The National Security Act was officially promulgated in early July. The law creatively proposed many concepts, principles and mechanisms of network information security from the legal aspect. The law states that "the key technologies for network and information core technologies, information systems and data in key infrastructures and key areas are controllable and secure" highlight the core tasks of maintaining network and information security.
The core technologies of cyberspace, key infrastructures and key areas include large-scale servers, optical fiber cable systems and related hardware facilities and software systems as well as networks and information systems in key industries and sectors such as finance, telecommunications, energy and transportation Their security is undoubtedly the foundation and key of network and information security. This requirement of the National Security Law is closely related to the frequent cyber-information security incidents in the world.
In recent years, major cyber-security incidents such as the prism in the United States, WikiLeaks, and large-scale Internet users' information disclosure have been frequent, and the security situation in cyberspace has become more and more serious. In this case, most countries place specific networks under their own sovereignty and bind and regulate relevant network activities. Establishing the concept of cyberspace sovereignty in the national security law will help our country to strengthen cyberspace governance, establish a cybersecurity system, participate in the international governance and cooperation in cyberspace, and safeguard the sovereignty and security of cyberspace in China.
Prior to this, the Ministry of Public Security has decided to conduct a nationwide three-month inspection of key law enforcement and safety inspections of key national information systems and key websites, and the inspection will end in mid-August. The 500 state-level important information systems covered by this inspection mainly cover 47 industry authorities such as energy, finance, telecommunications, transportation, radio and television, customs, taxation, human resources and social security, education and health care. This unprecedented round of inspections is also carried out under the background of frequent major cyber-security incidents in the world in response to the increasingly serious cyberspace security situation.
Experts point out that the situation of information security in our country has been unsightly: key IT equipment uses foreign products and important systems are also purchased abroad, which is equal to placing their own secrets under others' eyes and posing great hidden dangers to our country's information security.
From the trend of technological development, in the ongoing tide of revolution in the digital age, new technologies such as mobile Internet, cloud computing and big data make the traditional software infrastructure and architecture unable to meet the needs of the new economy and the software infrastructure needs to be " Redefined. "
New technologies have changed the paradigm of information technology in the past, and they are redefining the "software infrastructure" of the digital economy, overlaying existing agricultural and industrial infrastructure and playing an increasingly important role in the "Internet +" wave .
This cross-border integration has put tremendous pressure on traditional users. Under the impact of the wave of new technologies, users from all walks of life are actively embracing the rapid adoption of new software infrastructures to support the rapid transformation of traditional business models and operational processes to embrace the Internet, which will surely become the IT-enabled accelerator. Dong Fang Tong is a rising star in the localization wave of domestic brands, the company is formed through the capital operation of middleware, enterprise-class server virtualization software, data exchange platforms and other high-quality products to help partners enhance competitiveness, to help traditional industries Embrace the Internet.
As the leader of domestic basic software, Dongfang Tong has formed a complete product system with brand influence and reputation. In particular, its middleware products have been comparable to foreign, banking, military and other strategic industries have clearly purchased domestic middleware into the core system, while in energy, telecommunications, finance and other industries, domestic middleware also has a broad application scenarios.
In addition, as the first truly enterprise-class server virtualization software in China, Dongfang Tong virtualization platform has completely independent intellectual property rights, and the products are safe and controllable. Wireless Middleware MKey is the third generation enterprise mobile platform product launched by Dongfang Tongzi Digital Paradise Co., Ltd. It has the characteristics of cross-platform development and deployment to help enterprises to quickly realize "Mobile Internet +"; Dongfang Tong Data Exchange Platform products are suitable for our government And enterprise information resources exchange and sharing needs of the development and research and development of data exchange support platform has been widely used in document exchange, electronic surveillance, parallel approval and many other application scenarios.
Experts point out that in the context of the promulgation of the "National Security Law," domestic industry users should make more use of domestically produced products in order to achieve self-controllable and reliable network information security and thus defend the national network information security. The good news is that many industries in China have raised awareness of information security, which provides the opportunity for Dongfang Tong this type of local software vendors to exert potential force. (Reporter Chen Dong-dong)

Heat Transfer Oil

Thermal Transfer Oil,Heat Conduction Oil,Boiler Open Heat Transfer Oil,Non-Boiler Heating Closed Heat Transfer Oil

AMER TECHNOLOGY CO.,LTD. , https://www.amerlube.com