Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in oicq.net -> Romance -> dream era

Text Chapter 288 The operating system is made!

Previous page        Return to Catalog        Next page

    Yu Shanshan still needs a few days to settle her thoughts.

    Xiao Qi is not too anxious. Anyway, with his relationship with Yu Shanshan, unless the beauty really wants to return to her hometown in Northeast China, she will definitely join the Fairy Company.

    Just as Yu Shanshan was optimistic about Xiao Qi, the boy also felt that Yu Shanshan was a rare talent.

    ???????????????????????????????????????????????????????????????????Out out of the public relations manager, she is the perfect person to be a public relations manager.

    Although Xiao Qi never intends to use a honey trap, beautiful women will always get a lot of advantages when handling things.

    Ą°Coupled with the fact that Beauty has such a powerful background as the Fairy Company, Yu Shanshan will only be able to do things more easily.

    After settling this matter, Xiao Qi originally planned to go home to accompany his classmate Fairy. Even though he was suspected of harassing the little beauty to prepare for the college entrance examination, the boy still ignored it shamelessly.

    But at this time, Linus finally called and sent an operating system similar to LINUX via encrypted email. Along with it came the application development that Xiao Qi had also longed for.  Bag.

    According to Linus, one month was originally enough, but after the four hackers took such a large sum of money, they felt that it would be a shame for Xiao Qi if they did not strive for excellence, so they continued to test and improve it.  It took ten days until they thought they had reached two standards: the first was the performance and software compatibility of the current version of LINUX 80, and the second was that the closed system reached the CIA's anti-theft and anti-decryption intrusion level before they sent it to Xiao Qi.  Come over.

    Being able to really reach the LINUX system 80 standard that has been supplemented and improved by thousands of engineers, Xiao Qi simply admired the four hackers he had never met before.

    On the one hand, there are thousands of engineers from all over the world, and on the other hand, there are only four of them, so even if there is a performance difference of 20%, it is definitely an amazing achievement.

    But think about it, the number of hackers in the United States is far less than that of China, but they rely on their quality to trick the Chinese hackers time and time again, and they often counterattack, making the Chinese hackers  Extremely embarrassed.

    Having entered the electronic age, it is no longer an era where human sea tactics can be successful!

    As for the anti-theft and anti-decryption performance of the closed system, Xiao Qi doesn't pay much attention to it, because once the tablet operating system is released, it will be exposed to hackers all over the world. In this world, there are many anonymous or low-key hackers.  Masters, no matter how good the fortress is, they will fall to them one day.

    At this time, what is needed is to cultivate usersĄŻ genuine use as much as possible.

    And Xiao QiĄŻs online software store is precisely prepared for this.

    It may only be a matter of time to crack a closed system, but there are countless fun and interesting programs in online software stores. It is too troublesome to crack and install them. It is far better to just spend some money to buy them, have fun and enjoy them, and still have a lot of fun.  You can upgrade for free at any time.

    No doubt, this happened to be an important reason for the success of Qiao GangzhuĄŻs later Apple online software store!

    Not only customers in Europe and the United States are accustomed to purchasing software from online software stores, but even customers in developing countries such as China and India who like to use pirated software are also more or less accustomed to purchasing genuine software.

    First of all, because everyone now has more money than before, it is reasonable to appropriately support their favorite games or software; secondly, genuine software is definitely more convenient than pirated ones, and it is definitely better than those on Android systems.  The game should be fun and sophisticated. These advantages will make users not be stingy with this small amount of money.

    It is worth noting that although the copyright of the Fairy System belongs to Xiao Qi, Xiao Qi still has to pay the patent fees honestly for many patents involved: picture browsing, windows, text, video playback, etc. These patents that are widely used are not  There is no way around it, but it is impossible to get around it.

    "But Gang Leader Qiao can afford these patent fees, and IPHONE and iPad can still make a lot of money, so naturally Xiao Qi can do the same.

    As for negotiating with those companies to obtain patents, it is natural for Mario Law Firm to negotiate, with Citibank's face mixed in. I believe Microsoft and other companies will also sell face - these patents are widely used and do not belong to  High-end patents are not subject to national restrictions, so the most you can do is spend a little more money.

    After buying the usage patent, Xiao QiĄŻs mobile operating system will also benefit from this, which saves a lot of trouble.

    Xiao Qi himself didnĄŻt understand technology, so after he got the operating system he named Ą°FairyĄ±, he went to his own laboratory at the University of Electronic Science and Technology of China.

    The person responsible for the second level of encryption and functional perfection of the Fairy System is the integratedA group of teachers and staff from the Road and Systems Laboratory.

    They have all signed a mandatory confidentiality agreement, and all the contents of the laboratory must not be leaked, otherwise they will face severe penalties of sky-high compensation and life imprisonment.

    This confidentiality agreement was drawn up by the lawyers of Mario Law Firm using the American confidentiality agreement. It can be said to be the most stringent. Compared with the simple confidentiality clauses in China, it is simply not on the same level.

    With the long-awaited Fairy System in hand, the researchers immediately began research and development.

    ????????????????????????????????????????????????????????????????????????????????????????????????????????????????? It is in fact a pain to a researcher to have ašOšOšOšOšOšOšOpašOšOšOšOšOšOšOšOšOšOšOšOšOšOšOšOšO asšOšOšOšOšOšOšOšOšOšO asšOšOšOšOšO\_šO__ as to a researcher, it will be a_šO_energized, now that they have something busy to do.

    They have been studying Apple's closed systems, LINUX systems, etc. during this time, so they were fully prepared. They were no strangers to holding the Fairy System. They stayed up late to fight, and in a day and a half, they completed all the things they had studied some time ago.  After adding it to the fairy system, he happily gave it to Xiao Qi.

    While the young man was surprised at their speed, he emailed the Fairy System to Linus again, asking him to forward it to four hackers so that they could evaluate the achievements of his laboratory personnel.

    The four hackers didnĄŻt care that Xiao Qi wanted to improve it on his own. The property rights of the Fairy System belonged to Xiao Qi. They only cared about the work they had to do. Everything else had nothing to do with them.

    Therefore, they gave the evaluation results readily.

    In the afternoon of that day, Xiao Qi walked into the laboratory building and brought together 85 of the 360 ??researchers responsible for the improvement of the fairy system, plus Ou Chuyun and a few people who were guiding here.  All the teachers were called into the conference room, and then they started writing on the blackboard.

    First, system-irrelevant programs occupy too many cores, causing a reduction in operating power.

    Second, there is no improvement in functional efficiency.

    Third, confidentiality is only at the most basic level. On the original basis, it can be cracked in ten minutes.

    Comprehensive evaluation score: 0.

    Looking at what was written on the blackboard, especially the eye-catching "0" score, a group of researchers, including teachers, blushed.

    Although they handed in their grades in a hurry, they definitely studied hard during this period. How could they get a zero score?

    Before they could hold back their anger and ask questions, Xiao Qi turned on the projection equipment and played the specific operation and inspection process of the hackers.

    Hackers write in very professional English. Fortunately, Xiao QiĄŻs English level has reached a super first-class level, and because he has been studying related knowledge of electronic products all year round, his explanations are effortless.

    As Xiao Qi explained in detail, the anger on the faces of the teachers and researchers gradually dissipated, replaced by growing embarrassment and uncontrollable admiration.  (To be continued. Please search Piaotian Literature, the novels will be better and updated faster!)
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report