I Am the President of the University

Vol 2 Chapter 206: Anti-big data app

"I'm the president of the university(

"Why don't I make an anti-big data app?"

This thought really shocked Zheng Tianyu.

It is not easy to make such a software, nor is it difficult to say.

Technically, there is actually no problem.

It is only a few thousand or tens of thousands of yuan to develop and put it on the application store and rent some cloud servers.

But the rare thing is the follow-up expenses, how to operate for a long time...

For example, if such software is free for no charge, once it is promoted, the more apps are installed, the requirements for server space will increase.

And this kind of software must be running in the background when the phone is turned on, so its power consumption must be huge!

The above optimization is also a big problem.

Thinking of these questions, Zheng Tianyu wanted to retreat a little.

These are not something he can solve as a college student.

Zheng Tianyu gritted his teeth, his eyes erratic and muttered: "Then give up?"

"Ask Lao Zhang to see."

After thinking about it, he called Zhang Lei.

Because their home is not far from Lu Island, they also went back on the National Day.

As soon as the phone was connected, Zhang Lei's voice came with a carefree voice.

"Tianyu, what's the matter? Have you eaten mooncakes? Fried chicken is delicious, but the principal is magnificent!"

Zheng Tianyu has a black thread, and this silly batch knows how to eat it.

"Lao Zhang, have you noticed what happened recently?"

"And Xixi?"

Zhang Lei was taken aback for a moment and asked: "Look, why are you asking about this?"

Isn't it moon cakes? Why suddenly asked Bing Xixi.

Zheng Tianyu hesitated and said, "How about we develop an anti-big data app?"

Zhang Lei's eyes widened, his voice revealed excitement, "Anti-Big Data? How to say?"

Zheng Tianyu directly expressed his thoughts.

It is not easy to develop a software. Even if you have programming skills, you have to pull people together to do it.

And Zhang Lei is one of his goals.

Although Zhang Lei's programming ability is not as good as him, he can at least help a little bit.

Only after Zhang Lei listened, he meditated for a while and said: "If Tianyu you really want to do this, I have a suggestion."

Zheng Tianyu was also a little curious, and asked: "What? You said."

Zhang Lei expressed his thoughts: "I think you can directly ask the principal on WeChat. I think this idea is very good. If there is no school support, I find it very difficult."

However, Zheng Tianyu fell silent after listening.

Without Zhang Lei's reminder, he never expected to ask the school for help.

But... he also thought of the difficulty.

Zheng Tianyu replied distressedly: "But if it is developed, this software will not be profitable, and it will continue to burn money."

Zhang Lei continued: "Do you think our principal is short of money? If you manage so much, please communicate with the principal first."

"Uh, it seems so."

Zheng Tianyu twitched, thinking of the headmaster's generous appearance, it seemed that Zhang Lei's words made sense.

"Okay, then I will ask later."

...

...

When Chen Hao received Zheng Tianyu's news, he was still a little surprised.

I thought I was asking about the results of a mathematical modeling contest, but I didn't expect to open it. What I saw was a question about big data.

The issue of information security has indeed become a major issue in the current era of rapid Internet development.

For example, the newly opened first-level discipline cyberspace security major in recent years shows that the country has begun to attach importance to the issue of cybersecurity and has begun to train corresponding talents.

But in fact, most of these network security experts are to guard against enterprise information security.

As for the safety of users, it is of course necessary to prevent outside intrusion.

You can collect users' private information by yourself... ahem, this is called commercial behavior, not peeping.

What Zheng Tianyu mentioned is only a small part.

After all, it is worthy of praise and praise.

After thinking about it, Chen Hao sent two voices over.

9\'\': "Your idea is very good, it's worth doing, but your idea is a bit simpler."

25\'\': "Privacy leakage is mainly divided into three methods: active, passive and malicious leakage. What you are preventing is only passive privacy leakage. Do you know that the other two cannot be prevented at all?"

The active type means that we actively fill in some information in each application. This is the most common way to disclose our personal information.

For example, fill in hobbies, family members, and job information in some dating software and loan software.

The passive type is the way that users search for items on search engines, social software chats and other ways to record user behavior trajectories.

These will be recorded by big data and then recommended everywhere. Of course, these behaviors of collecting information are not correct, but they generally do not cause harm to users.

The malicious disclosure type is that some hackers steal your computer data through technical means, or steal most of the data in the database of other companies, and then sell them to other people in need.

Zheng Tianyu said: "I know, but I think at least doing something can help netizens."

Chen Hao asked, "But do you know what difficulties you are facing?"

This matter is not as simple as it seems.

Not to mention that the software is secretly obtaining your private information, even major mobile phone brands are also doing this.

Whether it is Huaxing or Apple, which one is clean on this butt?

Everyone is collecting information on big data ~www.wuxiahere.com~ and reselling each other.

Well, you want to come up to stop everyone's information gathering?

Isn't this an enemy?

And user information security is really something you can prevent if you want to prevent it?

Mobile Internet + one machine with one hand + real name system = portraits of characters.

Online shopping will reveal your address and shopping habits.

Using the navigation will expose your daily whereabouts, and you can calculate your residential address and company address.

Dating sites will expose your personal emotional status and family situation.

...

These data can be added up to get your personal profile data. Perhaps these Internet companies know yourself better than you.

The Internet is everywhere, and the behaviors on the Internet are recorded, as if there are cameras monitoring you 24 hours a day, do you feel a cold back...

The Internet has entered the era of real-name from an era of anonymity, and in the future it will enter an era of anonymity demand. After all, no one wants to have an eye behind at any time.

This idea of ​​Zheng Tianyu attracted Chen Hao's interest.

In the era of big data, software can collect big data.

But can you please collect it in the software? Out of the software, I was spied on by you for chatting, shopping, and talking, which is too much.

Because of the photon screen, major mobile phone brands really dare not offend Guanghua University.

He not only has to support Zheng Tianyu in doing this, but he also has to come in and lead himself!

As for the profit issue...just make it free!

He can burn money to improve Guanghua University's reputation and sense of social responsibility!

"This anti-big data app is beneficial to society, and my school and I will strongly support you!"

ps: Ask for a recommendation ticket for a monthly pass!

Chapter 2 is finally here, alas.

Life is hard.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like