为广大币圈朋友提供币圈基础入门专业知识!
当前位置首页 > 区块链知识> 正文

10.24区块链,10月24日区块链节日

发布时间:2023-12-06-09:36:00 来源:网络 区块链知识 区块

10.24区块链,10月24日区块链节日


请查看相关英文文档

① Will electronic contracts be the trend of future contract development?

Let me first show you a set of data: As of June 2017, the total number of electronic contracts signed by "Fada" exceeded 100 million copies. Based on an average of 5 pieces of paper per contract, we calculated that 100 million electronic contracts would consume about 17,000 papers produced by 20-year-old trees, while saving nearly 2 billion yuan in express delivery costs and 140 million yuan in labor costs. Of course, this is just an economic cost. Let us take a look at the current situation:

(1) The development and increasing popularity of cloud computing, Internet, mobile Internet and other technologies have provided opportunities for the use of electronic contracts. Provides convenient information dissemination and sales channels.

(2) The increasing perfection and maturity of national laws and policies have provided a certain basis for the spread and use of electronic contracts in the mutual finance field, business travel platforms and other industries.

(3) The market voice is expanding, and the awareness and acceptance of electronic contracts by enterprises and individual users are gradually increasing.

(4) The financing environment is becoming increasingly superior and strong financial support To "protect" the development of manufacturers, the number of electronic contract companies has doubled in the past three years.

It can be seen that the trend of electronic contracts replacing paper contracts is difficult to avoid. Of course, this is a good thing for both public and private parties.

② What is the node transmission of the China National Finance Public Chain

The China Finance Public Chain is an ecological-level blockchain public chain system focused on serving Chinese industries, with a 100% state-owned background. It is a set of underlying blockchain operating systems used for the development of blockchain distributed applications. It adopts a brand-new blockchain architecture and is positioned as an easy-to-use, high-performance blockchain platform, aiming to realize the development of distributed applications. Performance scales to meet real-world business needs.

Node transfer is an ecological-level blockchain social platform based on national data value authorization. It is a social-specific side chain of the Guojin Public Chain, involving the private data of hundreds of millions of users. It is 100% state-owned assets background.

Node transfer realizes that the platform is owned by users and user information belongs to users, so as to encourage and guide people's direct actions, gather people's multi-dimensional information with respect, reduce people's communication costs with sharing, and create people with trust. The greatest value, fair sharing of people’s value-added benefits, leading a new social concept in the blockchain era.

③ Is it true that the main developer of Bitcoin created a new virtual currency?

According to a report on October 24, Beijing time, Jeff Garzik is the bottom layer of Bitcoin. One of the few key developers of the software, he is well aware of the shortcomings of the Bitcoin blockchain. Therefore, he decided to create a better digital currency.

He named the currency Metronome and said it would be the first virtual currency that can be used on different blockchains.

This flexibility means that if a blockchain dies due to developer infighting or no one uses it, Metronome users canThe currency holdings are transferred to other places. Kajik said this can help Metronome maintain its valuation and ensure long-term survival. To found Metronome, Kajik founded the startup Bloq. Metronome will be officially launched on Tuesday at the Money 20/20 conference in Las Vegas, he said.

Metronome will be generated and supported by automated distributed software that is not controlled by anyone and cannot be changed. The software will begin auctioning the Metronome currency in December and will retain and use the proceeds from the auction to drive the price of the currency. The rest of the project will be open source, so anyone can develop apps for Metronome.

Bloq will provide developer tools for enterprise users. Of the 10 million Metronome coins that will be auctioned in December, Bloq and other organizations that helped create and promote Metronome will retain 2 million. Every 24 hours, 2,880 new Metronome currencies are born.

Metronome avoids the problems that users often encounter when wishing to transfer from one blockchain to another. That is, users must sell one of the cryptocurrencies they hold and then purchase another cryptocurrency. This incurs transaction fees and may result in the loss of potential appreciation in the currency sold. With Metronome, these are not problems.

When users wish to transfer Metronome to another blockchain, they will be given a digital receipt. They can then send the receipt to another blockchain and then add Metronome to that blockchain.

④ What exactly is the blockchain?

What exactly is the blockchain? In essence, blockchain is a distributed, decentralized network database system that will make the storage, update, maintenance, and operation of data different. Blockchain has four indispensable core technologies, namely: distributed storage, consensus mechanism, cryptography principles, and smart contracts.

Then let’s talk about how blockchain is different from traditional data processing to help everyone understand what blockchain is and give everyone a general understanding of blockchain. Cognition.

1. Data storage in blockchain: block chain data structure

In terms of data storage, blockchain technology utilizes "block chain data structure" To verify and store data.

What does the blockchain structure mean? Everyone has seen an iron chain, with one link within another. In fact, each link can be regarded as a block, and many links are linked together to form a blockchain.

How does this so-called "iron chain" store data? Simply put, blockchain and ordinary stored dataThe difference is: on the blockchain, the data in the next block includes the data in the previous block.

Take reading as an example: when we read a book, we finish page 1, then page 2, page 3...
What about in the blockchain? If each block is marked with a page number, then the content on page 2 contains the content on page 1, the content on page 3 contains the content on page 1 and page 2...Page 10 contains The content of the first 9 pages is such a chain nested layer by layer. In this way, the most original data can be traced back. This is the traceability of the blockchain.

The "blockchain data structure" of blockchain makes it traceable, which is naturally suitable for many fields, such as: food traceability, drug traceability, etc. In this way, the probability of tainted milk powder, fake vaccines, and fake and substandard food incidents will be greatly reduced, because once a problem occurs, through traceability, we can clearly know which link caused the problem, and accountability and recovery will be clearer.

2. Data update in the blockchain: distributed node consensus algorithm

In terms of data update, blockchain technology uses the "distributed node consensus algorithm" to Generate and update data.

Every time a new block is generated (that is, when data is updated), an algorithm needs to be used to obtain the approval of more than 51% of the nodes in the entire network to form a new block. To put it bluntly, it is a vote, and it can be generated if more than half of the people agree, which makes the data on the blockchain non-tamperable.

Why do you say that? Let’s make an analogy: we compare the blockchain to a ledger, because it records data. In the traditional world, the bookkeeping power lies with the bookkeeper, and the ledger belongs to the bookkeeper alone. So in the blockchain, everyone owns this account book. If you want to update the account, you must vote. Only if more than half of the people agree can you update the account data.

In this process, we will involve several terms: distributed, node, consensus algorithm. These terms are actually very easy to understand:

Everyone Accounting (that is, everyone has a ledger, and the ledger is scattered in everyone's hands) is the so-called "distributed";

The accounting method that everyone discusses, votes for, and unanimously agrees on is The so-called "consensus algorithm";

Every person participating in accounting is a so-called "node".

3. Data maintenance in blockchain: cryptography

In the data maintenance stage, the difference of blockchain is that it uses cryptography to Ensure the security of data transmission and access.

The cryptographic principles applied in the blockchain mainly include: hash algorithm, Merkle hash tree, elliptic curve algorithm, and Base58. These principles actually ensure data security on the blockchain through a series of complex operations and conversions.

4. Data operations in the blockchain: smart contracts

A smart contract is a commitment agreement defined and automatically executed by a computer program. To put it bluntly, it is executed with code A set of transaction rules, similar to the current automatic repayment function of credit cards. If you turn this function on, you don't have to worry about anything. The bank will automatically deduct the money you owe when it expires.

The outstanding advantage of smart contracts is that they largely avoid a series of problems caused by trust.
Many of us have encountered the situation of being borrowed money: a friend who is short of money borrows 2,000 yuan from you and promises to pay back the money after the salary is paid next month, but next month he finds other excuses. Also, dragging this matter around would be pointless. We didn't have much money, but we were still friends. Even though you were depressed, let it go.

Then, with the smart contract, he can no longer default on his debt, because in the smart contract, once the terms in the contract are triggered, the code will automatically execute, whether he wants it or not, as long as he sends Once you have earned your salary and have money in your account, he has to pay you back.

To summarize the contents of this section, there are four indispensable core technologies in the blockchain, namely: distributed storage, consensus mechanism, cryptography principles, and smart contracts.

We can understand it this way: distributed storage corresponds to the data storage stage, the consensus mechanism corresponds to the data processing and update stage, cryptography corresponds to data security, and smart contracts correspond to data operational issues.

⑤ What is blockchain and how to introduce blockchain in a simple and easy-to-understand manner

Blockchain is a term in the field of information technology.

Essentially, it is a shared database. The data or information stored in it has the characteristics of "unforgeable", "full traces left", "traceable", "open and transparent" and "collectively maintained". . Based on these characteristics, blockchain technology has laid a solid foundation of "trust" and created a reliable "cooperation" mechanism, which has broad application prospects.

On January 10, 2019, the Cyberspace Administration of China issued the "Blockchain Information Service Management Regulations". On October 24, 2019, during the 18th collective study session of the Political Bureau of the CPC Central Committee, General Secretary Xi Jinping emphasized that “blockchain should be used as an important breakthrough for independent innovation of core technologies” and “accelerate the development of blockchain technology and industrial innovation.” . "Blockchain" has entered the public eye and become the focus of society.

On December 2, 2019, the word was selected into the top ten buzzwords of 2019 by "Biwenqiezi".

(5)October 2019Extended reading on blockchain on the 24th:

Blockchain financial applications:

Since 2016, major financial giants have also been inspired by the trend and have launched blockchain innovation projects to discuss The possibility of applying blockchain technology in various financial scenarios. In particular, Puyin Group took the lead in pioneering the “blockchain+” standard digital currency.

The standard digital currency is an asset that has been identified, evaluated, confirmed, insured, etc. by a third-party organization and written into the blockchain through rigorous digital algorithms to form a standard correspondence between the asset and the digital currency. relationship, called a standard digital currency.

In order to realize the great leap forward development of blockchain finance, in order to promote the new development of China's economy, accelerate the circulation of global assets, and realize the dream of rejuvenation that generations of people have been striving for, Puyin Group will Puyin Blockchain Finance Guiyang Strategy Release Ceremony was held in Guizhou on the 9th;

At the meeting, the digital circulation of assets through blockchain, the blockchain financial transaction model, and the relationship between blockchain services and blockchain services will be discussed. The application of social public industries will be discussed. This conference will mark the beginning of the application of blockchain finance and the transformation and development of a new financial ecosystem.

Reference for the above content: Network-Blockchain Finance; Network-Blockchain

⑥ Analysis of the Development Prospects of the Security Industry in 2020

In recent years, the security industry It’s so popular that new entrants are constantly coming in, and they are all people with strong capital. Therefore, the scale of my country's security market is expanding. Next, I have compiled an analysis of the development prospects of the security industry in 2020 for everyone. Welcome to read!

The security industry will usher in five major development opportunities in 2020

In the past 2019, for many security It has been a year of declining harvests for enterprises. Externally, we have been affected by the Sino-US trade war, the competition between major powers, and the damage to security. This is not optimistic for every enterprise involved in international affairs; internally, we have welcomed the impact of enterprises such as Alibaba. The addition of new rivals and partners like Tencent and Tencent has made technological changes more rapid and made people more nervous.

Alibaba’s investment in Qianfang Technology has undoubtedly become another “top player” in the security industry

In this year, we have seen that the former security manufacturers are in deep trouble due to financial problems. Stuck in the quagmire, we have also seen many security companies being annexed or acquired. But we are still the world's number one security country. We are even at the top among the top 50 security companies in the world. As the environment gradually stabilizes, we are facing new opportunities and challenges in 2020.

Today, Bangnijun will sort out five opportunities that will be beneficial to the security industry in 2020 based on what happened in the past year.

1. Pan-security continues to deepen, and the potential market for intelligent security is huge

From "no AI, no security" in 18 years to focusing on implementation in 19 years, we found that not only artificial intelligence When entering the security industry, security companies are also using their unique fieldsRadiate into other markets.

Smart transportation, smart access control, smart elderly care, public security big data...the construction of these scenarios has become the "new blue ocean" that security companies are competing to bet on. Taking smart transportation as an example, the Ministry of Transportation alone plans to invest 2.7 trillion yuan in building smart transportation. Not to mention the various manufacturers that enter at low profits in order to seize the market.

The advantages of algorithmic computing power provide a strong boost to the "pan-security" trend

With the continuous improvement of algorithmic computing power, the non-civilian part of intelligent security will show its performance in 2020 Huge construction boom. But there is no free lunch in the world, and various pain points during the construction process require more scenario-based solutions. And most needs are not something that one or two companies can perfectly bear.

Just as Hikvision claims to be a solution provider for the Internet of Things, what the industry will need in the future will not be competitiveness in a single field, but the resource integration capabilities of the entire industry. Who can integrate resources to form a Whoever has a powerful solution can take the lead in the pan-security market.

If in the past everyone competed for turnover, profit, and who is the leader in the industry, then in the era of pan-security, what companies have to compete for is resource integration capabilities, not who is competing in a single field. Earning more is more about being able to bring everyone together to earn money. This is the "good cat" that Deng Gong said can catch mice.

2. The time has come for the artificial intelligence industry to face a reshuffle in the security and defense industry.

In the past, we all said that with the development of artificial intelligence, how many people in the industry would be left without a living? But now What? How many people engaged in the artificial intelligence industry are not in danger?

It is true that the artificial intelligence industry is still one of the industries with the highest employee salaries and benefits, but the obvious reality is that it cannot be quickly put into application of artificial intelligence companies will quickly wither.

The theme of the AI ​​industry in 2020: reshuffle

According to statistics obtained by the Beijing Economic and Information Commission, 70% of the country’s artificial intelligence companies cannot obtain venture capital, and Obtaining venture capital does not mean immunity from death. In this regard, someone even compiled a list. The AI ​​companies that died on it were all "stars of hope" that had received tens or even hundreds of millions of yuan in financing. They are all dead, who can escape? The latest data also shows that in 2019 alone, 92,000 AI companies died. In this environment, in 2020? Which artificial intelligence company can resist the urge to cash out and launch?

This is the fact. In this pragmatic capital world, few people have the patience to wait for you to put it into practice. The painted cakes are becoming reality step by step, and capital is more willing to pursue fast food, those meal packages that can be implemented and monetized.

In this environment, the artificial intelligence industry may become a "gold rush" for various industries in 2020, and the security industry is no exception. Whoever can better empower the industry with technology will continue to survive. For AnAs far as the security industry is concerned, artificial intelligence has helped the industry complete a technological leap in recent years, and technologies with promising market prospects such as face recognition, low-light cameras, smart bayonet and even pan-security products are obviously inseparable from these artificial intelligence companies. .

Under the premise of this two-way demand, opportunities have clearly arrived. In 2018, my country's AI+ security market size has reached 13.5 billion yuan, and the turnover obtained by AI for some leading security companies has exceeded 8%. Today, two years later, a new round of competition for the artificial intelligence industry in the security industry will also begin. Whoever can better serve their own products with technology and implement it better will seize the opportunity.

3. The commercial use of 5G technology brings many possibilities

Just as 4G technology makes real-time transmission of surveillance images, cloud technology and other technologies possible. The nationwide commercial use of 5G technology also brings new possibilities to the security industry.

5G at the forefront

From a technical perspective, the transmission efficiency provided by 5G can provide more possibilities for security equipment. Ultra-high-definition cameras, more intelligent module installations, real-time cloud storage and other functions all require the support of 5G technology.

Just as the real-time video transmission brought to us from 3G to 4G requires an evolutionary process, the implementation of 5G technology is still widely considered to be too early and too costly in the general environment. But new things will always replace old things. It will be too late to consider the necessity of developing 5G when 5G is truly mature and applied.

With the continuous development of the Internet of Things, the 5G environment provides conditions for security to realize the interconnection of all things. The Internet of Vehicles, Internet of Things, smart cities, and drone network construction are all inseparable from the application of 5G technology. Today's 5G field is in the layout and technology discovery stage just like the artificial intelligence field in the first two years, but everyone also knows the importance of 5G technology. As the first year of large-scale deployment and mature application of 5G technology, 2020 is bound to show powerful possibilities.

How much security can grow on this basis is worth looking forward to.

4. Data Security and Data Storage

With the advent of smart security and 5G era, the capacity of video data has experienced a blowout development. Still facing huge challenges in reading and writing speed.

The requirements of smart security for hard drives mainly focus on three aspects: efficiency, capacity, and power consumption. This has put forward new requirements for traditional hard drive manufacturers. Seagate and Western Digital both launched 14TB or more this year. High-efficiency security storage hard drives, but in the face of the increasing storage demand in the security industry, traditional hard drive manufacturers are still facing severe challenges.

Customized, large-capacity, high-performance traditional hard drive manufacturers continue to deepen their focus on security

In addition, with the development of 5G technology, cloud storage technology has become increasingly popular among security manufacturers.Storage method, although cloud storage currently has shortcomings such as high cost, limited data storage time, and unstable transmission efficiency, this centralized storage method is more convenient for platform-based management and control centers. This is also a major trend in the current security development. With the development of data transmission technology, cloud storage has broad development prospects in the security industry in the future.

Today, artificial intelligence and cloud technology are developing too fast, and information security measures have not been followed up in time, which has led to frequent data breaches since the second half of last year. These incidents endanger users' privacy and data security all the time. When data security cannot be guaranteed, how can you let users choose your device?

Alipay’s facial recognition has also been cracked, and data security research and development is urgent

In fact, data security is Problems do not arise in a day or two. The current data security problems faced by security are reflected in several major aspects: information islands, top-level design, algorithm application defects, and lack of policy systems and technical standards. In this environment, enterprises are like "data chimneys". Technology, R&D, service scope, and development platforms all show non-uniform characteristics, and the non-uniformity in these aspects further leads to the occurrence of vulnerabilities. Frequent occurrences, thereby endangering user data security.

In addition, malicious programs, various types of phishing and fraud are emerging in an endless stream. User privacy and data trafficking have even formed a complete industry chain. These have brought huge hidden dangers to the security industry.

In order to solve these hidden dangers, the related data security market emerged as the times require. In the new year as smart security continues to accelerate, it is believed that the scale of the data security market will also further expand.

5. Strong policy support

As the Sino-US trade war continues to expand, Hikvision and Dahua have been included on the list of trading entities. Now even ordinary people know that China What security can do makes the United States extremely fearful. Where there is oppression, there is resistance. In 2020, China is expected to introduce a large basket of favorable policies or standards for the security industry. Here is a brief summary of this. The specific situation is as follows:

In terms of video surveillance, There are "Regulations on the Management of Network Audio and Video Information Services", "Specifications for Collection of Video Image Information in Key Public Security Areas" and "Safety Requirements for Light Radiation of Active Lighting Components of Video Surveillance Systems". At the same time, export-oriented companies need to pay additional attention to California's CCPA Data Act, which will impose many restrictions on export-oriented security companies.

In terms of public safety, the "Measures for the Safety Management of Road Transport of Dangerous Goods", "Measures for the Management of Special Public Security Services of Liaoning Province", "Anti-theft Safes (Boxes)" and General Technical Requirements for Vault Doors, as well as the Ministry of Emergency Management issued The 19 safety production industry standards will be officially implemented in 2020.

In terms of industry, the "Guidance Catalog for Industrial Structural Adjustment (2019 Edition)" and "Technical Requirements for Home Security Intelligent Management Systems"beg".

Finally, there are supporting policies. In this regard, there are "Action Outline for Promoting the Development of Comprehensive Transportation Big Data (2021-2025)", "Opinions on Promoting the Development of "Internet + Social Services"", and other policies that are worthy of We pay attention. A series of new support policies are bound to emerge for 5G commercial use and smart security. Maintaining close attention will also bring certain development opportunities to security companies.

Conclusion:

Where there is demand, a market will be born. Smart security is now like a rocket taking off at high speed. The faster the rocket, the less the outer protective layer will be lost. The more serious it is, and the various gaps created are the birthplace of the future market. Whether it is new transmission technology, storage technology or even data security, these are all products born with the development of intelligent security.

The market for new things is always full of vitality. In the second decade of the 21st century, whoever can grasp the new direction of the development of these industries will be able to better take the initiative.

Understand the general trend of the security industry in 2020 through the eleven major trends

Looking back on the development of the security market this year, on the one hand, under the influence of government policies at all levels, AI, IOT, Emerging technologies such as 5G and blockchain continue to integrate with the security industry, creating a huge market growth space, and emerging products and solutions from companies continue to emerge.

On the other hand, as the traditional security market becomes increasingly blurred and expanded driven by technology, more and more companies are crossing over into the security industry, applying the massive data in the security industry to wider areas, thereby Continuously expand the industrial ecosystem.

However, in addition to the updates and iterations of product solutions, problems such as network security, data islands, and scenario-based operation and maintenance also plague the development of the industry market, requiring enterprises to continuously improve in the implementation of the industry. Improve.

In 2020, how to seize industry development opportunities and achieve better development and commercialization of emerging technologies will become the key for many security companies to occupy a place in the fierce market competition.

In order to let everyone better understand the development trend of the security industry in 2019, CPS China Security Network has sorted out the new development trends of the security industry in 2019 for your review.

5G+ video surveillance has started to be put into practice

In 2019, driven by the promulgation of 5G pilot cities and 5G commercial licenses by the country, 5G technology with large bandwidth, low latency, and large connections has The integration between various industries has become a hot topic of social concern, and the security industry is no exception.

At the 2019 CPSE Security Expo, Huawei, ZTE, Infineon and other companies all presented 5G+ security products. In early December, Huawei teamed up with Yuncong Technology and Shanghai Unicom to implement 5G+4K+AI video surveillance for the first time in China at Zhangjiang Artificial Intelligence Island in Shanghai.

Comments: According to Gartner predicts that by 2022, outdoor video surveillance will become the largest market for 5G IoT solutions in the world, which has also attracted numerous video surveillance and IoT companies to invest in the commercialization of 5G. However, at this stage, unfavorable factors such as insufficient base station construction and high implementation costs will continue to affect implementation development.

Video surveillance welcomes the blue ocean of ultra-high-definition video applications

In March 2019, the Ministry of Industry and Information Technology, the State Administration of Radio and Television, and China Central Radio and Television jointly issued the "Ultra-HD Video "Industrial Development Action Plan (2019-2022)", video surveillance ushered in the blue ocean of ultra-high-definition video applications.

The "Action Plan" states that it will clearly follow the overall technical route of "4K first, taking 8K into consideration" to vigorously promote the development of the ultra-high-definition video industry and applications in related fields.

Among them, in the field of security monitoring, the future will accelerate the research and development and mass production of ultra-high-definition surveillance cameras; promote the upgrading and transformation of security monitoring systems; support the development of face recognition, behavior recognition, and target classification based on ultra-high-definition video and other artificial intelligence algorithms; improve monitoring range, identification efficiency and accuracy; create a batch of intelligent ultra-high-definition security monitoring application pilots.

Comments: For a long time, policies have been a powerful booster for the development of my country’s security industry. Since the issuance of the "Action Plan", the market value of listed companies in the security industry such as Ingenics, Hikvision, and Dahua Technology that are closely related to ultra-high-definition video surveillance has increased, which shows the huge impact of the plan on the industry. . New products such as ultra-high-definition cameras and ultra-high-definition displays are also emerging in the industry.

The collision of blockchain and security industry

On October 24, 2019, it was pointed out in the 18th collective learning session that the integrated application of blockchain technology in new technologies plays an important role in innovation and industrial change. Blockchain should be regarded as an important breakthrough for independent innovation of core technologies, clarify the main direction of attack, increase investment, focus on conquering a number of key core technologies, and accelerate the development of blockchain technology and industrial innovation.

This has also opened the curtain on the integration of various industries with blockchain technology. Security companies such as Doer Intelligent Control, Zhongkong Intelligence, Guangdian Express, and Infineon are also exploring and deploying in the blockchain field.

In addition to releasing solutions and exploring the combination of blockchain and smart cities with the State Key Laboratory of Surveying, Mapping and Remote Sensing Information Engineering of Wuhan University and Bitmain, Infineon will also participate in its "Hunan Smart Chinese Project" "Real-time deployment of blockchain technology during construction.

Comment: In the context of the increasingly popular construction of smart cities, especially the construction of the Guangdong-Hong Kong-Macao Greater Bay Area, the high data protection characteristics of the blockchain itself also provide a strong guarantee for smart city data transmission and storage. . At present, more and more cities are beginning to try to promote the application of blockchain technology in smart city projects.

The main theme of the second half of security - AIoT

In the wave of intelligenceUnder the impact of the epidemic, the security industry is undergoing changes at both the technical and market levels.

At the 2019 CPSE Security Expo, in addition to traditional security companies, there are companies in the fields of AI, Internet, ICT, communications and other fields that are deploying in the security field. The massive data generated through the Internet of Things is stored in the cloud or at the edge, and then analyzed and processed through deep learning to achieve structured processing of video data by front-end cameras and create an ecological closed loop.

Comment: AIoT makes the boundaries of security increasingly blurred. In the future, security may only be a business in the AIoT industry. This has also enabled in the current industry, industry leading companies, artificial intelligence companies, and cross-border companies to begin strategic cooperation with the upstream and downstream of the security industry chain such as traditional manufacturers and integrator engineering companies to jointly develop the AIoT market.

The first year of data center

With the continuous development of urban intelligence, the application of data governance in cities is also increasing. How to break data silos has become a part of urban governance. Big pain point.

Based on this, digital twins and data middle platforms that can empower huge urban scenarios according to industry needs, tap deep data value, and realize refined urban management are beginning to come into view.

At the 2019 CPSE Security Expo, Dahua Technology, Jiadu Technology, Oriental Networks, Gosuncn and other companies all brought relevant digital twins, smart twins, and data center products to the display.

These products are essentially based on the basic processes of front-end data collection, intermediate data aggregation, and back-end data application. They are continuously expanded and derived, and applied to different scenarios.

Comments: From the establishment of Xiongan New Area to the construction of the Guangdong-Hong Kong-Macao Greater Bay Area, in recent years, under the influence of artificial intelligence and the Internet of Things, the city’s intelligentization process has continued to accelerate, and the surge in data has also impacted the city’s data governance. Ability puts forward higher requirements.

Against this background, the data center emerged spontaneously, which also opened up a vast market space and attracted many security companies to conduct research and development.

3D face recognition may become a mainstream trend in the industry

Face recognition is an important technical application of artificial intelligence. In the process of artificial intelligence rapidly landing in the security industry, face recognition is playing an important role in the security industry. The industry has also set off a trend of "face brushing". From time attendance to community entrance and exit access control, to urban security management, face recognition can be seen everywhere

At the same time, security issues regarding face recognition have also remained high. With video pictures and 3D News about facial models cracking facial recognition also happen from time to time.

Against this background, more secure 3D face recognition has begun to achieve research and development in many fields such as smart locks, access control, and video surveillance. At the 2019 CPSE Security Expo, Dahua Lecheng released the industry’s first AI face recognition video lock equipped with 3D structured light.

Comments: Face recognition can be said to be the most representative implementation of artificial intelligence in securityApplications and a large number of popular face scanning scenes have gradually exposed the disadvantages of 2D face recognition. Although live body, infrared and other technologies are currently installed on face recognition products on the market, more secure 3D face recognition display is the direction of industry application.

State-owned assets invest in security companies

On March 2, 2019, Hanbang Hi-Tech announced that it planned to transfer 8.5 million shares of the company held by Wang Liqun, the company’s controlling shareholder and actual controller, to Beijing Qinglv Zhongbing Asset Management Co., Ltd. After the transfer is completed, Beijing Youth Travel Service Zhongbing will become the company's major shareholder holding more than 5% of the shares.

On July 14, 2019, Jieshun Technology issued an announcement that the company’s controlling shareholders and actual controllers Tang Jian and Liu Cuiying entered into an agreement with Shenzhen Special Economic Zone Jianfa Smart Transportation Investment Partnership (Co., Ltd.) on July 12, 2019. Partnership) signed the "Share Transfer Agreement". After the transfer is completed, Tejianfa Intelligent Transportation will become the second largest shareholder of Jieshun Technology.

On September 3, 2019, Oriental Netpower received the anti-monopoly review approval document transferred from Sichuan Investment Information Industry. According to the relevant agreement previously signed, the company’s controlling shareholder is now changed to Sichuan Investment Information Industry, and the company The actual controller was changed from Liu Guang to Sichuan Provincial State-owned Assets Supervision and Administration Commission.

On November 18, 2019, Infineon's controlling shareholder JHL and actual controller Liu Zhaohuai signed a "Share Transfer Agreement" with Shenzhen Investment Holding Co., Ltd. JHL planned to transfer its holdings of Infineon to Shenzhen Investment Holdings Co., Ltd. 59.9338 million shares, accounting for 5% of Infineon’s total share capital. After the implementation of the "Share Transfer Agreement" is completed, Shenzhen Investment Holdings will hold a total of 26.35% of Infineon's equity and gain control.

Comments: As a G-end and B-end market, security is mainly oriented to the G-end and B-end. The participation of state-owned capital will not only solve the financial problems of security enterprises, but also bring market and project support, so as to achieve better results. develop.

Artificial intelligence is moving towards the implementation of scene operation and maintenance

Nowadays, artificial intelligence no longer only exists in computer vision, but also in ISP, transmission, storage, operation and maintenance and other aspects of artificial intelligence. .

At the 2019 CPSE Security Expo, artificial intelligence has almost become a "standard feature" for companies to participate in the exhibition, and more and more companies are exhibiting platform products such as operation and maintenance intelligent platforms. Some companies say that a one-time transaction of selling hardware and technology is far better than buying continuous services of operation and maintenance.

Comments: In the context of the ever-expanding security boundaries, the implementation of artificial intelligence in the security field has also begun from the first half of "algorithm-computing power-data" to the second half of "plan-implementation-operation and maintenance" Move forward. In addition to providing technical products, the operation and maintenance platform that can aggregate and analyze data has also been favored by many users.

Cloud-edge integration is accelerating

At the 2017 CPSE Security Expo, Hikvision officially released the Hikvision AI Cloud concept and advocated for the development of the Internet of Things industry.Implement the "cloud-edge fusion" computing architecture composed of edge nodes, edge domains and cloud centers to achieve "edge computing + cloud computing" from end to center, truly making edge perception more accurate, data aggregation more efficient and diverse Layer cognition is more intelligent and hierarchical applications are more practical.

Two years have passed in the blink of an eye. At the 2019 CPSE Security Expo, Hikvision fully demonstrated the latest achievements of Hikvision AI Cloud in terms of software, hardware, solutions, and practical application cases.

CPS Zhongan.com learned that typical application projects based on the Hikvision AI Cloud material and information integration data platform have covered 24 provinces and regions and nearly 100 cities across the country, providing public security, emergency command, people's livelihood services, and urban Provides intelligent IoT solutions and big data services in operations, traffic management and other fields.

Comment: From the first proposal of the "AI Cloud" strategy in 2017 to the release of a number of new software and hardware products under the strategy at the CPSE Expo in 2019, Hikvision's exploration of cloud-edge integration has gone further. further and achieve considerable project implementation results.

The concept of software-defined cameras is further expanded

On October 29, Huawei held a conference in Shenzhen titled "Insight into the present and foresee the future - 5G+AI+video to accelerate the intelligence of thousands of industries." Huawei Intelligent Security Industry Summit with the theme of "Upgrade". Huawei proposed to redefine the platform technology architecture for the 5G+AI era, upgrade SDC (software-defined camera) to HoloSens SDC, upgrade IVS (intelligent video cloud) to HoloSens IVS, and accelerate the 5G+AI era with a new ecosystem and new platform. Intelligent upgrade of all industries.

In addition, Huawei also launched the Huawei HoloSens Store, an intelligent video algorithm mall based on intelligent vision and perception. It uses Huawei products as the core base to carry intelligent algorithms, providing a comprehensive solution for rapid development, convenient ordering, and agile operation. Process services provide a variety of entry models and business model combinations.

Comment: Software-defined cameras have always been an important step for Huawei to enter security. In 2019, in addition to releasing new hardware products, Huawei also released an algorithm platform to improve its "software-defined camera" ecosystem. Against the backdrop of accelerated application in the artificial intelligence security industry, Huawei will bring more scenario understanding.

AI ultra-low light technology has become a new tool for controlling light pollution in the industry

For a long time, limited by factors such as nighttime ambient light sources and insufficient imaging technology, the nighttime imaging effect of surveillance cameras has been unsatisfactory. To meet the needs of video image imaging, high-intensity fill lights are widely used.

However, while the fill light increases the brightness, the dazzling light also seriously affects the personnel's vision and brings safety risks. The current mainstream intelligent fill light technology is extremely susceptible to many factors such as scene, cost, reflective materials, etc.impact, the application effect is limited.

To this end, relying on years of accumulation in basic ISP image modulation technology, Kodak released the AI ​​ultra-low light series cameras at the 2019 CPSE Expo. By using self-developed deep learning image enhancement algorithms, it significantly Reduce the reliance of previous surveillance cameras on fill lights, fully restore the color and texture of objects while improving image brightness.

Comments: In daily traffic, high-intensity camera flash capture has always been a major problem that car owners "hate". Under the trend of intelligence, technologies such as super starlight and black light have begun to expand towards this pain point. I believe that Kodak's AI ultra-low light technology will also bring new understanding to the industry.

The market size of the security industry is expected to exceed 800 billion in 2020, but there are very few people with annual revenue of tens of billions

In recent years, the security industry has been booming, with BAT, Huawei, and artificial intelligence The four little dragons all came to "have a chip in." New entrants are constantly coming in, and they are all well-capitalized. Therefore, the scale of my country's security market is expanding. In 2016, the security market scale exceeded 500 billion yuan, and the security market scale will reach 800 billion yuan in 2020. Why is the security industry market so big, but there are so few people with an annual revenue of tens of billions? Experts believe that an important reason why there are few large companies in the security industry is product homogeneity and insufficient technological innovation. At present, whether it is an established security company or a new start-up, the technological gap between the two is gradually narrowing. There is a gap between artificial intelligence algorithms and accuracy, but it is not large, and there is no "one-size-fits-all" one. In addition, the security market still has a lot of TOB business, which relies more on government orders. Large companies with strong capital have an advantage. It is difficult for new companies to go it alone and more of them need to cooperate with local integrators.


Related articles analyzing the development prospects of the security industry in 2020:

1. What is the market size of the excavator industry

2. Development advantages of the electric vehicle industry in 2020

⑦ What are the popular Internet words in 2019

1. Mutual learning among civilizations

Mutual learning, that is, learning from each other; Mutual learning among civilizations means strengthening exchanges and learning from each other among different civilizations in the world. On March 27, 2014, President Xi Jinping delivered a speech at the UNESCO headquarters and stated that “civilizations are colorful because of exchanges, and civilizations are enriched by mutual learning.”

In the past five years, President Xi has expounded on the proposition of "exchanges and mutual learning among civilizations" on a series of major occasions, and its connotation has been continuously enriched and its influence has been expanding. On May 15, 2019, President Xi once again emphasized at the opening ceremony of the Conference on Dialogue of Asian Civilizations that “civilizations communicate because of diversity, learn from each other because of exchanges, and develop because of mutual learning.” This attracted global attention.

2. Blockchain

Blockchain is a term in the field of information technology. Essentially, it is a shared database in which the dataData or information has the characteristics of "unforgeable", "leaving traces throughout the entire process", "traceable", "open and transparent" and "collectively maintained".

Based on these characteristics, blockchain technology has laid a solid foundation of "trust", created a reliable "cooperation" mechanism, and has broad application prospects. On January 10, 2019, the Cyberspace Administration of China issued the "Blockchain Information Service Management Regulations".

On October 24, 2019, during the 18th collective study session of the Political Bureau of the CPC Central Committee, General Secretary Xi Jinping emphasized that “blockchain should be used as an important breakthrough for independent innovation in core technologies” and “accelerate the promotion of blockchain technology”. Chain technology and industrial innovation and development”.

3. Hardcore

Hardcore, translated from the English "hardcore", originally refers to a rap music style with strong sense of power and fierce rhythm. Later, it was extended to refer to "things that are aimed at core audiences and have a certain level of difficulty and appreciation threshold." For example, "hardcore games" refer to games that are very difficult to play.

In recent years, its meaning has been further extended. People often use "hard core" to describe "very powerful", "very tough" and "very tough", such as "hard core regulations", "hard core mother" and "hard core". "Core Gamer", "Core Life" and so on. At the beginning of this year, the popularity of the movie "The Wandering Earth" triggered a discussion on "hardcore science fiction", and the popularity of "hardcore" further increased.

4. Gongge

Genge, derived from "叏", originally refers to the laughter in artistic works, but also refers to the plot, fragments and creativity of the story. Fusion means integrating other people's wonderful ideas into your own work. In recent years, because many literary and artistic works are suspected of "plagiarism", there have been several collective discussions on the Internet regarding the "integration of memes". However, there is still no consensus on where the "boundary" between the two is "reasonable borrowing" or "illegal plagiarism".

At the end of October, it was revealed that the original novel of the hit film "Young You" was "incorporated" into many works of Japanese mystery novelist Keigo Higashino, and netizens were talking a lot. Yi Zhongtian posted a comment on Weibo, saying that "except for very few geniuses, few writers can never borrow from others. The key lies in whether they imitate clumsily or even directly plagiarize, or creatively use others as themselves." "Ronggan" has once again attracted widespread attention.

5. ×× Tens of Millions, ××’s First

The science fiction movie "The Wandering Earth" was released during the Spring Festival in 2019 and was generally well received, with fans at home and abroad applauding it. The driving safety reminder that appeared repeatedly in the film, "There are thousands of roads, safety is the first priority. If driving is not standardized, relatives will burst into tears", which spread instantly.

This "safety code" does not rhyme well, and it is even a bit awkward to read; but it is close to reality, can arouse people's safety awareness, and has arisen in people's hearts.

Subsequently, the scope of use was expanded, and a new sentence format was derived, "×× millions of items, ×× is the first one", such as "Thousands of health items, sleep is the first item", "Skin care is the first item" article, science first"Blessings to millions, health first" and so on. This format is also widely spread in society.

⑧ What is Chain Letter

Quark Chain Letter app is A blockchain social software launched by Cangzhou Network Technology, the parent company of Quark Blockchain.

The basis of Lianxin’s APP is blockchain: a term in the field of information technology. In essence, it It is a shared database, and the data or information stored in it has the characteristics of "unforgeable", "full traces", "traceable", "open and transparent" and "collective maintenance". Based on these characteristics, blockchain technology has laid a solid foundation The foundation of "trust" creates a reliable "cooperation" mechanism with broad application prospects.

(8) Extended reading on blockchain on October 24, 2019:

The development of blockchain in my country:

To seize the commanding heights of innovation, we must build a complete industrial ecological chain. Currently, in our country, blockchain technology has been used in supply chain finance and credit reporting. , product traceability, copyright transactions, digital identity, electronic evidence and other fields have a wide range of application scenarios.

As the participants continue to grow, it can be said that our country already has a good foundation for the development of the blockchain industry. However, there are also many bottlenecks, such as difficulties in implementing large-scale applications, uneven development and a series of other problems.

Vertically, the development of blockchain technology is inseparable from the protection of the rights and interests of market entities in all aspects. With the improvement of soft environments such as financing environment and government services, it is necessary to gather high-quality innovation and entrepreneurship resources in the industry, create a channel for integrating technological innovation and scenarios, and accelerate the transformation of scientific and technological achievements driven by applications.

Horizontally, blockchain It is the product of integrated innovation of multiple technologies. Its development must deepen the in-depth integration with artificial intelligence, big data, cloud computing and other technologies, innovate the technology infrastructure integration architecture, and then extend the blockchain technology radius and industry radius, enriching the blockchain The possibility of blockchain. At the same time, we must pay attention to protecting and creating a blockchain innovation environment, and resolutely crack down on and curb illegal and deceptive behaviors in the name of "blockchain", such as pyramid schemes and speculation of various "air coins".< /p>

博客主人唯心底涂
男,单身,无聊上班族,闲着没事喜欢研究股票,无时无刻分享股票入门基础知识,资深技术宅。
  • 37270 文章总数
  • 3637265访问次数
  • 3078建站天数