Chapter 1164 Cooperative Operation Department
Chapter 1164 Cooperation Operations Department
Author: Friend of the Sorceress
Chapter 1164 Cooperation Operations Department
The responsibilities of the Jiuzhou Technology Cooperation Operations Department are to lead or participate in the product development and market bidding of cooperative enterprises. At the same time, it builds a communication bridge between Jiuzhou Technology R&D technology and cooperative enterprises, promotes the technological integration between cooperative enterprises and the company, and improves cost and product supply.
Competitive advantage in capabilities and functionality.
The Engineering Procurement Department of Jiuzhou Technology will actively participate in the production of customer bids together with the Cooperation Operations Department.
Participating in market bidding will enable the purchasing department to understand the needs of customers for supporting products, and fully understand the commitments made by Jiuzhou Technology to partner enterprises early in the order fulfillment process to ensure that solutions meet customer needs and can be delivered in a timely manner.
Production procurement and administrative procurement are responsible for daily procurement operations and communication with cooperative enterprises, handling procurement requests in a timely manner and solving problems between both parties.
From within the industry, Jiuzhou Technology's purchasing department and operations department directly regard cooperative enterprises as core customers, but their authority is not simply "purchasing", but the management of cooperative enterprises and material management under the Jiuzhou industrial system.
After all, all the purchasing department of a typical enterprise can do is perform procurement and price negotiations.
In addition to procurement and operations, Jiuzhou Technology has also developed a complete value judgment process for partner companies to ensure that the company selects partners that best serve its own company's interests, and at the same time ensures that Jiuzhou Technology provides equal opportunities to all partners of the same level.
The selection team for technology decentralization is generally formed by a team of relevant experts and the technology R&D department. This team manages the selection process for partner companies to accept technologies.
The Partner Enterprise Feedback Office is a department under the President's Office. If the partner enterprise has any dissatisfaction in its interactions with Jiuzhou Technology, there is a dedicated help center responsible for collecting feedback and complaints.
Each technical cooperation project has a corresponding interface person within Jiuzhou Technology, who is responsible for the interface and communication with the cooperative enterprises. The cooperative enterprises can also send important events and serious violation complaint information to the official email of Jiuzhou Technology (jiuzhoukjjd@jiuzhoukeji.com)
, this mailbox is specially set up for this purpose to ensure the confidentiality of feedback information and quick response.
"Establish long-term cooperative relationships based on trust, honesty and candor. Resolutely avoid damaging the overall best interests of Jiuzhou Technology and cooperative enterprises due to local or departmental interests.
Observe business ethics. If at any time the supplier feels that the implementation of this policy is compromised or contrary to the policy, please report your concerns to the Jiuzhou Technology Cooperation Operations Department Office. We will investigate and deal with it based on the principles of respecting the facts and being cautious and thorough.
And keep the confidentiality of the feedback giver.”
Yu Chengdong whispered these words in the contract with cold eyes.
Today, he is responsible for the introduction of Jiuzhou Technology’s regional special network communications and dual-satellite system positioning technology.
The budget given by the company is quite large, but not too much.
"With these two technologies, regardless of the frequency of use, you must pay for installation and use. We at Xia Wei agree with this.
In our opinion, this technology is one of the core competitiveness of mobile phones, and there is no need to hesitate.
However, your company requires that the service sign a confidentiality agreement with users separately, that all information must be transmitted through encryption, and that it does not provide our company with a data interface. I think both of us need to discuss this.
Our company's Hongmeng system has the highest standard security certifications from many authoritative organizations at home and abroad, including the world's first to obtain ISO/IEC 27701 certification and Daxia's highest standard EAL4+ security certification.
And each protection level data of our Hongmeng system needs to provide security protection of different strengths according to the corresponding security policies from the time it is generated to the entire life cycle of its storage, use and transmission.
Each data will be labeled with a corresponding label when it is generated. This label will accompany it throughout its life, guiding each node of the super virtual terminal to provide it with consistent strength of security protection.
At the same time, the access control system of the super virtual terminal supports access control policies based on labels to ensure that data can only be stored, transmitted and used between nodes that can provide sufficient security protection. Devices with a low security level cannot access devices with a high security level.
Some data that are more sensitive and have a higher risk level.
Therefore, it is impossible for our company to hand over users' sensitive information to any other company."
Yingshu looked at Yu Chengdong, who had a serious face and a strong sense of justice, with a dull look. He waited until the other party finished speaking before holding on to the microphone at hand.
"This user data will be solely responsible for the Cloud Jiulong Big Data Service Company. I believe that once users are eager to use these two technologies, it is usually when the signal environment is poor. In a potentially dangerous environment, our company believes that it will be important
It’s right to hand over your data to the world’s most secure and fastest-responsive big data service company.
Or, Mr. Yu, do you think your company’s data security protection capabilities and information transmission capabilities can surpass those of the Cloud Jiulong Big Data Service Company?”
When Yu Chengdong heard this answer, he was instantly speechless.
His mouth opened slightly and his eyes were stunned.
Since Jiuzhou Technology entered the field of intelligent systems, all service requests and data storage of its products have been processed by the servers in Daxia of Jiulong Big Data Industry Development Co., Ltd. in the cloud.
As an insider, Yu Chengdong knew clearly that this company was a special enterprise in which Jiuzhou Technology exchanged technology and certain intellectual property rights, and Daxia Panda Electronics Group, which had a background in Daxia Junfang, held 51% of the shares.
The most important thing is that this company is already responsible for some foreign official data security services. In the world of network data security, the young man in front of you may not be scary, but the genius behind this young man is truly terrifying.
Demon King.
The network engineers in my company usually think hard about how to achieve the data protection capabilities of Cloud Nine Dragons. Naturally, it is impossible to defeat the opponent in this aspect.
Zeng Xin, the person in charge of Yunzhong Jiulong Big Data Company, was sitting aside, looking at Yu Chengdong's embarrassed expression and thinking of helping him out.
Said: "Actually, regarding data security issues, our company is only a small company founded a few years ago. Xia Wei has always made great achievements in this aspect. We should learn from each other and make progress together."
If Xia Wei is willing, our company can also be responsible for some of your company's data security services."
Um?
Yu Chengdong opened his mouth, wanting to take out his Xia Weiyun technology and throw it at him. But looking at the experts who had retired from the units beside him, he finally managed to smile and said: "Our company's data security services are at the top level in the world.
, I believe that we can definitely make progress by learning together."
Chapter completed!