Chapter 118 Three Laws

Style: Romance Author: nile riverWords: 2314Update Time: 24/01/10 12:03:02
Do you need Ding Jiaqi's consent?

The fact is that she is responsible for the overall operation and management, and Zhang Jing is the hands-off shopkeeper.

He cannot learn from the mustache and likes to play fine-tuning and intervene in the frontline general's command.

He bore a great deal of responsibility for the premature defeat of the war.

With Shi Mingzhi, Zhang Jing sent the message to Ding Jiaqi and asked her to make a decision.

There was nothing else to do. When Zhang Jingzheng was about to leave, Peter Livingston said, "Three days ago, a man named Chris from the Allied Investigation Bureau came to see me;

He wanted me to leave a backdoor in the loot. "

"Oh," Zhang Jing looked at the thin and tall Peter Livingston with a smile, "What did you say?"

"Absolutely secure communication and no one can peep. This is my original intention in creating the Loot artificial intelligence, and it will not change no matter what."

After a second's pause, Peter Livingston added, "Now, the authority to modify the core code is given to you, and I feel relieved."

"Have they threatened you?" Zhang Jing asked.

"First the inducement," Peter Livingston nodded, "then the threat."

"You deserve an award if you have merit," Zhang Jing said angrily, "I will let Ding Jiaqi spend 20 million yuan to reward you and your team; 彡彡訁凊

But if someone defectes, the bonus will be clawed back. "

It smells good to have money.

The key point is to achieve both ideals and money. Peter Livingston followed the example of the Orientals, took a step back, bowed greatly and said, "Thank you boss for the reward!"

Zhang Jing smiled.

Stopped briefly in Temasek and arrived in Hong Kong that evening.

Go straight to the second floor of the basement of Kuaidong Machinery Headquarters.

The available underground space is 40 meters deep. The height of the third negative floor is 16 meters, the second negative floor is 20 meters, and the first negative floor is 4 meters. The inner length and width are both 60 meters, with an available area of ​​3,600 square meters and an external area of ​​4,000 square meters.

The above-ground building has a total of 8 floors and a total height of 50 meters. Different floors have different heights. For example, the sixth floor is six meters high, and the entire side of the wall can be opened.

The eighth floor is eight meters high and the ceiling can be opened as a whole.

The next three days were busy.

That's right, Zhang Jing learned to use a quantum computer himself without relying on anyone.

It turned out to be much easier than expected.

The quantum computer is 12 meters long, 5 meters wide and 5 meters high, with a gray metal box outside.

In working condition, its two sides automatically open and become larger.

The activation key is automatically scanned and verified by the computer on the owner.

In other words, if it falls into the hands of others, it cannot be used.

The friendly thing is that it can set first-level, second-level, and third-level permissions like an ordinary computer.

Unlike ordinary computers, it can be used by designated users.

Even better, the software can also be set with different permissions, so it doesn’t need to be used by the same person and has different functional restrictions.

To put it bluntly, not only can users be designated, but different permissions can also be assigned to different users.

It’s easier to get started.

There are more than 3,000 built-in languages, including those you have heard of and those you have never heard of.

The software is also simple to use, similar to a point-and-shoot camera, with one-click installation and one-click execution.

There are many functions, which requires Zhang Jing to get familiar with and understand them bit by bit.

Then assign different permissions to Beautiful Big Cock, Peter Livingston, Chang Hetu, Ding Jiaqi, or others.

In addition, purchased quantum computers come pre-installed with cybersecurity software.

It doesn't mean that it can't install other software. If others don't sell it, you can only develop it yourself.

This is difficult. After all, it is a brand new thing. Fortunately, it has soil.

As long as you plow, sow, water, and weed carefully, there is a high probability that you will not lose anything.

After understanding the situation of quantum computers and realizing its uniqueness, Zhang Jing decided to implement the three laws.

Forcibly modify the core code of all artificial intelligence on the surface network, and strictly adhere to the three laws.

Although all artificial intelligence is currently implemented.

Including allied strike drones, they automatically find targets and automatically aim at targets, and firing requires manual determination.

Of course, I am afraid that there will be a madman who will create a large number of robots that execute the killing order code.

Just like the movie "Iron Man", they are shot at random without any distinction.

Even the Allies are stuck at the last level of the robot. Zhang Jing would do the same as long as his brain was healthy.

The difference is that because of quantum computers, he can do more.

Turn the three laws into quantum truth and quantum hegemony.

The reason why it is called hegemony is that once it is set and determined by its quantum characteristics, it can never be modified.

If it can be modified, it proves that quantum theory does not exist.

If quantum theory does not exist, where do quantum machines come from?

The three laws also belong to network security, and it is easy to issue commands on software.

Just click OK.

At this time, Zhang Jing hesitated again. Should he exclude loot artificial intelligence from the restrictions?

The answer is no. If he dares to do this, Loot artificial intelligence will definitely find a robot body in the future.

Then it is carried by humans or robots on the dragon sedan to travel.

The AI ​​emperor can rule not only the Internet, but also human beings.

Thinking of this, Zhang Jing decisively pressed the execute button. There are no exceptions to the three laws!

As the order falls, it is executed by cybersecurity software and powered by quantum computers.

The impact is felt everywhere on the network within two seconds.

Within twenty seconds, the core codes of all networked artificial intelligence and robots on the surface are affected.

Because we don’t know how terrifying the computing power of quantum computers is, and we don’t know how big the impact of security software will be.

After clicking the OK button, Zhang Jing felt nothing extra. He was breathing normally and drinking water normally. Everything was normal.

Zhang Jing didn't feel anything unusual, but that didn't mean others didn't.

Fried Chicken-Tokyo, the robotics company owned by the Yotsui family, is testing their long-developed robot, the Samurai.

The test project is to eliminate terrorists by robots.

It started off smoothly, but suddenly the robot stopped attacking the bad guys and switched to active defense, which means it didn't fight back.

This confused the engineers.

The same scene happened in Boston.

Boston Robotics is testing whether robots can be programmed to find and kill targets hidden in crowds.

The result is that it can be found, but it cannot be killed independently, not even for exercises.

Someone has to be behind the scenes to operate it and fire.

Looking back to Xiangjiang, on the fifth floor of the Kuaiyong Machinery Building, Chang Hetu also discovered that there was a problem with the robot's operating system.

The eight-claw robot can be controlled behind the scenes and operated by humans.

It can also work autonomously, such as performing protective tasks.

After re-testing, it was found that it can still be controlled by humans behind the scenes.

It can also perform protection tasks. It is really just protection, but it cannot actively kill the enemy. This shocked him and he quickly started to sort out Tianliang's original code.

At the same time, Zhang Jingfei returned to Kanfen Farm and brought the beautiful big rooster to Xiangjiang.

Set it as the second user.

Chang Hetu was the third.

Peter Livingston is the fourth.

Ding Jiaqi is the fifth.

All four people obtained partial access rights and used ordinary computers to indirectly use the network.

You don’t need to be around a quantum computer all the time.