Recently, the nation's leader in the PC industry - with the computer side, the joint Lenovo, Founder, 12 trillion and Japan, focusing on PC manufacturing, software development and chip production in the IT business, opened in Beijing of "China Information Security to build DNA - China's own joint conference of trusted computing products. " This means that by the pilot's own computer with the side trusted computing industry, will formally assume the responsibility to defend China's information security.
At the meeting, Vice President Li Jianhang Company, Limited on behalf of 12 companies attending the speech, and co-released with independent intellectual property rights of trusted computing products. He said: "China's independent release of trusted computing products, is the government and the Chinese national enterprises, the results of co-operation; the results to the development of trusted computing in China entered a new stage, and to promote the healthy development of national information security industry. "National 863 Plan Theme Group of Experts on Information Security Technology, the National Informatization Expert Advisory Committee FENG Deng also focus on introducing the computer with the side of trusted computing products, he said:" the same side in the business computer, home computers, laptops, full line of high-performance workstation and server products, are implanted into the autonomous trusted computing technology to create a systematic and large scale industrial system, and developed a high availability of the technology platform, great promotional value. "
Looking at the world, in the Internet age, the importance of information security has reached unprecedented levels, but also trusted computing industry into a high-speed development stage; from a national perspective, trusted computing industry must have the autonomy to really defend the motherland The IT territorial security. Today, with the computer with the side joint 12 IT companies released independently of trusted computing products, the dream has finally become a reality. Not long ago, by the host computer with the side, "Computer World" newspaper contracted "computer application based on the safety of TCM" seminar held in Beijing. Business secret from the State Office, General Staff confidential Bureau of Safety Standards Committee of the leadership of well-known information security experts and representatives of various industries all at the user's key, and praised the same side of computers in the field of exploration and Trusted Computing contribution, while the pilot with the Chinese side the computer industry more independent of trusted computing can be described as "ripe."
With a strong technical background and scientific and technological strength, leading a new era of computer security computer with the side, now standing industry high ground. Industry experts point out, with the party committed to innovation, breakthrough, not only will further enhance the competitiveness of the brand itself, but also will promote China's information security technology development process. As Li Jianhang said: "Information security is a fundamentally important issue concerns the country is the world's IT industry can not avoid a major challenge." Eradicate the problem of information security, is an arduous and vast engineering. Today, the computer sounded the same side of the "Chong Fenghao" sound of the Chinese nation and the technology industry's elite, the backbone of work published independent trusted computing products, has taken a key step toward victory; tomorrow, with the the independent development of trusted computing industry, health, national IT industry, will take off with the great rejuvenation of Chinese nation in the world of the Orient.
Recommended links:
Who Cuts Should Be Cut? Old Staff Or New Staff?
FrontPage easy to adjust inside the framework of the margins
ASF to MPG
Five Tips for promotion
Eclipse + JBoss + EJB3 Entity Bean's connection strategy
All roads lead to full High-definition video equipment HD Thunder
How To Speed Up Laptop Within Four Methods
You will enter the English phonetic IT?
Infomation Flash Tools
Internal Control: Harm Than Good, Or At Every Step
Motorola Recall: a beautiful mistake
OGM to AVI
DivX to iPod
Comparison Personal Finance
Cisco: IPTV Ice Soon