Chapter 1991 New methods brought by new technologies


The Sea Eagle Building is large, but not high. Many buildings in the capital are of this style.

On the top floor of the twelfth floor, in a large conference room, a group of people wearing military uniforms, suits, and Chinese tunic uniforms were sitting upright.

When the door opened, although everyone was fully mentally prepared for the age of the visitor, they couldn't help but feel secretly frightened.

The young man walking in front, carrying a strange bag on his back, was about in his early twenties. He had a rather elegant appearance, a smile on his face, and looked like he had a good temper.

The girl following him could even be said to be a girl. She looked like she was a high school student. She was not tall and had an innocent and romantic look on her pretty face.

However, these two people are here to introduce to you the forward-looking achievements in information technology this time.

For China, which is still very poor, this is undoubtedly the best solution to make old resources play a huge role.

Although Zhou Zhi and Mai Xiaomiao do not think so, most people who cannot bear the fear of being poor have such thoughts.

Sitting in the middle of the conference room was an old general in navy uniform. He nodded to Zhou Zhi and Mai Xiaomiao who came in: "Since everyone is busy, we don't need to talk more. Introduced, let’s start directly. Xiao Zhou, Xiao Miao, you are welcome to come specially. Capital City, teach us old guys this lesson.”

“Today we are all students, and you two are gentlemen. Please tell us how to achieve computing power integration and resource virtualization. These are all. It’s what we need urgently now.”

"Okay, let's start directly." Zhou Zhi was not polite and gestured to Mai Xiaomiao to open his notebook and prepare to connect to the PPT. He would introduce it first: "While Xiaomiao is preparing, I will introduce the situation of our laboratory and what we have done today. What research has been carried out and what specific technical achievements have been achieved, please give leaders and experts a summary Report it.”

Zhou Zhi then started talking. Although he was a layman in terms of professional technology, he still knew the general principles, and he was very clear about laboratory operation management and application-level projects. It's professional, and these are actually what the experts here are most interested in.

After all, the people sitting here are "users" who want to use Xiaozhi, not researchers who are interested in the research and development of neuron network systems.

The way Zhou Zhi introduced it was more interesting, especially after he used the "collectivism" familiar to Chinese people to compare the design ideas of neural networks. Everyone present showed a smile of understanding. Understand the weight of this achievement.

Distributed computing systems actually take the approach of having more people, more power, and concentrating efforts to do big things. It has a collectivist philosophy.

To put it bluntly, this is also a computing power solution that is very in line with the Chinese thinking. Three years of new and three years of old, and three years of sewing and repairing. This neuron system can connect various computing devices through the network and use algorithms "Save" it into one or more virtual devices to form computing resources for users that are close to those of mainframes or even supercomputers. This line of thinking is extremely familiar to everyone here.

Although Xiaozhi of the Clover Group has gradually begun to modularize and standardize, the computing power equipment has gradually been replaced with computing power boards independently designed by the Shanghai Design Center, and then manages them through the network transmission bus, forming A large and standard computing power cluster has achieved a rapid improvement in computing power cost-effectiveness, but this does not mean that this system cannot be integrated and connected with various computing power devices. After introducing the Clover Group's "Xiao Zhi System", as well as applications such as virtual resource allocation, backgammon player simulation program with independent nonlinear learning function, oracle bone edge nonlinear fitting program, Mai Xiaomiao has been waiting for Zhou Zhi for a long time.

Next, Zhou Zhi handed over the lecture position to Mai Xiaomiao, who introduced the cellular neural network from the perspective of mathematical tools, as well as Xiaozhi’s establishment method, including computing power integration, Storage integration, data exchange, resource virtualization, application deployment and other key technologies.

The final introduction is, of course, the current achievements of Clover Computing Laboratory, as well as the design of its computing power interface open to the outside world, and an introduction to how external customers can use these interfaces to use the computing power provided by Xiaozhi. resource.

Next came the break time, but during the half-hour break, the experts did not let go of Mai Xiaomiao and Zhou Zhi. Some asked about software engineering management, and some asked Xiaozhi about technical issues. After half an hour, this The break is equivalent to answering questions in class.

The next is another "long lesson", this time it is about blockchain technology, and explains how to use this technology to achieve non-tampering of data, and how to use remote access computing resources to achieve this Monitor.

"Mai Xiaomiao, I have a question." The white-haired general raised his hand to indicate that he had a question to ask. After getting Mai Xiaomiao's approval, the general asked: "Speaking of your blockchain, it's just The data in the system cannot be tampered with, but there is no way to stop data theft, copying, etc., right? "

"This question is more management-oriented, so let me answer it. "Zhou Zhi took the question : "Indeed, as you said, this technology can only ensure that the data in the system cannot be tampered with. It cannot prevent illegal acquisition of data."

"But let's change our thinking. , these behaviors are also performed within the system, and they themselves exist in the system. If we form records, such as login logs, data usage logs, etc., they can also be digitized.”

"Then they are also non-tamperable in the system. That is to say, no user, whether legal or illegal, can cover up or eliminate any of their activities in the system."

"For blockchain From a system perspective, this is the non-tamperability of transactions, which includes both transaction data and transaction behavior.”

Read the error-free version at 69 Book Bar! 6=9+Book_Bar debuts this novel.

“But in this way, it is still impossible to prevent the risk of data theft.” The old general said.

“Indeed,” Zhou Zhi nodded: “Blockchain technology itself cannot prevent insiders from stealing data, but for non-system authorized users, the POW algorithm is enough to ensure that it is difficult for external customers to steal data. ”

"Internal customers are people who are qualified to use data. How to prevent data from being leaked by these people, I think it should rely more on system management rather than technology."

"What's more, we already have a A system that cannot tamper with data or eliminate traces is already a relatively "This is a huge improvement over the previous system," Zhou Zhi said, "With such progress, we have greater data security, and at least we can discuss a new way of cooperation within the framework of such a new technology. "(End of this chapter)

Previous Details Next