The cross of "don't touch applications above, don't touch data below" is enough to let many small and medium-sized security manufacturers who had been living in frustration before breathe a sigh of relief, and finally find a big tree that can give full play to their strengths while avoiding wind and rain.
From the perspective of Huawei and other manufacturers, their advantages lie in their strong technical accumulation, strong top-level design capabilities, and a certain customer relationship foundation; their challenges mainly come from their insufficient understanding of the industry and lack of product coverage.
Of course, how the security business of Huawei, Alibaba and other companies will develop in the future will depend on how much effort they put in.
After all, security is life for Hikvision and Dahua, but for Huawei and Alibaba, it is just a choice.
The transformation has just begun
Some people say, "Security has not changed, it just continues to grow in a different way, and it is growing wildly."
In the past, the efficiency of monitoring operations was likened to bicycles, but now it is high-speed rail; in the past, your opponents were traditional security players, but now there are Internet communication companies such as Huawei, Alibaba, SenseTime, and Megvii; in the past, hardware was king, but now it is the software era; in the past, it was To G/B/C, but in the future there will only be To S (society).
All of this is due to the changes brought about by new technologies such as AI. Before the arrival of AI, the security industry served more governments and police departments. After the arrival of AI, the functions and market of video surveillance were magnified hundreds of times, bringing new desires, new demands, and new directions.
The iteration of technology always drives us to pursue "new", but "new" is always fleeting and will be replaced by newer things in the never-ending changes.
For security, the new "revolution" has just begun, and everything is still the prologue.
Previous article:Naked Internet of Vehicles: Hacker Control, Harassing Calls, Spam Text Messages
Next article:List of the most frequently hacked passwords
- Popular Resources
- Popular amplifiers
- Mir T527 series core board, high-performance vehicle video surveillance, departmental standard all-in-one solution
- Akamai Expands Control Over Media Platforms with New Video Workflow Capabilities
- Tsinghua Unigroup launches the world's first open architecture security chip E450R, which has obtained the National Security Level 2 Certification
- Pickering exhibits a variety of modular signal switches and simulation solutions at the Defense Electronics Show
- Parker Hannifin Launches Service Master COMPACT Measuring Device for Field Monitoring and Diagnostics
- Connection and distance: A new trend in security cameras - Wi-Fi HaLow brings longer transmission distance and lower power consumption
- Smartway made a strong appearance at the 2023 CPSE Expo with a number of blockbuster products
- Dual-wheel drive, Intellifusion launches 12TOPS edge vision SoC
- Toyota receives Japanese administrative guidance due to information leakage case involving 2.41 million pieces of user data
- Innolux's intelligent steer-by-wire solution makes cars smarter and safer
- 8051 MCU - Parity Check
- How to efficiently balance the sensitivity of tactile sensing interfaces
- What should I do if the servo motor shakes? What causes the servo motor to shake quickly?
- 【Brushless Motor】Analysis of three-phase BLDC motor and sharing of two popular development boards
- Midea Industrial Technology's subsidiaries Clou Electronics and Hekang New Energy jointly appeared at the Munich Battery Energy Storage Exhibition and Solar Energy Exhibition
- Guoxin Sichen | Application of ferroelectric memory PB85RS2MC in power battery management, with a capacity of 2M
- Analysis of common faults of frequency converter
- In a head-on competition with Qualcomm, what kind of cockpit products has Intel come up with?
- Dalian Rongke's all-vanadium liquid flow battery energy storage equipment industrialization project has entered the sprint stage before production
- Allegro MicroSystems Introduces Advanced Magnetic and Inductive Position Sensing Solutions at Electronica 2024
- Car key in the left hand, liveness detection radar in the right hand, UWB is imperative for cars!
- After a decade of rapid development, domestic CIS has entered the market
- Aegis Dagger Battery + Thor EM-i Super Hybrid, Geely New Energy has thrown out two "king bombs"
- A brief discussion on functional safety - fault, error, and failure
- In the smart car 2.0 cycle, these core industry chains are facing major opportunities!
- The United States and Japan are developing new batteries. CATL faces challenges? How should China's new energy battery industry respond?
- Murata launches high-precision 6-axis inertial sensor for automobiles
- Ford patents pre-charge alarm to help save costs and respond to emergencies
- New real-time microcontroller system from Texas Instruments enables smarter processing in automotive and industrial applications
- How many read and write clock cycles does SRAM have?
- Mini OLED Game Console
- How does a trace moisture meter perform for factory equipment testing?
- Oximeter Principle
- Playing with Zynq Serial 26 - Functional Simulation of PL in Vivado
- EMC testing of Bluetooth electronic products powered by lithium batteries
- Playing with Zynq serial 8 - Installing Linux cross compiler under Ubuntu
- About the disassembly and welding of this type of module
- [Repost] Introduction to the application of hard-flex PCB
- What is the output/input impedance value of CC2xxx?