Chapter 544: Unscientific, this technology is too dark!

Chapter 544 is unscientific, this technology is too dark!

From now on, Daxia will be the end of spies or those who want to sabotage. After all, everyone has a life trajectory, and a saboteur will definitely have a trajectory if he wants to do something. This way, he will definitely catch a lot.

So at this time, Hantang Technology has developed a black technology that can recognize multiple faces through security monitoring and cruising drones, which completely drives people completely crazy.

Of course the madness is followed by shock.

Because this kind of black technology actually has a concept in everyone's mind. After all, it has appeared more than once in science fiction movies or novels, but the reality is just a concept and it cannot be done at all.

But I didn't expect Hantang Technology to actually do it, making the black technology that can only exist in science fiction movies into reality!

Powerful! It is too powerful!

At this time, the reporters, including millions of viewers, were full of admiration.

It turns out that Hantang Technology is so powerful, even if Lin Xuan didn't make a move, Hantang Technology can still develop such a powerful black technology!

The source of this content is n0v//elbin[./]net'

I have to say that Hantang Technology's performance has successfully refreshed people's perception, making them realize that Hantang Technology is still a great company even without Lin Xuan.

But at this time, a reporter seemed to think of something, and he slowly raised his hand:

"Mr. Xu Bo, I found a problem. Before you said that Hantang Technology's public security monitoring cruise drone has a total of 12 lenses, and the pixels of each lens are as high as 1 billion.

This means that huge data processing capabilities are required. After all, the performance of mobile phones is so powerful, but cloud computing is still needed to complete auxiliary calculations.

Otherwise, it would be very difficult to complete a 100-megapixel photo with the processor of the mobile phone alone, and it would take a few seconds to process a photo.

And such a 1 billion-pixel picture needs to process the computing power, I am afraid that even the Hantang computer will be very difficult.

And the most frightening thing is that a public security surveillance cruise drone has 12 lenses and needs to process 12 images at the same time.

At this time, it is not only necessary to process the screen, but also to perform face recognition in the screen and create a file for each person. The huge computing power required may not be able to be completed by public security monitoring drones alone. "

Hearing what the reporter said, people nodded slightly at this time. This is indeed a serious question.

Regarding this, Xu Bo smiled and continued to say:

"I have to say that this reporter's eyesight is indeed very keen, and our public security monitoring cruise drone relies solely on its own computing power.

It is indeed not enough to process 12 ultra-clear images of 1 billion pixels at the same time, and the most troublesome thing is to perform face recognition.

This requires more computing power, which cannot be solved by our public security monitoring cruise drone alone, so we introduced an additional computing power unit, which is cloud computing!

In this cloud computing, we currently mainly borrow computing power units from computing power rental operators or personal computer computing power renters.

That is to say, in the future era of public security patrol monitoring, cloud computing will gain greater development prospects because of public security patrol drones. "

Regarding this, a reporter on the side hurriedly asked:

"Mr. Xu Bo, will there be any information leakage in the borrowing of this kind of computing power? After all, if hackers intercept the data, it may be used for illegal purposes."

Hearing the reporter mention the security issues of cloud computing technology, the people at the scene fell silent again.

In fact, the security issue of cloud computing technology has been controversial since the birth of cloud computing technology.

This has also caused many consequences. This consequence is that many technology or pharmaceutical companies will be willing to spend a huge price to rent supercomputers, and will not use cheaper cloud computing technology, because they are afraid of the leakage of research data! After all, cloud computing does naturally have information leakage defects, so the information security of cloud computing technology has always been a controversial issue.

Xu Bo shrugged his shoulders, and then said helplessly:

"When there is no information security issue, the Internet itself is a big sieve!

Do you think that without using cloud computing technology, the monitoring on the road will not be captured by hackers?

Only ordinary hackers can be blocked, and truly powerful hackers are hard to guard against.

And if our cloud computing data wants to be stolen, it is not something ordinary hackers or even powerful hackers can do, at least the world's top hackers can do it.

What are people doing to steal your data at the risk of being seized? There is no need!

In addition, our data adopts two forms, one is the cloud real-time recording mode and the local hard disk storage mode.

The local hard disk storage mode adopts a specially designed hard disk, which can only burn data one-way but cannot copy and modify data.

Even if a hacker captures the cloud data of the public security monitoring cruise drone, it is useless to steal and modify the cloud data, because he cannot modify the local hard disk that can only burn data passively and cannot be modified afterwards. "

Hearing Xu Bo's words, the worries in people's hearts were relieved by half.

It turns out that Hantang Technology has long prevented hackers from tampering with data. One data is stored in two places, so it is really useless for super hackers to conquer cloud data.

So at this time, people no longer worry about what to do after the data of public security monitoring and cruise is hacked? And among other things, who likes to watch your videos.

Who do you really think you are, who will spend energy paying attention to you, don't be too proud!

Thinking of this, people immediately applauded again, applauding for the power of the Hantang public security surveillance cruise drone.

After a long time, as the applause gradually subsided, a reporter slowly raised his hand again:

"Mr. Xu Bo, what is the price of this security patrol surveillance drone?"

Hearing the reporter's question, Xu Bo smiled and said:

"The price of public security monitoring and patrol drones is not expensive. After all, if they are too expensive, the relevant agencies cannot afford them.

So we didn't think about making a lot of money for this security monitoring and patrol drone, but only charged a cost price, manufacturing costs and scientific research costs.

How much is it? We haven't negotiated a detailed result yet, but I can assure you that the price is definitely affordable by the relevant organizations. "

"Papa papa papa papa papa papa..."

After hearing Xu Bo's words, there was another warm applause at the scene. At this time, people looked at Xu Bo with admiration in their eyes.

Since Xu Bo himself said that the price of security patrol drones is not expensive, it means that Hantang Technology is really doing public welfare.

The research and development of such a powerful security patrol drone did not expect to make a lot of money, and only charged a manufacturing cost price and scientific research expenses. This is really too public welfare.

(end of this chapter)