If the Internet is compared to a battlefield, then Chen Yao and his team are on the road to war.
Leading the army continues to advance forward, but the further back, the more difficult it becomes.
Han Yuxin frowned and said: "Xinyu software, there is only one big group that it has not covered yet."
Chen Yao nodded, only the middle-aged and elderly people were missing.
The middle-aged and elderly people are different from students and office workers. Once they get used to a certain software, they will not migrate easily.
Habits are a very good thing that allow people to operate easily without spending time learning.
Habits are also a bad thing. When a habit becomes natural, you are unwilling to change it, even if it is a good thing.
Xinyu Social, if it wants to become a national-level application, it must cover middle-aged and elderly people. After all, middle-aged and elderly people are a huge group in our country.
At first, many people didn¡¯t understand why Pindd, a shopping software, became so popular?
"Compared to a certain treasure and a certain thing, it has no characteristics. Why can it grow up under the eyes of the overlord?"
The reason is very simple. With the help of WeChat, Pindd has reached the middle-aged and elderly people who have not been covered by shopping software.
For many middle-aged and elderly people, they can not install any applications, but WeChat is a must. With WeChat¡¯s strong traffic diversion and DD¡¯s marketing strategy, the software has become so popular.
"Brother, what can you do?" Han Yuxin looked at him expectantly.
At the beginning, he said that he would first cover the student group and launch big moves one after another, and he did it.
He said he wanted to cover the office crowd, and now, he has done it.
It is indeed difficult to get the old man to speak his mind, but Han Yuxin knows that this omnipotent senior brother must have a way.
Chen Yao tapped his fingers lightly on the table and said, "Let me ask you, what functions do the elderly care about most when using social software?"
Han Yuxin pursed her lips and thought for a moment: "It must be two major functions, one is chatting and the other is payment."? "
It¡¯s not clear whether other elderly people are like this. Han Yuxin observed that the elderly people around her mainly have these two functions.
This is not to say that other functions are not important, but chat and money bag are the most important.
There is no need for those fancy functions, simplicity is best. From this point of view, the elderly are easily satisfied, but because they are easily satisfied, it is often difficult to attract new things to them.
Therefore, the next version of the software must be more convenient for chatting and payment.
"Brother, what should we do?" Han Yuxin was confused again. She knew young people very well, but the market for the elderly was too difficult, but they were indispensable.
Chen Yao asked back: "What do you think bothers the elderly the most when they use software?"
Han Yuxin blurted out: "Safety. While protecting them safely, some settings are often very cumbersome."
Forgot my password how do? How to pass the verification code? And what should I do with those miscellaneous security settings?
Many older people can¡¯t do it well.
As for what to do, I didn¡¯t think about it for a while.
The sun had gone down before they knew it, and Chen Yao and Han Yuxin came to the canteen downstairs to have dinner.
The legendary headquarters campus is located on the seaside and accommodates more than 20,000 employees. Every time it is time to eat, the cafeteria is extremely lively.
Different companies are divided into different areas. The canteen where Chen Yao is located is the software Internet. The people who eat here are people who are engaged in software development or work related to the software Internet.
The software engineers around him are all young, with an average age of about 25 years old.
During this time, everyone was busy with social software. As for what to do next, Chen Yao chatted with them while eating.
At this moment, the phone vibrated. I took out the phone and glanced at the screen. It was a message from my mother.
Mom: ¡°I lost my Xinyu account password, how can I get it back?¡±
Now she uses WeChat to send messages to Chen Yao. Since her son developed a new social software, she has also started to use Xinyu.
But for some reason, I forgot my password and couldn¡¯t log in.
While Chen Yao was eating, he used brain control to reply to messages.
"Just follow the prompts and reset your password."
Mom: ???No, son, you are the boss of an Internet company, can't you just change it for me? "
Chen Yao: ""
I really think that the boss of an Internet company can do whatever he wants. The boss does not have the authority to view the user's password.
Prince Dark Horse: "You call customer service, I will talk to customer service later and fix it for you."
Although it is not the best way, this is the only way for now.
Older people tend to be very careful about things like passwords and security protection.
Chen Yao thought about it for a moment, or create a revolutionary verification method?
"I suddenly had an idea, about the upgrade of the next version of Xinyu?"
The engineers around him all looked at him: "Boss, what do you have in mind?"
Chen Yao typed five words on the screen of his mobile phone.
Brain wave recognition!
The engineers here will know what this is after just one glance.
In order to solve security verification, scientists around the world have invented many biometric technologies.
?For example, fingerprints.
However, fingerprints are not omnipotent, and recognition will fail if your fingers are dirty, sweaty, etc.
Then, facial recognition was invented.
Based on the facial feature information of a person¡¯s face, it is stored digitally and then recognized. However, it is not absolutely safe.
Countless infrared rays are projected on the human face to form a 3D model. This technology can theoretically be cracked.
There is also a voice lock. Everyone speaks in a different voice. This identification method can also be used for verification, but it also has many disadvantages.
The recognition accuracy is low and it is easily interfered by the sound of the surrounding environment.
Whether it¡¯s face recognition, fingerprint recognition, or voice recognition, they all have one thing in common, they are all exposed.
Once facial information, voice information, and fingerprint information are collected and illegally used by bad people, the consequences can be serious.
So, the reason why these biometrics cannot completely replace passwords is that many apps still require users to enter passwords to log in.
However, brainwave verification is a revolutionary cryptography technology!
Brain waves are a kind of idea. The information is stored in one's own head. It cannot be seen or decoded by others, allowing the software to accurately identify the owner's identity.
Brainwave recognition is an epoch-making biometric technology.
Han Yuxin asked: "Brother, what do you mean, in the next version, we will do brainwave recognition?"
"Yes." Chen Yao snapped his fingers: "Let passwords become history." (Remember the website address: www.hlnovel.com