Chapter 194, Big Blue is going to fall, Cisco giant is going to rise
When everyone heard that the girl actually had an idea, they were immediately excited. President Reagan took the lead and said, "Build a wall? How do you want to build a wall? What will form between two computers?"
"Oh, this inspiration was what I derived from the field of architecture."
Reagan is in his seventies, and it is not easy to let him understand the professional computer field. Alice quickly said: "When building manufacturers design buildings, they will build firewalls. This is a non-combustible physical wall used to prevent fire from spreading, which is used to divide fire zones and fire-proof partitions. After I received your call, I have been thinking about how to deal with illegal invasions, so I got inspiration from this matter."
"The firewall in the network is certainly not a physical thing. According to my ideas these days, it should be a network security protocol. To put it bluntly, the transmission of information packets between computer networks must be allowed through the protocol. One of the biggest features of my router is that it can allow network interconnection of different types of protocols. So, we only need to design a software specifically to isolate illegal information packets?"
Creativity has always sounded easy but difficult to say, which made many executives worried for a long time. When it comes to Alice, he put it into a solution in one sentence!
"so what?"
Seeing Alice stopping, Reagan immediately asked, "How should this kind of security protocol be done?"
"It needs to be a device composed of software and hardware devices, install relevant security software on the computer, and operate continuously by specialized hardware devices to monitor network data transmission. As for the production technology,"
"It can be understood in essence as an isolation technology, an access control scale that is performed when two networks communicate. It allows people and data you agree to enter your network, while keeping people and data you disagree to, and preventing hackers in the network from accessing your network to the greatest extent."
"The so-called agreement, disagreement, to put it vividly, if the company boss is willing, the office computer in the enterprise LAN cannot be connected to the external network. This is the most typical disagreement!"
Alice's words once again made the group of executives in the audience fall into deep thought every minute.
Undoubtedly, the amount of information is too large, and everyone has to take the time to absorb it.
There is no way, this is what creativity is like.
Represented by advertising companies and game companies, such companies have to call employees to start brainstorming meetings every day in order to catch the flash of inspiration in chatting. A game work, an advertising work is often made up by everyone's brainstorming words after countless brainstorming meetings.
This is a processed thing.
How could Alice directly pour ready-made things into other people's minds like beans like Alice now?
When you hear it, you will suddenly realize it and then shout: "So that's it, so it's that simple!"
Yes, it's that simple, so who thinks about it and try it yourself?
At this moment, the people sitting in this conference room felt like this.
When Alice's words were heard, almost everyone felt a sudden sense of enlightenment: "Yes, network data must be transmitted through protocols, so just create a security protocol specifically!?"
It's a simple question, but if Alice doesn't say it, they can't figure it out even if they want to break their heads.
"Very good, very good, so great!"
The first sigh, followed by the first applause, led by the Pit Cisco Unlimited Department, which initiated the Prism Dominic Folle, the current director of the National Security Administration, and the conference room immediately rang out with a continuous stream of applause.
He laughed and said, "Vice President Bush has really not recommended you in vain. The network security problem that has troubled us for several days has been solved by your words!"
Alice smiled modestly and said, "I'm just a professional person. After all, I'm a person who built Cisco. I have a specialized in my profession."
Reagan smiled and said, "Then, let the issue of making this network security protocol to your Cisco. In addition, did you name it a firewall?"
"Well, that's the name? It's very vivid, right? Prevent the computer building from being burned by flames from the Internet?"
"Speaking of this, I'm too brave."
The topic suddenly changed, and Reagan's face turned even more muted: "I dared to invade the Nasdaq Exchange and maliciously modify the call bidding when new stocks were listed, and it was really successful. If they and the exchange did not buy your products, what did you realize from the order record? Is this matter not going to be discovered in many years, right?"
Alice's eyes moved and she chose to shut up wisely.
Director Webster said: "But until now, there is still no explanation for the public, just saying that they are still looking for the perpetrators. Humph, I want to leave the relationship completely and throw it on an innocent ordinary employee. Do I know what the executives are planning?"
Alice's eyes moved again, and she still shut up.
"It's okay."
Reagan said plainly: "Even if they really use any method to make an ordinary employee come out to confess, it is just to let the group of executives avoid criminal punishment. The company itself is bound to pay huge fines to the government, and hum, how much has their stock price fallen now?"
For the next ten minutes, Alice kept making soy sauce without any pretentiousness, simply listening to the future of the big guys' discussions.
The situation is now very obvious. If you accidentally die, the losses you suffer will not be just a little fine. The first thing you do is to invade the stock exchange and maliciously modify the stock market data is the extreme distrust facing the whole society, and it also offends the listed companies in the entire country. Once you put this big hat down, you will be in a long time to take it off again!
But the Blue Giant's status is here. It is the world's largest information technology and business solutions company. Since its establishment in 1925, it has first been a commercial typewriter, then a word processor, and then a computer and related services. It has made a great contribution to the development of the entire United States over the past few decades.
Such a sudden problem arises in such a company, which is a huge mess for the government while a strong trust crisis breaks out.
If a giant falls, there will be thousands of giants standing up.
So, when the car is here, when this giant created the first Internet crime and was such an amazing crime, the next giant must also take good care of it?
So, since the last giant was affected by the Internet
After a while of casual conversation, everyone looked at the girl who had been sitting honestly and well-behavedly again.
"Alice."
Reagan smiled and said, "Since you have taken a big order for Cisco, then you can do another one."
"Bang!"
"Click!"
"Brush!"
Accompanied by this strange sound effect that seemed to exist, Alice's eyes suddenly lit up: "Wow, is it really? That's great!"
There was a burst of laughter, including those Pentagon executives who were purely accompanying each other, and everyone was amused by Alice's childish look.
Yes, since the new giant is still a baby, it is definitely very easy to control it.
This group of people must have thought so.
A trace of unconscious sneer flashed across the corner of his mouth, Alice continued to blink and said, "What order, what order? Is there a hundred million? Is there?"
"Haha, of course, the Ministry of Finance needs to calculate the specific amount."
Reagan continued: "Based on your company's production capacity, this order can be divided into steps. First, the R&D expenses of firewall-related equipment. You report me a number, which is the first priority. Then, I will ask each department to count the router procurement matters of all government departments in Washington to report them separately. Third, New York, Pennsylvania, Maryland, and New Jersey are the first sequences. I will recommend that state and municipal governments order Cisco products. As for what they will do, it depends on your luck."
A super huge order, a sales contract that must have exceeded 10,000 routers. It is no doubt whether the homemade governments in those states will buy it. Judging from the current market price of routers, this is like a pie falling from the sky with a transaction volume of more than US$20 million!
“,,.”
So it's not that Alice opened her mouth invisibly. Even though she had guessed that the White House could give her some sweetness, this pie was really choking.
"Our company's net profit for the whole year was only 28 million last year. Everyone, will your investment be so large?"
"Since a myth has been created, let's continue."
The director said with a smile, and the director looked at Alice with a look of gold, and the director also looked at her with a deep look.
The great sacrifice of self-sacrificing oneself to others opened a door to a new world for the bigwigs of the intelligence agencies. Alice, the owner of the Cisco system sitting in front of them, was more like a shining golden statue, making them unable to help but show their greedy eyes.
Reagan spoke: "Then, Alice, please calculate the cost of the firewall R&D. In addition, you can say anything else in one go, and we will satisfy you."
Alice swallowed.
If you don't swallow it, your saliva will flow out.
"The R&D costs are not too high, 30 million US dollars should be enough."
Seeing Reagan nodding easily as if he had thrown a dollar, Alice followed.
"In addition, in addition to routers, I have just developed something called a switch here. Are you interested in listening to it?" To be continued.
...
Chapter completed!