Time Travel: 2014

Chapter 365 Accelerating Data Utilization Compliance

This is a major benefit for well-behaved technicians.

It can be said that after the passage of this law, data utilization in our country really got on the right track.

Anyway, it’s better than the situation now [in 2014].

The current situation is that there are basically no clear laws regarding the mining and utilization of data. .

Not to mention that there are no laws regarding data mining and data utilization.

Even the clear legislative definitions of "data", "data processing" and "data security" were only officially released in 2021 in the previous life.

There is no clear determination, so offline data utilization, whether it is data mining or data processing, is actually a gray area in our country at the moment.

Although it is said that for ordinary people, "anything can be done without prohibition by law", when it comes to data, Lin Hui feels that it is better not to be too willful.

Ordinary people may be indifferent to data, but technical personnel do not dare to underestimate the value of data.

As human society enters the digital age, cyberspace, the physical world, and human society begin to achieve deep integration.

Data is not only the product of the operation of cyberspace itself, but also a digital portrait of the operation of the physical world and human society, containing the operating rules of the digital world.

In the digital era, data has multiple attributes such as national security, digital economy, social governance, and personal privacy.

In this case, the data is often of great significance.

In this way, many things involving data can be handled by you even if there is no law on data in the province.

No matter how big the deal is, there is always a law that applies to you.

Under this situation, Lin Hui felt that one should not be too willful when it comes to data.

Even if possible, Lin Hui feels that the "Data/Security/Security/Law" should be promoted as soon as possible.

Even if it costs a certain amount of money, it is worth it.

After all, even a small price is not too much compared to the huge cost caused by a certain company's willfulness in data.

Moreover, this aspect is not pure investment. With corresponding legal support, there are clear institutional norms.

Technical personnel who work hard can still support a good market size by following the rules.

Instead of having to sell important core data such as in-depth data in order to obtain benefits.

Lin Hui believes that it is necessary to accelerate the promotion of this law.

The annotated data itself can also be traded in the name of a training set by downplaying the attributes of "data".

But it is impossible to downplay the attributes of data in things like collecting data.

Even if it’s just collecting dark data.

Before clear relevant legal provisions are issued, it seems inappropriate to mine data anywhere now.

Although the motivation was data mining, Lin Hui felt that he just wanted to use the data in a legal manner, which didn't seem too excessive.

Moreover, Lin Hui was not entirely motivated by the selfish desire to use the data in compliance with regulations.

When it comes to data security, it is inseparable from personal security and national security.

Even in the previous life, the "Data Security Law" was highly regarded. Even after the advent of the law, some scholars said that the "Data Security Law", "Network Security Law" and "Personal Information Protection Law" These laws together constitute the basic legal rule framework in the field of cybersecurity and data compliance.

Although it remains to be seen whether this statement is accurate, it is enough to show the positivity of the law.

Although it is necessary to speed up relevant legislation, Lin Hui does not have much say in speeding up legislation now.

However, Lin Hui feels that as his contribution becomes more and more prominent, his voice will become larger and larger.

Even in the future, Lin Hui will not be the voice of one person, there will be many voices surrounding Lin Hui.

In the future, there will even be a group of emerging forces with Lin Hui as the backbone active in the computer field, the Internet field, and the technology industry that cannot be ignored.

And when Lin Hui can represent the interests and demands of a rather large group or several groups, then it seems that the real meaning will be loud and clear.

This day seems not too far away.

When everyone realizes that data utilization compliance is more conducive to the steady development of the industry, Lin Hui does not even need to do it personally.

Specific to the current collection of dark data.

Although it seems to be difficult to implement in a short time, Lin Hui doesn’t need to be too anxious about this matter.

Lin Hui remembered how things developed in his previous life, although Apple had expressed interest in dark data probably since 2014.

But it wasn’t until 2017 that it officially spent $200 million to acquire an artificial intelligence company dedicated to mining dark data.

The reason why it was delayed until so late is actually not difficult to understand.

There are buyers but no sellers.

In this case, it is naturally not as easy to buy as you want.

Judging from this, it seems that Lin Hui's time is quite sufficient.

During the chat with Huang Jing, Lin Hui further chatted with Huang Jing about some content related to the 2014 Apple Global Developers Conference.

Huang Jing and Lin Hui introduced the specific arrangements for this global mobile developer event.

In fact, Lin Hui and Elizabeth Nish had already talked about something related to this conference not long ago.

It's just that this time the discussion with Huang Jing was more detailed.

And maybe it's because it's closer to the Apple Worldwide Developers Conference.

The news described by Huang Jing obviously sounded more conclusive.

The information obtained from Huang Jing was corroborated with the information Lin Hui had previously obtained from Elizabeth Nishi.

Lin Hui summarized it at this year’s Apple Global Developers Conference.

There is no doubt that the new OS X Yosemite will arrive as scheduled.

Although the specific design of this new system remains secret.

But what Lin Hui knew was that this so-called new system design was actually not particularly innovative.

It is nothing more than the same flat design style as the original iOS7.

At the same time, Apple has introduced the same Dock bar as the Apple mobile phone system in this system.

In addition, all application icons have been redrawn, and the frosted glass effect that can be seen everywhere has been added...

A bunch of fancy upgrades.

In general, it just borrows a lot of elements from the Apple mobile phone system in terms of the entire function.

The reason for this design is simply to further seamlessly integrate with the Apple mobile phone system.

Lin Hui remembers that it was at the beginning of this year that the AirDrop connection function of OS X and Apple mobile phone systems was implemented for the first time;

At the same time, the Handoff function is implemented for the first time;

The Handoff function is the so-called relay function.

After having this function, half of the work that users are doing on iPhone/Mac can be continued on Mac/iPhone.

This feature was once praised by fans who have a relatively complete Apple ecological experience.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like