Observing trends and opportunities, and insight into the smart future——Excerpts from the guest speeches at the main forum of the 2020 World Computer Conference
(On November 3, the opening ceremony and main forum of the 2020 World Computer Conference will be held at Changsha Meixi Lake International Culture and Art Center. Hunan Daily·New Hunan Client reporter Gu Pengbo Tongdi Photographic Report)
Hunan Daily·New Hunan Client reporter Cao Xian Huang Tingting finishing up
In the autumn season, Changsha Meixi Lake welcomes the grand event.
In the digital age, data becomes a means of production, and computing power is productivity. Focusing on the new momentum of the computing industry, on November 3, the 2020 World Computer Conference jointly sponsored by the Hunan Provincial People’s Government and the Ministry of Industry and Information Technology kicked off.
In the main forum of the 2020 World Computer Conference, academicians and experts from home and abroad, Turing Award winners, senior executives from well-known enterprises such as China Electronics, China Electronics Technology, Huawei, Dell, Qi Anxin, etc., discussed the computer industry New trends, insights into the forefront of the computer field, and prospects for new opportunities in the computer industry.
To calculate everything, we must talk about computing, and”Hunan” will talk about intelligence in the future
Yang Xuejun, academician of the Chinese Academy of Sciences and dean of the Academy of Military Sciences
(Yang Xuejun, academician of the Chinese Academy of Sciences and dean of the Academy of Military Sciences, made a theme report on”Intelligence from Computational Thinking” at the main forum. Hunan Daily·New Hunan Client reporter Tong Di Gu Pengbo photo report)
To calculate everything, we must talk about computing, and”Xiang” will talk about intelligence in the future. Today, I will discuss the main line of intelligence from the perspective of computational thinking.
First discuss calculation and thinking. Computing is a permanent topic in history. From the point of view of being computable, constructible, storable, programmable, operable, and linkable, does strong artificial intelligence need to go beyond the Turing machine model? We can think about this issue together.
Second, discuss technology and law. When it comes to the laws of computing technology, I very much agree with the three major advances mentioned in the book”Second Machine Revolution”, namely exponential advancement, combined advancement and data advancement. Facing the law of combination progress and data progress, our technical reserves are still insufficient. What needs to be considered is whether we can seize the opportunity of intelligence, use smart CPUs, smart operating systems, and smart databases as the traction to control the”three major advances”, get rid of the”stuck neck”, and create a world-leading artificial intelligence ecosystem ?
The third discussion is about goals and starting points. From the point of view of computability, I also think that the long-term goal is to support the calculation model of strong artificial intelligence. This requires breaking through the NP problem, breaking through the causal inference, and breaking through the selective random calculation. How to start? It is necessary to start with the representation model and algorithm that adapt to environmental artificial intelligence. The environment can be composed of”human-machine-object”, and this model must be able to cope with environmental changes.
Fourth discusses the concept and implementation. How to overcome such technology? According to”computable, configurable, storable, programmable, operable, and linkable”, I personally think that grouping can be implemented into two key directions, one is artificial intelligence computing chips; the other is a group intelligent operating system.
The”PKS” system has developed into an important force in the global computing ecosystem
Zhang Dongchen, general manager of China Electronics Information Industry Group Co., Ltd. strong>
(Zhang Dongchen, general manager of China Electronics Information Industry Group Co., Ltd., made a keynote report on”Innovatively Build a High-Quality Independent Computer Ecosystem”. Hunan Daily · New Hunan Client reporter Tong Di Gu Pengbo photo report)
Since the birth of computer technology,”innovation” has always been the main line of industrial development. Innovation genes have also been rooted in China Electronics. my country’s first domestic computer”Great Wall 0520″ was born in China Electronics.
Faced with the new requirements and challenges of the innovation and development of computer technology, China Electronics thoroughly implemented the strategic deployment of building a network power, innovatively built an independent computer ecosystem, and achieved three breakthroughs.
One of the breakthroughs, the innovative construction of a new autonomous computer base. Relying on Feiteng CPU and Kylin operating system, China Electronics has successfully constructed a computer basic software and hardware”PK” system with completely independent intellectual property rights (“P” is the English initials of Feiteng, and”K” is the English initials of Kylin). International counterparts hailed it as the”Chinese Architecture”. From 2017 to 2019, the independent innovation achievements of China Electronics”PK” system won the first prize of National Science and Technology Progress Award for three consecutive years.
Breakthrough two, innovatively build a new three-dimensional security system. Applying the traditional and passive”patching” computer security model can no longer meet user requirements. It is necessary to change”passive defense” to”active immunity”. Our self-developed”Trusted Computing 3.0″ technology, creatively added a three-dimensional protection security chain to the”PK” system infrastructure, and successfully established a”PKS” security system, combining the general processor layer, memory storage controller layer, and operating system The safety pillars of the layer hit the”bedrock”. Not long ago, more than 120 teams launched a total of 1.53 million attack drills on the PKS three-dimensional security protection system, and none of them successfully broke through.
The third breakthrough is to innovate and create a new autonomous ecosystem. China Electronics is committed to building the”PKS” system into an open ecosystem like Wintel, ARM+Android and Apple systems. In China, China Electronics and National University of Defense Technology have carried out long-term and in-depth strategic cooperation, established 38 computer software and hardware adaptation centers in Beijing, Hunan and other places, and gathered hundreds of industry-university-research units to carry out basic technology research, adaptation verification and all-round user experience. Internationally, China Electronics has worked with ARM, Google, Microsoft, Dell and other companies to formulate international standards for green computing, and cooperate in the field of global open source ecology and enterprise-level applications. The”PKS” system has developed into an important force in the global computing ecosystem.
Let the industry’s”trick” be protected by chips
Liao Xiangke, academician of the Chinese Academy of Engineering
( Liao Xiangke, academician of the Chinese Academy of Engineering, made a keynote report on”Open Source and Agile Chip Design”. Hunan Daily · New Hunan Client Reporter Gu Pengbo Tongdi Photography Report)
Open source and agile chip design are now an important trend.
The elements of open source and agile chip development require open source CPUs, open instruction sets, open processor cores, and open source EDA tools to support agile development. With the strengthening of intellectual property protection awareness, everyone began to pay attention to chips, but the threshold for chips is too high. Agile development can reduce costs and development thresholds. According to the current work situation, our entire hardware environment built based on open source has relatively high performance and can be fully”competent” in simulation technology.
After doing a whole set of processes through open source, we found that open source still has a series of problems. To this end, we modified many open source verification tools, and did more than 2000 verification tests and other related content; in the chip design, we adopted open source EDA and commercial EAD in parallel, tried the open source EDA test process, and finally produced Chips have also made some new technologies in verification.
As the demand for chip design in various fields continues to increase, we believe that agile chip development can reduce the cost of chip development, which can definitely become a future trend and has a bright future. In all walks of life, if your”trick” in the industry can be protected by chips, it will be a beneficial and harmless thing.
In order to reduce the cost of chip development, it is very important to increase the speed, and the research and progress in this area is relatively fast. But at present, the progress in this field is still stuck in academic research. If you really want to make product-level things, RISC-V chips may have prospects. At the same time, the discussion on EDA tools and open source commercial models also requires further research.
The computing industry ushered in a golden period of development, and computing power has become a core competitiveness
Gao Tao, deputy general manager of China Electronics Technology Group Co., Ltd.
(Gao Tao, deputy general manager of China Electronics Technology Group Co., Ltd., made a keynote report on”Seize the Opportunity, Meet, Calculate and Create the Future Together”. Hunan Daily · New Hunan Client reporter Gu Pengbo Tongdi Photographic Report )
The computing industry has ushered in a golden period of development, and computing power has become a core competitiveness. According to statistics, the scale of the global digital economy in 2019 has reached 15.6 trillion, accounting for 19.7%of the global economy. It is estimated that this proportion will reach 25.3%by 2025, and the growth rate of the digital economy will be 3.5 times that of the global economy.
The construction of emerging digital infrastructure requires stronger and more efficient computing capabilities. The new computing system of artificial intelligence, big data, and cloud computing generates massive amounts of data, and computing power is its driving engine. At present, the global demand for computing power doubles every 3.5 months, far exceeding the current growth rate of computing power.
Computing technology has entered the super-mole era, giving birth to new computing technologies such as memory technology, graph computing, neuron computing, and quantum computing. Related theories and technologies have gradually matured, and some technologies also have the basis for large-scale applications. It can be said that a diverse computing era is coming.
In general, computing power is to the intelligent age just like heat is to the steam age, and electricity is to the electrical age. Both represent the upper limit of the productivity of an era. Who will master advanced computing power in the future? They have mastered the initiative for future development.
Standing at a new historical starting point, CETC insists on both innovation-driven and system advancement to enable high-quality economic development. At present, CETC has 20 national laboratories and 8 R&D centers, focusing on key technological breakthroughs, and carrying out an overall layout from the underlying basic technology, infrastructure, support platform, and application services.
In recent years, CETC has joined hands with Hunan to promote industrial innovation and development, and built a 500MW high-efficiency photovoltaic cell digital workshop, integrated circuit complete equipment localization and verification platform in Hunan to help smart manufacturing and smart city development. China Electric Technology will carry out more comprehensive, extensive and in-depth cooperation with Hunan.
China Electronics Technology is willing to work with all walks of life to build new computing infrastructure, jointly carry out future computing technology research, and jointly promote the development of computing empowerment industry, so that the computing industry can better empower the new development of the country’s dual cycle pattern.
Opinions can make up for the lack of IQ
Turing Award winner and American computer scientist Alan Kay
(Alan Kay, winner of the Turing Award and American computer scientist Alan Kay, made an online theme report of”Context is worth 80 IQ Points”. Hunan Daily · New Hunan Client reporter Gu Pengbo Photo report by Tong Di)
Before speaking, I would like to thank the research team-the US Advanced Research Projects Agency and Xerox Parker Research Center. They created many inventions today, including personal computers, graphical user interfaces, desktop publishing (systems), word processing, advanced conference formats, the Internet itself, Ethernet, etc.
Viewpoints can make up for the lack of IQ-upholding this concept, the research team has achieved great success in scientific research.
The research team is very interested in people. We are not hermits. We live in cultural and social groups. We think about how to adapt to society, what are our responsibilities? Whether we have children or not, we all need to consider for the next generation.
Food, climate, water, health, pollution, education… these issues are all global. Children born this year will be 80 years old by the end of this century. This makes us have to think about what we can leave for the children and they will get a world that is much worse or better than it is now. It depends on our views and actions. .
Through invention, we create power, and there is a huge gap between the wisdom that humans have and the power we have. We often only have an IQ of minus 80. When we insist on the wrong point of view, we will actually be more stupid and do dangerous things. Human beings have many desires, but they are difficult to satisfy. This is a human dilemma that we must solve.
When we invent tools and express opinions with technology, we must think about what it means for humans. Artificial intelligence, computers, aided design, the Internet… When we make tools, we must understand the limitations of the tools, and use and interact with tools in a more powerful and sensible way.
I want to emphasize that when we make a tool and don’t use it for other purposes, the tool is not dangerous. In fact, if you look at it from a commercial point of view, and only in terms of market value, those successful companies have been trying to study technologies that improve the living conditions of all mankind.
Viewpoints can make up for the lack of IQ. When we have the right views, there is also the possibility of improving these views.
Create an”intelligent body” to build a full-scene intelligence together
Huawei Senior Vice President and President of Cloud and Computing Division Hou Jinlong
(Huawei’s Senior Vice President, Cloud and Computing BG President Hou Jinlong wrote”Building a City”Intelligent Body Builds All-Scenario Wisdom” Thematic Report. Hunan Daily·New Hunan Client Reporter Gu Pengbo Tongdi Photography Report)
I am very happy to participate in the World Computer Conference again. Last year, I shared with you our strategy and layout in the Kunpeng computing industry. One year later, Kunpeng on the Xiangjiang River took root on the land of Hunan and spread across the country. Today, I will share with you some thoughts on the future development of Huawei cloud and computing.
The digital economy has become the main engine of economic growth. Digital demands from governments, enterprises and industries, including those for intelligence, are constantly emerging.
In our view, the foundation of the digital economy is link and computing. 5G represents link technology, while cloud and AR represent computing technology. Industry applications are the key to releasing link and computing. 2020 is the first year of 5G, opening a new era of Internet of Everything. At the same time, computing is moving from singularity to diversification. AR has entered the main business process of enterprises and industries, making computing power and AR within reach.
The five technologies of 5G, cloud, AR, computing, and industry applications are also five major opportunities, and they have gathered together for an unprecedented time. How to achieve the synergy and integration of these five technologies? In September of this year, we released the concept of”smart body” in Shanghai.
“Agent” includes smart applications, smart hubs, smart connections, and smart interactions. The innovation of the intelligent body is the collaboration of cloud, network, edge, and end, which forms an integrated intelligent system that can perceive, think, execute, and can evolve for a city or an industry. In the construction of the transportation industry and smart cities,”smart bodies” have played a huge role.
In Hunan, we are cooperating with all walks of life to accelerate the scale construction of computing power. During the computer conference, we will jointly release the”Hunan Artificial Intelligence Eco-Innovation Center” with the Changsha Municipal Government and Hunan Xiangjiang New District. Relying on this center, it will combine with industry needs to activate computing resources and promote intelligent industrial upgrading.
In the next 5 years, the edge computing industry will have a development space of up to 500 million US dollars; the future space of the software cloud service industry will also be as high as 1 trillion US dollars. In the future, software will fully enter the era of cloud and SAS.
We hope that through the application potential energy, AR potential energy, data potential energy and other platforms, create the best SAS service and application development platform, empower local software and application enterprises, establish a prosperous software ecosystem, and promote intelligence Manufacturing, intelligent networked vehicles, and industrial Internet industries are booming.
Digital transformation is imminent and the process is accelerating
Liu Wei, global vice president of Dell Technology Group and general manager of China R&D Group p>
(Liu Wei, global vice president of Dell Technology Group and general manager of China R&D Group, made a keynote report on”Technology Empowers the Digital Era”. Hunan Daily·New Hunan Client reporter Gu Pengbo Tongdi Photographic Report)
Digital transformation is the use of digital technology to make traditional industries develop better and increase production efficiency. In the battle against the epidemic this year, the advantages of digitalization have been fully demonstrated, and digital transformation is imminent.
From the survey results, the digital transformation of domestic enterprises is advancing by leaps and bounds. From 2018 to 2020, the number of active practitioners of digital transformation in China has doubled. Especially since the epidemic, more companies have accelerated the process of digital transformation.
Digital transformation or digital architecture must be supported by a strong IT technology architecture. From the current point of view, there are several development trends that are more obvious.
The first trend is distributed integration. Convergence includes the integration of chips, products and systems at all levels. For example, at the chip level, whether it is X86 or GPU, they are all integrated into a computing platform; at the system level, thousands or hundreds of thousands of standard servers are integrated into a cloud platform and cloud computing center. For distributed fusion systems, the key element is to achieve unified management.
The second trend is super automation. Human beings have been pursuing the improvement of productivity through automation. In the past, there was mechanical automation and programming automation, but now it is intelligent automation. Artificial intelligence is used to realize the automation of processes in all walks of life. The development of artificial intelligence in the future requires the realization of scenarios, transparency and civilianization of artificial intelligence in algorithms. Customers do not need to become artificial intelligence experts, but only need to use them on the platform. The future data storage platform must have the four characteristics of multiple, fast, good, and economical, that is, it must support multiple application scenarios and multiple data forms, real-time data processing must be fast, performance, scalability, and space saving, cost-saving, Energy saving.
There is another related to information security in the multi-cloud era. In the digital information era, the entire IT technology has become a multi-cloud, IOT, and 5G-linked system. In the face of such a huge and complex system, the previous defense method of the”Great Wall” through a firewall is no longer sufficient. If you want to find a way to build a”second line of defense,” you can monitor the risks as soon as possible and use technical methods to compensate for this risk as soon as possible. The loss that comes. The software itself must have its own security function, and make full use of artificial intelligence to analyze the characteristics of the network and the behavior of users, predict possible risks, and solve the problem of security protection.
Using an endogenous security framework to reinforce the “bottom plate” of the digital age
Chairman of Qi’anxin GroupQi Xiangdong
(Qianxin Group Chairman Qi Xiangdong made a keynote report on”Using Endogenous Safety to Accelerate the Release of Computing Productivity” in the main forum . Hunan Daily · New Hunan Client Reporter Tong Di, Gu Pengbo Photography Report)
The”backplane” of the digital age is network security. If there is no network security, it is like a wooden barrel without a bottom plate. Data, network, and computing power must be based on network security.
Currently, cybersecurity in the digital age faces six major risks. First, computer software and hardware vulnerabilities are inevitable. For every 1000 lines of code written by programmers, there will be 3 defects on average; second, network protocol vulnerabilities will cause serious consequences, and hackers may launch attacks and paralyze urban communications; third, internet anonymity The architecture of the system increases security risks, without the restriction of identity, it is easy to breed cybercrimes; fourth, the network boundary is gradually opened from relative isolation, and the network attack surface is expanded, which brings new security risks; fifth, the sharing and flow of data intensifies leakage Risks, statistics show that in 2019, the number of brute-force password cracking attacks against databases exceeded 10 billion times a day; sixth,”internal ghosts” emerged one after another, and reports from many organizations showed that more than 85%of cybersecurity threats came from within.
Normal users and cyber attackers are becoming more and more difficult to identify. The previous fence-style border protection and the”post-incident remediation” and”treatment of the disease” security protection measures no longer meet the needs of the digital age. In the face of different customer subjects, complex and diverse attacks, and unbearable consequences, security protection must adopt a comprehensive defense, dynamic defense, and defense-in-depth”prevention and control” network security system.
Endogenous security system engineering, that is, the security capability is built into the business system, which has the characteristics of autonomy, self-growth and self-adaptation like the immune system, and truly achieves”prevention and control”.
There are three keys to the implementation of the endogenous security framework:building a foundation, building a system, and running to win.”Panjiadi” refers to systematically sorting out and designing all the required security capabilities;”building a system” means to componentize security capabilities and deploy them in different areas, nodes, and levels of the information environment in a scientific and orderly manner to ensure security capabilities Can be constructed, landed, and schedulable;”Run to win” means to ensure the sustainability of safe operation, to achieve closed-loop management, and to”outrun” loopholes, internal ghosts and hackers.
As a leading domestic network security company, Qi Anxin has established itself in more than 40 large-scale government and enterprise customers, including ministries, finance, energy, education, and digital cities, in accordance with the idea of endogenous security system engineering.
Editor in charge:Deng Yujiao
Source:Hunan Daily·New Hunan Client