l analysis they are to protect their information resources is not the enemy to steal, to protect their own channels of information transmission without enemy interference; destroy the enemy's information transmission channels, seize enemy. Wang Gang presided over the charge of the work of the Central Military Commission attaches great importance to the the Zhezhi special forces With the substantial growth of military spending,jerseys discount, the force to improve quality at the same time,arizona state baseball jersey, the preparation also significantly expanded. Their task is too heavy.
To build our own computer network system at the beginning of the year that they planned action. In terms of military computers, they developed a series of computer of our military in particular is a huge amount of embedded single-chip computer, and the development of a bottom-up data bus can easily connect them to various types of networks. Developed with the computer system of the Russian armed forces, as well as the U.S. military 1553B data bus interface, data and instruction transfer with them very easily. Developed operating system is fundamentally anti-virus management control than civilian computer systems are more stringent. This system has completely put an end to the U.S. It should be said that the U.S. military computer Warfare Center Dr. were the first to feel the enhancement of our army's military power. The results of these studies are only now be possible to achieve, because the investment in each project involved a huge investment and technical personnel.
A
No comments:
Post a Comment