On the road of intelligent hardware innovation, information security must be absolutely guaranteed.

Recently, the secret dispute between the wearable device Fitbit and Jawbone has made new progress: the judges of the San Francisco High Court ordered the five employees of Fitbit to return the confidential information they carried when they left the competitor Jawbone, which means that Jawbone is in this trade secret. The initial victory in the lawsuit is not far from winning the lawsuit. Previously, Jawbone accused Fitbit's five employees of stealing the company's trade secrets. He believed that Fitbit had developed a meticulous digging plan to obtain Jawbone's trade secrets.

At the moment when mobile phone manufacturers frequently blame each other, it is rare to see similar legal disputes surrounding employees. At most, patent disputes can be seen by patents and do not need to be stolen. The mature mobile phone industry lacks the need to pass core employees. No one cares about the core technology that can be "acquired" or whether the industry is doing this.

Intelligent hardware innovation, information security must be absolutely guaranteed

The smart hardware industry is different. This is a relatively new field. Many devices have many innovations and even unique skills. For example, the Fitbit mentioned above, the algorithm of the bracelet's accuracy on motion recording is unmatched. Another example is China's most well-known intelligent hardware startup team, Shenzhen DJI (DJI), which has the technology that allows the drone to maintain sufficient stability during flight to support the quality of the shooting. This technology is beyond the reach of its competitors and becomes DJI. The nirvana of the world.

In fact, Dajiang had encountered such troubles before. Colin Guinn, the former head of North America in Dajiang, left DJI for reasons such as disagreement with the company, and joined the former editor of Wired magazine. 3D RoboTIcs, founded by Chris Anderson. This company has become a major competitor of DJI in North America. What Colin Quinn brought to 3D RoboTIcs is a mystery, but some people say that it was Colin Quin's joining, 3D RoboTIcs rose quickly.

Dajiang is strengthening the management of the core technology of drones. A person close to Dajiang revealed that the "top secret" technology, which is regarded as the core competitiveness, is not accessible to outsiders and even some employees. In the most famous technology circle recruitment platform, DJI is also recruiting senior information security management engineers with a monthly salary of 15k-30k, which is responsible for further strengthening the company's information security management.

For Chinese companies that attach great importance to information security, I also thought of one: Huawei, the only Chinese mobile phone manufacturer with chip development technology, all employees' computers have strict access restrictions, including Internet access, U disk and other external storage. The access rights of the device are almost strict. No one can deny that Huawei has a large number of core technologies, whether in the field of communication equipment or consumer electronics.

So what are the conclusions we have drawn? The more companies with core R&D technologies, the more they should focus on information security protection.

Intelligent hardware team, compared with the Internet or O2O team, needs to pay more attention to information security, because many intelligent hardware have core technologies, such as 10% power saving compared with similar devices, and the connection speed is significantly improved, especially the smart water cup. Behind these new areas of electronics, technology is behind.

This is not a concept with patent protection. Patent protection is "prevention of plagiarism", and information security protection is more "preventing leakage and even stealing". Of course, patent protection is the most basic, but many core technologies may not be able to apply for patents. The core technology is in the hands of a few people, just like DJI.

The intelligent hardware team with core technology should set up a dedicated CSO (Chief Security Officer), or other TItle, responsible for the company's information security and strengthen information security management. This includes the formulation and implementation of employee confidentiality agreements, competition agreements, the establishment and implementation of information security management control systems, the monitoring and accountability of confidential information disclosure, and the designation of information security manuals for employee information security awareness education. A team with economic strength can also purchase professional third-party information security services or consulting.

Internet companies often do PR with internal letters, chat screenshots, etc. The information security environment is indeed worrying. Most of the intelligent hardware teams are self-proclaimed as Internet companies, trying to make themselves more "Internet thinking", but I am afraid that I need to be more concerned about information security. For example, you should use specialized team collaboration tools for collaboration and not rely too much on WeChat groups. For example, the company's mailbox adopts a dedicated system instead of a public mailbox such as NetEase mailbox, which has recently been leaked out of a large number of account passwords. On security software, you should purchase a more professional security system instead of using a free tool... shredder? The intelligent hardware team can consider getting one.

Featuring an original and unique design, our tattoo chair is made of  nice touching upholstery. It has been developed for professional tattoo artists.

A totally innovative product that features an impressive look, adapted to the sector needs and that will make your job very comfortable.

Tattoo Bed

Tattoo Bed,Hydraulic Tattoo Bed,Tattoo Massage Table,Portable Tattoo Bed

TOM SPA BEAUTY SALON EQUIPMENT CO.,LTD , https://www.tomspabeauty.com