The release of 15 leading scientific and technological achievements in the world Internet highlights the power of "science and technology for the good"

At the world internet conference Internet Development Forum in Wuzhen yesterday, the "World Internet Leading Scientific and Technological Achievements Release Event" was held in Wuzhen in 22, and * * * released 15 world Internet leading scientific and technological achievements, including 15 representative leading scientific and technological achievements at home and abroad such as Tencent, Ali, Baidu, Microsoft and Chianxin.

the endogenous security framework of chianxin: the guarantee in the digital age needs endogenous security

the new generation enterprise network security framework (endogenous security framework) launched by chianxin won the leading scientific and technological achievements of the world Internet in 22.

"The arrival of the digital age has completely broken the boundary between the network world and the physical world, and brought new security risks. The previous static border protection ideas no longer meet the needs of the new era, and the protection of the digital era requires endogenous security. " At the conference of leading scientific and technological achievements, Qi Xiangdong, chairman of Qi Anxin Group, introduced that endogenous security refers to the built-in and self-growing security capability in the information environment. Through "one center and five filters", the ubiquitous network security "immunity" is established from five levels of network, data, application, behavior and identity, thus greatly reducing the risk of network attacks and truly ensuring business security.

In the leading achievement release activity, Qi Xiangdong demonstrated the network security defense model: through the demonstration video, it can be clearly and vividly seen that in the face of network attacks, the new generation of enterprise network security framework (endogenous security framework) restricts the cross-regional network from moving the attack path horizontally through in-depth network access protection and other measures, and constantly eliminates external risks and asset exposure; In the same area, combining active protection and passive trapping technology, we can find and clear the internal strongholds of intruders, repair loopholes and defects, and ensure the security of internal networks. Finally, combined with external security information and big data analysis, rapid security response and disposal will be implemented to block threats from government and enterprises.

Qi Xiangdong said that the new generation of enterprise network security framework (endogenous security framework) not only establishes a security system of "prevention and control beforehand" for government and enterprise institutions, but also makes network security gradually move from periphery to core, from plug-in to endogenous, from "compliance" to "actual combat", and promotes the development of network security to infrastructure and service mode.

"The' Ten Major Projects and Five Major Tasks' for network security planning in the digital age are applicable to almost all application scenarios, and can guide different industries to export network security architectures that meet their characteristics, build a dynamic and comprehensive network security defense system, and fully meet the security requirements in the digital age." Qi Xiangdong said.

It is understood that related components of the new generation enterprise network security framework (endogenous security framework) of Chian Xin have obtained more than 1, invention patents and computer software copyrights in the field of network security, and another 85 invention patent applications are under examination.

In the previous main forum, Qi Xiangdong said that network security is the backplane of digital technology, and without network security, the role of digital technology will be greatly reduced. "A wooden barrel with a short board can't hold enough water, but a hole in the bottom board of a wooden barrel can't hold water. We should not only be good at filling short boards, but also pay attention to strengthening the bottom board". Qi Xiangdong believes that in the digital age, building a network security backplane depends on a data-driven endogenous security framework.

Tencent Conference Practice: Becoming the First Award-winning Video Conference Product

Since this year, the outbreak of epidemic has caught everyone off guard, and the suspension of business, schools and trade ... has had a great impact on all aspects of China's economic and social life. Tencent Conference has built a borderless communication bridge at home and abroad by creating multi-party audio and video collaboration capabilities, demonstrating the power of "science and technology for goodness".

It is reported that after the outbreak of the epidemic, Tencent Conference was urgently deployed, and the conference capacity of 3 parties was quickly opened, and it was rapidly expanded in the first time. In eight days, Tencent Conference expanded more than 1, cloud hosts, invested more than one million cores of computing resources, and completed the service coverage of more than 1 countries and regions around the world. This set an unprecedented record in the history of cloud computing in China, which reflected the China speed of scientific and technological products, and further ensured the interaction and economic development of all walks of life, including government, enterprises and schools, in terms of anti-epidemic experience and trade.

behind the speed, there is more technology. In order to support large-scale online collaboration, Tencent's conference solution includes a number of powerful basic technologies developed by Tencent, including TDSQL, a high-performance, financial-grade and highly available distributed database technology independently developed for more than ten years. Based on the support of TDSQL, Tencent Conference steadily supports the use needs of more than 1 million users, and is not afraid of sudden increase in traffic and failure disasters at any time, providing users with high-speed, smooth, stable and reliable services and experiences at all times.

According to the Report on Social Value and Future Development of Online Meetings published by Peking University Internet Development Research Center, during the period from January to May this year, Tencent directly saved 71.4 billion yuan in social costs, which brought great social value and contribution to many aspects including technology, culture and economy.

Alibaba Cloud Shenlong Architecture: the representative of the third generation virtualization technology in the cloud computing industry

Yesterday, the Shenlong cloud server architecture independently developed by Alibaba Cloud was selected as the leading scientific and technological achievement of the world Internet. Simply put, Shenlong has solved the problem of virtualization performance loss that has plagued the cloud computing industry for many years, making the server play a higher performance and be more stable.

according to the evaluation from the conference, Shenlong architecture is a typical representative of the third generation virtualization technology in the cloud computing industry. It was born for the cloud, which not only solved the pain point of virtualization performance loss on the cloud, but also made the performance of the cloud server surpass the physical machine. Today's Shenlong architecture carries more than 8% of China's high-tech enterprises to the cloud, which is widely used in many industries, such as medical care, new government affairs, intelligent manufacturing, Internet, education and so on.

Jiang Jiangwei, a partner of Alibaba and the head of Alibaba Cloud's basic products, said when receiving the award: "Shenlong is one of the key innovative technologies in Alibaba Cloud, which can accelerate the inclusiveness of cloud computing." It is reported that Alibaba Cloud's self-developed Shenlong architecture can integrate the high performance of physical machines with the flexibility of virtual machines by transferring virtualization to special hardware for acceleration, with almost zero virtualization loss, stronger performance than traditional physical machines, and capacity expansion at any time, which greatly reduces the cost of customers.

36 holographic star map network space mapping system: illuminating the "dark forest" in cyberspace

The 36 holographic star map network space mapping system, which was awarded as "the leading scientific and technological achievement of the world Internet" this time, is a cloud application of 36 security infrastructure, which can illuminate the "dark forest" in cyberspace by transforming data into real comprehensive perception.

Pan Jianfeng, chief scientist of 36, said that on the technical level, 36 holographic star map network space mapping system has raised the capabilities of network space detection, data analysis and map drawing to a new height, and combined with the self-developed Vscan detection engine and 36 security big data, it can transform local perspective into global perspective, which is helpful to transform passive response into active monitoring and active early warning.

At the application level, the 36 holographic star map mapping system has accumulated billions of data from the whole network. Relying on the overall capabilities of the knowledge base and the security expert team, it can help multi-end users of the party, government, military and enterprises to actively detect cyberspace risks, give early warning, support network security situational awareness, trace and trace advanced threats, and continuously update global security risks.

At the same time, under the empowerment and command of the 36-generation network security capability system, the 36 holographic star map network space mapping system can also establish a continuous operation and cooperative operation mechanism with other security infrastructures in the whole system, such as intelligence cloud, vulnerability cloud, killing cloud and analysis cloud, so as to create a systematic security protection force for joint prevention and control.