Position: Home page » Blockchain » Swiss blockchain intelligent hardware company

Swiss blockchain intelligent hardware company

Publish: 2021-05-07 09:00:20
1.

- the following data sources and scores are from the in depth analysis report on business model innovation and investment opportunities of China's blockchain instry published by foresight Instry Research Institute

< H2 > - original title: Analysis on the current situation and development trend of China's blockchain instry in 2019, widely applied and accelerating the construction of Digital China; Midstream blockchain application and technical services

application fields of downstream blockchain. The upstream hardware, technology and infrastructure mainly provide the necessary hardware, technology and infrastructure support for blockchain application. The hardware equipment includes mining machinery, ore pool, chip manufacturer, etc; General technologies include distributed storage, decentralized transaction, data service, distributed computing and other related technologies

the downstream application fields include the combination of application blockchain technology and existing instries, mainly including financial instry, logistics instry, right protection, medical health, instrial energy and many other fields. As an emerging technology, blockchain has many downstream application fields and great development potential

the application and service of midstream blockchain includes the construction of infrastructure platform and the provision of technical service support. The construction of infrastructure platform is divided into general infrastructure chain and vertical domain infrastructure chain; Technical service support includes technical support and service support. Similar to upstream technology, technical support is responsible for providing buyers with a series of technical support based on blockchain procts, such as blockchain security protection; Service support includes a series of services such as digital asset trading place, digital asset storage, media community, etc

analysis of instrial chain of blockchain instry

2. Introction: quantum blockchain technology is a professional Internet technology service provider integrating computer software and hardware research and development, digital currency proction and asset management. Its main business is to mine the most core value digital currency in the world, especially bitcoin. It belongs to quantum blockchain Technology (Guangzhou) Co., Ltd
legal representative: Xu Rong
time of establishment: April 28, 2018
registered capital: RMB 10 million
enterprise type: limited liability company (invested or controlled by natural person)
address: 205, building 3, No. 6, Jiapin third Street, Shatou street, Panyu District, Guangzhou City
3.

Blockchain is a new application mode of distributed data storage, which is an important concept of bitcoin. At present, there are 35 stocks associated with the blockchain concept in the A-share market, of which 6 blockchain concept listed companies are traded on the Shanghai Stock Exchange, and 29 blockchain concept listed companies are traded on the Shenzhen Stock Exchange

according to the correlation of blockchain, the leading stocks of blockchain concept stocks are most likely to be born from Xinchen technology, luyitong and Sifang Jingchuang

Xinchen Technology: on September 29, 2016, the company said in the interaction that the company is now doing research and development of blockchain technology

Lu Yitong: the company plans to raise 67.9691 million shares of additional shares of RMB 24.57 per share, and the total amount of supporting funds will not exceed RMB 1.670 billion, which will be used to pay the cash consideration of this transaction, construct the block chain ASIC chip instrialization project, artificial intelligence ASIC chip R & D center, chip proct marketing and service network, etc

Sifang Jingchuang: on May 31, 2016, the inaugural meeting and the first general meeting of the financial blockchain cooperation alliance (Shenzhen) was officially held in Shenzhen Wuzhou Hotel, and the company was one of the members of the meeting

4. Blockchain is a key project in the 13th five year plan for national informatization. It is parallel with artificial intelligence, big data, driverless and other projects. With the support of the government, blockchain technology has developed rapidly, and China's blockchain instry is expected to take the lead in the world. At present, the number of domestic blockchain related companies is increasing, of which fast online has been in the lead
5.

I think it is possible. Firstly, AI is to cultivate centralized intelligence on closed data platform, and blockchain is to promote centralized application in open data environment

blockchain is a secure, distributed and constant database shared by all parties in the distributed network. This database can record transaction data (either on or off the chain), and it is easy to audit. In short, blockchain is "a technology that allows strangers to trust a shared record of an event.". I think blockchain technology can provide solutions to the following pain points of AI

help AI explain itself (and let us believe it) : AI black box encounters interpretability problems. A clear audit trail can not only improve the credibility of the data, but also improve the credibility of the model, and provide a clear way to trace the machine decision-making process

improve the effectiveness of artificial intelligence : secure data sharing means more data (and more training data), and then there will be better models, better actions, better results... And better new data. In the end, network effect is the most important thing

rece barriers to market access : let's step by step. Blockchain technology can protect your data. So why can't you store all your data in private, or maybe sell it? You might. First of all, blockchain will promote the establishment of cleaner and more organized personal data. Secondly, blockchain will promote the emergence of new markets, such as the data market (which is relatively easy to implement); For example, the model market (this is much more interesting); There may even be an AI market in the end (see what Ben Goertzel is trying to solve with singularity net). Therefore, simple data sharing and new markets, together with blockchain data verification, will provide smoother integration, thus recing the entry threshold of small enterprises and recing the competitive advantage of technology giants. In the efforts to rece the entry threshold, we have actually solved two problems, namely, providing more extensive data access and more effective data monetization mechanism

increase trust in human beings: once part of our tasks are handed over to the automatic virtual agent, clear audit trail will help robots trust each other (and help us trust them). With itemized data and coordinated decision-making, coupled with robust mechanisms to reach a quorum (highly relevant to swarm robots and multi-agent scenarios), this will ultimately increase machine to machine interaction (outlier ventures, 2017) and transactions. Rob may expressed a similar concept in his recent email briefing

the situation of recing catastrophic risk: the AI with specific smart contract written in Dao can only perform those actions, and there is no more (so its action space is also limited)

at present, some enterprises and projects are doing the integration of blockchain and AI, such as atmatrix (decentralized robot), green running (home energy virtual assistant), ethventures (investment in digital token), etc

to learn more about blockchain, please pay attention to pinecone blockchain

6. Shengshi Huacai company
their company knows the blockchain system very well
we have cooperated with their family, which is really good.
7. Article 1 the information network of State Grid Corporation of China is an important tool for the proction, operation and management of State Grid Corporation of China, and an important guarantee for the safe, stable, economic and high-quality operation of power grid. Information network security is an important part of power proction safety management system of State Grid Corporation of China. In order to standardize the operation and management of the information network of State Grid Corporation of China, improve the operation and management level of the information network, ensure the safe, reliable and stable operation of the information network of State Grid Corporation of China, and promote the informatization work of State Grid Corporation of China, this regulation is hereby formulated

Article 2 the information network refers to the network system and network application system of each unit of the State Grid Corporation of China, including network system, network service system, application system, security system, network storage system, auxiliary system, etc

Article 3 this regulation is applicable to the operation and management of computer information network of all units in the State Grid Corporation of China. The information network operation and management of all power grid operation enterprises and information service enterprises of the State Grid Corporation of China shall strictly implement this regulation, and the corresponding operation regulations and Implementation Rules for operation and management shall be prepared according to this regulation

Article 4 the rules and regulations on the operation and management of information networks issued by various units shall not conflict with the relevant national laws and the rules< Article 5 quoted standards and reference documents:
(1) regulations of the people's Republic of China on the security and protection of computer information system
(2) Interim Provisions of the people's Republic of China on the management of computer information network international networking
(3) measures for the implementation of Interim Provisions of the people's Republic of China on the management of computer information network international networking
(4) International Federation of computer information networks Measures for the administration of Internet Security and protection (V) measures for the administration of the access channels of the Internet of computer information networks (VI) measures for the administration of the Internet of public computers in China (VII) measures for the administration of public multimedia communications in China (VIII) Interim Provisions on the interconnection of private networks and public networks (IX) Interim Provisions on the confidentiality administration of computer information systems (x) And state secret communications Interim Measures for approval of office automation and computer information system Bit information network refers to the information network within the management scope of the unit, including local area network, Wan and network application system interconnected with subordinate units< Article 7 the science and Technology Information Department of the State Grid Corporation of China is responsible for the inspection, supervision and assessment of the operation and management of the information network of all units in the system of the State Grid Corporation of China. The information centralized management departments of regional, provincial power grid companies and prefecture (city) power supply companies are responsible for implementing the requirements of the superior information centralized management departments, and inspecting, supervising and assessing the operation and management of the information network of their own units and their subordinate units

Article 8 each unit shall make it clear that the operation management department or organization is responsible for the daily operation, maintenance and other management work of the information network within its management scope< Article 9 the information network of each unit shall be implemented 7 × Run 24 hours. All units shall arrange personnel with corresponding professional and technical level to work for 5 hours on legal working days × On site ty for 8 hours. The rest of the time should be arranged off-site ty, and ensure that in case of system problems, the ty personnel can rush to the site in time. Seven principles should be implemented in important period × 24-hour on-site ty to ensure the normal operation of key application systems

Article 10 when on ty every day, the person on ty shall regularly inspect the information network, and monitor the operation of the information network in real time through effective technical means and measures, and record and analyze the operation data of the system. Once the fault is found, it should be reported and handled in time

Article 11 the person on ty shall keep a log. The personnel on ty shall conscientiously implement the shift handover system and the reporting system of major events

Article 12 each unit shall set up a special ty telephone to inform users and report to the superior network operation and management department for record. The on ty telephone number should be 7 × There's a 24-hour answer< Article 13 each unit shall define the information network operation and management department and have a clear division of responsibilities

Article 14 the information network operation and Management Department of each unit shall set up network security, network management, system management, database management, operation ty and other posts corresponding to its network scale, and clarify the division of responsibilities of each post according to the situation of the unit. Relevant technical posts must be undertaken by special personnel with corresponding technical level, and each unit shall conct professional technical training and assessment on them on a regular basis

Article 15 the key posts of information network management, system management and network security of each unit shall implement the standby system of main post and Deputy post. When the main post is absent, the Deputy post should be able to perform the relevant work instead of him< Section 3 work order management article 16, Work order must be filled in:
(1) troubleshooting (including system recovery)
(2) defect elimination
(3) system upgrade and configuration change
(4) system commissioning and shutdown
(5) other operations that may affect the system operation
the work order style is shown in Table 1

Article 17 the work ticket shall be applied by the special person and issued by the qualified work ticket issuer. The work ticket issuer shall not concurrently be the person in charge (supervisor) of the work

Article 18 the responsibility of the work ticket issuer is to carefully review all the contents filled in the work ticket, including the necessity of the work, whether the work is safe, whether the operation steps filled in the work ticket are appropriate, whether the person in charge (supervisor) and operators are appropriate, and whether the safety protection and emergency measures are adequate

Article 19 the responsibilities of the person in charge of the work (supervisor) are to organize the work correctly and safely, organize the operators to complete the preparation of safety measures and technical measures before work, and strictly implement the work order, etc

Article 20 the responsibility of the operator is to conscientiously implement the work content specified in the work order under the supervision of the person in charge (supervisor)

Article 21 the numbering of work order shall be standardized. The content of work ticket shall include: number, work content, place, time, person in charge, staff, cooperation unit, safety measures, work plan and scheme, signature of examination and approval person, work record, on-site recovery, possible impact of operation on system and emergency preparation, etc. No one may fill in or sign the ticket beyond his authority

Article 22 all operations must have implementation plans, steps, safety measures, emergency plans, etc. Supervise the operation of the system with at least two people on site

Article 23 work tickets should be filed and kept for a long time for inspection, and statistics should be made regularly

Article 24 in case of emergency, it can be dealt with first after asking for instructions from relevant leaders, but the work order must be reissued afterwards

section 4 business acceptance

Article 25 each unit shall formulate relevant business acceptance system according to its own business situation, and carry out standardized and proceral management on information network business, such as Wan access, man access, LAN access, application system access, network service, etc

Article 26 classifies businesses according to their importance, frequency, etc., and specifies the acceptance process and commitment completion time of different businesses

Article 27 the business acceptance process should be clearly defined, including application, approval, confirmation, implementation, feedback, filing and other links, and the responsibilities of each post involved in the process should be clearly defined< Article 28 each unit shall formulate the management system of information network computer room, and the safety of computer room shall be in the charge of the operator on ty, and the person in charge of the operation management department shall be the first person responsible for the safety of computer room

Article 29 different security levels are set for different computer room areas, and corresponding access rights are given to staff in different posts

Article 30 except for the operators on ty and maintenance personnel, other personnel are not allowed to enter the computer room without permission. Visitors from outside need to obtain the approval of relevant departments before entering the computer room, and they are led to enter the computer room by designated personnel. The personnel entering and leaving the computer room shall be registered in detail, and the relevant registration records shall be kept for more than one year

Article 31 the equipment in the computer room can only be maintained and operated by the special engineer, and other personnel are not allowed to operate without approval

Article 32 the construction and maintenance of any lines and equipment in the machine room by external personnel must be approved by the operation management department in advance and carried out under the supervision of the operation management personnel

Article 33 the computer room shall be kept in a proper temperature and humidity, and the environment shall be kept clean and tidy

section 6 user services

Article 34 user services refer to the maintenance and application services of personal office terminal equipment for employees

Article 35 the network operation and management department shall set up a user service hotline, and can also use online repair, e-mail repair and other methods if conditions permit, and make statistics of the maintenance log

Article 36 a special person shall be assigned to be responsible for 5 working days × 8-hour on ty, responsible for answering the customer service hotline, viewing, registering, task distribution, user feedback, filing statistics, etc

Article 37 when answering the phone, the personnel on ty should use civilized language, understand the user's fault situation in detail, make records carefully and reply in time. Timely check and handle the online repair and e-mail repair

Article 38 the on-site service personnel should correct the service consciousness, improve the service quality and have good professional ethics. Any operation on the user's computer must be approved by the user in advance. Do a good job in keeping the internal information of the user's computer confidential, and do not do anything irrelevant to the work

Article 39 the inventory of spare parts and spare equipment shall be reasonably arranged to ensure that the faults can be eliminated in time and the normal work of users will not be affected

Article 40 fault handling methods include telephone support and on-site service. The fault handling process is shown in the figure below:

Article 41 generally, it is required to arrive at the site within 1 hour after receiving the fault report

Article 42 regular customer satisfaction surveys should be concted to promote the improvement of service quality. It is generally required to be concted once a year< Article 43 information network management departments at all levels shall strengthen equipment management, classify and code equipment, establish equipment account and equipment card, and track equipment according to equipment card
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750