Riding the wind of rebirth
Chapter 1991 New Technology Brings New Ways
The Sea Eagle Building is large but not very tall. Many buildings in the capital are of this style.
On the top floor of the twelfth floor, in a large conference room, a group of people dressed in military uniforms, western suits, and Zhongshan suits sat upright.
When the door opened, although everyone was mentally prepared for the age of the visitor, they couldn't help but be secretly shocked.
The young man walking in front, carrying a strange tube on his back, was in his early twenties. He looked quite elegant, with a smile on his face, and seemed to have a good temper.
The girl following behind him could even be said to be a girl. She looked like a high school student. She was not tall, and her pretty face still had an innocent and romantic look.
However, these two are here to introduce to you the forward-looking achievements in information technology.
For China, which is still very poor, this is undoubtedly the best solution to make use of old resources.
Although Zhou Zhi and Mai Xiaomiao did not think so, most of the people present who were afraid of being poor had such an idea.
Sitting in the middle of the conference room was an old general in a navy officer's uniform. He nodded to Zhou Zhi and Mai Xiaomiao who had entered the room and said, "Since everyone is busy, there is no need for further introductions. Let's get started. Xiao Zhou, Xiaomiao, welcome to the capital to teach us old guys this lesson."
"Today we are all students, and you two are professors. Please tell us how to achieve computing power integration and resource virtualization. These are what we urgently need now."
"Okay, let's get started." Zhou Zhi was not polite and motioned Mai Xiaomiao to open his notebook and prepare to connect the PPT. He introduced himself first: "While Xiao Miao is preparing, I will report to the leaders and experts on the situation of our laboratory, what research has been carried out so far, and what specific technical achievements have been achieved."
Zhou Zhi then began to talk eloquently. Although he was a layman in professional technology, he still knew the general principles. He was also very clear and even professional about laboratory operation management and application-level projects, which were actually what the experts present were most interested in.
After all, those sitting here are "users" who want to use Xiaozhi, rather than researchers who are interested in the research and development of neural network systems.
Zhou Zhi’s way of introduction was quite interesting, especially when he compared the design idea of neural network to the concept of “collectivism” which is familiar to Chinese people. Everyone present smiled knowingly and understood the significance of this achievement.
The distributed computing system actually follows the path of strength in numbers and concentrating resources to accomplish great things, and it itself has a collectivist philosophy.
To put it bluntly, this is also a computing power solution that is very consistent with the Chinese way of thinking. Three years of new, three years of old, and three years of patching. This neuron system can connect various computing power devices through the network and use algorithms to "assemble" them into one or more virtual devices, forming computing power resources that are close to mainframes or even supercomputers for users. This idea is very familiar to everyone present.
Although Clover Group's Xiaozhi has gradually begun to modularize and standardize, and the computing power equipment has gradually been replaced with computing power boards designed independently by the Shanghai Design Center, and then managed through the network transmission bus to form a large and standard computing power cluster, achieving a rapid improvement in computing power cost-effectiveness, it does not mean that this system cannot integrate various computing power devices. After introducing Clover Group's "Xiaozhi System", as well as virtual resource allocation, Gobang player simulation program with autonomous nonlinear learning function, oracle edge nonlinear matching program and other applications, Mai Xiaomiao has been waiting for Zhouzhi for a long time.
Next, Zhou Zhi handed the main lecture to Mai Xiaomiao, who introduced cellular neural networks from the perspective of mathematical tools, as well as the assembly method of Xiaozhi, including key technologies such as computing power integration, storage integration, data exchange, resource virtualization, and application deployment.
The final introduction, of course, is the achievements that the Clover Computing Lab has made so far, as well as the design of its open computing power interfaces, and how external customers can use these interfaces to use the computing power resources provided by Xiaozhi.
Next was the break time, but during the half-hour break, the experts did not let Mai Xiaomiao and Zhou Zhi go. Some asked about software engineering management, and some asked Xiaozhi about technical issues. After half an hour, the break was equivalent to answering questions in class.
Next is another "long lesson", this time it is about blockchain technology, and explains how to use this technology to make data immutable, and how to use remote access computing resources to achieve monitoring.
"Xiaomi, I have a question." The white-haired general raised his hand, indicating that he had a question to ask. After getting Mai Xiaomiao's approval, the general asked, "Speaking of which, your blockchain only ensures that the data in the system cannot be tampered with, but it cannot prevent data theft and copying, right?"
"This question is more of a management one, so why not let me answer it?" Zhou Zhi took over the question: "It is indeed as you said, this technology can only make the data in the system unalterable, but it cannot stop the illegal acquisition of data."
"But if we change our thinking, these behaviors are also carried out within the system and they exist in the system. If we record them, such as login logs and data usage logs, they can also be digitized."
"And then they are also tamper-proof in the system, which means that no user, whether legal or illegal, can conceal or eliminate any of their activities in the system."
“For blockchain systems, this is the immutability of transactions, which includes both transaction data and transaction behavior.”
6◇9◇Book◇Bar
“But this still cannot prevent the risk of data theft,” said the old general.
"Indeed," Zhou Zhi nodded, "Blockchain technology itself cannot prevent internal personnel from stealing data, but for non-authorized users of the system, the POW algorithm is sufficient to ensure that it is difficult for external customers to steal data."
"Internal customers are people who are qualified to use data. How to prevent data from being leaked by these people should rely more on system management rather than technology."
"Besides, we now have a system that cannot tamper with data and eliminates traces. This is a huge improvement compared to previous systems." Zhou Zhi said: "With such progress, we have greater data security. At least we can discuss a new way of cooperation within this new technology framework." (End of this chapter)
You'll Also Like
-
Kamen Rider: Missed the College Entrance Examination at the Beginning and Became a Kabuto
Chapter 140 4 days ago -
Daqin: After eighteen years of forbearance, the useless prince went crazy with killing
Chapter 92 4 days ago -
Unlimited enhancement at the beginning, all heroes are god-level
Chapter 138 4 days ago -
Zhutian: Gain a supernatural enlightenment at the beginning
Chapter 234 4 days ago -
Top torture! The sickly actress has a crush on me
Chapter 291 4 days ago -
You want to make me the devil, right?
Chapter 124 5 days ago -
Infinite simulation from lock dragon well
Chapter 672 5 days ago -
Invincible starts with predatory terms
Chapter 236 5 days ago -
You don’t want god-level superpowers, so you choose the worst talent?
Chapter 256 5 days ago -
Wasteland: My items are infinitely upgraded
Chapter 232 5 days ago