Font
Large
Medium
Small
Night
Prev Index    Favorite Next

SC185 Mysterious Collaboration: Too Smooth?

The ACP system based on Anc software users is becoming increasingly large, with the number of users exceeding one million. The asynchronous and disordered computing power collected by the ACP system has exceeded the height of 1oootf1ops.

However, as the ACPCS system becomes larger and larger, the increase in the computing power of the ACPCS system is becoming slower and slower.

It is still because of the inherent defects of the APS system!

The ACPs system does have flaws. It is not that Nanlin Uniform's technology is not advanced enough, nor that Butler cannot manage more Pivot fulcrums, but because as the Pivot fulcrums increase, Butler needs to consume more resources but manage them and allocate them to perform tasks in an orderly manner.

Simply put, there is an extreme bottleneck when the ACPCS system collects computing power. Once the bottleneck state is reached, that is, when the increased performance of the Pivot fulcrum is consistent with the computing power paid by Butler to manage the Pivot fulcrum, the ACPCS system will reach a saturation state.

To give an example, if Anc has 15 million users, Butler needs 5oootf1ops of computing power to manage them. Now, 10,000 Anc users have added 1oootf1ops of computing power to bring 1oootf1ops of computing power resources.

However, based on the 150,000 users and adding 10,000 users, Butler needs to consume 1oootf1ops of computing resources to manage them.

So, is it in vain to add 1ootf1ops of computing resources to add 1ootf1ops of computing resources to consume 1ootf1ops of computing resources to manage them?

No!

It's not a waste of effort!

It should be more difficult!

It is not the same difficulty for Butler to manage 150,000 pivot fulcrums and 160,000 pivot fulcrums. In fact, the more pivot fulcrums that need to be managed, the greater the pressure on Butler.

Because, if you manage more pivot fulcrums, you will encounter more emergencies.

Let me give you an example to illustrate that when Nanlin Unification requires computing power resources, Butler will first screen a single Pivot fulcrum with stronger computing power, better network environment, and more stable state in the APS system.

Simply put, it is to select the best!

If Nanlin Renewal requires 2ootf1ops of computing resources, Butler will screen about 100,000 to 200,000 pivot fulcrum to draw better asynchronous disordered computing power for Nanlin Renewal.

However, even more than 100,000 pivot fulcrums are difficult to manage. Because when Nanlin is unified in carrying out tasks, any pivot fulcrum may cause problems.

Once a problem occurs, Butler needs to transfer the load and allocate the work tasks undertaken by the problem to another pivot fulcrum in a very short time.

Based on such rules, when absorbing asynchronous disordered computing power, Butler actually carried out two screenings for the best selection. The first screening of the pivot fulcrum directly became the fulcrum for the asynchronous disordered computing power.

Then the pivot fulcrum selected for the second time becomes the backup fulcrum. When the pivot fulcrum is in use has problems, the backup fulcrum will be immediately pushed up.

Due to such rules, if Butler manages tens of millions of pivot fulcrums, how many problems will he encounter? It should be that every second, there will be a lot of problems!

Nanlin Guiyi has no way to change such rules. In fact, such rules are designed by Nanlin Guiyi, and are currently the best asynchronous parallel computing system rules.

After all, the computing resources of the ACPCS system come from uncontrollable third-party computers, so how can it be stable?

This is an inherent disadvantage of the APSS system.

Under the hindrance of inherent shortcomings, there are indeed bottlenecks in the ACPCS system. To be precise, any asynchronous parallel computing system has such defects.

If the asynchronous parallel computing system has no defects, then what level of computer is there? Why should Nanlin Guiyi covet the CE11 processor connected into a private level of computer?

"Private, the system has optimized the computing power of 2ootf1ops. Do you need more?" Butler asked Nanlin Guiyi.

I have just introduced the working principle of the ACPCS system. When Butler optimized the computing power, he carried out two rounds of screening for the best selection, which naturally takes a certain amount of time to process.

Nan Lin Guiyi smiled and denied, "No need! It's not difficult to jump into the Ministry of Culture and Science in a mere province of literature and science," he said.

Since the last time, Nan Linguiyi led the Houyi Alliance and set the Ministry of Culture and Science as the target of the Ministry of Culture and Science, the official website of the Ministry of Culture and Science, was invaded every few days.

Hackers visit the official website of the Ministry of Culture, Culture, Science and Technology, and it has become almost a common thing.

Nan Lin Guiyi sneaked into the official website of the Ministry of Culture, Science and Technology, without causing any fluctuations at all. The cybersecurity expert in the official website of the Ministry of Culture, Science and Technology was almost turned a blind eye.

As long as hackers who invade the official website of the Ministry of Culture, Science and Technology, do not tamper with information or further invade, they simply break through the official website of the Ministry of Culture, Science and Technology, they will not deal with it.

Of course, once the hacker tries to tamper with information or further attempts to sneak into the internal system, he will be hit by a thunderous blow.

Nanlin Guiyi doesn’t care about the official website of the Ministry of Culture, Science and Technology. Whether there are safety guards to supervise it. With his technical strength, concealing invasion is not a problem.

At least when Nanlin Guiyi successfully entered the official website of the Ministry of Culture, Science and Technology, it was not discovered at all.

Of course, Nanlin Guiyi was not satisfied with staying in the eB server of the official website. He was preparing to enter the internal system of the Ministry of Culture, Science and Technology, and search for information about the Putian Machinery Factory in the internal system.

If it cannot be searched in the internal system, it will also enter the confidential database to search.

Nan Lin Guiyi's actions to sneak into the internal system of the Ministry of Culture and Culture and Science Province were almost done in one go without any obstacles. This situation surprised Nan Lin Guiyi a little.

Although Nan Linguiyi looked down on the cyber defense of the Ministry of Culture, Science and Technology, the cybersecurity experts of the Ministry of Culture, Science and Technology can contact the Cybersecurity Intelligence Bureau of the Ministry of Culture, Science and Technology anytime, anywhere.

Even if the Cybersecurity Intelligence Bureau cannot stop Nanlin Guiyi, it can still stop it. But now, it has entered the internal system of the Ministry of Culture, Science and Technology, completely unstoppable, which has surprised Nanlin Guiyi.

His invasion was so smooth. Is there a fraud? To be continued.
Chapter completed!
Prev Index    Favorite Next