SC123 powerful computing power!
Anc software has been officially launched for more than two days, and the number of users has grown quite rapidly. It has now exceeded 400,000, and is close to 430,000.
The apcs system includes all anc users. Each anc user is a pivot fulcrum of the apcs system, providing computing power for the apcs system.
The core of the apcs system is actually Butler!
Because Butler's level of artificial intelligence is very high, he can reasonably allocate every Pivot fulcrum resource of the APS system to the most reasonable level.
Without Butler's existence, the ACPCS system built by Nanlin is only half the efficiency now. In addition, in terms of fault tolerance, with Butler's ACP system, the fault tolerance rate is almost invincible.
Without Butler, the fault tolerance rate of the ACPCS system cannot be effectively and automatically corrected. In that case, not to mention that the ACPCS system has nearly 430,000 Pivot fulcrums, even if there are 100,000, Nanlin Guiyi's daily work is to maintain the ACPCS system.
Under normal circumstances, advanced hackers form an asynchronous disordered computing power network, and the target they choose is definitely not an individual user. Although the personal user's computer has low security performance and is not easy to be discovered.
However, it is really a cumbersome to collect the computing power of individual users’ computers.
The conventional approach is to select stable enterprise-level servers, form a broiler server cluster, and then build a network of asynchronous and disordered computing power in the broiler server cluster.
This is how the asynchronous disordered computing power of the Duke of Darkness is obtained.
Nanlin Guiyi ordered Butler to query the ACPCS system. How much computing power has been collected at present? He is looking forward to how much computing power has the ACPCS system collected after the Anc user grows to nearly 430,000.
In less than three seconds, Butler gave feedback. On the monitor on the rightmost right of the three screens, the apcscenter program is displayed and the Apcs system is marked. The computing power that can be drawn currently exceeds the height of 700tflops.
"Private r can safely extract the computing power of 706tflops. Is it used?" Butler asked.
Nan Lingui nodded, "Extract 700tflops of computing power, establish a unified channel, improve optimization efficiency, and establish a fault-tolerant mechanism."
"yes, private r!" Butler responded to Nanlin's unity, and then the center program showed that Butler was mobilizing the computing power of the ACPs system.
After just twenty seconds, Butler gave a prompt, "Private r, 700tflops computing power was retrieved, the unified channel was successfully established, and the corresponding interface was as follows."
Nanlin Guiyi immediately controlled the computing power interface and spoke in the encrypted voice communication channel of the third layer of dark web space.
"I'm ready! Tutumen, launch a general attack!" Nan Lin Guiyi ordered.
Tutumen immediately responded: "Okay!"
The next moment, Nanlin Guiyi mobilized 700tflops of computing power and began to impact the supercomputer Jing!
When the computing power of 700tflops hits the supercomputer Beijing firewall, the firewall suddenly has a hysteresis reaction. After all, even if the firewall of the supercomputer Beijing is very powerful, its computing power is superior to the world.
However, the computing power of the supercomputer Jing also has to load other tasks, and it is impossible to provide all of them to the firewall. Besides, at this time, the security guards are too busy and cannot help the firewall and actively resist Nanlin's reunification.
While invading, Tutumen scanned the calculation power mobilized by Nanlin Guiyi. He did not complete the scan and asked.
"Light Dominator, how much computing power have you mobilized?" Tutumen's tone was obviously surprised. Even after the voice change process, he could still feel it.
"There are only so many for the time being!" Nan Lin Guiyi did not give a specific answer. He was rushing the firewall of the supercomputer Jing with all his might. Some subsystems of the firewall have already stopped running.
In less than half a minute, Tutumen spoke again and sweared directly.
"Damn it! 700tflops' computing power! Brother Light Dominator, you are my brother, where did you get the computing power? Also, what's going on with the computing power you use? It's like unified and ordered computing power, and asynchronous and disordered computing power. What kind of thing is it?" Tutumen was shocked!
Originally, Tutumen thought he was a rich man or a rich man among the rich man. He owned a private supercomputer and had a computing performance of 200tflops.
But now it seems that Nanlin Guiyi is not bad either!
The computing power of 700tflops and the comprehensive quality shown by those computing power is very strong, so why don’t Tutumen shock?
Tutumen swears, causing the Dark Duke to swear, "holy! Dark Immortal Bird, are you cheating? It actually has 700tflops of computing power?"
The red fox remained silent.
But in fact, the red fox's heart was very uneasy.
The Red Fox originally thought that discovering a supercomputer with 200 tflops of computing power in Tutumen was already a huge gain of intelligence. But now, Nanlin Guiyi has exploded with 700 tflops of computing power.
What's this?
Are these top hackers all super rich? Or are these hackers all the masters on Forbes’ rich rankings? Why are they all so powerful?
According to the current situation shown by Nanlin Guiyi, I am afraid it is not much worse than Tutumen?
Unfortunately, Red Fox didn't know that Nanlin Guiyi owned the ACPs system, and it was even more impossible to guess that Nanlin Guiyi owned an unreasonable artificial intelligence system like Butler.
Red Fox is also a world-class hacker. He analyzed it more rationally that the computing power mastered by Nanlin Guiyi should be asynchronous and disordered computing power. However, he did not understand why the asynchronous and disordered computing power mobilized by Nanlin Guiyi has the characteristics of unified and orderly computing power.
‘It’s really troublesome! In addition to the Tutumen, there is another dark immortal bird. However, this guy is too mysterious and cannot determine his identity at all. What should I do? The Red Fox was thinking in his heart.
Faced with the amazement of Tutumen and the Dark Duke, Nan Lin Guiyi chuckled, "Because my technology is better than you, the asynchronous disordered computing power I have processed is more stable. The answer is that simple, there is no reason!"
"Tsk!" Tutumen hummed, "I will upgrade my toys in a few days! Asynchronous disordered computing power is always asynchronous disordered computing power, and in the face of unified and orderly computing power, I am at a disadvantage!"
This time it was Nan Lin Guiyi's turn to be speechless. What kind of identity is Tutumen? If you want to upgrade to a supercomputer, did you directly upgrade it?
———
New book uploads, recommendation tickets are required, member clicks, collections, etc. Thanks for all support!
———
Follow the public: qms5120 to learn more behind-the-scenes footage of the works and authors, as well as periodic popularization of computer knowledge.
———
Chapter completed!