Intranet computing power
1. In 2016, Laibin public security organ was deeply engaged in the main business of public security, and achieved good results through measures such as prevention and control<
a series of special operations such as "Shenjian No.1" and "Shenjian No.2" were organized to severely crack down on illegal and criminal activities in the fields of "theft, robbery and deception", "pornography, gambling and drugs", "dangerous guns and explosives" and food, medicine and environmental protection, and achieved "nine increases" and "four 100%" in the overall criminal case detection rate, robbery case detection rate and homicide case detection rate (i.e., 100% detection of 28 current homicide cases We have achieved good results in cracking criminal cases involving guns and explosives, investigating cases supervised by the public security department, and arresting people at large supervised by the public security department. We have successively cracked 9 cases of ministry supervision and 23 cases of department supervision, including the "1.01" pyramid selling project, "3.8" mega drug manufacturing case, "9.01" mega Internet gambling case, "3.28" tobacco related case. In the aspect of three-dimensional prevention and control, we have achieved the goal of "eight rections and one increase" in the number of criminal cases, eight categories of major criminal cases, robbery cases, fraud cases, theft cases, robbery cases, homicide cases and public security cases
"under the high pressure of the public security organs, the cases of" two robberies "have decreased significantly. Last year, there were 233 days of zero cases of "two robberies" in the urban area of Laibin City, an increase of 29 days over the previous year. " Li Shi, deputy secretary of the Party committee, deputy director and Secretary of the Discipline Inspection Commission of Laibin Public Security Bureau, said<
behind his outstanding achievements is a "great division in Central Guangxi". In 2016, a total of 1 collective and 1 indivial won provincial and ministerial level commendation, 12 collective and 17 indivial won department level commendation, 14 collective and 43 indivial won municipal level commendation, 1 collective won collective second class merit, 8 collective won collective third class merit, 39 collective awards, 6 police won indivial second class merit, 57 police won indivial third class merit, 195 policemen won indivial awards<
2 cultivate intelligent policing with the wings of science and technology
the lack of police force is a tough injury. In the reality of more cases and fewer people, Laibin public security innovates policing mechanism, demands police force from science and technology, demands police force from wisdom, compresses crime space, and creates a safe and harmonious environment
in 2016, Laibin Municipal Public Security Bureau, in order to play a good role in science and technology warfare, information warfare and synthetic warfare, on the basis of continuously improving the equipment, functions and systems of the Municipal Bureau's synthetic warfare command center, promoted the construction of county-level synthetic warfare system, and correspondingly set up a synthetic warfare room led by criminal investigation, making it a "one-stop" command platform for case detection
on April 18, 2016, a series of telephone fraud cases occurred in Laibin City on the ground of "tax refund for house purchase", resulting in the loss of more than 120000 yuan. In order to detect cases as soon as possible and rece the losses of the masses, the Laibin City Public Security Bureau gathered the series of cases into the synthetic operations command center, and combined with scientific means and traditional investigative techniques, quickly locked 3 suspect suspects and seized 3 suspects in Ruijin, Jiangxi Province in April 29th. Subsequently, the combined operations command center arrested 8 gang members suspected of fraud in Xiamen City, Fujian Province on June 8
according to statistics, in 2016, the Laibin City public security organs cracked 1673 criminal cases through the synthetic operation platform, accounting for 62.6% of the total number of cases, and arrested 1035 suspect persons, accounting for 54.15% of the total number of arresting cases. Assisting the police in other places to study and judge 143 cases, searching 316 cables, and arresting 87 suspects at large. More than 50 major cases such as "Chen's telecom network fraud", "Qin's highway robbery" have been detected
Laibin Municipal Public Security Bureau dares to taste the crabs, and strives to build the portrait recognition Laboratory of the Public Security Department of the autonomous region in Laibin, and build a platform and database for receiving cases, inputting information, examining and approving cases, video image management and other functions in the public security intranet
at present, Laibin Public Security Bureau has built a portrait database of 11.3 million permanent residents in Guangxi and 1 million key people in other provinces. It uses big data to quickly compare the portrait and determine the identity of personnel. It has achieved remarkable results in the investigation of new network (Communication) crime cases and multiple robbery and deception cases, and improved the efficiency of solving cases, It reces the cost of handling cases. Since its operation, the system has successfully used image comparison to determine the real identities of more than 100 suspects, and assisted in the investigation of more than 60 major cases inside and outside the District, involving more than 10 million yuan
technology is combat effectiveness. Laibin City Public Security Bureau "three in one" system based on the modern police command platform, police, alarm and other resources in the "one map" marked positioning, police command to achieve intelligent, flat, visual, truly "police follow the police situation", to achieve social security prevention and control precise deployment, accurate strike and dynamic adjustment. The "intelligent management and control system for electric vehicles" has been developed to effectively prevent and rece the occurrence of theft of electric vehicles, which has been praised by the masses
3 based on public security reform and innovation of police mechanism
since September 2016, Laibin citizens suddenly found that there were more policemen directing traffic on the street, and the traffic order was relatively orderly. This benefits from the deepening reform of police mechanism
the reform is a fine tradition of Laibin public security. Due to the shortage of police force and limited funds, Laibin public security is forced to innovate the police mechanism and give full play to the limited police force
in January 2011, Laibin Municipal Public Security Bureau integrated all kinds of police and set up an urban police detachment, which greatly promoted the maintenance of urban social order and street traffic, and became a "guest sample" of police mechanism reform
with the economic development of Laibin, the expansion of urban area and the substantial increase of car ownership, the original mechanism has been unable to meet the needs of society. In order to better play the role of the urban police detachment and create a better traffic environment for the public, Laibin Public Security Bureau assigned the first traffic police detachment in charge of urban traffic management to the urban police detachment in September 2016 to further improve the traffic management ability and level of the main urban area. After the reform, the detachment gave full play to its functions and investigated 2628 traffic violations, an increase of 54.86% year on year; The death toll in urban traffic accidents decreased by 75%. According to the survey, 85% of the public think that the rate of seeing the police and managing affairs has increased significantly, and 75% of the public think that the urban road traffic order has improved significantly
Network (Communication) fraud is emerging in endlessly, which brings unstable factors to the society, and the masses reflect strongly. On December 29, Laibin Public Security Bureau's anti false information fraud center was set up to declare war on false information fraud cases. By using big data platform and other intelligent police systems, it has achieved good results in blocking blocks, receiving and dealing with police quickly, striking fast, stopping payment fast and early warning fast, so as to effectively protect the property safety of the people
in addition, Laibin Municipal Public Security Bureau innovates the management of special personnel, and solves the problems of admission and treatment of special personnel such as drug-related persons with serious diseases, injured persons involved in cases, and mental patients causing trouble by establishing special medical districts. All kinds of cases in Xingbin District, where public security was once trapped, have decreased by a large margin, and robbery cases have decreased by 37.28%. We have innovated the prison work law, actively carried out the socialization of detention center management ecation, ecated and transformed a number of illegal personnel, effectively resolved a number of social contradictions, and achieved good legal and social effects. Last year, Laibin detention center successfully entered the detention center to resolve 30 social conflicts. The detention center of Xiangzhou County was rated as the "law enforcement demonstration unit of public security organs in the whole region"
source: Ping An guests
let's put it this way: the "dark blue" that won the chess champion Kasparov in 1997 is a supercomputer, while alphago, who is going to play go with Li Shishi, is an artificial intelligence program developed by deepmind, a Google company. Let's talk about world peace. But alphago, as a program, has to run on a computer to compete with human beings. So change the question to "how many times more powerful is the computer that will play go with human beings than dark blue?"
we are still able to give an approximate answer by simple calculation. After all, in terms of measuring computer performance, we already have a fairly unified standard: the number of floating-point operations per second. For convenience, we all call it "flops" below
don't be scared away by the computer term "floating-point operation". In other words, floating-point operation is actually four arithmetic operations with decimals. For example, 1.2 plus 2.1 is a typical floating-point operation. If your primary school math teacher is not an American, then we estimate that at this moment you have already calculated the result by heart to be 3.3. But it's not that easy for computers
we know that computers operate on binary numbers composed of 0 and 1. For example, in the basic binary system, 1 is 1, 2 becomes 10, 3 is 11, 4 is 100... This operation mode allows us to assemble stable and effective computing machines with the simplest circuit components, but it also brings a problem: the number that computers can handle is only integers. If you want to express a 0.1 with 0 and 1 without any other mathematical method... Let's really talk about world peace
the solution to this problem is very simple: 0.1 can be regarded as the result of 1 divided by 10. If we want the computer to calculate a number with a decimal point, we just need to tell the CPU how many zeros are added after 1. But in this way, the computer in dealing with the decimal point, there are several more steps. So the speed of floating-point operation has become the standard to measure the performance of computer
take dark blue, which beat human beings in chess, for example, its computing power is 11.38 gflops, which means that dark blue can calculate 11.38 billion times of addition, subtraction, multiplication and division with decimals per second. ENIAC, the first general-purpose computer that helped the United States design and manufacture atomic bombs ring World War II, had only 300 flops
How about the performance of dark blue today? Three words: weak explosion. As far as the CPU used in PC is concerned, as early as 2006, Intel's first generation core 2 has steadily surpassed dark blue. This does not include the effect bonus brought by GPU in the graphics card. The performance of the most common integrated graphics card today has exceeded 700 gflops. If you really want to compete in performance, dark blue, the supercomputer of the last century, even if you are in a group, you may not be able to choose the laptop in front of you alone
what kind of performance level has today's supercomputers reached? Tianhe-2 is the fastest supercomputer in the world. Its floating-point computing capacity has reached 33.86 PFlops. In other words, dark blue needs to grow to 300000 times its own performance to be comparable to tianhe-2
however, for dark blue, such comparison is too unfair. Because even in those days, dark blue was not the fastest supercomputer. In contrast, only through the computers used by Google alphago can we compare the amazing development of our computers in the past 20 years
according to a paper published by the Google team in nature, alphago initially "trained" Ai to play go on a Google computer. According to the description in the paper, Google uses this computer to make alphago's go level close to that of European champion fan Hui. However, in addition to mentioning that the computer is equipped with 48 CPUs and 8 GPUs, the paper does not even mention the performance of the computer. Fortunately, alphago runs on the cloud computing platform. We only need to compare the computer data of our competitors, and then we can get the general information
for example, in December last year, Alibaba cloud opened its high-performance computing services to the public. According to Alibaba cloud's description, the single floating-point computing capability of these computers is 11 tflops, and they can also be used to train AI to learn by themselves. If Google's computer performance is close to that of Alibaba cloud, then the hardware driven by alphago has a performance at least 1000 times that of dark blue
but the story is not over yet. Alphago is not only a "stand-alone" version. In order to achieve higher computing power, Google has also connected alphago to a network of 1202 CPUs. After networking, alphago's computing power has increased by 24 times, jumping from the "stand-alone version" not to the level of the second stage of the career to the level of the fifth stage of the career
so how many times more powerful is alphago than dark blue? It's estimated that you've got the answer: 25000 times. From this point of view, we can also see how complicated go is. It takes 20 years to improve the performance of the computer before it can defeat human beings in chess and then sit in front of the top human players on the go board. But in the final analysis, alphago's most important achievement is not to use computers with excellent performance, but to make programs think, learn and improve in a human way for the first time. So in the next few days, no matter who wins or loses, we are witnessing the beginning of a new era
of course, don't forget to pay attention to Sina Technology. We will be at the front to welcome you to the first dawn of this new era.
2
then open "programs and functions" in the control panel
3
then click "turn on or off windows functions" in the upper left corner
4
check "telnet client" in the "open or close windows functions" dialog box, and click OK to install it automatically. The work of this Windows terminal has been completed<
end
linux server starts telnet service
many linux systems do not install telnet service by default. If you need to use it, you must install this service. There are many ways to install telnet. Here we only introce how to install telnet using yum. Its advantage is that it can automatically check the dependent files of the installation package without human intervention. Of course, the premise is that the system must be connected to the Internet. Enter "Yum install - y telnet server" command at the prompt to install telnet service. Finally, complete appears, indicating that the installation is complete
use the command "VI / etc / xinetd. D / telnet" to edit the telnet configuration file and change the value of disable to No
Restart xinetd service to make telnet configuration effective
open port 23 of Telnet Protocol on Linux server. Use the command "VI / etc / sysconfig / iptables" to add the code in the red box and save it
Restart iptables to make the firewall policy take effect
on windows, with "telnet IP address" command, and then enter the user name and password, you can complete the remote login of Linux server.
in the public perception, the voice of the Internet of vehicles has been low, and the big wave of publicity launched in 2014 has long gone. But in the eyes of IT enterprises, the good play has just begun. Speculation concept is the appearance, seizing territory is the instinct, and going the right way is the key
it manufacturers and host companies have no time to ecate potential customers, so that most of the public are still unable to distinguish the Internet of vehicles from the Internet of vehicles. But it doesn't matter. What customers need is intelligent systems to do as much as possible, and they just need to enjoy life. The more troublesome the customer is, the less likely the proct is to succeed
in the Internet and mobile Internet stage, bat has occupied the largest niche. It is almost impossible for all other apps to start a new platform. Regardless of bat's own strong R & D strength, they only need to "buy" to deal with almost all start-ups. The latter will always face the dilemma of cash surrender and wrestling with bat
in the era of Internet of vehicles, the situation is a little different. Although giant bat is still keen to release "strategy" and "platform", the start-up companies see new opportunities and need not pay attention to the former
in the three-tier architecture of the Internet of vehicles instry chain, TSP (telematics service provider) occupies the core position of the instry chain. TSP is connected with automobile, on-board equipment manufacturers, network operators and content providers, so it has become the role that host companies, telecom operators and it manufacturers strive for. Apart from the platform, bat chooses to make procts in person, which is the reason
the Internet of vehicles is not perfect, which gives more opportunities to start-ups
Botai is an active start-up company. In the past two years, it has cooperated with half of the companies in the Internet of vehicles chain, such as network, United electronics, Huawei and NXP. It can be seen from this road that although Botai is most active in cross-border cooperation, its cooperation with auto companies is "point-to-point", so it is difficult to get strategic cooperation opportunities. Because pure software companies can not give consideration to the layout of the Internet of vehiclesthe battle of voice access
at the beginning, voice interaction was only done by search engines such as Google now, Microsoft and the Internet, aiming to break through the barriers of data in different languages, achieve full network and data coverage for global users, and seek greater advertising benefits. But soon, the whole chain of the Internet of vehicles realized the great application value of voice interaction in the vehicle
driving is not convenient for touch operation, so voice becomes the input control mode. However, voice interaction is considered to have the potential to become the common "entrance" of vehicle intranet, Internet and vehicle Internet. Since it is a must for military strategists, resources are rapidly gathered in the head companies
the competition for voice interaction platform in the automotive field has entered a white hot stage. The number of procts has reached double digits. They have all made mobile apps, hoping to affect users' habits. Moreover, our young users have mobile phones first and then car phones. Starting from the mobile phone to cultivate customers is an inevitable choice
a few years ago, the accuracy of speech recognition was not satisfactory. With the development of artificial intelligence technology, natural language processing (NLP) and natural language understanding (NLU) engines are becoming more and more mature, and the recognition rate claimed by various countries is higher than 95%. Even so, customers are always worried about the unreliable 5%. Language performance in different contexts is too complex, so we need to continuously "feed" the training system with data to enhance self-learning ability. The competition of speech recognition has transited to the competition of super computing and big data processing capabilities, and the first hand gesture of start-ups has been weakened
in 2014, Amazon launched echo, a smart speaker based on Alexa platform, and opened the third-party development interface, resulting in thousands of applications. As a smart home proct, it is easy to migrate to the vehicle environment. This is the first mature intelligent voice proct
Apple's homepod, however, came late and was not released until February this year, which was jokingly known as "the bottom of the box". Relying on the intelligent voice assistant represented by Siri, apple aims at the intelligent interactive port in the era of Internet of things (IOT), and the Internet of vehicles is just one of the application scenarios
During this period, nuance of the United States, iFLYTEK of the University of science and technology of China, Sogou voice, voice of the cloud, and Spitzer have successively deployed intelligent voice procts. Last year, nuance voice interaction system was adopted in the first Internet car of Alibaba and SAIC; IFLYTEK signed a contract with Qichen yesterday, and signed a series of cooperation agreements with Chery, Chang'an and BAIC earlier; When you go out to ask, you will set up a joint venture with Volkswagen Chinabat is no longer the only way for startups to launch their procts. Bat, which is everywhere on the Internet, no longer seems to dominate the entrance of TSP. However, bat still tries to circle its own territory through capital operation
voice is just a tool, what customers really need is an intelligent assistant. The assistant can't just search and push a bunch of messages, but make decisions for the customer, at least recing the options to a very small range. From this point of view, Siri is not a "competent assistant"
with the benefit of speech recognition, iFLYTEK released the "flying fish assistant" of smart car, claiming that it can support real-time demand change, midway interruption and sleep wake-up, which seems to be more intelligent, and can hold all daily urban life scenes
if the intelligent assistant is supported by the vehicle enterprise, it can control some non safety matters through voice: air conditioning, audio, telephone, window lifting, etc. Even if the opening of non critical control, car companies are hesitant, take a very small step. As a result, speech recognition companies have made few achievements in this area
Tencent, which started a little later, cooperates with its peers in the field of voice interaction, but the latter has not yet the strength to challenge iFLYTEK. Tencent's AI in car ecosystem was launched at the boyue press conference. However, Tencent declared that it would not be an operating system, but still sought to move Social Networking and become a super app
to get the car end data, bat should be
at this time, bat can stand up. The "small vehicle system" launched by the Internet World Congress last year is a typical AI interactive system“ "Xiao" has many built-in functions, such as intelligent voice assistant, face recognition, fatigue monitoring, AR navigation, HMI, car home Internet and intelligent security. Small degree is more like the common entrance of the network business group procts
and Ali sacrificed its zebra intelligent company and Alios system, emphasizing that the latter is a cloud system. OTA can be updated like mobile phone system, and long life cycle can be realized like car. The secret is that with the help of cloud computing and storage capacity, the pressure on the car end is greatly reced, and the life cycle of the car end hardware is extended
the problem is that it needs the assistance of vehicle enterprises to make decisions for users, control non safety equipment in vehicles and other intelligent scenarios. In this way, those who can obtain data from auto companies can smoothly access TSP. This curve occupies the TSP port
zebra and SAIC have reached an agreement, zebra does not seek to obtain the underlying data of the car, but the big data generated by users using Alios will be uploaded to the Alios server. The driving map source data is deployed at both ends of the car and cloud, and Gaode can obtain "interactive information" in the background
Ali has a stronger bargaining chip and has concluded a strategic agreement with SAIC, which is beyond the reach of start-ups. Moreover, it is necessary to tear a hole in the data package which is regarded as forbidden by the automobile enterprises. Tencent's strong social advantage to implement the "offset strategy."
it is worth mentioning that Ali intends to use this as a model to discuss data cooperation with car companies one by one. For new energy start-ups, bat intends to "ask a higher price" in order to obtain all the data. However, no vehicle start-ups have entered the market
the essence of the Internet of vehicles (IOT) is to abandon the way that mobile phones map to vehicles. The realization of intelligent scene must be sent directly from the Internet of vehicles, and the mobile phone is no longer used as the process node. This is not only more seamless, but also can cultivate users to the era of Internet of vehicles, and then to the era of Internet of things, when the mobile phone will come to an end
Tencent is the leading social service provider. It hopes that AI in car, a car proct, will bring Tencent's social network to the car, so as to highlight its own advantages. However, Tencent's AI in car should not only point to the content that it is good at, but also build a more pure TSP architecture and develop the decision-making assistant function that is more needed in the on-board environment, instead of simply moving wechat into the car. At the same time, it should reach closer cooperation with car companies and try to make the latter adopt Tencent's front-end platform in a series of procts
investing in AI means investing in the Internet of vehicles
how to kill mobile phones? Bat has come up with its own platform level procts. Carlife, a mobile phone interconnection scheme similar to Apple Carplay, is selected for the network; Alibaba chooses the route of native app based on Yun OS; With the help of a huge user base, Tencent hopes to divide the application into channels, control the user experience, and move towards the road of super app
the layout of the network is earlier and more comprehensive. It has invested heavily in AI, trying to support eros and Apollo, two open platforms, which cooperate with all automobile developers. Network claims to have more than 70 partners, but although most of the first-line car companies are on the list, they all avoid in-depth cooperation. Although the network is determined to be a general operating system + development platform for the Internet of vehicles and has invested a lot of publicity, so far, no breakthrough has been made. This is not directly related to the AI progress of the network, and the hesitation of auto enterprises is mainly e to the doubt of dominance
Alios, developed by Ali, has its own platform attributes, and cooperates with SAIC, Changan and DPCA in AI, application, social and information security
no matter the super entrance of speech recognition, or the platform, or the data exchange between cloud and vehicle, all depend on the development of AI technology. AI algorithm training provides path for intelligent and scene based recommendation service. The more you understand the Internet of vehicles, the more you will be favored and dependent by users
cloud computing is the foundation of AI computing power. Ali focuses on making car owners get more intelligent services, while network Apollo focuses on making cars more intelligent on the road in the field of automatic driving; Dueros makes voice interaction in the car more intelligent
in the field of AI, Ali and network will compete directly. If Google can return to China, it will also become an important competitor. For Tencent, content and TSP al drive, the proportion of content light platform way is more competitive
it is worth mentioning that in the "national new generation of artificial intelligence open innovation platform" announced by the Ministry of science and technology last year, the intelligent driving platform of the network, Alibaba cloud's smart city platform, and iFLYTEK's intelligent voice platform are all directly related to the Internet of vehicles, while Tencent is the only one to obtain the medical imaging AI platform, which is incompatible with the top three. It reveals that Tencent needs to adjust its AI strategy (light assets + heavy investment)
with the development of AI, human-computer interaction is bound to be simplified (rece the cost of learning). The connection between cars and people, cars and cars, cars and various services will be driven by AI. The super entrance position of intelligent voice will be consolidated to a greater extent
at present, the total amount of the global automobile instry is about 2 trillion US dollars per year, while in the future, the Internet of vehicles, autonomous driving and new technologies will be developed
Automobile network information security is becoming a hot topic
recently, 360 company officially released the annual report on information security of intelligent networked vehicles in 2019, which combs the development of information security of intelligent networked vehicles in 2019 from the aspects of development trend of network security of intelligent networked vehicles, new attack means, attack events of vehicle security, summary of vehicle security risks and suggestions on security construction
According to the introction, APN is a private network established by the operators for the manufacturers, because the private network APN is a private network with high security level. It is directly connected to the core switch of the car factory, bypassing the protection of the firewall and intrusion detection system on the network side. However, once hackers penetrate into the internal network of the car factory through the private APN network, they can implement further penetration attacks and realize remote batch control of carsin the previous speech, 360sky go's security researchers found that most of China's domestic independent brand cars use private APN to connect to TSP back-end servers related to vehicle control. ISP can protect the back-end server to a certain extent, but it also brings more security risks to the back-end server
the reason is that, e to the existence of private APN, TSP will not be exposed to the public network, but the security personnel of TSP ignore the security problems of private network and TSP itself. At the same time, there is no strict security access control in the private network, and T-box is over trusted, so that T-box can access the internal assets of private network at will
at the same time, many unnecessary infrastructure services are also exposed to APN private network, which will cause more security risks. Therefore, once the hacker obtains the T-box communication mole of the smart car, he can access the private network of the car factory through the communication mole, and then attack the intranet of the car factory, resulting in the fall of TSP
the attack of automatic driving algorithm based on GSN is e to the lack of special training data such as confrontation samples in the process of deep learning model training. In the current practical application of deep learning, it is proved by the experiments of researchers that the corresponding counter samples can be generated by a specific algorithm to directly attack the image recognition system. Therefore, the current neural network algorithm still has some security risks, which is worthy of our attention
in addition to these two new attack modes, there is another attack mode worthy of our attention, which is digital key
according to the introction, the digital car key can be used in remote call, automatic parking and other emerging application scenarios, and this diversified application scenario also makes the digital key vulnerable to attack. The reason is that the "short board effect" of digital car key is significant. If any link such as identity authentication, encryption algorithm, key storage, data packet transmission is invaded by hackers, the whole digital car key security system will collapse. At present, the common way of attack is to amplify the signal of digital car key through relay attack, so as to steal vehicles
security of smart cars in the future
in the mobile phone instry, from the upgrading of traditional function phones to smart phones, network information security has always been accompanied by the problem. Even in today's period when smart phones are so developed, network fraud is inevitable
similar to the mobile phone instry, the upgrading of traditional function vehicles to intelligent network connected vehicles will inevitably face network information security problems. However, cars are no better than mobile phones. When mobile phones are attacked by network hackers, the most common is property loss. But once the car is attacked or hijacked by hackers, serious traffic accidents are likely to occur
Based on this, 360 put forward five suggestions in the report:first, establish a safety responsibility system for key links of suppliers. It can be said that the golden section of automobile network security lies in the safety management of suppliers“ The "new four modernizations" will speed up the development of new procts by first-class suppliers. At that time, new first-class suppliers will join the procurement system of main engine plants, and the original supply chain pattern will be reshaped. Supply chain management will become a new pain point of automotive network security. The main engine factory should comprehensively evaluate the suppliers from the aspects of quality system, technical ability and management level
Second, implement safety standards and lay a solid foundation for safety. The year 2020 will be a year when the automotive network security standards will be fully implemented. According to iso21434 and other network security standards, the network security work is comprehensively arranged in the stages of concept, development, proction, operation, maintenance, destruction, etc., the risk assessment is integrated into the whole life cycle of automobile manufacturing, the perfect supply chain management mechanism is established, and the penetration test is carried out regularly according to the network security standards of electronic and electrical parts, In order to effectively manage security risks, we should continuously monitor network security data, conct security analysis combined with threat intelligence, and carry out situational awareness Thirdly, build a multi-dimensional security protection system and strengthen security monitoring measures. Passive defense scheme can not cope with the emerging network security attack means, so it is necessary to deploy new security protection procts such as security communication mole and security vehicle gateway at the vehicle end, actively discover the attack behavior, timely warn and block it, and build a hierarchical defense system in depth from point to area through multi node linkageFourth, the use of Threat Intelligence and security big data to enhance the ability of security operations. The network security environment is changing rapidly. High quality Threat Intelligence and continuously accumulated security big data can help automobile enterprises to improve their security operation ability to the greatest extent at a small cost, so as to cope with the changeable network security challenges
Fifthly, good automobile safety ecological construction depends on sincere cooperation. Internet companies and security companies rely on the technology precipitation and accumulation in the traditional IT field, keep up with the rapid development of automotive network security, and have unique research and insights on related automotive electronic and electrical procts and solutions. Only when the upstream and downstream enterprises of the instrial chain form a joint force, can they jointly promote the automotive network security to a new height of "active defense in depth" and escort the mature landing of "new four modernizations"in the future, automobile safety problems are bound to be various, which can only be prevented by the joint efforts of the upstream and downstream of the instrial chain
this article comes from the author of car home, which does not represent the standpoint of car home
generally, the level of a book's sub configuration is sorted by CPU, graphics card and memory
memory mole
memory mole is a computer component that can be addressed by CPU through bus and can be read and written
memory mole used to be an expansion of main memory in the history of personal computer
with the continuous updating of computer software and hardware technology, memory mole has become the whole of read-write memory
generally speaking, the size of computer memory (RAM) refers to the total capacity of memory moles
the data written into RAM (i.e. read-write memory, i.e. memory mole) will disappear completely after power failure. When the computer is turned on, the earliest program data read and executed by CPU comes from ROM (read-only memory)
memory is the basic component of a computer (including a single-chip microcomputer). It has been available since the day the computer was built
external memory belongs to computer peripheral equipment, and hard disk is external memory developed after tape and floppy disk
memory is an essential part of a computer, and CPU can address memory through data bus
historically, there was main memory on the computer motherboard, and the memory mole was an extension of the main memory
in the future, there is no main memory on the computer motherboard, and the CPU completely depends on the memory mole
all the contents in external memory can only work through memory.
In early March 2006, SASAC approved the company's share reform plan. On March 15, raw water held a shareholders' meeting related to the share reform, which deliberated and approved the reform plan of Shanghai raw water Co., Ltd. According to the reform plan of non tradable shares, Shanghai urban construction investment and Development Corporation (hereinafter referred to as "Shanghai Chengtou"), the non tradable shareholder of the company, implements the consideration arrangement to the A-share current shareholders in exchange for the circulation right of the non tradable shares held by them. At the same time, the company's corporate shareholders do not implement the consideration arrangement and do not get the consideration in the process of the reform
in order to obtain the right of circulation, Shanghai Urban Investment Corporation executed the consideration arrangement to the shareholders of A-share circulation shares. The shareholders of A-share circulation shares received 2.2 shares for every 10 A-shares they held, and the total number of consideration shares executed was 123387322. Shanghai Chengtou will distribute 5 European put warrants free of charge for every 10 shares to the shareholders of circulating shares registered in the registration and Clearing Company on the equity registration date of the implementation of the scheme. In addition, Shanghai urban investment has also made the corresponding legal commitments: (1) the non tradable shares it holds will not be listed or transferred within 12 months from the implementation of the reform plan 2) After the expiration of the above commitment period, the number of original non tradable shares to be sold through listing on the Shanghai Stock Exchange shall not exceed 5% of the total shares of the company within 12 months and 10% within 24 months 3) When the number of raw water shares sold through listing on the stock exchange reaches 1% of the total number of raw water shares, an announcement shall be made within two working days from the date of occurrence of the fact, but it is not necessary to stop selling shares ring the announcement period. In addition, the shareholders who raise corporate shares shall abide by the relevant statutory commitments, and the non tradable shares they hold shall not be listed or transferred within 12 months from the implementation of the reform plan
according to the non tradable share reform plan approved by the relevant shareholders' meeting of raw water shares, the company distributed 5 put warrants for every 10 shares to the shareholders of tradable shares registered in the registration and Clearing Company on the date of implementation of the non tradable share reform plan, totaling 280425731 put warrants, As an integral part of the consideration arrangement executed by the non tradable shareholders to the tradable shareholders. According to the Shanghai Stock Exchange (szqz [2006] No. 15), 280425731 put warrants paid by the company were listed and traded in Shanghai Stock Exchange from April 19, 2006. The put warrant transaction is referred to as "raw water ctp1". The warrant transaction code is "580994". The initial exercise price is 5.00 yuan, and the exercise ratio is 1:1. The ration of the warrant is from April 19, 2006 to February 12, 2007, totaling 300 days. February 5, 2007 is the last trading day of put warrants of the company. The stock price of raw water shares closed at 7.11 yuan / share, and the warrants closed at 0.041 yuan / share. February 6 to February 12 is the exercise date of warrants. On February 12, the Shanghai Branch of the securities registration and Clearing Company issued the confirmation letter of exercise results of warrants, informing that the registration and settlement of exercise of warrants had been completed, and the number of successful exercise warrants was 65328. All rights are exercised to the creator, but the warrants issued by Shanghai City Investment Co., Ltd. have no right to exercise

