Workflow
《AI可信数据空间白皮书》
icon
Search documents
助力国家数据流通“新基建” AI可信数据空间大会在贵阳召开
Sou Hu Cai Jing· 2025-08-31 14:11
Core Insights - The "AI Trusted Data Space Conference" held in Guiyang focuses on the development trends and future opportunities of trusted data spaces, emphasizing the importance of data sharing and collaboration in building a national integrated data market [2] - The trusted data space is recognized as a critical infrastructure for the digital age, facilitating the integration of public data value and AI industry, with significant opportunities arising from national policies, industry demands, and technological innovations [2][3] Group 1: Conference Highlights - The conference was organized by the China International Big Data Industry Expo Committee and hosted by Huawei Technologies, gathering representatives from government, enterprises, and academia [2] - Huawei announced the launch of its hybrid cloud AI trusted data space solution, which features a three-layer architecture designed to assist cities and industries in entering the "Data+AI" collaborative innovation era [3] Group 2: Innovations and Projects - Two key innovations were introduced: the "AI Trusted Data Space White Paper," which outlines the technical paths and frameworks for the collaboration between trusted data spaces and AI, and a project aimed at enhancing the efficiency of tourism service intelligent agents through public data [3] - The tourism service project utilizes multimodal data processing to generate over 1,100 high-quality question-answer pairs from 100 original documents, improving the accuracy of government tourism service responses by 30% and reducing response time from seconds to milliseconds [3] Group 3: Regional Developments - Guizhou Big Data Group has established a comprehensive infrastructure for the marketization of data elements, creating a public data authorization and operation space that promotes efficient data circulation and application [4] - The authorization operation space is designed with capabilities for trusted control, resource interaction, and value co-creation, ensuring secure data operations throughout the entire process [4]