Chapter 28: Then difficult in the middle
"60 million, this is just the beginning. When those new players get used to it, the day after tomorrow will be able to flow over 100 million yuan a day. If you open five more regions, you will easily flow 5 million to 600 million a day. Generally, although the top-up flow will be reduced after buying fashion, the next step is that as the number of players increases, the market continues to grow. The 5% fee for the game market alone can maintain the revenue of this game. "
Thinking of this, Chen Lang quickly took out a pen and paper and began to adjust his thinking, and laid out the next plan.
写 He writes very messy, even some sentences are completely a symbol.
This is a new programming language for computers in the future. No one knows it in this era, and you don't have to worry about it being seen.
"First, we need to build a data center that integrates processing, storage, and analysis. By then, these junk servers can be completely eliminated. After the game data is transferred to the data center, not only can it be integrated into various regions, but it can also be based on the data center. Developed artificial intelligence.
However, a data center capable of carrying tens of millions of players online at the same time and capable of carrying artificial intelligence for big data calculations, even with my own hands-on transformation, would need at least three billion.
Let's get the industrial base first. As long as the industrial base has a prototype, with the ability of inertial intelligent robots, manufacturing the hardware required for the data center directly from raw materials can save at least two billion yuan in cost. "
浪 Chen Lang drew a × in front of the data center and artificial intelligence, and then began to write and draw about the industrial bases.
"Why me? It ’s difficult at the beginning and then difficult in the middle. A small industrial base that is currently in use also requires a lot of money. Lin Lin always invests at least 3 billion yuan.
Forget it, simply buy one at that time. Although it will waste a lot of useless machinery, at least there is a foundation, which is much faster than starting from scratch. "
"This company looks good? No, you can't afford it, even fractions are not enough!"
"What about this one? The scale is much smaller, but it's cheaper ..... What is the reason? I actually set up an industrial company in Modu. Although it is a suburb, the land price is still astronomical?"
"This, this one is okay, the place is a bit remote, in Hangzhou, but although it is only a large second-level industrial enterprise, it should be enough to transform it into a small industrial base. Moreover, hiding the industrial base inside the industrial enterprise, short It should be relatively safe in time. "
滴滴 滴滴 滴 .....!
Chen Lang frowned and inquired about the information of industrial enterprises, and at this time, the computer background specially designed by Chen Lang suddenly flashed the game server and data supervision system.
I opened it casually and looked closely, Chen Lang couldn't help but wonder: "Why is it endless?"
The information prompted in the background is the prompt that someone attacks the server.
Since Chen Lang is playing games, it is naturally impossible not to be a server firewall. It can be said that the security issue of the game is the top priority. Before creating the game, Chen Lang specially designed a defense system far beyond this era.
Looking at the continual data displayed in the defense system by Rou Kegang, and then returning to the complex data returned by the original road, Chen Lang shrugged his lips and continued to query the industrial enterprise information.
怎么 How can an excellent online game not have a plug-in?
Especially in the magic world, a horse and a fashion can sell hundreds of thousands of casually.
Some people who think they have good technology are rash and want to attack the server, and it is normal to open the box.
Chen Lang has seen countless people unknowingly attacking the server these days, but he is too lazy to manage it.
First of all, the base is too large, and the alarm is useless.
Secondly, those people can't threaten the magic world in the slightest, so there is no need to bother.
The people attacked by this wave were more ruthless than others and mobilized tens of thousands of meat machines. The mixed information was enough to make any server go down.
But unfortunately, in the eyes of Chen Lang, this is still just a small means like those ordinary technical masters.
Not worth mentioning.
浪 The defense system designed by Chen Lang is designed based on the principles of several famous defense systems in the future world.
Before the complete emergence of artificial intelligence in the future world, in order to prevent data leakage and maintain data security, major global Internet companies have their own defense systems.
For example, Ali's Tai Chi, Goose Factory's Star Wars, Microsoft's Aegis, Google's Alien, Apple's Smart Lock, etc.
The principle of this defensive system designed by Chen Lang is derived from Tai Chi and Dou Zhuan Xing Zhu.
There is no way, a 57-year reeducation, he learned these in the beginning, these are one of the introductory courses.
Taiji, as its name suggests, is a special algorithm that receives any external information in Rou Kegang, and is screened by pseudo-intelligence, and secondary screening is performed manually.
The so-called pseudo-intelligence is the AI ??displayed by the so-called major Internet companies.
This AI is the initial data of true artificial intelligence. There are several obstacles to the true development of artificial intelligence. But everything is empty.
What's more, Douzan Starshift is different. Unless it has special permissions, this defense system refuses to receive all external information. If it is stormed, the stormed data will be transferred to the backup server.
The two systems are not good or bad, they just process the external data differently.
Since Chen Lang's technology is far beyond this era, a new adaptation has been made by combining the two major systems. Not only can it detect and record the other party's IP address while receiving information, it can even automatically rebound.
The principle is received by Taiji, using Roché Gang, squeezing the remaining computing processing power of the server, and using the other's computer or server as a backup server in a star-studded manner.
Which one is wrong, whoever attacks.
Different from Chen Langdanding's continued inquiry of information, at this time abroad, the mysterious base suddenly exploded as the second world's defense system independently carried out Taiji and Douzhuanxing.
Dozens of servers went down directly, and more than thirty top configuration computers were burned directly.
More than a dozen well-known masters in the hacker circle stared blankly at their computers, UU reading books www. uukansu.com has no response time.
"Oh my god, boss, tell me, is it that we attacked the goose factory?"
"Our data has just been sent out, there is no chance to respond, the server and computer all crash, this ..."
"It's over, boss, all of our meat machines have collapsed and the hardware has burned out. I'm afraid we will lose a lot of money this time."
"Hundreds of thousands of computer hardware, my god!"
"It's more than that, we're afraid we'll be wanted."
"what why?"
"Did you forget? Skoll secretly mined bitcoin with a meat machine last month. Our meat machine users have refused to continue to cooperate with us, and now we have burned the hardware, they will call the police."
"Fuck, this can be solved by more than losing money. Quickly, pack up and run while those people haven't responded yet !!!"
The white middle-aged man, who is called a boss, is furious.
This year is different from before. People used to have less access to computers. If you want to get a meat machine, you can get it without even knowing it. There are even hackers selling meat machines in the dark web.
But it is now 2023. Who doesn't know a little about computer? I do n’t know how to repair a computer for a goddess?
Even if you do n’t really understand it, those computer security software manufacturers understand that what goose factory computer housekeepers and the like completely eliminate the possibility of personal computers becoming meat machines.
Fortunately, these hackers want to get meat machines, and they have really been developed one by one. These tens of thousands of meat machines have been developed for two or three years, and some of them even paid for it.
........