Crazy Entertainment System
Chapter 348 Threat
Aside from the United States, other countries in the Americas have welcomed CloudSearch because CloudSearch is very friendly, helps local businesses develop, and provides technical support to local search engines.
As for how much support to give, that's a battle of interests.
Yunsou also deeply understands the essence of Chen Yu's business strategy: the companies it supports will be quietly acquired by it, using a strategy of encircling the cities from the countryside and making decentralized acquisitions.
Each acquisition by each party is small, but when these are combined, they result in a controlling stake, and an absolute controlling stake of 70%.
As for Zhanlong Technology, the United States would naturally provide an address, but Chen Yu directly sent an email to the private messages of the US President and the US Department of Defense and the CIA.
The email contained very little, just one sentence: "Do not interfere with the development of WarDragon Technology, otherwise Prism will be exposed to the world."
When the email came into view, the three of them were stunned.
The three of them knew better than anyone else what Prism was.
The PRISM program is a top-secret electronic surveillance program implemented by the U.S. National Security Agency (NSA) since 2005 [changed to 2005 for plot purposes] during the George W. Bush administration. Its official name is "US-984XN".
In 2005, the U.S. National Security Agency (NSA) and the Federal Bureau of Investigation (FBI) launched a secret surveillance program codenamed "PRISM," which directly accessed the central servers of U.S. internet companies to mine data and collect intelligence. Nine international internet giants, including Microsoft, Yahoo, Google, and Apple, participated in the program.
These nine companies control more than 70 percent of the global internet market.
If this plan is exposed, it will be an unprecedented blow to the United States and companies like Microsoft.
Just think about how big the losses will be; more importantly, their reputation will be completely ruined.
Although Crazy stores its data within the United States, and the US has tried to access the data, Crazy's justification is that the data is encrypted and no one can know its contents without the user's password.
They also gave some of the data to the relevant departments and told them the encryption method. However, even if they knew the encryption method, it was difficult for them to crack the 1024-bit encryption. Even if they managed to crack the information with great difficulty, it was of no use.
On the contrary, it wasted a lot of human and material resources.
When Chen Yu first designed the system, he made the data encrypted. However, the company's internal staff could access this data, but only two people had the right to do so: Chen Yu and Gao Feiyan.
Gao Feiyan's access was limited to vague big data; only Chen Yu had access to detailed personal data.
This is to prevent data leaks that could bring catastrophic consequences to the company.
Chen Yu values data very highly, and his response to any company is always the same: we can give you the data, but it's all encrypted, and you can even extract the data directly from the database.
The U.S. National Security Agency, however, refused to believe it and launched a surprise attack to extract information from the database. They discovered that it was completely inaccessible, and that the data would be automatically destroyed after being cracked more than 1024 times.
According to FBI intelligence, Crazy officials were also unable to obtain the data. Even the headquarters, which had the highest authority, could only compile a general data table, and detailed data was simply unavailable.
This is the same outcome for any country, but still without any selfish motives, they organized official hackers to crack Crazy's encryption system, only to find that the encryption system was an insurmountable obstacle.
Data must be encrypted to be stored and transmitted. This encryption is like blood in the human body; any flaws will be detected.
More importantly, the encryption system is constantly being upgraded.
Crazy Technology has developed a unique protection method using matrix calculations provided by Chen Yu. The protection method is ever-changing, and the matrix is infinitely variable. No one dares to say that they can fully understand the matrix. Matrix calculation is an extremely difficult technology to learn. Even top experts struggle with it and need the assistance of mathematicians to make progress slowly. However, despite this, the results are still remarkable.
Crazy has also developed many cutting-edge technologies based on this technique, and has attracted countless geniuses to join the company.
Crazy's generous R&D funding further tempted these geniuses.
You can research whatever you want, but only on the basis of fulfilling the tasks I give you.
Once it's finished, the rest of the time is yours. You can ask for any amount of research funding you need, as long as your application is reasonable.
However, the results of the research must belong to Crazy.
Of course, you won't be hired for nothing; a generous monthly salary awaits you.
House! Money! Girls! I'll give you anything you want, as long as you can produce it.
This was what Chen Yu had told Gao Feiyan about Google's actions in later generations, and Gao Feiyan remembered it and did the same.
Although Crazy is an internet company, it is definitely not lagging behind in technological research and development.
They've even started developing their own operating systems.
Naturally, they were developed based on the Unix kernel, and their systems were more focused on networking.
This operating system will be targeted at netbooks, compact computers, and low-cost PCs. This open-source software will be named CrazyOS!
A lightweight open-source operating system!
The vast majority of applications will be completed on the web. Speed, simplicity, and security are the key features of CrazyOS. CrazyOS users do not need to worry about annoying things such as viruses, malware, Trojans, and security updates.
It provides support for Intel x86 and Loongson architectures as well as ARM processors. The software structure is extremely simple, which can be understood as running a browser using a new windowing system on a Unix kernel.
For developers, the web is the platform. All existing web applications can run perfectly on CrazyOS, and developers can also create new web applications for it using different programming languages. Of course, programs developed for CrazyOS can also run in various traditional browsers on Windows/MacOSX/Linux/iOS platforms, which provides developers with a sufficiently large user base.
Because the traditional operating system market is almost entirely dominated by Linux, Windows, macOS, and iOS (developed by Zhanlong Technology). (To be continued.) mz
You'll Also Like
-
Fear of food
Chapter 31 6 hours ago -
Wan Jian returns to his clan!
Chapter 125 6 hours ago -
Those who face the wall, but are in the Nascent Soul stage.
Chapter 155 6 hours ago -
This villain is too popular.
Chapter 42 6 hours ago -
I manifested the Shushan game
Chapter 54 6 hours ago -
The most melodramatic rebirth in history
Chapter 507 6 hours ago -
Simultaneous travel: Not eating beef
Chapter 241 6 hours ago -
The beautiful woman in the quick transmigration novel has been targeted by the male lead again.
Chapter 178 6 hours ago -
The Eldest Daughter Reborn: She Provoked the Obsessive Crown Prince and Couldn't Escape
Chapter 190 6 hours ago -
I tricked you into thinking you had the makings of an emperor, but you actually did it?
Chapter 745 6 hours ago