How far is the gap between domestic chips and imported chips? Can the localization of the chip depend on BAT?

Recently, because ZTE was subjected to US sanctions and a WeChat brush-up article of the assistant of the year, Ni Guangnan, a 79-year-old Chinese Academy of Engineering academician, was pushed to the headlines of various media. His efforts for domestic chips and operating systems have been raised again by the world. How did he see the ZTE incident? How far is the gap between domestic chips and imported chips? Can the localization of the chip depend on BAT? Ni Guangnan recently responded to the above hot spots.

How far is the gap between domestic chips and imported chips? Can the localization of the chip depend on BAT?

Opinion one

Chip gaps cannot be generalized. Some of the more special chip areas in the past have not received enough attention. There is a gap with foreign countries, not because we really can't do it. In the past, there was a widely spread saying that shipbuilding is not as good as buying a ship. It is better to buy a ship than to rent a ship. Without considering security, if a technology may require a long period of time for independent research and development, the fastest and cheapest way is to buy ready-made. However, what we experienced most when developing large computers was that the real core technology could not be bought.
From the chip industry, it can be divided into two parts: design and manufacturing. China's design level is ok, and the biggest short board is in manufacturing. Chip manufacturing is close to traditional industries, involving a series of problems such as equipment, materials, processes, packaging and testing. It requires long-term investment and a large amount of capital. Without a few billion yuan, it may not form a production line. In the past, we have not invested enough in chip manufacturing. It may take about 10 years to catch up with developed countries, and at least several hundred billion yuan of continuous investment.

View two

Without an alternative, it is impossible to establish its own ecosystem. There is a process for the development of everything. China is in an available stage in the field of network information. The so-called available, can be used, but the price is not good enough, some applications can not adapt. It's not bad enough to be used, and it's not good enough. Therefore, the top-level design should increase its efforts to break through some areas that are not available at all, further support the currently available areas, and develop in a good direction until all parts are 100% usable.
From the perspective of system construction, the chip and the operating system form the basis, plus the software and hardware components system, and then develop a large number of applications to form support for the system, this is an ecology. The development of ecology is not a one-off event, it needs to be accumulated, especially when we are in the position of a latecomer, and the first-come-first has achieved monopoly. Microsoft's ecosystem in the desktop space has been around for 25 years since the 1993 Windows 3.1 application promotion. But on the mobile side, it did not succeed in forming its own ecology, and it was squeezed out by Apple and Android.
In the past, we did not have enough ecological support for many systems. We should realize that without a substitute, we can't build our own system. To build an ecological environment requires accelerating the replacement process. In this respect, the government's leadership is very important. On the one hand, users are already very familiar with existing products, are unwilling to bear the cost of substitution, and are unwilling to learn new things. On the other hand, the reasons are the suppression of monopoly giants, such as the flooding of the Chinese market in the early years. The pirated Windows operating system, Microsoft may not be clear? In fact, this is a free marketing strategy they have taken to combat domestic operating systems.
In addition, the government's leading role should also be reflected in the integration of resources and avoiding internal friction. At present, there are about seven or eight companies that develop operating systems based on liunx in China. Each of them has hundreds of employees, and they have no single heads with Microsoft.
It can be seen that in the process of replacing domestically produced independent brands, we should give full play to the advantages of China's concentrated efforts to do major events, led by the state, and the society keeps up. For projects involving major investments, large numbers of scientific researchers, and supporting projects throughout the industry chain, the state has the responsibility to integrate the decentralized forces to form a unified standard and compete with developed country multinationals under the same system.
The conditions for China to catch up with the world's advanced level have been much better than the past. If the chip is not autonomic, there may be a problem with the implementation. The central government has a good top-level design for promoting domestic autonomy. The executive department and the project should be done according to the route map. Don't forget to walk and walk, the relevant departments should correct it in time.

Opinion three

The security of network security can not be the gap between the chip and the chip. It is not the key to the ZTE incident. The key is to expose that our concept of self-control in the field of network is not strong enough. The supply chain is risky and easy to be caught.
However, the ZTE incident has not fully exposed our risk in the security of the network. In the traditional industry, the safety of a product is reflected in the quality of life without the quality problem, and the safety of its own product is expected. While network security is unpredictable, the risks of hacker attacks, backdoors, and passwords do not exist in traditional products. The "Prism Gate" incident shows that the core technology is subject to people, and the information may be monitored by others; the Ukrainian power grid is hacked and the Iranian nuclear power plant is attacked. If the core technology is not mastered, the national security will be caught.
Network information products must be self-controllable, secure, reliable or secure. This includes two levels: First, network information products must guarantee quality as well as traditional products. Second, products must be able to defend against network attacks and ensure information security. As for the leaked information.

Yuchai 21-75KW Diesel Generator

Yuchai 21-75Kw Diesel Generator,Yuchai Container Power Generator,Yuchai Portable Power Generator,Yuchai Open Type Power Generator

Shanghai Kosta Electric Co., Ltd. , https://www.generatorkosta.com