My autobiography is definitely not a tragedy!

Chapter 502: Xinchuang


"This Baiyeji has truly given me yet another surprise!" Mr. Hu couldn't help but sigh.

After discreetly inspecting without revealing his identity, he was pleasantly surprised to discover that the "Tianshu ERP" system developed by Baiyeji exceeded his expectations!

While the Ministry of Finance needs to focus on cost reduction and efficiency enhancement, he was more concerned about the system's significant implications for the national "IT Application Innovation" project...

Xinchang, short for "Information Technology Application Innovation," originated from the "Information Technology Application Innovation Working Committee" established by the state in 2015.

Its main purpose is to ensure that domestic information technology software in critical fields is autonomous and controllable.

The fields it refers to include basic hardware (mainly chips), basic software (such as operating systems), application software (especially ERP, OA, office), and information security.

The national-led "IT Application Innovation" encompasses areas that can be broadly summarized as "2+8+X."

"2" refers to political parties and government, which is widely known as essentially a closed market.

"8" refers to eight key economic sectors, with finance leading the charge, followed by electricity, telecommunications, petroleum, transportation, education, healthcare, aeronautics, and aerospace.

Currently, these fields are basically monopolized by state-owned enterprises.

"X" refers to affiliated enterprises, such as state-owned or state-controlled holding or participating companies, which will be mandated to abide by certain policies.

"2+8+X" also represents the steps for advancing "IT Application Innovation" outlined in the plan.

It means starting with refining products and cultivating core enterprises in party and government sectors, moving into key industries once the products mature, and finally pushing into the consumer market.

Of course, this is under the ideal scenario where the product is excellent enough to leverage its competitiveness to penetrate the consumer market...

However, while the vision is beautiful, the situation is far from optimistic.

The domestic "IT Application Innovation" project can be described as chaotic and disordered.

The state has used policies to create the "demand side," opening a vast market worth hundreds of billions, but the problem is that due to technological shortcomings, there's a persistent lack of competitive "supply side."

Furthermore, the local "bidding process" is virtually non-existent.

Good products can't get in; instead, the opportunists lining their pockets are like hyenas flocking to the smell of decaying flesh.

They naturally have no intention to focus on product development, while foreign open-source products slapped with a new logo are boldly sold for millions or billions, and "experts" may have had one too many drinks at banquets, only to realize years later that they've been swindled.

The result is that the selected products are expensive and impractical, not to mention obligatory.

It's bad enough that they don't work well, yet they must be used.

A typical example is the domestically produced servers "snatched up" to the point of running out of stock.

They are tasked with fulfilling the "IT Application Innovation" goals handed down from above while ensuring business operations proceed as usual.

Ultimately, the choices are either use five domestic servers to replace one previous unit or maintain two parallel operating environments as a contingency, with the "IT Application Innovation" system as the backup.

As a result, not only are the objectives unmet, but the digitalization level of enterprises is indirectly lowered, driving information technology regression in state-owned enterprises...

Despite all the magnificent efforts, the aggressive strategy proves as fierce as a tiger; when looking back, one finds oneself stagnant...

Administrative efficiency has not improved; on the contrary, it has increased the management burden, leaving frontline personnel severely stressed.

To be fair, the "IT Application Innovation" project cannot be said to be a wrongful decision; it's the same route as the "New Energy Strategy," initially supported by policies, then handed over to market forces.

As long as the market is big enough and enough money is invested, it is ultimately possible to incubate a batch of outstanding unicorns in the industry.

However, new energy is an emerging industry where domestic and foreign entities start essentially from the same line, and Country Hua, as an industrial powerhouse, even holds a first-mover advantage, making overtaking on curves inevitable.

In contrast, the information technology sector is traditionally advantageous for Western established powers; their software ecosystems are heavily fortified, and the gap in domestic and international levels is vast.

This means that carving out a separate path requires paying a significantly larger price and spending more time.

The final outcome, as a great leader once said, is that surrenderist theory of national downfall and blindly optimistic theory of quick victory are both inadvisable.

This will be a prolonged lasting battle!

However, the world situation has been intricate and changeable in recent years. When ordinary people are unaware, the international landscape has already ushered in a once-in-a-century upheaval.

How could something impacting the country's lifeline have so much time for gradual development?

The one most anxious about this situation, MSS (Intelligence Bureau), is undoubtedly among them.

The modern intelligence gathering process is no longer like the days of "Military Intelligence," "Central Intelligence Bureau," "Secret Bureau," and the like, primarily relying on human intelligence and courage.

More heavily relied on are reconnaissance satellites in the sky and big data extraction.

How to collect the opponent's data and protect ours has become paramount!

Yet, when even the financial system's underlying database utilizes foreign technologies, how can data confidentiality be discussed?

This poses a huge hidden threat to the nation's intelligence security.

Having long dealt with "intelligence warfare," Mr. Hu naturally knows that sometimes catching ten spies might not be as effective as blocking a single information security vulnerability.

"IT Application Innovation" relies on chips at the base layer and applications at the upper layer, both weaknesses domestically.

Chips have been cracked open by the "Light Chip Project," while at the application side, "Tianshu ERP" is like a timely rain...

This is also why Mr. Hu regards it extremely highly and had to come personally.

"Xiao Chu, how's the security analysis on the core of this system?" Mr. Hu asked.

"The results are quite astounding..." The female officer, holding a file, looked serious.

"Be specific."

"Based on the analysis done by our technical team, initially, we can confirm that this system may have adopted several innovative technologies like 'AI native databases,' 'Internet of Things,' 'big data mining,' 'supply chain visualization.'

Its IoT functionality and intelligence level are far ahead of similar foreign products.

The most critical aspect is a set of unprecedented 'Web3.0 new internet protocol architecture'.

This means, to some extent, the absolute security and immutability of blockchain data, offering superior stability, making it almost impossible for hackers to tamper with.

Our analysis suggests... it is likely to reshape the entire landscape of enterprise management software worldwide."

"Hmm..."

Although still amazed internally, thanks to the precedent military system, Mr. Hu remained relatively calm.

"Exceptional indeed, it's just too exceptional, and promoting it might be a bit tricky..."

Thinking of the chaos in the pilot towns over these two days, Mr. Hu couldn't help but shake his head.

The progress of the management system is heavily reliant on information disclosure and transparency upgrades.

As a result, many hidden aspects will be exposed...

Is solving the "job-cheating" problem technically difficult?

There's absolutely no difficulty!

The key lies only in whether you want to solve it.

The application of blockchain technology further amplifies the difficulty of data tampering.

In essence, this system acts partly as an audit mechanism.

Fortunately, this "Tianshu ERP" has a strong customization feature, with many functions being modular and adjustable per managerial requirements.

For instance, the "facial recognition" attendance function can be chosen to be canceled by the authority manager.

However, this right is in Mr. Hu's hands, so the two pilot towns have no authority to reduce it and are forced to swallow this "poisoned chalice".

To test the effect, the pilot towns naturally used the "Tianshu Max".

Thus, in less mature places with greater resistance, promoting "Tianshu Pro" or even the "Tianshu Basic Edition" first might be feasible...

The financial situation in local areas has been increasingly tight over the past two years, and once the managers realize the massive fiscal savings brought by adopting "Tianshu ERP".

Even if unwilling, they will gradually be forced to tighten their belts and join this information wave.

This is indeed a "poisoned chalice," but it can "fight poison with poison"...

"Xiao Chu, prepare a complete evaluation file upon returning, and list 'Tianshu ERP' as a national key recommendation on behalf of the 'Information Technology Application Innovation' department."

After contemplating for a long time, Mr. Hu slowly uttered.

"Key recommendation"!

These seemingly light words mean that "Tianshu ERP" has gained critical official recognition.

Even a trillion-level "government cloud" market is secondary, akin to ancient products being labeled as "tribute".

Making money has become secondary; what matters is the huge brand effect...

"Well... Mr. Hu, I do not deny the excellence of this system, but after all, it's a product from a private company, and its security hasn't been thoroughly verified.

Isn't promoting it so early somewhat reckless?" queried the female officer hesitantly.

"Haha!" To this, Mr. Hu just chuckled.

No one aside from Meng Lang and Mr. Hu knew the real significance behind Baiyeji's "pledge"...

"Let me ask you, in the national new energy strategy, who eventually stands out, state-owned joint ventures or private enterprises?"

"Uh... this..." The female officer understood Mr. Hu's implication and fell silent.

"Security isn't something we can just research behind closed doors; it requires market, time for validation.

If there really is a backdoor, with their technology, how long do you intend to find it?

A year or two? Should we wait until foreigners replicate and use it before certifying it for listing?"

Ideally, such critical information security products should be developed by related technology enterprises under state capital control.

However, the current giants are blissfully engrossed in the false prosperity of monopoly industries, unable to extricate themselves, with their R&D efficiency being truly worrisome.

If you invest ten billion, a private company might actually invest eight billion and pocket two billion.

But if it's state-owned...

Having a billion spent efficiently would be considered quite "effective".

Every household has its difficulties. Today's giants can only "maintain stability," hoping for "vigorous progress" is really flattering them...

There were also excellent advanced technology enterprises, but once the state capital started intervening, operational efficiency presented an exponential decline.

Isn't Shuimu University's "Enterprise Management" considered world-class?

Even so, they couldn't manage Shuimu Tongfang and Shuimu Seeds effectively, ending with a mess.

In this regard, as the head of the Intelligence Bureau, Mr. Hu is profoundly experienced.

Frustrated yet increasingly determined to support Baiyeji, this "future unicorn".

"Looks like I must personally meet Chairman Gao..."

If you find any errors ( broken links, non-standard content, etc.. ), Please let us know < report chapter > so we can fix it as soon as possible.


Use arrow keys (or A / D) to PREV/NEXT chapter