Novel Translate

Rebirth of the Tech Madman - Chapter 969

Chapter 967 Sixty-four people flew into the home of

“We are mainly from two aspects.” Brad Svolberg talked freely: “Positive-polestar resolutely gives netscape_navigator a head-on blow.”

“Isn’t Netscape trying to put as many new features as possible into the product to attract users? The Philosopher software does not show its weakness. It has assembled a web browser, email client, news client, address book, and downloads. A complete set of software packages including the manager, html editor, irc-Internet relay chat client and other programs, raises the threshold of browser solutions from the breadth.”

“As for the vertical function of the browser itself, we are mainly playing the card of supporting the complete technical standards of the World Wide Web Consortium and the stability of the program during its operation.”

“After all, the status of Zheru software in the industry is not comparable to Netscape-they can ignore the reputation and treat program crashes as commonplace, while we have to treat poor code as a scourge to ensure excellent product quality.”

“At this stage, the development of browser technology is indeed dizzyingly fast.”

“Take Netscape as an example. Almost every six months, it adds 1 to the major version number of the product—this is less than two years, and the current version of netscape_navigator is about to reach 4.”

“In contrast, philosopher’s polestar is a bit conservative.”

“However, we are not really indifferent, but through the browser plug-in, this way everyone can participate in the production, let those endless new features, board the polestar platform.”

“In this way, we are tantamount to handing over the endless development of new features that are not critical to larger third-party software developers without having to pay any salary—this is also the case. A browser with a polestar core is the main technical motivation for such a dynamic.”

“I don’t believe it-Netscape’s development department, working overtime to introduce new features, can it match the workload of thousands of programmers?”

“Don’t talk about Netscape, even Zheru Software can’t stop such crowded tactics.” Tang Huan laughed immediately, “However, I think Netscape should be imitating the browser plug-in design. ”

“Even so, it will take a lot of time-after all, we have worked a lot to make polestar have the open feature of browser plug-ins.” Brad Svolberg said here, in his eyes There was a fierce force, “At present, polestar and netscape_navigator, as well as other browsers, are chaotically grouped together. It looks so lively, but this is just a frontal battlefield, and the side battlefield that is not much noticed by the public-the web server Software is the key to victory.”

“Especially for Netscape companies with a single product line, web server software is the most important source of income-as long as this path is cut off, the more joyful it jumps now, the more painful it will be when it will lose blood and die.”

“Specifically, my actions on the side battlefield have two key points-marketing, combining website server software and database ebase and other products as a complete set, attacking Netscape’s website server software at a preferential price, and logging in to Fangyuan. Computer platform; technically, browsers like netscape_navigator are far behind the technical standards of the World Wide Web Consortium, so web pages created by dreamweaver, fireworks, and the easy-to-learn and easy-to-use website development three swordsmen are not supported .”

“It’s really ruthless for you to draw salaries from the bottom of the tank.” Tang Huan shook his head and laughed, then turned the topic to other aspects.

With the size of the Zheru Software Company, no matter how important the browser is, it is only a link in the product line. Tang Huan began to ask about the security of the Zheru product ecosystem.

Nowadays, the personal computer in terms of hardware is equivalent to the Fangyuan personal computer. Similar to the original time and space, when the term personal computer is mentioned, people first think of ibm-pc compatible machines instead of Macs.

The difference is that, compared with the original time and space, Fangyuan personal computer is not kidnapped by the microprocessor, but instead controls the microprocessor—Intel’s x86 family microprocessor, which is still the same as it is, and meets the requirements of the general public; and Zheru’s risc microprocessor holder replaces the Motorola mc68000 series, which has been defeated without a fight, and provides a suitable “brain” for high-end personal computers and special fields such as educational computers that emphasize power consumption and cost-effectiveness.

On this basis, Zheru software logically dominates the Fangyuan computer platform-from operating systems, programming development tools, to office software, databases, and so on.

This unified pattern has brought philosophers a lot of money; it has brought users all kinds of convenience, including the use of a consistent interface; at the same time, it has also brought technology enthusiasts a thorough understanding of research.

Zheru Software’s products, such as the operating system, are definitely not a bit stronger than Microsoft’s windows, but they can’t stand to become a target for all hackers, and they are not being observed and studied with a magnifying glass all the time.

In particular, the rapid development of the Internet has brought great convenience to technical communication-for example, when a person discovers a bug, it may not be used for a day, and hacker circles around the world will know it.

Therefore, the software platform represented by Zheru’s personal computer operating system has encountered countless attacks every day, and has become the hardest hit area of ​​computer security problems-maybe one day, this volcano will erupt!

This situation cannot be completely counted on by computer security companies such as Symantec to solve problems. You still need to be hard-working, and you must be competitive, and Philosophy Software must pay more attention to it.

We must know that even now, the real buyers of operating systems are still in the corporate market, and the requirements for the security of computer systems are getting higher and higher.

Zheru Software Company only regards Netscape as one of the many competitors that only needs to be dealt with normally, that is, it pays considerable attention to strategy; however, Netscape regards Zheru Software as a matter of life and death. The enemy’s number one, go all out to find fighters.

Jim Barksdale, CEO of Netscape, was listening to the work report of the marketer at this time, his face was pale and his mood was extremely bad.

I saw the other party cry helplessly: “When we and Zheru Software Company encountered the same project, the other party often packaged with the database ebase, mail server zeroe_exchange and other enterprise products, and gave discounted prices. Ten-thousand-dollar zeroe_-Zheru Internet service is a free gift, and we simply can’t stand it.”

“Those small and medium-sized companies in need, when purchasing, the first consideration is the total cost of ownership. When they see something for free, they are seduced almost without even thinking about it. After all, Zheru’s brands are all It has been in business for more than ten years and has become very authoritative. A casual low profile creates a psychological hint to buyers that they have a rare opportunity.”

“Enough, I am calling you here, not to listen to these excuses to get rid of responsibility.” Jim Barksdale finally couldn’t help it, and started the runaway mode of spitting stars. “A bunch of idiots, work so hard, Is it necessary for the company to pay you a handsome salary? I don’t believe it anymore. When Zheru and ibm competed face-to-face, did they complain like that?”

Glancing at a dumb cadre, Jim Barksdale shouted sternly: “I will ask now, is our website server software a unique solution on the hardware platform of Sun Microsystems? Plan? Do we also have a package discount agreement with Sun Microsystems and Oracle?”

“After all, everyone has the same routine, but why has the product sales of the Sun Microsystems hardware platform declined recently?”

The sales director blushed and explained: “Although everyone has an agreement to cooperate, Sun Microsystems, Oracle and us will cooperate seamlessly, and they will only give a lower discount. How can it be compared with the tacit understanding of philosophers and Fangyuan. Extent? Sometimes, they can even quote the overall solution that includes hardware and software together when only one party is present, and quote a low price that we can’t afford! Customers are abducted on the spot.”

“I think it’s not just that our product sales are not going up, I’m afraid the performance of Sun Microsystems and Oracle is not good.”

“Do you think? What you want is to find a decent reason for your incompetence!” Jim Barksdale slapped the table heavily, not accepting the explanation given by his subordinates at all.

He bitterly reprimanded: “Now, every week in the United States there are at least hundreds of websites open-with such a large market space, you tell me that you can’t compete with your competitors.”

“Unless, our web server software, like a browser, takes the road of free-first increase the market share.” I don’t know who whispered, and it seemed particularly harsh in the huge conference room.

“Fart! Who do you think the enterprise software was given away for nothing? There is no sales income, where do you get your salary?” Jim Barksdale was so angry that he picked up the coffee cup in front of him, and wanted to throw it straight away, but He swept his eyes around, but didn’t find the nasty guy who uttered a lot of words.

“The meeting is over!” Jim Barksdale put the cup in his hand on the table again, “After I go back, everyone will write me a work report.”

When the subordinates left one after another, and only oneself was left, the CEO who sat in the middle position showed fatigue. He scolded “Damn Monopoly” in frustration, which was an excuse to talk and comfort him.

Compared with the complaints of Netscape, which only hangs on a tree, Microsoft, which has a rich product line, is still optimistic. Gates’ mood is also clearer. Gein’s own operating system has made a crucial breakthrough. .

Just this summer, windows_nt was finally rated as compliant with the trusted_computer_system_-trusted computer system evaluation standard, that is, tcsec’s c2 level requirements by the US National Security Agency.

Each field has its own standards. The United States, which has always regarded high technology as its lifeblood, has spared no effort in military security, and launched a complete set of “Rainbow Book” on various standards—the trusted computer system evaluation standard was in 1983. The “Orange Book” published.

The Trusted Computer System Evaluation Criteria divides the security of a computer system into four levels from low to high—d, c, b, a; below each, the corresponding numbers are defined according to numbers such as 1, 2 From low to high level-each high level includes all the safety requirements of the lower level.

Specifically, level d is the lowest level of security protection-a computer system belonging to this level is like a house with a wide open door. Anyone can enter and exit freely, which is completely untrustworthy.

To give a straightforward example, a personal computer with a DOS operating system is at a level D—anyone can do whatever they want after turning on the power and starting the computer normally.

Above the d level is the c level, UU reading www. uukanshu.com is divided into two security sub-levels from low to high-c1 and c2.

One of the easiest features of level c1 is that if a user wants to use a computer, he needs to enter a registered account number and password, and the system uses the account number and password to identify whether the user is legal and determine what kind of program and information the user has. Access rights.

In addition to the features of the c1 level, the c2 level also has an access control environment.

The difference between the two can be illustrated by an inaccurate but vivid example, that is, the Android smartphone that was originally owned by almost one person more than ten years later in time and space—ordinary people feel that they have all the operating permissions, but there is actually another one. “Root” level.

Zheru’s operating system has passed the c2 evaluation long ago, and now windows_nt has finally caught up. How can Gates be unhappy?

You know, from now on, windows_nt will be able to stand up in the corporate market, and even qualified to think about national defense projects.

However, Gates was not happy for long before he was frowned upon by the technological developments in another field.

More and more information has been disclosed for ea’s next-generation home TV game consoles, one of which can be certain is the 64-bit architecture.

Others may not know it, but Gates’s mirror in his heart is that ea’s software architecture is also in the same line as philosophers.

It can be said that Tang Huan has done it, making his software everywhere-and Gates is still working towards this goal.

The launch of the 64-bit architecture Xiaobawang game console naturally means that the originally superior 64-bit software system has begun to put down the shelf and enter the consumer field.

In this regard, Gates had to make associations-is this Tang Huan’s test of the gap in competition in the industry?

Exit mobile version