The concept of "meta universe" has become a big hit recently, because NVIDIA CEO Huang Renxun created a virtual version of "the online world parallel to the real world" Huang Renxun.
With the development of science and technology, can we humans really create a " parallel space-time " belonging to our humans?
If this technology full of black technology can be widely used, I am afraid it will have a great impact on many industries.
If we further decompose the core elements of the meta-universe, the "parallel space-time" of this virtual digital world needs to do the following four points:
1. Simultaneous simulation;
2. Open source creation;
3. Perpetual closed loop;
4. Data support.
Further technical analysis requires the integration of big data, artificial intelligence, communication technology, digital twins, blockchain, VR/AR, 5G and many other cutting-edge black technologies.
In 2021, Gartner proposed ten major data and analysis trends from the three dimensions of accelerated change, operational business value, and distributed entities, indicating specific technological developments for the development of "information space" under the strategy of intelligent support for data and information direction.
even said that if the current hot "meta universe" concept is to be firmly implemented, these technologies need to be combined.
In the cloud computing industry, the latest generation of private cloud technology, including edge computing + distributed + full stack + ecology, requires software and hardware decoupling to realize software evolution , The hardware can be replaced in order to truly release the value of the cloud platform for a long time and create a more efficient virtual space world.
is like Tesla under the leadership of Musk ,It is the first to create a new generation of automotive software operating system, decoupling the hardware and software of the car, making it a reality for software to define a new generation of cars.
But from the current point of view, whether it is a "meta universe" or a digital economy, the biggest opportunity and challenge that will be faced in the future lies in the data security of the virtual world.
At present, our country has successively promulgated the "Civil Code", " Personal Information Protection Law", " Data Security Law", " Cyber Security Law", "National Security Law", " Critical Information Infrastructure Security Protection Regulations and many other important laws.
Among them, 2021 is a decisive year:
1. The "Data Security Law" will be officially implemented on September 1, 2021.
2. The "Regulations on the Security Protection of Critical Information Infrastructure" will be formally implemented on September 1, 2021.
3. The "Personal Information Protection Law" will be officially implemented on November 1, 2021.
Take the "Personal Information Protection Law" which is closely related to each of us, and put forward the famous "two minimums" principle-the smallest impact and the smallest scope.
This is the core principle to be followed in the processing of personal information, especially the "minimum range" of the processing destination, which is to prohibit any unit or individual from "excessive collection of personal information".
Therefore, the sensitive personal information involving each of us needs to fulfill the principle of "information-informed-consent". This maximizes the protection of everyone's data privacy and security in the virtual world.
In the past few years, personal information was over-collected, abused, and leaked, resulting in frequent violations of the rights and interests of our citizens.
Nowadays, under the protection of this law called the "Emperor's Principle", I believe that the previous "big data kills", "is agreed to use" and many other unreasonable clauses are no longer visible.
Therefore, "true security" in the information space needs to include four security pillars,They are:
1. Physical center security, that is, the security of storage, network, server and other hardware itself.
2. Basic platform security, that is, the security of the virtualized and clouded software platform.
3. Identity authority control, that is, to protect our identity authority and security from fraudulent use, abuse, or overuse.
4. Data classification rules, in accordance with the laws that have been promulgated, scientifically classify commercial data and personal data.
is deduced based on the logic of personal privacy protection and security. In Oriental Linyu's view, the most noteworthy technologies are edge computing, cognitive intelligence, privacy computing, and zero trust technology .
As described in the Gartner report, in the era of big data, in the protection of data and privacy, more "small" and "wide" data needs to be used. These "small data" are like capillaries. The "last mile" of big data, therefore, 2020 to 2030 will be a critical decade for edge cloud computing to flourish It is 9.1 billion yuan, of which the regional, on-site, and IoT edge cloud markets have reached 3.7 billion yuan, 3.8 billion yuan and 1.6 billion yuan respectively. It is estimated that by 2025, the overall edge cloud scale will grow to 55 billion yuan at a compound annual growth rate of 44.0%.
If these technologies will be perfected, and with the help of meta-universe technology, each of us can create a "parallel space-time" ourselves. Isn't it something to look forward to?
.