Faced with monitoring programs of the U.S. security services, China is working on the creation of an alternative and safer Android and Windows operating system. Similar attempts have been made without success. In China, several IT players have announced the development of an OS called COS (China Operating System) based on Linux. This follows several calls Chinese publishers to break the hold of the United States on the software market in China. The operating system has grown to become a national security issue, says the company Liantong Network Communications Technology Shanghai based on the COS website. This company founded in 2012 with the support of the Chinese Academy of Sciences, closely linked to the government develops COS to wear on PCs, smartphones, tablets, and TVs. But behind the words, this initiative may take some time before becoming a reality. A spokesman Liantong said the company was already working on the integration of the OS in an Internet box. It is also in t
http://www.bnxit.com/china-reactive-creation-national-os-called-cos/
Subscribe to:
Post Comments (Atom)
Archives
-
▼
2014
(50)
-
▼
January
(41)
- Microsoft might be forced (again) to change the na...
- Microsoft facilitates the management of accounts O...
- EverNote: Sync 4 times faster after upgrading its ...
- Mobile applications, the other target of the NSA
- Information Builders launches Skybox for BI projec...
- Oracle Big Data: tangible business value
- Cisco annual security report unprecedented from ad...
- Apple quarterly, 2014: Record sales but concern ab...
- Native Windows malware tries to infect Android dev...
- ESET obtained the first position of AV-Comparative...
- Thomson is going to demonstrate the virtues of the...
- What is expected from Windows 8.1 Update 1?
- How to detect if Google has penalized us?
- Personal data: in the cloud and in the land
- Chrome goes to war against noisy tabs
- Case Target: 11 GB of data sent to a Russian server
- Fujitsu Labs invented a method for searching encry...
- China reactive the creation of a national OS calle...
- More updates for XP, except for anti-virus
- Using WiFi, Fortinet offers to track customers in ...
- The creator of BitTorrent developing a steganograp...
- Blackphone the smartphone ultra-secure Silent Circ...
- Dell relies on a security offering end to end
- NSA hacks radio waves unconnected PC
- Do Green Data Centers Exist?
- Data Center Management Through Careful Environment...
- Data Center Consolidation - What You Should Know
- How to Take Data Center Secure Backup
- Cisco Data Center Security: Taking the Next Step i...
- What Are The Technology Trends For 2014?
- Unlocking Encryption - A Method of Data Security
- Cisco - How to configure an IKEv2 Site to Site IPS...
- ASA - VPN Traffic is not being encrypted (CSCsd48512)
- Zone Based Firewall ZBFW
- Designing VPC and Routing
- Cisco Flex Link
- Understanding Cisco Nexus 2000 Series Fabric Exten...
- Distributed Firewall
- Distributed Firewall - Statefull ??
- Virtual Firewall
- Physical Firewall
-
▼
January
(41)
© Copyright 2014 - Security Data Center. Simple theme. Powered by Blogger.
No comments:
Post a Comment