Chapter 226: DTCode
"Analysis of the ...... of the 'Thorns' Active Counterattack Hardware Firewall"
"...... under analysis
"The analysis is complete. ”
"The new knowledge '2053 'Thorn' Active Counterattack Hardware Firewall Overall Technical Solution' (not unlocked) has been sent to the host knowledge column, please pay attention to the host. ”
"The overall technical solution of the 'Thorn' active counterattack hardware firewall in 2053: including hardware and software, can effectively prevent most network attacks, and track the attacker to crack his computer at the same time and analyze the key data of the opponent's hard disk. ”
Jiang Yuan is very satisfied with this result, as long as he integrates the software part into DTOS, DTOS will have more security than all operating systems on the market.
"Now, it's time to start the next important task, complete DTCode! I don't know how long it will take to trigger the touch bypass effect by applying the principle of 'graphical embodied imagination technology solution' to software development?" Jiang Yuan began to study DTCode with great interest.
His steps are clear.
As a first step, he only needs to complete a simplest version of DTCode, which allows the pontine device to embody the results of the programmer's mind directly.
Of course, embodying abstract thinking is certainly not as precise as embodying art drawing.
He doesn't need the simplest version of DTCode to be powerful, as long as it works.
Then, Jiang Yuan can use the 'Technology Directed Evolution' to evolve the source code of DTCode.
A few days ago, he discovered a bug in 'technology directed evolution'.
If we use 'technology-directed evolution' to evolve other technologies, we may have to worry that we will not be able to complete it with the existing conditions.
But the source code is different!
No matter how it evolves, the source code is the source code.
Jiang Yuan can be copied directly, and there is no problem that cannot be realized.
At most, the principle of the source code is incomprehensible to Jiang Yuan.
He even plans to wait for this period to evolve the current AI open-source codebase several times in a row to see what happens.
Is it really possible to achieve true artificial intelligence?
Either way, the evolution of the source code is king!
......
......
The focus of the news has been focused on Jiang Yuan, and the statement of '6 months to achieve an operating system' has become a complete laughing stock, just like "21 Days of Mastery of C++".
Every day, many foreign netizens work hard to go to Maoyu Live's 'Shensi Technology Official Live Room', Shensi Group's official website forum, Qiandu Tieba, Jiang Yuan Blog and other places, and use DT1 to post and ridicule Jiang Yuan.
Huaguo netizens were naturally not to be outdone and fought with the white-skinned people, causing a miasma everywhere.
Shensi Group did not suppress public opinion, but deliberately let the water army secretly add fuel to the fire.
The end result is that DTOS has become famous all over the world before the project has even started - notoriety is also famous.
The carnival of the Western media lasted for two weeks before it was lured away by a media mogul's sky-high divorce case.
The purpose of Shensi Group was also achieved, and a large wave of advertisements were made without spending money, and only then did it begin to cooperate with relevant departments to wash the floor, seal the account, and delete posts.
After a few days, most of the negative news disappeared as if it had never been there.
Jiang Yuan is sure that after this operation, as long as DTOS is launched, there will definitely be a lot of Western users who will try it for the first time with various ideas, and then go to the official website forum of Shensi Group to scold it.
Jiangyuan's R&D is also smooth.
In just 5 days, he was able to trigger the tactile bypass and realize the original 'source-code embodied imagination technology solution', and then he immediately evolved.
By mid-June, Jiang Yuan had finally completed all the DTCode code.
After the compilation was completed, Jiang Yuan finally got a DTCode version 1.0 application.
He rubbed his hands together excitedly and said to himself:
"Let's try it out, um, make an online snake to play. ”
Jiang Yuan put on the DT1 and began to think about how to implement the program of the Internet Snake.
First of all, this is a simple online game, so you need basic network synchronization functions, DT1 is running on indos, so let's use the IOCP framework.
This is where the power of DTCode comes in.
After Jiangyuan integrated a certain expert system, DTCode became an extremely intelligent development software, which can automatically fill in some simple fixed code.
Originally, if a programmer wanted to develop a network program, there were many things to consider, such as C/C++.
From the perspective of functional design, he needs to understand how to control the timing of network connection switches, how to ensure the size of the connection pool, control memory buffering, packet encryption and decryption, the most basic socket function, and how to use the IOCP framework.
From a performance point of view, he should consider the reasonable allocation of threads, put encryption and decryption to one thread, put packaging and unpacking to another thread, create a single thread for sockets, and send and receive a single thread, and finally these should be completely independent of logical threads.
From a program syntax perspective, he also wanted to make sure that he didn't make a mistake and write a grammatical error that the compiler couldn't find.
From a memory perspective, he wants to make sure that the program doesn't overflow to the point of a damn 'scalding' error.
And so on and so forth.
It is precisely because there are so many places to think that it is so difficult to write a bug-free program.
Now with DTCode, there is no need for it.
As long as it finds that the programmer wants to write an IOCP code, it will immediately fill in a high-performance runnable source code, and then show it to the programmer, and then automatically modify the part that needs to be according to the programmer's thinking, and show the programmer the modified part, and finally complete the function that the programmer wants.
To put it bluntly, it is an intelligent upgrade version of CTRL-C+CTRL_V Dafa.
In just 15 minutes, Jiang Yuan completed the network part of the code, a full 2,000 lines.
After 3 hours, the 20,000 lines of cyber snake have been completed.
This is the programmer's artifact!
Jiang Yuan played with the snake and thought proudly.
......
......
Unknowingly, Cook has been working in Shensi Group for a month, and he has basically understood the situation of Shensi Technology, and officially took over Shensi Technology from Li Qingyu.
Li Qingyu finally let go of a heavy burden and can devote herself to the overall operation of the group, instead of spending a lot of energy on Shensi Technology.
To be honest, she doesn't care about the salary of the CEO of Shensi Technology.
The 3% original shares of Shensi Group have already made her very satisfied, and now as long as Shensi Group develops well as a whole, her worth will naturally grow rapidly.
Cook was busy, not only taking on the responsibilities of CEO of Shensi Technology, but also completing the sinkhole task of the system and buying Apple in 6 months.
It's a very difficult challenge.
Apple's current major shareholders certainly don't want Apple to be acquired by Shensi Group, and the feud between the two is too deep.
And Apple is a public company, and buying a hostile public company is never an easy task, even if Jiang Yuan has agreed to use a huge amount of money around $100 billion to complete the job.
Once Apple discovers Shensi Group's intentions, various anti-takeover strategies will be put together, such as multiple poison pill plans, amendments to the company's articles of association, and golden parachutes, all of which will not be able to bear the amount of money that Shensi Group has.
It's always easier to reverse a takeover than an acquisition.
Therefore, this acquisition must be a sneaky act.
Considering that Apple's shares are extremely fragmented, with nearly 2,500 institutions controlling 60% of Apple's shares, the largest shareholder only 6.43% of the shares, and the top 10 only 23.33%, Cook intends to start from multiple angles.
Through hundreds of shell companies, 28% of the shares are secretly absorbed from the stock market, and then through more than a dozen companies named by Eagle Nation, the shares of the top 10 shareholders are taken over.
Then Shensi Group has more than 51% of Apple's shares, which is enough to forcibly convene a board of directors and oust the current chairman, and there is no need to worry about other shareholders not supporting Shensi Group.
Very simply, as long as Jiang Yuan announces that Pons and DT support the Apple system, Apple's market value will skyrocket, and other shareholders will vote with their feet to support Jiang Yuan as the new chairman of Apple.
And Cook will also return to the throne of Apple's CEO.
As for Apple's surname, Cook doesn't care at all, he never has the surname Cook anyway.
If you can complete the task, save your life, and earn some magical system rewards, Cook will be satisfied.
Of course, it's easier said than done!
--------------------------
During this time, there is something at home, there are fewer updates, and it will return to normal tomorrow.