Light Novel Pub

Chapter 276: Prohibited Research

Chapter 276 Prohibited Research

The meeting had barely ended when a new assessment came out.

This new system was formed after Lu Shan conquered the American mathematics community. The specific measures are to strengthen the collection of relevant information about Lu Shan, including his academic, career, and personal life.

Less than half a month after Lu Shan returned, Mathematics Weekly collected new information and reported the matter. The superiors were shocked when they heard it.

"Why do you always send us news so late? Where have you been?" The US security department and the Computer Network Security Association quickly convened a large number of professors to discuss this matter. Interestingly, the people who attended this meeting were highly overlapped with those who attended the previous meeting.

The editor-in-chief of the Annals of Mathematics looked helpless. After Lu Shan and Tang Yi collaborated to publish a paper, Princeton had already reminded everyone to pay special attention to Lu Shan, but no one took it seriously.

It was not until Lu Shan published two papers in the United States, which shocked the American scientific community, that people began to take Lu Shan seriously.

The problem is, the information collected by the Mathematical Annals is that Lu Shan fought a real battle with 306 and won, and then Lu Shan founded Zemeng Company, which is currently focusing on network security business.

All these things Lu Shan did were done before he came to the United States. At that time, the United States did not pay too much attention to Lu Shan.

In addition, Lu Shan's fight with 306 was a private act, and 306 announced that Zemeng Company had broken through its firewall. At that time, Zemeng Company had just been established and few people knew about it.

It's a slap in the face, a complete slap in the face. The blame lies in the fact that Lu Shan returned from the United States in less than a week. If he had stayed for another week, everything would have been clear.

According to the evaluation of mathematical journals, the results of Siegel's zero-point problem had been used to develop security business before Lu Shan came, and now he may be using the Riemann hypothesis and subsequent research to come up with new network security methods.

There is not much basis, but Zemeng Company has received more orders, most of which are from specific departments and institutions of Xia Country, with high levels and high confidentiality levels.

It took me a lot of twists and turns to get this information, so it's impossible to know the details.

To be fair, it is already remarkable that a mathematics journal can obtain this information. After all, it is not a professional intelligence agency. I believe that the security department will pay more attention to this matter in the future and collect information more accurately and quickly.

It’s useless to talk about this now. What’s useful is what should we do?

After intense and heated discussions, three measures were finally formulated to deal with Lu Shan’s problems in a targeted and proactive manner.

The first measure is to let Princeton University take the lead and contact Tang Yi and other well-known Chinese scholars and professors in the United States to find a way to let Lu Shan return to the United States to work, and all treatment will be easy to negotiate.

Even Lu Shan's companies can be relocated here. The United States can provide land, workers, and orders to ensure that Lu Shan's business will be further developed. At this point, the people at the meeting scolded Intel and AMD as pigs, and asked why they didn't use this opportunity to bring Lu Shan's companies to the United States?

But this matter is just talk. Everyone present knows the nature of capital. Who would watch a new technology company appear? And it is from Xiaguo, and it is engaged in industry. Who can allow this?

The second method is to let Princeton University take the lead and find a way to start more research on the Riemann hypothesis based on the result given by the proof of the Riemann hypothesis, with a focus on research in artificial intelligence, network security and other aspects.

The specific method is to let Lu Shan provide more details. Princeton will use cooperation as a bargaining chip to coerce Lu Shan, but the intensity must be controlled so as not to offend him completely.

The most important thing is that Lu Shan's research should be done in a timely manner. The final solution is for the Association for Computing Machinery (ACM) and the Wireless Communications and Internet Association (CTIA) to jointly issue an announcement prohibiting the use of advanced mathematical research in illegal computer security attacks. If anyone violates the rules, the relevant services and products will be boycotted.

This seems nonsensical, but it is very malicious. Whether advanced mathematical research is used for attack and whether it is illegal is up to the United States to decide. Do other organizations have the right to speak?

The joint statement is similar to those arms treaties, which allow the United States to do what it wants but not others. The governor is allowed to set fires, but the people are not allowed to light lamps.

After the joint statement was released, the computer and network industries in the United States and the West responded one after another.

The American elites are not stupid. They know that the solution to the Riemann hypothesis means that Xia has terrible potential in this area.

The level of protection can be improved, and the improvement in attack methods will only be more obvious.

Unexpectedly, many Internet companies in Xia country also responded to the joint statement of the United States, expressing their respect for the joint announcement of ACM and CTIA.

This made Zhou Hong from 306 very angry. Although his nickname was the leader of online hooligans, his values ​​were still very positive. At least he would not do such a servile thing.

Zhou Hong has always been following his own technical path. Although borrowing or even plagiarizing is inevitable, at least he tries his best to avoid it.

"They are all spineless! How could I be born in the same country and the same era as these things? Ha! Disgusting! Bah!" Zhou Hong cursed fiercely, but this is the company, so he lowered his voice, but the anger in his heart could not be suppressed at all.

A feeling of powerlessness welled up in Zhou Hong's heart. Xiaguo's computer industry has always had a weak presence in the world and no voice. The most important thing is that Xiaguo has not established its own industry standards, but has adopted Western standards.

306 was an early reference, but it is trying to make changes, however, other Internet companies in Xiaguo accepted it completely and did not make any progress.

However, this is just an existing phenomenon, and no specific standards have been formed to require compliance. Now that the relevant standards announced by the West have not yet required any company to implement them, the domestic network security companies in Xiaguo have taken the lead in surrendering and saying that they will definitely comply. This kind of flattery made Zhou Hong sick.

After calming down, Zhou Hong used his connections to find out the background of the statement. Why did the United States suddenly say this? It was likely that someone had touched its related interests. Following this line of thought, it would be much easier to find the truth.

Soon, Zhou Hong understood the real reason and was completely stunned.

He also knew about Lu Shan's affairs, but he didn't expect that he alone would cause such unrest in the entire West.

The West prohibits the use of advanced mathematical research in the field of illegal computer security attacks. The fundamental reason is that they are afraid that Lu Shan will use the results of the Riemann hypothesis to create something beyond this era, thus putting the West in a passive position.

(End of this chapter)

Loading...