Chapter 382: scary cloud computer technology

Chapter 382 Terrible cloud computer technology

While Lin Xuan was speaking, the projection screen behind him also simultaneously showed the many uses of fingerprint recognition under the screen and a real machine demonstration.

In this regard, the guests at the scene naturally burst into exclamation. Obviously, people are very satisfied with the fingerprint recognition technology under the screen.

But at this moment, Lin Xuan didn't stop, he just lightly clicked the remote control in his hand.

Then the projection screen behind him changed in an instant, and it became the introduction of the next technology in an instant. The name of this technology is impressively called "Face Recognition Technology!".

"The next selling point we want to introduce is face recognition technology, which, like fingerprint recognition, is a service for security verification.

However, face recognition technology is different from fingerprint recognition technology. It is verified by face, and the face recognition rate is as high as 99.9%!

With it and fingerprint recognition technology, our mobile phone will be more secure, since your mobile phone is lost, then you don't have to worry.

Because our mobile phone supports global GPS positioning, coupled with fingerprint recognition and face recognition.

The source of this content is no//vel//bin[./]net'

As long as you buy a mobile phone and register a Hantang account and log in, it will be registered in our Hantang Technology data center and the Hanfeng fourth-generation chip, and this mobile phone will be unique from then on.

Even if someone else gets your mobile phone and uses your mobile phone, then you are the person with the highest authority.

GPU real-time positioning can be forced to be activated at any time, the camera and video functions can be forced to be activated, and the image of the criminal can be directly captured and handed over to the police as evidence...

So our Hantang S3 mobile phone is definitely a smart phone that thieves are afraid of. Even if others find this mobile phone, they dare not use it.

Even if the mobile phone is accidentally lost, the person who found the mobile phone will contact you to return it!

So our Hantang S3 smartphone is the safest smartphone in the world, and it is also the smartphone most detested by thieves in the world! "

"Cool!"

"After possessing the highest authority, it is possible to force the real-time positioning of the GPU, and to take pictures and videos!

This mobile phone is too powerful. With this mobile phone, I am no longer afraid of being targeted by thieves. "

"Yes, this phone is too powerful!

With this mobile phone, we no longer have to worry about what to do if we lose our mobile phone carelessly. This face recognition and under-screen fingerprint recognition technology is too powerful and safe! "

"Lin Xuan is amazing, he has launched such a powerful technology, among which the face recognition technology is lucky, other mobile phone companies may be able to develop it.

But the under-screen fingerprint recognition technology, I am afraid that only Hantang Technology can make it in the world, Lin Xuan is amazing! "...

There was a burst of exclamation and discussion at the scene, and everyone looked at Lin Xuan with admiration.

I have to say that the face recognition technology and the under-screen fingerprint recognition technology launched by Lin Xuan have succeeded. He has successfully made the temptation of the Hantang S3 mobile phone to a higher level!

It also made people have a fuller understanding of the safety performance of this mobile phone, and successfully established the concept that this mobile phone is very safe in the hearts of the people!

But people at this time don't know that they are thinking too much. It is certain that the Hantang S3 smartphone is safe, and the functions mentioned by Lin Xuan will definitely be realized.

But if those who steal the mobile phone directly disassemble the mobile phone after stealing it, and then throw away the Hanfeng 4th generation mobile phone chip that is unique and cannot be disassembled inside the chip.

The remaining things are still very valuable. After all, the most expensive Hantang Technology is the fourth-generation chip of Hantang mobile phones.

But other things also have huge value, so this phone will still be targeted by thieves, but it is very troublesome to cash it out after it is stolen.

So the Hantang S3 smartphone is not the priority target of thieves, and Hantang Technology really has no way to deal with this behavior of dismantling parts and selling them.

But even so, Hantang Technology's mobile phone security and anti-theft performance is also the world's first, and it is also an exciting selling point!

At this time, Lin Xuan looked at those satisfied eyes, and then continued:

"Next we will introduce the last selling point, which is actually a technical selling point derived from the previous cloud computing technology."

Hearing Lin Xuan's words, the people at the scene cast curious glances.

At this time, the faces of Jobs and Jasanjie suddenly became gloomy. There were so many amazing selling points in the world before, but now the Hantang S3 mobile phone still has selling points. Does this make them live? !

However, the anger of Jobs and Jasanjie was useless. At this time, Lin Xuan spoke slowly under their angry eyes:

"The name of this selling point is cloud computer technology!"

"Cloud computer technology?!"

When Lin Xuan said the name of the technology, everyone at the scene showed curious eyes. They didn't know what kind of technology this so-called cloud computer technology is.

"The so-called cloud computer technology, as the name suggests, directly simulates a virtual computer for you to use, and the objects that can be used include mobile phones, computers and even smart computers!"

Hearing Lin Xuan's words, people showed shock in their eyes.

At this time, among the crowd, a group of friends named "Zhengyong International" wearing glasses shined brightly.

Because he found that this cloud computer technology is terrifyingly powerful, directly simulating a computer for you to use, which means that if your computer has insufficient computing power.

Then you can directly buy a cloud computer with performance far exceeding that of Hantang high-end computers!

And the scariest thing is that no one can say how much the performance configuration of this cloud computer is. Its performance is theoretically unlimited!

If you need it, it is possible to directly simulate the performance of a supercomputer for you.

Moreover, this cloud computer can be used not only by computers, but also by mobile phones. If other devices want to use it, it can also be realized, such as smart TVs!

So this cloud computer is very scary!

On the other side, Lin Xuan with a faint smile on his lips slowly introduced Cloud Computer:

"We have introduced cloud computing technology before. This cloud computing technology is to borrow the computing power of other computers. This computing power includes the computing power of the CPU and the computing power of the graphics card."

Hearing Lin Xuan's explanation, people nodded slightly to express their understanding.

For this reason, Lin Xuan pondered for a while, and then continued:

"Cloud computing technology is to enhance the computing power of one's own computer and system, which can be regarded as an act of strengthening one's own computer.

The cloud computer is different. The cloud computer directly uses the computing power of its own computer and other computers to simulate a virtual computer through the virtual machine program!

Although there seems to be no difference from the results of use, the Hantang computer operating system and Hantang mobile phone operating system for ordinary computers are developed for personal terminals.

It naturally has natural limitations, and the virtual machine system of the cloud computer is directly developed for the cloud computer technology, so the cloud computer can perfectly display the potential of cloud computing!

(end of this chapter)