Chapter 31 Bee Software Enters a Stable Period
After nearly a month of development,The number of installed bee input methods has climbed to more than 500,000,More than 300,000 active users log in every week,It seems that the first high-speed development period of bee input method seems to be coming to an end,Enter a period of steady growth。
Hidden worries have slowly emerged, and although Atletico Madrid is depressed and worried, they can only be solved slowly.
As an individual developer, Atletico Madrid has done a very poor job of technical support and customer service for the bee input method.
Although the bee input method terminal supported by e7u is very strong, and there are few serious bug vulnerabilities, it can't stand the strange software and hardware configuration of domestic users. On some backward or niche hardware, it is easy to have all kinds of inexplicable and completely unpredictable problems, and because Atletico Madrid's contact with the outside world is only the gPRs on his computer, so a lot of feedback can not be processed in time, so many new users are lost.
At the same time, it has helped the bee input method to obtain a sharp tool for early users - the word relational database function, which is also suspected of stealing user information, and some companies have begun to ban the use of the bee input method.
After discovering this situation, in 1. In version 1, Atletico temporarily disabled the relational database function.
This function allows users to enter some words, and the input method will mark and order some words in the candidate words.
For example, when the user enters "anteater feeds on termites", when he selects "anteater", the first candidate corresponding to the pinyin of "baiyi" will be the "termite" highlighted in the background, not "white" or "10 billion".
This is because "anteaters" and "termites" have a "relationship", whether it is a food chain relationship or something else, it is right to have a relationship first.
For example, when a user enters the class list, after entering the name of classmate A, the names of other students will be highlighted and displayed first.
This is the bee input method that associates these names together in some way.
And these avenues are likely to be illegal.
Therefore, Atletico temporarily turned off the relationship thesaurus function, sorted out all the bees' thesaurus from scratch, rebuilt the relationship thesaurus, and ensured that the phrases in the official thesaurus provided by bees, as well as the relationship data between phrases, are similar to "open relationships like anteaters and termites", rather than "private secret relationships".
Because it was inconvenient to access the Internet at school at that time, he had to temporarily disable the relational database function.
Today Atletico released 1. 11. Upgrade the patch, reopen the potential function of relational databases, and open the import function of relational thesaurus to users.
At the same time, he uploaded several new versions of the thesaurus he had compiled a few days ago to the server. The new version of the bee input method only supports the relational thesaurus function in the new version of the integrated thesaurus. The old version of the input method can use the old version of the thesaurus normally, but the relational thesaurus function is disabled.
Fortunately, relational thesaurus are all online thesaurus, so it is very simple to disable relational thesaurus, and Atletico Madrid's so-called setting up on the server side is complete.
Atletico noticed this situation because of an enthusiastic user who sent him several emails some time ago to remind him.
When the enthusiastic user printed the company's customer list, he found that the company name and customer name of the client he had worked with would be specially marked, and he had not entered these words before. As a result, it turned out that another colleague had typed these words at the same time, and the bee input method seemed to record the two words and link them together.
So the enthusiastic user sent an email to mJ, strongly suggesting that the bee input method be turned off or adjusted for this function. Because it is a thief to take it without suing, the current practice of bees is to infringe on users** at a small level, and to steal trade secrets at a large level.
In fact, the Bee Input Method does not rely on keyloggers to establish contact with the customer's company name for enthusiastic users, but by the "thesaurus generator" (upgraded from the previous Bee publisher, which automatically collects text files to build a new thesaurus) by analyzing the public data on the company's website. Atletico Madrid also replied to him in the same way, and said that in order to avoid suspicion, they will still rectify the relevant functions.
The phrase "stealing trade secrets" startled high school student Atletico Madrid, and a search on the Internet found that his own behavior could indeed be counted as stealing.
After careful consideration, Atletico quickly made the choice to rectify the relational database.
In the past, he designed the bee input method in order to be able to find his enemy, and he did not pay enough attention to the image and development of the software itself, and was a little eager for quick success.
In the past, the relational database came from the results of the whole site download and text analysis of the bee publisher, and many of them were suspected of infringing. These flawed contents are now being gradually cleaned up by Atletico.
The new version of the thesaurus is all based on the relationship thesaurus generated by various public relationships between words, but users can import some private relationship data into the relationship database and set a series of relationship prompts.
At the same time, Atletico Madrid, in the name of Bee Studio mJ, promised that the relationship data created by the user's private account will only be used by his own account and will be strongly encrypted on the server. Bee Studio will not create a relational database from the user's input data, and the relational database provided by Bee will only contain all kinds of publicly disseminated relational data.
Although this will greatly reduce the input accuracy of the bee input method, it is a step that must be taken to normalize the software.
Downloading some thesaurus that has not yet been rectified to the brain, Atletico turned their attention to bee safety.
This four-dislike antivirus software has been promoted with the help of the bee input method in the past period of time (it will prompt when it detects that the user's computer is not installed with antivirus software), and the installed base has barely exceeded 100,000.
After connecting to Bee's secure P2P network, Atletico buzzed and buzzed as if it had really entered a honeycomb.
Of course, this is a metaphor for the image, in fact, the bee secure P2P network is full of text information, and there is no noise in the data stream of only the screen.
Seeing them, Atletico Madrid was full of smiles, and these data that kept swiping the screen were actually the core technology and core competitiveness of Bee Security.
Bee Security is essentially an anti-virus software rather than an anti-virus software, and the virus signature database when it used to be called Bee Antivirus was borrowed from other paid antivirus software, and after upgrading to Bee Security, the suspected pirated virus signature database was removed.
How can I kill viruses without a virus database?
Bee safely used the anti-thief artifact "Aunt of the Neighborhood Committee", uh no, it is a "risk notification and anti-virus system" similar to the "public security joint defense system", that is, these broadcast messages that swipe the screen.
Each online Bee security client will report their virus detection records to the P2P network, and they will be forwarded and spread within a certain IP range.
Under this system, every bee security client is a poison detection dog, and every bee security client is an early warning.
Bee Antivirus has a very powerful virtual machine, which can efficiently simulate the user's computer, the first time the new executable program is run in virtual machine mode, according to its behavior: what files to open and close, what URLs to visit, what programs to run and close, what system settings to modify, etc., Bee Security will record an "application history" for it, and report it to its neighbors (LAN and other Bee Security clients with nearby IPs).
Only applications with innocent sources and long-term innocent behaviors will be whitelisted, reducing the intensity of attention. Speaking of which, this concept is somewhat similar to the concept of the microdot anti-virus product that cannot be marketed by the "scandal" of "anti-virus software companies spreading viruses", and it is all based on behavioral judgment. For mobile phone users, please visit http://m.piaotian.net