Ten days later, the large computing unit group arrived at Zihong Star, using four large cargo starships.
The equipment is already quite large in size, and it also has to prevent collisions and extrusions. Four starships are really not that many.
There is no problem with the security of the goods. The insurance company itself arranged armed starships to escort the goods.
After the equipment arrived, a special fleet was transported to Ping An headquarters, and intense installation and debugging began.
The construction period alone is estimated to take twenty days. There is no way, the equipment is too sophisticated.
For this installation location, Duoduo personally asked "Master Huang Tian" if he wanted to install it in Shanshui Xiaozhu?
After Huaxiezi asked Qu Jianlei for instructions, he said that it would be enough to install and debug it at your headquarters, and then we would move and assemble it ourselves.
Duoduo doesn't think this answer is surprising. A team that can rub extractors by hand must have no technical problems.
Seriousness can cover the whereabouts of adults, which is really great.
In fact, Qu Jianlei had already made corresponding arrangements.
He is indeed very confident, but he will never be blindly arrogant. He arranged for Xiaohu to watch the entire installation and debugging process in advance.
Even when he is free, he will ask Xiaohu to call up the video and audio of the scene to observe and learn.
As a man in two lifetimes, this was his first time taking out a loan to buy something big, so he had to be careful.
Of course, he also noticed that Taiping was making trouble against Ping An, but he didn't bother to pay attention to it.
Qu Jianlei knew very well that Taiping was probably the main behind-the-scenes mastermind of Ping An.
Relevant information cannot be found online, but Xiaohu can also penetrate personal terminals.
However, Ping An didn't say anything, so Qu Jianlei didn't bother to care. The team collected the protection fee for being a bodyguard, not a nanny.
In other words, this equipment has been under the attention of Xiaohu and Qu Jianlei from installation to debugging.
Because of Ping An's cooperation, the construction period of twenty days was completed in only sixteen days.
Next, there was training for operators from the manufacturer, but Qu Jianlei and Xiaohu ignored it.
——Just get a set of training materials and videos, there is no need to waste that time.
The big-headed butterfly said with emotion, "Isn't the installation and debugging too simple? In the past sixteen days, my days have seemed like years."
When it says this, it means that there is no problem at all after disassembly and reassembly.
"I know you learn quickly," Qu Jianlei replied disapprovingly, "The key is to optimize the transportation plan and save space."
Since installation and debugging are very simple, of course there are other things to consider.
For Qu Jianlei, the amount of space occupied by four large cargo starships is also intolerable to him.
Although the team has a lot of storage talismans, the space is not wasted like this!
However, if you want to make reasonable use of space, you need to reduce packaging, which increases the probability of collision and extrusion of components.
Therefore, this is also a systematic project that requires a lot of calculations, and it must be done by Xiaohu.
The big-headed butterfly turned around and said, "I'm already thinking about it. I'm designing special-shaped parts, which can effectively save space."
Not to mention that this guy is quite hardworking, but now he feels that the standard parts on the computing unit set are in the way, so he needs to replace them with special-shaped parts.
If you have a little understanding of modern industry, you will know the importance of standard parts, which facilitate disassembly, maintenance, and parts replacement.
But Xiaohu would rather sacrifice these conveniences and replace them with special-shaped parts in order to save a little space.
That's right, you can really only save a little bit, not much - it is already racking its brains and trying everything it can.
And it dares to make modifications so freely because it has a boss who is extremely capable.
"Let it go," Qu Jianlei firmly supported it. "If necessary, the overall unit layout can be re-planned."
"No problem," the big-headed butterfly turned excitedly, "I also think there is something wrong with the overall layout."
"That's an interface for expansion and spare parts," Qu Jianlei said coldly.
"But we don't need it," Big-headed Butterfly replied without hesitation, "We can change structures like these at any time."
Okay, you are right... Qu Jianlei was speechless. Xiaohu was right.
The fixed layout is indeed convenient and easy to use, but for a craftsman who can disassemble and assemble the machine at any time, it does not mean much.
And Qu himself is such a master.
So he could only remind it, "Be careful to monitor the backdoor program and don't ignore it."
"Don't worry, I have special data fragments for monitoring..."
The next moment, the big-headed butterfly's turning body suddenly stopped, and its soft voice was full of disbelief.
"This, isn't it? This kind of weird data packet...Boss, have you ever opened your mouth?"
"Huh?" Qu Jianlei originally just mentioned it casually, but was startled when he heard this, "Is there a problem with the data packet?"
"There must be a problem, but I don't know the size of the problem," Xiaohu answered simply, "It's a bit tricky to decipher..."
It is indeed necessary to be cautious when deciphering abnormal data packets.
With Xiaohu's intelligence and computing power, the probability of being tricked is not very high, but if it disturbs the opponent, it is already worthless.
Qu Jianlei was very calm, "Let's determine the source of the information first."
The big-headed butterfly's body turned so fast that it didn't even bother to answer the question, "Uncle and aunt can't bear such a shameful thing!"
Xiaohu’s computing power now comes from 80 million computing units.
Although the computing power gap is hundreds of times compared to the newly purchased huge 1.6 billion unit, it is still remarkable.
In about five minutes, it found the source.
The other party used the central control system of Ping An headquarters as a springboard, which can be traced back to the relay signal tower of Zihongxing.
In short, there is a 99% chance that the attack comes from an alien planet.
Although Xiaohu does not have an independent personality, he has quite a lot of condition settings and execution settings, and his logical judgment ability is very strong.
When it discovered that the data packet came from aliens, the self-protection setting was automatically turned on and a series of responses were made.
First of all, the first element is to pretend to be dead and not let the other party find out that you have been exposed.
Other things can be done slowly. The most fearful thing about this kind of thing is that it cannot be discovered. As long as it can be discovered, it will be easy to deal with.
Next, Xiaohu completely gave up on the structural design of the computing unit and concentrated on analyzing the data packets.
Previously, it was an oversight. In its words, it "set the invasion too simply and it was a bit formal."
Now once it gets serious, it immediately compiles a lot of news.
First of all, this kind of data packet is used to dismember the data link, and its main purpose is an "ablation function".
To put it simply, this process is a bit like white blood cells in the human body, which first engulf the target and then dissipate themselves.
This theory based on bionics is actually not uncommon, but in terms of digital applications, it is very difficult to implement.
Secondly, the swallowing of data packets is quite intelligent, mainly targeting blocked backdoors.
In addition to backdoors, it also swallows up data links on digital barriers and is highly targeted.
Xiaohu spoke highly of this kind of data packet, "It looks very simple, but the identification and triggering mechanism is very clever."
Fortunately, Qu Jianlei understood these words, "Does it mean there is an artificial intelligence behind the other party that is not weaker than you?"
The big-headed butterfly turned twice and replied proudly, "It is impossible to be stronger than me, otherwise it would have discovered me long ago."
Qu Jianlei felt that this guy was a little too arrogant and deliberately poured cold water on him, "But he is from an alien planet and is limited by the transmission channel."
The big-headed butterfly turned twice more, "That must be because of the powerful computing power. I just... well, the children of poor people have long been in charge."
After investing so much in you, you say I'm poor? Qu Jianlei felt extremely aggrieved.
"Could it be that it has already discovered you and is just pretending not to?"
"Impossible, absolutely impossible!" The big-headed butterfly turned crazily and shouted in a soft voice.
"I was very careful when analyzing the data packets. They all seemed to be natural dissipation caused by peak and valley errors."
Peak-to-valley error values are common in analog signals, but less common in digital signals.
In Blue Star's digital signal, it is nothing more than "yes" and "no" or "zero" and "one". The emphasis is on presence or absence.
The presence of current is "1", and its absence is "0".
Even if the empire's digital signal is in ternary, "1", "0" and "-1", the same principle applies.
The difference between ternary and binary is mainly due to the difference in mode and hardware generation.
But in fact, digital signals are also divided into strengths and weaknesses, such as "there is" and "it seems to be there, but it may not be there".
However, this error is not only small, but also not easy to capture, so most people think that digital signals have nothing to do with analog.
Generally speaking, it is indeed irrelevant. The errors that trigger these are nothing more than sudden failures or external interference.
But Xiaohu can use the method of pretending to be external interference to quietly swallow the other party's data packets. It has to be said that he is very clever.
Anyone who has done data intrusion knows...forget it, I won't go into details.
Anyway, ordinary intruders must first cover their origin to avoid being discovered - "I'm a fool, you invaded me!"
If we really have to face-to-face digital confrontation, that is another scenario.
So throwing out massive data packets to congest the other party and doing some bad things secretly is the right way.
How could a large amount of information be smuggled out without using cunning tactics?
You know, digital warfare also talks about "local operations" - the local area is wired and the distance is very close.
If outsiders cannot access wired networks and can only use wireless transmission, how can they win in terms of the transmission capabilities of the medium?
Water injection again... Well, the intruder uses a large amount of data, so it is destined to be impossible to achieve "one package, one tube".
At least in the normal data transmission of the Blue Star network, packet loss is not uncommon. It can be discovered during inspection and it can be made up for in time.
As for the reason for packet loss, only God knows.
Then, it is even less possible for those silent intruders to verify the cause of each packet loss.
(Updated to summon monthly tickets, follow-up subscriptions and recommended tickets.)