Generally speaking, cutting-edge technology or top-secret information will not be stored in data, but will choose to be stored in paper form.
Even if you choose to save data, you will choose to save in isolation from the Internet environment rather than store it in a device with an Internet environment.
This does not mean that storing cutting-edge technology or top-secret data in devices with Internet environments is a kind of brainless behavior.
No matter which option you choose, they have their own pros and cons.
If you choose to preserve cutting-edge technology or top-secret information in a paper form, although it completely isolated the possibility of being stolen by hackers, new problems will arise.
In the real world, paper materials are prone to stolen, copying, taking photos, etc., and even in extreme cases, they may be forcibly attacked by the enemy to store paper materials.
For example, if Mirui Technology Group's new energy information is chosen, not to mention the organization, even the Rongcheng Military Region, a close partner of Mirui Technology Group, may have bad ideas.
As for the storage solution for isolating the Internet environment, it seems to integrate the dual advantages of paper storage solution and Internet environment storage solution, and greatly weaken the shortcomings of both. But in fact, this is also a failed storage method.
Isolating the Internet environment to store data means that the owner cannot manage it remotely, and once an emergency occurs, it will not be able to effectively solve the problem.
This storage solution also has various weaknesses in the storage solution of paper-based data, which is even more obvious.
For example, the Tiandi Xuanhuang Thief Group under Shi Lei. If they want to steal information from a closed network system, they only need to install a wireless network device secretly inside the closed network system to steal information remotely.
According to the skills of the Tiandi Xuanhuang Thief Group, I am afraid that after stealing the information, no trace will be found at all!
Therefore, the way to store data is isolated in the Internet environment is not a good way, it can only be an alternative.
Although neither paper storage plan nor isolation of the Internet environment storage plan is a perfect solution, this does not mean that having an Internet environment storage plan is a good solution!
In fact, the disadvantages of having an Internet environment are also very obvious. The biggest disadvantage is that it is easy to be hacked or even stolen by hackers.
As for the advantages, the owner can respond quickly and provide solutions.
When hackers invade, as long as the owner's technology is skilled enough and the equipment for storing data is strong enough, it can block the intruders. It is not afraid of intruders at all.
Mirui Technology Group has strong network technology, coupled with the sensitivity of data, is not suitable for paper storage and isolated Internet environment storage, so it naturally chose a storage solution with an Internet environment.
Duke Duke invaded the official player forum of Dream Entertainment. It was resisted by the organization, which made Duke Duke understand that the core information of Miri Technology Group must be stored in the internal network, rather than using paper data storage or isolating the Internet environment storage solution.
This also means that as long as Duke Duke breaks the internal network defense of Miri Technology Group, he will have the opportunity to obtain the most core information of Miri Technology Group.
"Butler, I need the resources of amon14!" Duke Duke ordered.
"Duke Duke, according to your authority, you cannot obtain the resources of amon14!" Butler responded.
Duke Duke had expected that the resources of the supercomputer amon14 were not available. At the beginning, the Chaos Snake Stone asked, and after reclaiming the permissions of amon13 and amon14, he made corresponding permission adjustments.
With Duke Duke's authority, he can only mobilize the supercomputer amon13, but cannot mobilize amon14.
"Start the savior program!" Duke Duke ordered.
Butler, the organized pseudo-artificial intelligence system, did not reject Duke's order this time, but implemented it.
"The savior program is being executed, and the main system begins to judge the advanced permissions..." Butler displayed the relevant information on the Duke Duke's laptop screen.
"Marquis Anlingen, the senior authority, has been cancelled..."
"The senior authority Duke Satan cannot obtain contact. According to the logic of the main system, Duke Satan is dead, and the corresponding authority is temporarily frozen..."
"The Duke of Andusias, the senior authority, has died and authorized to be suspended."
"The senior authority Duke Eliger, the senior authority Duke Agares, has died at the S17 base in Nevada based on the information collected by the main system, and is authorized to be suspended."
"Through the request of the senior authority Duke Duke, the savior program is started and the Duke Duke is temporarily granted complete permissions until it is cancelled by the super authority!"
Butler sent out prompt messages one after another. Obviously, there is a certain judgment mode within Butler. When the number of core members of the organization is reduced to a certain level, a program called "Savior" can be started.
Duke Duke obtained Butler's interim full authorization through the 'Savior' procedure.
"Butler, prepare for amon14 computing resources!" Duke Duke issued an order again.
This time, Butler did not directly refuse, but responded: "The supercomputer amon14 computing task is being reviewed. There is no super permission authorization task. Relevant task abort notification is being sent. Supercomputer amon14 computing resources are being sorted out. Please wait..."
Duke Duke waited patiently. The supercomputer amon14 is the core supercomputer of the organization. The key computing power of the organization to develop biological gene technology is provided by the supercomputer amon14.
About half a minute later, Butler gave another prompt. "Duke Duke, supercomputer amon14 is ready to be completed!"
The notebook screen in front of Duke Duke shows the computing resources of the supercomputer amon14, with 1200 tflops intensive distributed computing resources!
Quadruples of lightning like a supercomputer!
The computing resources of supercomputers amon13 and amon14 add up. They reach the level of 1700 tflops and are intensive distributed computing resources.
Duke Duke is obviously preparing to fight to the death in order to break the cyber defense of Miri Technology Group!
At present, the defense strength demonstrated by Mirui Technology Group's network defense is only about 500 tflops intensive distributed computing resources.
Although the attack defense ratio of the Endless Defense System is excellent, it is also possible to have a tragedy when facing 1700tflops intensive distributed computing resource attacks.
This is not that the endless defense system is not powerful enough, but that the loose distributed computing resources provided by iwn secret network are not powerful enough. As long as the iwn secret network fluctuates slightly and the computing resources provided cannot be in place on time, the endless defense system will crash.
Duke Duke gathered the computing resources of supercomputers amon13 and amon14, paused for a moment to attack, allowing the defenders of Miri Technology Group to relax their guards, and then immediately launched a sharp attack.
When 1700tflops intensive distributed computing resources attacked the Dream Entertainment Official Player Forum like a tsunami, the Dream Entertainment Official Player Forum immediately became slow to browse and even unable to provide services.
Raphael exclaimed immediately, "Stone. Things are not good!"
Shi Lei had already discovered something was wrong and ordered loudly: "jazz, hurry up and join the battle and help Fini resist the attack!" After saying that, Shi Lei continued to order, "Yuzhuer, start the overseed program of the iwn secret network!"
Overseed. Overclocked explosive!
By increasing the computing resources drawn by each iwnseed, iwn secret network can obtain more computing resources. According to the current hugeness of iwn secret network, without affecting users, iwn secret network can obtain at most 8,000 tflops of loose distributed computing resources.
Although only from data analysis. 8000tflops far exceeds 1700tflops, in fact, 8000tflops is a loose distributed computing resource, while 1700tflops is an intensive distributed computing resource.
The two are not the same concept at all!
Even if there are many problems that are ignored, including consistency, coordination, delay, etc., according to a very simple proportion, 8000 tflops loose distributed computing resources are at most equivalent to 1000 tflops intensive distributed computing resources, or even only 800 tflops intensive distributed computing resources.
Although the 300 tflops-intensive distributed computing resources provided by the supercomputer Lightning still lags behind the 1700 tflops-intensive distributed computing resources controlled by Duke Duke, it will not be much different after all, and there is no gap between performance and computing resources.
Relying on the endless defense system can also block it!
If there were no computing resources provided by iwn secret network, and no overseed to absorb more iwn secret network resources, only supercomputer lightning, facing the aggressive Duke Duke, I am afraid that the internal network defense of Miri Technology Group would have collapsed long ago!
Fortunately, Shi Lei had long been foresighted and built the iwn secret network, as one of the trump cards of Mirui Technology Group, protecting the network environment of Mirui Technology Group.
iwn secret network has played a crucial role in many hacking wars!
Duke Duke, Tao Wenxian and Raphael fought each other for nearly half an hour, and finally gave up the direct invasion through the network, breaking the plan of Miri Technology Group's network defense.
Duke Duke never expected that Miri Technology Group could mobilize so many computing resources!
‘It seems that you can only try to enter the internal network of Miri Technology Group in the present world!’ Duke Duke thought to himself.
Although there is a certain degree of danger to enter the internal network of Mirui Technology Group through real-world methods, there is no way to do it.
And in Duke's view, the current situation is also the best time!
Once you miss the good opportunity now, you may never have the chance to acquire the cutting-edge and new technologies of Miri Technology Group. Fortunately, Duke Duke had expected this situation and made a scheduled plan.