0968 Network Decentralization and P2P

The first half of the big chapter will be published first, and the full text will be published tomorrow. Pen, fun, pavilion www. biquge。 info has opened the starting point of this chapter or Q_Q mobile client, when the time comes, you can press and hold the name of this chapter on the directory interface, and download it again.

……

In terms of operating system, Tang Huan has indeed not stopped the pace of 64-bit technology research and development, and has carried out practical applications on high-end database servers, graphics workstations and other platforms.

However, compared to the current stage, most people only see the performance improvement brought by the 64-bit technology that can use more memory space, Tang Huan also cares about the enhancement of computer security by the 64-bit architecture.

Again, taking the evaluation criteria of trusted computer systems as an example, it is not that the higher the security level of the product, the better, because there is a dialectical constraint relationship in this.

First of all, it is not difficult to understand that the higher the security level, the more links, the stricter the audit, the more troublesome it is for users to use the system, and this is not necessary for most ordinary application scenarios, like you just buy a piece of meat dumplings, but the butcher says, you must go to the street office to open a certificate before I can sell it to you - this kind of experience, how irritating, you can imagine!

Second, the higher the level of security, the greater the system performance overhead.

For example, the C2 level requires that events such as when the computer was turned on, which user logged in from where and when, and written into a log, so that by looking at the logs, it is possible to identify intrusions represented by multiple login failures, as well as to record the activities performed by the system administrator, and so on.

Obviously, such audits consume additional processor time and disk resources.

Therefore, for a general-purpose operating system that targets the widest range of users, it is sufficient to achieve a C2 rating on the Trusted Computer System Evaluation Criteria;

Originally, in time and space, Microsoft's Windows_NT branch and Windows_9x branch merged into one Windows_2000 and Windows_XP belonged to the C2 level, and you can easily find system logs and computer security management functions in the interfaces such as "computer management" and "disk properties", and did not cause any discomfort to users in terms of ease of use.

It's a pity that C2 is just a standard, and it can't guarantee that Windows, the target of public criticism, will not be broken in terms of security.

Later versions of Windows, Windows_Vista, introduced a new infrastructure technology called User_Account_Control - User Account Control, or UAC, to help stop malware from damaging it.

This mode of throwing the responsibility of security to the user to decide and take responsibility has brought obvious discomfort to the user.

In fact, when the user is confused or not annoyed, the mechanism is useless - the user may not even be able to click the confirmation button, and the responsibility falls on their own heads.

Another obvious example is installing a program on Android - maybe a flashlight program is out of reach to ask for permission to get phone calls, communication books, text messages, etc., and users often don't bother to take the time to think about it carefully, and they all agree.

If there is a bad situation such as the leakage of private information, who is to blame?

Zheru's operating systems for the consumer market and the professional market, StudiOS and Artascope, are certainly much better than Windows and Android in terms of architecture and other aspects, but they also feel the security pressure of public criticism.

Rather than dumping the pot at the user, Tang Huan wants to take a more proactive solution - and the 64-bit environment can do some things that the 32-bit environment can't.

Of course, the richest man's enthusiasm also has his own selfish motives -- he is a user of his own high-tech products, and sometimes the information he handles is no less secret than that of any major national affairs, and of course he is particularly sensitive to computer security -- and he is becoming more and more sensitive.

It is undeniable that at this stage, the security enhancement of 64-bit is still mainly used in high-end fields such as workstations and servers.

As for EA's latest home TV game console, the fourth-generation Xiaobawang game console, 64-bit technology has been introduced, which is in pursuit of performance.

Tang Huan was asking about IT security, and Tripp Hawkins happily brought a good news - the global sales of the third generation of Xiaobawang game consoles are not far from the unprecedented benchmark of 100 million units.

……

The following is the anti-D part.,Update it tomorrow.,Just ignore it.。

……

Tang Huan, who personally participates in angel investment activities at least once a quarter, has long been familiar with the website information retrieval service "Jerry's_Guide_to_the_World_Wide_Web", that is, "Jerry's Internet Guide", which runs on a computer in a student apartment at Stanford University.

Its founders, David Ferro and Yang Zhiyuan, who are still graduate students, belong to private work behind the back of their bosses.

As Tang Huan predicted at last year's COMDEX Las Vegas Fall Show, the number of World Wide Web websites this year has increased by more than 10 times to more than 10,000 -- and if this trend continues, it will exceed 100,000 next year.

The World Wide Web, which has no licensing fees, has proliferated the number of websites, but it has also brought confusion to Internet users.

It is estimated that the bosses of David Ferro and Yang Zhiyuan were so generous that they had the leisure to compile an index of these sites for other Internet users to use, and then stepped on the drumbeat of the times by chance, and the number of hits was about to exceed 1 million due to their popularity.

As a result, "Jerry's Web Guide" was changed to the catchy "Yahoo", and in order to distinguish it from the registered trademark "Yahoo" of existing products such as barbecue sauce and knives, it was added with an exclamation point and changed to "Yahoo!", but I forgot to pay $100 to register "yahoo.com".

I have to say that smart people often have a hundred secrets, or when people are poor and short-sighted.

It's not hard to imagine that Yahoo now, in terms of technology, doesn't have much gold content, and is a software "database" that can be customized and can update the website's index information at any time.

It is no exaggeration to say that for Yahoo, who has only shown sharp corners of Xiaohe, the richest man with too much capital, whether he looks down on it or replaces it, there is nothing to say.

However, he still quietly watched this little seedling, growing up according to his instinct with natural ecology. Guy, Yahoo's great thing is that it inherently contains a new and viable mode of operation.

Of course, the richest man owns AOL, but the AOL's model does not represent the entire Internet and the World Wide Web.

Although AOL is not as qualified as its competitors in the online services field, it certainly has no problem being older than Yahoo. It came to the fore in 1983 when the ARPA network was divided into military and civilian parts, and TCP/IP began to become a universal protocol.

Due to the lack of resources in the era of Internet pioneering, the operation mode of such online services has been to try to provide all the Internet access content by themselves from the beginning, and to lease network lines on a large scale, or even build their own network lines, to become Internet_Service_Provider Internet service providers, that is, ISPs.

In contrast to AOL's "hard" model, which keeps users in circles, Yahoo represents a "soft" path to provide navigation capabilities for the portal because the Internet resources have begun to explode so much that users are at a loss for what to do.

Yahoo's main job is to set up servers, maintain its own "website database", and provide an attractive navigation page that takes up the entry point to the Internet with countless websites, without having to rent lines and control users to its own website.

To put it more lofty, or even politically ~ more correct, Yahoo represents freedom~ freedom and openness, and truly explains the spiritual essence of the Internet.

Of course, this does not mean that AOL is on the wrong path, but Yahoo is on the right path -- the different stages of the development of the Internet have contributed to different road trade-offs and operational characteristics.

Moreover, AOL still represents the mainstream at this stage - Yahoo's website navigation directory is in the front row, and it must have its place.

Under Tang Huan's guidance, AOL has embraced the World Wide Web many times faster than its competitors in online services, and it can be said that its path has always been "right".

But it is impossible to make AOL one step more "correct" and switch to the model of a portal. Not to mention that the portal model has just emerged, it is impossible to part with AOL's existing content resources alone. The online service model has been "correct" into its genes, and it can only fine-tune its own direction with the development of the Internet.

In this case, the value of the incomparably new Yahoo to the richest man is reflected - it can not only meet the layout of not putting eggs in one basket, but also greatly reduce the cost of mastering the portal model.

As for the value of David Ferro and Yang Zhiyuan, the two graduate students, they are similar to James Cameron, who is dedicated to filming "Titanic", and the persistence in his bones is not easy to find.

You must know that with the strength of only two people, it is a manual work to organize the information of thousands of websites into an indexing service, but it is definitely not possible without enthusiasm.

Tang Huan casually opened the Yahoo page on his computer, and couldn't help but smile to himself—the server in David Ferro and Yang Zhiyuan's apartment was probably overwhelmed and about to strike.

Meng Jing, the little cousin who was sorting out the information on the side, couldn't help but roll her eyes after seeing Tang Huan's scheming and complacent expression, "Brother, you have preemptively registered so many .com domain names, aren't you afraid that others will say that you will bully the small?"

"Silly girl, with these domain names, we can virtually try not to miss any fish in the layout. Tang Huan laughed, "When someone comes over to inquire about the transfer of a domain name, it is equivalent to an event trigger in the program, and I don't know how much effort is saved." ”

Meng Jing nodded suddenly, "Then you have chanted Yahoo's name several times, are you planning to catch this fish that slipped through the net?"

"Yahoo isn't a fish that slipped through the net, it's a fish in my pool. Tang Huan replied playfully: "By the way, Yahoo has almost more than 1 million hits, it is estimated that David Ferro and Yang Zhiyuan, two poor graduate students, should also have an idea of the commercial value of the work they are interested in. ”

"Got it. Meng Jing agreed, and then handed over a document, "This year's COMDEX Las Vegas Autumn Show is really a rare competition, not to mention that there are more Sony Playstations in the field of home TV game consoles, and just Polestar, a browser software from Zheru Software Company, Polaris, has new competitors." ”

Tang Huan looked at the document and said calmly: "This Netscape - Netscape I know that Jim Clark, who ran away from Silicon Valley Graphics, invested $4 million to establish a small start-up company - the browser market, there are not many of them, and there are not many of them. ”

"You've repeatedly stressed to us that the competition on the Internet platform is free of charge. Meng Jing reminded: "Compared to Polestar, which is a commercial software and temporarily implements it for free in the name of promotion, now Netscape_Navigator Netscape Navigator has no hesitation in positioning itself as a shareware as soon as the official version of 1.0 is launched, which is really free, which is not comparable to other competitors." ”

"Polestar is technologically ahead and has a first-mover advantage in market share, so it's not afraid of Netscape_Navigator disruptions. Tang Huan waved his hand relaxedly, "Netscape_Navigator want to grab market share by relying on clean and free means, then I can also spend money to buy others to use Polestar in the form of package promotions and secret subsidies for multiple software products." ”

Meng Jingwan said: "Brother, you have to pay attention, although Zheru Software has been spun off and has reached an anti-monopoly settlement with the Federal Ministry of Justice, there are still people staring at it - it is too domineering and easy to fall into the handle." ”

?