Chapter 45 Information System
Just did a bad thing that can kill people, Sima Mulong is in a happy mood, and he is still slowly reminiscing.
The power of the Internet is really infinite, just a small test, I have a bad breath in my heart, and I am invisible, and it is indeed not in vain for my hard work and hard work.
Unfortunately, the only regret is that I can't see the next live broadcast.
After receiving his report, the old brother Zhao with a miserable green head will be like thunder, and what kind of miserable revenge he will take on Huang Daya, I am afraid it is impossible to see. This is the most regrettable place.,I don't know if there's a chance to see some video or video in the future.,Make up for it a little.γ
You must know that Sister Mei's husband, Brother Zhao, according to the little information that Sima Mulong got from a little snooping, it doesn't seem to be a master to mess with.
His business is not small, not only selling building materials such as river sand, but also taking care of some projects, in the local rivers and lakes of Songjiang Mansion also seems to have some weight, and the family is backed by the local big clan, the family is prosperous, and there are many capable people. In short, it is a veritable snake on the ground, rich, powerful, and human, with black wrists and long enough.
How great is the strength of such a person, and how solid the foundation is, does it need to be said? This kind of person is usually too late for you to avoid him, and now you have provoked him, or you have offended him to death, and put on an unknown number of colored hats on people. Once he is allowed to move, you can imagine how thunderous it is, and thinking about that scene is enough to intoxicate people, and it is really an indescribable pity that he can't see it with his own eyes.
I believe that Huang Daya will definitely be satisfied with this sumptuous hospitality, and it will not be in vain that he serves him so diligently, in short, I hope to see him again in the future.
In short, except for this regret, the rest can be described as perfect!
Not only revenge, but also not blood on his hands, learn from Lei Feng to do good deeds without leaving a name, it is easiest to do on the Internet, it is not easy to check, as long as you don't leak out, it can be called a drop of water.
Sima Mulong summed up his experience and felt that although this case of pit and murder of a sharp husband and silver woman was a bit extreme and a bit coincidental, it still showed the power of the modern communication network world (including the Internet).
There are too many mines hidden here, and sometimes a casual sentence may be inadvertent, when the other side is in the right place, and then you meet a suitable person, you can slam and cause a big explosion, killing a few people or something, that's still light!
This alone shows that the potential of the Internet is still very large, and it should be intensively cultivated and firmly grasped in the palm of your hand.
Of course, another sobering lesson is that don't show affection on the Internet, all types of affection are the same, don't you hear that showing affection dies quickly?
In short, this deal continued, but Sima Mulong's interest was raised, and he excitedly found the information of several of his other enemies on the software, and wanted to give them a spoonful of stew and cook them all.
It's a pity that after several inquiries, there is no trace of the information of several other enemies, which shows that the coverage of their own network is still too narrow, and further efforts are needed.
Therefore, although Sima Mulong was a little sleepy now, and he couldn't help but want to take a nap, he still cheered up and continued to arrange some of the following work.
The basic situation now is this: the first work of surveying and modeling, and analyzing vulnerabilities has been completed, and the results have been fruitful.
There are two main things to be done at the moment.
The first direction is to continue to invest in more micron robot groups to join the work of information model mapping and system vulnerability analysis in the fields of computers and other electronic products and communication systems (mobile phones, new energy vehicles, tablets, laptops, servers, etc....... It doesn't matter when these chess pieces can come in handy and receive a big message.
This work can only be concluded after drawing out a full-type model that covers the whole world and is sufficient to control the global information and communication network, and then it is only necessary to pay attention to maintenance and keep an eye on those companies and individuals who have the ability to develop new software and hardware systems in the information field.
Things in this direction,Almost have formed a system,Sima Mulong has been authorized to the engineer to deal with it,The next period of time to produce the micron robot group,In addition to the middle and late stage of the transfer of a few groups to join Sima Mulong's injury recovery,Other production capacity,All handed over to the engineer scheduling,By which to arrange the progress of the workγ
In this direction, it is to expand the breadth of its own information control system.
The other direction is to expand the depth of their own information control system.
In this direction, there are three main things.
The first thing is to urge engineers to develop a suitable control software system, which requires security, concealment, and decentralization, and can be contacted and accessed at any time by logging in to the network.
The second thing is that on the basis of the control software, engineers are required to compile a set of information collection, classification, screening, analysis and processing system, and after installing this system, it is required to be able to squeeze out the information potential of every computer, every electronic device, and every user, and also require timely, accurate and error-free information!
The third thing is to integrate a complete set of data modeling system, which requires individuals, families, companies, organizations, regions, industries, people's feet, education, countries, etc. as the core nodes, and integrates a complete set of data models that include the world and cover all aspects of information, which is the deep processing of data and the in-depth mining of data value.
After all, Sima Mulong didn't have any talent available now, and the only labor force that could be used as cattle and horses was only an intelligent life engineer.
This complete set of information control system based on the Internet and various electronic devices is the only capital available to Sima Mulong, and it is also the only capital that he can boast of at this stage...... After all, the microparticle mother machine is still too rebellious, and this thing can't even be exposed in the face of his sufficient strength, and it is even more difficult to form a real power.
In the early stage, whether it is powerful or not, it almost depends on this.
In the future, whether he will make money and lose money, there will be few people, whether he will support and achieve great things, or whether he will succeed in success, or even rebuild the cultivation system, integrate all kinds of cultivation-related resources, all the major events, and the manpower in all aspects, are closely related to this information system, and if he does not squeeze out all the potential of this set of information, how can this work?
In other words, the power that dominates the world is nothing more than three levels, matter, energy and information, Sima Mulong has no background in the two categories of matter and energy, and if he wants to achieve something great, he must naturally give full play to the advantages of information in this regard.
But information is not something that can be collected and piled up at home just by looking at it, it's not like this!
The value of information can only be truly valuable when it is used.
Therefore, in the ocean of mixed and infinite information, the first thing you need to do is to identify and extract those valuable information, collect, classify and analyze it well, so that it can be applied in a targeted manner and reflect the value it has.
For Sima Mulong, I am afraid that the information he has in the future is too much, which will be a valuable wealth at the social level.
And some information is completely useless to him, but it may be a priceless treasure for someone else.
Realistically speaking, the value of this information lies in the people who use it, and the more people who use it, the more valuable it is, and the more it is used, the more valuable it is!
As a matter of fact, the only entity that can really realize the full potential of this information system is the organization at the national level, and only when the whole society participates in it, can really realize its maximum potential.
The significance of this information system is not just as simple as peeping and stealing secrets, it is a real big data and big application.
However, it is impossible for Sima Mulong to let others take advantage of his information advantage, and it is impossible for him to openly take out this information and sell it on the Internet.
Therefore, Sima Mulong's strategy is to use this information as bait to turn others into his own people, borrow the hands of others, borrow the power of others, develop the value of this information system, and extract a large share from it!
Figuratively speaking, Sima Mulong wants to be a person who sits on the ground and divides the dirt, a person who has countless younger brothers working hard.
The first step for him to do is to build his own information system, and then rely on the guidance of this information system to recruit batches of suitable talents for himself, and then form a snowball effect, and finally, spread to the world and lead the world.
This is the general idea of Sima Mulong's entire action.
Of course, an idea is just an idea, and if you want it to become a reality, you have to do it step by step.
For now, it is necessary to build this information system and accomplish the three things mentioned above.
Control information channels!Collect, classify and process information!Establish an information model system, complete the deep processing of information, and maximize value mining!