At the end of the meeting, it was late at night. Everyone knew what today's meeting meant. It can also be said that it was the beginning of a new era. From today on, a new network-based virtual currency will appear.

Of course, it is also very simple to profit from it, because this algorithm determines that it is not difficult to obtain this kind of bitcoin at the initial stage. As time goes by, more and more bitcoins are excavated, and later bitcoins are more and more difficult to obtain.

"If we consider from these aspects, we will not only increase the demand for CPU, but also the demand for graphics cards." after thoroughly understanding this matter, President Ni said to Qin Guan.

This algorithm will certainly rely on graphics cards. If one graphics card is not enough, it may need two or three. The more graphics cards, the easier it will be to calculate. Therefore, in the future, there will certainly be greater demand in this area, and our own performance is naturally responsible for the graphics card.

"That's right. For the motherboards we will ship in the future, we need to add an additional graphics card slot to facilitate users to upgrade in the future. We also need to adjust the production line and produce more graphics card chips," Qin Guan said.

In short, after Samsung has produced the hanshin-3 chip, its own production line will be empty, and it is easy to adjust the output of various products.

Now, Qin Guan is talking and walking with President Ni, and soon came to the Technology Department of the company.

There are many people here.

Many technical talents have a feature that their brains become active at night. Therefore, there are not many people here during the day, especially in the morning, but at night, they are almost full everywhere.

The tool they use is computers. Of course, Hanshin technology company also provides them with the latest computers, which use Hanshin chip 4. If the performance is almost equivalent to the small server produced by IBM.

At this time, in front of a computer, Qiu Xiaojun, who has grown up, is facing the computer screen, constantly meditating on something. Occasionally, he puts his finger on the keyboard, knocks it crackly, and occasionally starts to meditate again.

When Qin Guan stood behind him, he didn't find it. He had been looking at the screen in front of him.

Not only the host is the most advanced, but also the computer screen. Naturally, the most advanced LCD screen is used here, which does not flicker and protects the eyes. Moreover, in order to expand the display area, in addition to the front, there is a small display screen on the side.

That's the display of previous years. With the continuous development of LCD technology, it will be upgraded every few years, but the original display is reluctant to throw away, so they almost always use double screen display to expand the display area, so they can get better work efficiency.

Now, Qin Guan can't understand what the other party is doing, but looking at this, he must be busy.

Suddenly, Qiu Xiaojun patted the table: "found it, finally found it, it's the headquarters of Microsoft!"

When he shouted like this, the people around him stood up and said loudly, "yes, it's their company headquarters. It's hateful!"

"What's the matter?" Qin Guan frowned when he heard a few words from Microsoft.

Computers are composed of hardware and software. Some companies are proficient in hardware, some companies are proficient in software, and some companies are proficient in both software and hardware. Of course, Hanxin technology company is the master among them.

Hanxin computers are all self-produced, including CPU, motherboard, hard disk, graphics card and so on. The sound of startup is the same all over the world and will no longer change.

Eagle country is different. What they pay attention to is division of labor and cooperation. Now they feel the pressure of Hanxin technology company, and they can only keep warm together. For example, the CPU is Intel, and then the hardware integration depends on Dell, IBM and other companies, while the software used in the computer system is used by Microsoft.

Microsoft is bundled with Intel. After all, their own computers can't be pre installed with the Chinese Red Flag operating system.

Microsoft is almost learning from the system of Hanxin technology company and developed a similar one. However, the operation efficiency is very poor, which is also a reason why Intel's processor is criticized.

Now, Yingguo has begun to challenge Hanxin technology company, and at the same time, all aspects of the face-to-face fight is going on.

"We found that our network system was attacked by DDoS." Qiu Xiaojun said: "It's not troublesome to hinder this attack, because we already have perfect anti-virus software, but now we have to follow the vine and find the source of the attack. Now we can finally determine that although they control a group of broilers as a springboard, in fact, the real operator is Microsoft, and their IP address will not be wrong."

Now, computer network technology has been launched from the Han country and has gradually expanded to the whole world. The Han country and the island country have network exchange, while the island country has network interconnection with Europe, and then connected to the eagle country, thus forming a global computer network.

Although Yingguo is reluctant, the network development speed is still very fast. They have to purchase a large number of various digital switch equipment of Huawei to build their civil network, because after using this network, they do feel convenient. Yingguo people pay the most attention to work efficiency. Various network operation companies, Are rapidly expanding their own market.

And with it, of course, there are cyber attacks.

This kind of DDoS is not highly technical. In fact, it is to send a large number of data streams to the attacked object to saturate the other party's network system and make them unable to provide network services. The attacked object is mainly the servers of various large websites. Now, it is the headquarters of Hanxin technology company, which is the threat of red fruit.

Of course, they will not watch this attack. The counterattack is actually very simple. However, a large number of IP addresses are forged. They must find the real controller. It can also be said that most of the computer systems attacking them are actually innocent and controlled by others.

Through the springboard, they circle around the whole computer network world, even bypassing three or four, in order to hide their identity. Now, they can finally determine the final source of the attack.

Microsoft is really capable of such things!

Now, the target has been determined. Next, we can start to fight back!

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like