The 2024 Innovation and Development Conference on Information Technology Application was recently held in Beijing, at which a series of advanced information technology innovation achievements were announced that have significant application effects and advanced industrial forces.
At the event, multiple new products and technologies, including ones developed by Asiainfo Security, TongTech, Beijing Honor Trends and Loongson Technology in the Beijing Economic-Technological Development Area (Beijing E-Town), were selected as typical innovative solutions for information technology applications in 2023 by the Ministry of Industry and Information Technology.
Asiainfo Security's "Integrated Endpoint Security Operations Solution" focuses on governmental office automation and governance of extranet security scenarios, aiming to safeguard enterprise digitalization. The company’s next-generation endpoint security solution TrustOne innovatively introduces attack management and integrates endpoint security atomic capabilities such as antivirus, zero trust and desktop control.
TongTech's "Distributed Data Cache Solution" has a high-speed data reading and writing mechanism based on memory, which is an important way to improve performance of the application system and accelerate data processing. This solution has been implemented in over 150 projects in industries including finance, transportation, military industry, government, telecommunications, and central enterprises.
The "AIoT-based Laboratory 'Bio-Safety Online' Intelligent Supervision Solution", developed by Beijing Honor Trends Co, Ltd, conducts real-time data collection and monitoring through the bio-safety supervision terminal and the laboratory intelligent supervision platform. It can significantly enhance laboratory bio-safety risk control and early warning capabilities.
Loongson Technology's "New Generation Cloud Solution for Innovation in Information Technology Applications Based on Domestic Chip Cryptographic Security" aims to address potential security risks such as user information misuse and privacy breaches that may exist in traditional cloud platforms. It can be widely applied in important areas such as e-government, finance, energy, transportation and communication, empowering the construction of cyber security capabilities for critical information infrastructure and new infrastructure networks.