HK1765 Amon14, Go for It!
.
Under normal circumstances, cutting-edge technology or top-secret information will not be stored digitally, but will be stored on paper.
Even if you choose to save it digitally, you will choose to save it in isolation from the Internet environment, rather than storing it in a device with an Internet environment.
This is not to say that storing cutting-edge technology or top-secret information in a device with an Internet environment is a stupid act.
Either option has its own pros and cons.
If you choose to save cutting-edge technology or top-secret information in paper form, although it completely isolates the possibility of being stolen by hackers, it will create new problems.
In the real world, paper data are easy to be stolen, copied, photographed, etc. In extreme cases, the enemy may even forcefully attack the storage location where paper data is stored.
For example, if Mirui Technology Group's new energy data is stored on paper, not to mention the organization, even the Rongcheng Military District, a close partner of Mirui Technology Group, may have evil intentions.
As for the isolated Internet environment storage solution, it seems to combine the dual advantages of paper storage solutions and Internet environment storage solutions, and greatly weakens the shortcomings of both. But in fact, this is also a failed storage method.
Storing data in an isolated Internet environment means that the owner cannot manage it remotely. Once an emergency occurs, the problem cannot be effectively solved.
This storage solution also has the same weaknesses as the paper-based data storage solution, and is even more obvious.
For example, if Shi Lei's Tiandi Xuanhuang Thief Group wants to steal information from a closed network system, they only need to secretly install a wireless network device inside the closed network system. You can steal data remotely.
According to the skills of the Tiandi Xuanhuang Thieves Group, I am afraid that after stealing the information, no trace will be found at all!
Therefore, the method of storing data in an isolated Internet environment is not a good method and can only be an alternative.
Regardless of the paper storage solution. Neither the storage solution that is isolated from the Internet environment is a perfect solution, but this does not mean that the storage solution with an Internet environment is a good solution!
In fact, storage solutions with Internet environments have very obvious shortcomings. The biggest disadvantage is that it is easily hacked. Even data was stolen by hackers.
As for the advantage, it is that the owner can respond quickly and provide solutions.
When hackers invade, as long as the owner's skills are high enough and the defense system of the device storing data is strong enough. You can block intruders and you are not afraid of intruders at all.
Mirui Technology Group has powerful network technology, coupled with the sensitivity of the data, it is not suitable for paper storage and storage in an isolated Internet environment. Naturally, I chose a storage solution with an Internet environment.
Duke Duke invaded the official player forum of Dream Entertainment and encountered resistance from the organization. This made Duke understand that the core data of Mirui Technology Group must be stored in the internal network, rather than using paper data storage. Or a storage solution that is isolated from the Internet environment.
This also means that as long as Duke Duke breaks through the internal network defense of Mirui Technology Group, he will have the opportunity to obtain the most core information of Mirui Technology Group.
"Butler, I need Amon14's resources!" Duke Duke ordered.
"Mr. Duke, according to your authority, you cannot obtain Amon14's resources!" Butler responded.
Duke had already anticipated the inability to obtain the resources of the supercomputer Amon14. At the beginning, after Chaos Snake Shiwen took back the authority of Amon13 and Amon14, it made corresponding authority adjustments.
With Duke Duke's authority, he can only mobilize the supercomputer Amon13, but not Amon14.
"Start the Savior program!" Duke Duke ordered.
Butler, the organization's pseudo-artificial intelligence system, did not refuse Duke Duke's order this time, but carried it out.
"The Savior program is being executed, and the main system begins to determine the high-level authority..." Butler displayed the relevant information on Duke Duke's laptop screen.
"The senior authority, Marquis Anlin, has been logged out..."
"The senior authority, Duke Satan, cannot be contacted. According to the logic of the main system, Duke Satan is dead, and the corresponding authority is temporarily frozen..."
"The senior authority, Duke Anducias, has died and the authorization is suspended."
"High-level authority Duke Eligo and high-level authority Duke Agares, according to the information collected by the main system, have died at the S17 base in Nevada, and the authorization has been suspended."
"At the request of Duke Duke, the senior authority user, the Savior program has been started. Duke Duke is temporarily granted full authority until it is canceled by the super authority person!"
Butler sent out prompt messages one after another. It is obvious that there is a certain judgment mode within Butler. When the number of core members of the organization is reduced to a certain level, a program called 'Savior' can be started.
Duke received full temporary authorization from Butler through the 'Rescuer' process.
"Butler, prepare Amon14 computing resources!" Duke Duke issued the order again.
This time, Butler did not refuse directly, but responded: "The computing task of supercomputer Amon14 is being reviewed. There is no task authorized by super authority. Relevant task suspension notifications are being sent. The computing resources of supercomputer Amon14 are being organized. Please wait... "
Duke Duke waited patiently. Supercomputer Amon14 is the core supercomputer of the organization. The key computing power for the organization to develop biogenetic technology is provided by supercomputer Amon14.
About half a minute later, Butler gave another prompt, "Mr. Duke, the supercomputer Amon14 is ready to be completed!"
The computing resources of the supercomputer Amon14 are displayed on the laptop screen in front of Duke Duke. There are a total of 1200tflops of intensive distributed computing resources!
Equivalent to four times the lightning speed of a supercomputer!
The combined computing resources of supercomputers Amon13 and Amon14 have reached 1700tflops, and they are intensive distributed computing resources.
Duke Duke is obviously prepared to fight tooth and nail to break through the network defense of Mirui Technology Group!
At present, Mirui Technology Group's network defense demonstrates the strength of its defense. Taken together, there are only about 500tflops of intensive distributed computing resources.
Although the attack-to-defense ratio of the Endless Defense System is excellent, it may also be tragic when faced with an attack involving 1,700 tflops of intensive distributed computing resources.
This is not because the endless defense system is not powerful enough, but because the loose distributed computing resources provided by the IWN secret network are not powerful enough. As long as the IWN secret network fluctuates slightly and the computing resources provided cannot be delivered on time, the endless defense system will collapse.
Duke Duke gathered the computing resources of supercomputers Amon13 and Amon14 and paused the attack rhythm for a while. Let the defenders of Mirui Technology Group relax their vigilance, and then immediately launch a sharp attack.
When 1,700 tflops of intensive distributed computing resources attacked the Dream Entertainment official player forum like a tsunami, the Dream Entertainment official player forum immediately experienced slow browsing or even failure to provide services.
Raphael immediately exclaimed. "Stone, things are not good!"
Shi Lei had already noticed something was wrong and loudly ordered: "Jazz, hurry up and join the battle. Help Feini resist the attack!" After saying that, Shi Lei continued to give instructions. "Yizur, activate the OverSeed program of the IWN secret network!"
OverSeed, overclocking to explode seeds!
By increasing the computing resources drawn by each IWNSeed, the IWN secret network can obtain more computing resources. Based on the current size of the IWN secret network. Without affecting users, the IWN secret network can obtain up to 8,000 tflops of loosely distributed computing resources.
Although from data analysis alone, 8000tflops far exceeds 1700tflops, in fact, 8000tflops is a loose distributed computing resource, while 1700tflops is a dense distributed computing resource.
The two are not the same concept at all!
Even if many issues are ignored, including consistency, coordination, delay, etc., according to a very simple ratio, 8000tflops of loose distributed computing resources is equivalent to at most 1000tflops of intensive distributed computing resources, or even only 800tflops. degree of intensive distributed computing resources.
Although coupled with the 300tflops intensive distributed computing resources provided by the supercomputer Lightning, it still lags behind the 1700tflops intensive distributed computing resources controlled by Duke, but in the end it will not be too different, and there is no gap between performance and computing resources.
Relying on the endless defense system, it can still be blocked!
Without the computing resources provided by the IWN secret network, and without OverSeed absorbing more IWN secret network resources, and only the supercomputer Lightning, facing the menacing Duke, I am afraid that the internal network defense of Mirui Technology Group would have been directly collapse!
Fortunately, Shi Lei had the foresight to build the IWN secret network as one of the trump cards of Mirui Technology Group to protect the network environment of Mirui Technology Group.
The IWN Secret Network has played a vital role in many hacker wars!
Duke Duke, Tao Wenxian and Raphael fought continuously for nearly half an hour, and finally gave up the plan of directly invading the network to break the network defense of Mirui Technology Group.
Duke Duke never thought that Mirui Technology Group could mobilize so many computing resources!
‘It seems that we can only try to enter the internal network of Mirui Technology Group in the current world! ’ Duke Duke thought to himself.
Although there is a certain degree of danger in entering the internal network of Mirui Technology Group through real-world methods, there is no other way.
And in Duke Duke's opinion, the current situation is also the best time!
Once you miss this good opportunity, you may never have the opportunity to obtain the cutting-edge and new technologies of Mirui Technology Group. Fortunately, Duke Duke had anticipated this situation and made a predetermined plan.
.(To be continued ~^~)