, time, person in charge, staff, cooperation unit, safety measures, work plan and scheme, signature of examination and approval person, work record, on-site recovery, possible impact of operation on system and emergency preparation, etc. No one may fill in or sign the ticket beyond his authority
Article 22 all operations must have implementation plans, steps, safety measures, emergency plans, etc. Supervise the operation of the system with at least two people on site
Article 23 work tickets should be filed and kept for a long time for inspection, and statistics should be made regularly
Article 24 in case of emergency, it can be dealt with first after asking for instructions from relevant leaders, but the work order must be reissued afterwards
section 4 business acceptance
Article 25 each unit shall formulate relevant business acceptance system according to its own business situation, and carry out standardized and proceral management on information network business, such as Wan access, man access, LAN access, application system access, network service, etc
Article 26 classifies businesses according to their importance, frequency, etc., and specifies the acceptance process and commitment completion time of different businesses
Article 27 the business acceptance process should be clearly defined, including application, approval, confirmation, implementation, feedback, filing and other links, and the responsibilities of each post involved in the process should be clearly defined< Article 28 each unit shall formulate the management system of information network computer room, and the safety of computer room shall be in the charge of the operator on ty, and the person in charge of the operation management department shall be the first person responsible for the safety of computer room
Article 29 different security levels are set for different computer room areas, and corresponding access rights are given to staff in different posts
Article 30 except for the operators on ty and maintenance personnel, other personnel are not allowed to enter the computer room without permission. Visitors from outside need to obtain the approval of relevant departments before entering the computer room, and they are led to enter the computer room by designated personnel. The personnel entering and leaving the computer room shall be registered in detail, and the relevant registration records shall be kept for more than one year
Article 31 the equipment in the computer room can only be maintained and operated by the special engineer, and other personnel are not allowed to operate without approval
Article 32 the construction and maintenance of any lines and equipment in the machine room by external personnel must be approved by the operation management department in advance and carried out under the supervision of the operation management personnel
Article 33 the computer room shall be kept in a proper temperature and humidity, and the environment shall be kept clean and tidy
section 6 user services
Article 34 user services refer to the maintenance and application services of personal office terminal equipment for employees
Article 35 the network operation and management department shall set up a user service hotline, and can also use online repair, e-mail repair and other methods if conditions permit, and make statistics of the maintenance log
Article 36 a special person shall be assigned to be responsible for 5 working days × 8-hour on ty, responsible for answering the customer service hotline, viewing, registering, task distribution, user feedback, filing statistics, etc
Article 37 when answering the phone, the personnel on ty should use civilized language, understand the user's fault situation in detail, make records carefully and reply in time. Timely check and handle the online repair and e-mail repair
Article 38 the on-site service personnel should correct the service consciousness, improve the service quality and have good professional ethics. Any operation on the user's computer must be approved by the user in advance. Do a good job in keeping the internal information of the user's computer confidential, and do not do anything irrelevant to the work
Article 39 the inventory of spare parts and spare equipment shall be reasonably arranged to ensure that the faults can be eliminated in time and the normal work of users will not be affected
Article 40 fault handling methods include telephone support and on-site service. The fault handling process is shown in the figure below:
Article 41 generally, it is required to arrive at the site within 1 hour after receiving the fault report
Article 42 regular customer satisfaction surveys should be concted to promote the improvement of service quality. It is generally required to be concted once a year< Article 43 information network management departments at all levels shall strengthen equipment management, classify and code equipment, establish equipment account and equipment card, and track equipment according to equipment card