Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Ren Zhengfei: network security and privacy protection are Huawei's highest program!

2025-03-26 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Recently, Ren Zhengfei issued a letter to all employees-- "comprehensively enhance software engineering capabilities and practices and create credible high-quality products--" within Huawei, and signed off personally. In the open letter, Ren Zhengfei stressed the importance of network security and made it clear that network security and privacy protection are Huawei's highest principles.

The following are the full contents of the documents issued by Ren Zhengfei:

Comprehensively improve the ability and practice of software engineering

Create credible and high-quality products

-- A letter to all staff

I am writing today to communicate with you how the company can comprehensively improve the ability and practice of software engineering. The reform of IPD 20 years ago reconstructed our R & D model, realizing the transformation from relying on individuals and accidentally launching successful products to institutionalizing and continuously launching high-quality products. So far, our products and solutions have operated safely and stably in more than 170 countries, and have accumulated and won the trust of tens of thousands of customers around the world. Today, we are at a new starting point, the development trend of comprehensive cloud, intelligence, software definition and so on, which puts forward unprecedented requirements for the credibility of ICT infrastructure products. Credibility will become the basic condition that customers are willing to buy, dare to buy and the government accepts and trusts Huawei. Credibility is not only the high-quality result of the external performance of the product, but also the high-quality process of the internal realization of the product, and the double verifiable high quality of the result and process. Only by comprehensively improving the ability and practice of software engineering, is it possible to create credible and high-quality products.

The company has made it clear that cyber security and privacy protection are the company's top priorities. We want to integrate trust and build high quality into every ICT infrastructure product and solution, and the key elements include:

Security (Security). The product has good anti-attack ability to protect the confidentiality, integrity and availability of business and data.

Toughness (Resilience). The system maintains a defined running state when under attack, including degradation and the ability to recover quickly in the event of an attack.

Privacy (Privacy). Compliance with privacy protection is not only the requirement of laws and regulations, but also the embodiment of values. Users should be able to properly control how their data is used. The policy on the use of information should be transparent to users. Users should control when and whether to receive information according to their own needs. Users' private data should have perfect protection ability and mechanism.

Reliability and availability (Reliability& Availability). The product can ensure the fault-free operation of the business for a long time in the life cycle, has the ability of rapid recovery and self-management, and provides predictable and consistent services.

Comprehensively improving the ability and practice of software engineering is related to the future survival and development of the company, and is closely related to each and every one of us. Here, I hope that all employees, especially software engineers, will take the initiative to participate, start with themselves, and work together to create credible and high-quality products.

We should change our concept and pursue to create credible high-quality products, not only the high quality of functions and features, but also the high quality of the product development to delivery process. We know that functions and features are critical to the product, and we know that progress is also critical to meeting customer needs. Today, we want to make credibility a top priority, above functionality, features, and schedule. Unless customers trust our products, none of these excellent features have a chance to be of value. Our managers at all levels and all staff should not reduce credible requirements on the grounds of progress, functions, features, etc., to ensure that credible requirements do not deform in the implementation process.

We should start with the most basic coding quality and regard high-quality code as dignity and personal reputation. The code is like a brick by brick of a high-rise building. Without high-quality code, a credible product is a castle in the air. We should optimize and follow the company's programming standards, follow the architecture and design principles, skillfully use various programming libraries and API, and write concise, standardized, readable, robust and safe code.

We should have a deep understanding of the core elements of the architecture and carry out the architecture and design based on the trust orientation. On the premise of ensuring credibility, we should make a good tradeoff in terms of performance, function and scalability; carefully define our modules and interfaces to achieve high cohesion and low coupling; we should follow security design principles such as minimization of permissions and attack surfaces, and scientifically design isolation and interfaces between modules to improve security. Low-level architecture and design should follow high-level architecture and design principles, and continuously optimize while fully understanding the original architecture and design; we should be familiar with various design patterns, reuse common mature components and services, and avoid duplication of work.

We need to reconstruct corrupt architectures and historical codes that do not meet software engineering specifications and quality requirements. We know that no matter how good the structure is, its vitality is limited. With the passage of time, changes in the environment and the introduction of new technologies and features, the architecture will also be corrupted. In the face of a corrupted architecture, don't hesitate to reconstruct it. At the same time, it is actively guided by the trusted design principle to reconstruct the historical code that does not meet the software engineering specifications and quality requirements, so as to enhance the vitality of the software architecture.

We should delve deeply into software technology, especially security technology. Software technology is the basic tool for us to build our products. Whether the technology is advanced or not and whether the technology choice is reasonable will determine the height of our software. We need to learn in depth the technologies of architecture and design, coding, testing, security, usability, performance, maintainability, experience, and so on, and apply these technologies scientifically.

We must abide by the consistency of the process. Comply with applicable laws and regulations, follow industry consensus standards and norms, and ensure consistency from specification to implementation and from code to binary. The architecture should comply with the architectural principles, the design should follow the design pattern, the code should conform to the programming specifications, and finally achieve the consistency of requirements and implementation, and achieve various promises to customers. Only when we do every step in a down-to-earth way can we really create credible and high-quality products.

To this end, we should change our behavior habits and pursue high-quality products. We should be open, transparent, positive and brave to reveal problems and take the initiative to promote improvement. Software development is a kind of creative and artistic work, which needs to give full play to our intelligence and potential. We should change the behavior habit of only paying attention to functional results rather than code quality, strictly abide by software engineering norms, change passive tinkering, change fragmented knowledge acquisition, and actively learn to improve and contribute experience and code. form a shared knowledge base. There are still many behaviors and habits that we need to change, which will be a painful process for most people and will be peeled off, but I believe you will be able to meet this challenge.

More importantly, we will form a set of process, organization and assessment mechanism to adapt to the above changes through change. We need to improve and strengthen the transparent, retrospective and auditable whole process management mechanism, from a credible perspective, from the initial design, complete construction to product life cycle management, and comprehensively enhance the capability and practice of software engineering. We will comprehensively strengthen the code review and submission mechanism with the Committer role as the core, so that the code can be incorporated into the version after more rigorous and systematic review. To this end, we will establish a higher level of Committer role group, responsible for the care of software architecture, code review and submission, and ensure the high quality of integrated code as a whole. We should change the assessment mechanism, make people with good architecture design and good code stand out, and give help and training to those whose programming ability does not meet the requirements. But anyone who writes code that doesn't fit into the version for a long time will be abandoned by the team.

Over the past hundred years, many successful companies in the world have collapsed because they are unable to adapt to change. To adapt to external changes, only self-evolution, we must maintain openness and continuous change. The board of directors has decided that the overall improvement of software engineering capability and practice will be carried out in a changed way, under the overall responsibility of Xu Zhijun, the rotating chairman, with an initial investment of 2 billion US dollars and a plan to spend five years to achieve the goal of creating credible and high-quality products for customers in the field of ICT infrastructure. I hope you will support and actively participate in this great change. Only in this way can we achieve our vision and mission for the future: to bring the digital world to everyone, every family, every organization, and build a smart world of the Internet of everything.

Ren Zhengfei

December 27, 2018

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report