Bang bang bang bang...
Accompanied by a burst of warm applause, Wu Hao ended his introduction.
However, everyone is obviously not satisfied yet. Everyone is still immersed in this smart bullet. The introduction video just now really gave everyone a big surprise, and it also gave everyone endless imagination.
"Xiao Wu, is this micro attack drone easy to operate?" The old man was obviously very interested in this equipment, and then asked a question that he was more interested in.
Of course, this question about the old man is also something that many people here want to ask.
This weapon is good, but if it is difficult to control and inconvenient to use, its practicality will be greatly reduced.
Wu Hao smiled and led everyone to the side of the platform, and then smiled at everyone and introduced: "Our smart ammunition is very convenient to control. It has a total of three control methods for our users to choose.
First of all, we can use a tablet computer for remote control.
After the micro attack drone is launched, its first-person view image will be transmitted to the tablet in real time. Our remote control personnel only need to lock the target and click to confirm the attack.
As for the drone, it will launch an attack on the locked target.
Of course, this is an attack on an already existing target. If we want to launch an attack on unknown criminals hiding behind a bunker, we need to guide the attack method by manually controlling the micro-attack drone to launch the attack.
To put it bluntly, just control the drone and hit the criminals. "
Hehehehe...
Everyone present laughed when they heard his words.
With laughter, Wu Hao continued: "This second remote control method is actually what we recommend, which is to wear our smart AR glasses to control the drone.
Compared with tablet computers, smart AR glasses have a wider field of view and the images will be relatively more detailed. Moreover, our smart AR glasses present 3D images instead of the two-dimensional images presented by tablets, so they are more convenient for remote control.
As for the third remote control method, it is to be handed over to the rear for remote control command, through a dedicated 5G line or high-frequency high-speed communication technology, and to be handed over to a specialized rear control center for remote control and command. "
Speaking of this, Wu Hao looked at everyone and said with a smile: "Actually, we have another way, which is to use micro-attack drones to autonomously search for and attack targets.
Our intelligent system can determine who are criminals and who are hostages, and then determine to attack the criminals. "
"Huh?" After hearing Wu Hao's words, everyone present became agitated.
The old man shook his head repeatedly and said: "It is impossible for us to leave the lives and safety of innocent people to a machine or system program to decide. This is irresponsible to them."
The old man's words were unanimously approved by everyone present. This is not to pander or flatter, but everyone feels that it is somewhat unreliable to hand over the choice of life and death to a machine system.
Faced with this kind of reaction from everyone, Wu Hao had actually expected it. So he smiled and said: "So, I just introduced the first three control technologies to you. Relying on the artificial intelligence system to judge and make decisions is not suitable for practical application at present.
However, I believe that as this technology becomes more and more mature, this technology will definitely be put into practical use in the future.
In fact, this technology can still be used in some operational tasks.
Give an example? What if you encounter criminals who are stubbornly resisting in a bunker? This technology can be used. "
In response to his words, both the old man and everyone else present couldn't help but nodded. Indeed, this technology has advantages and disadvantages. What is certain is that this technology will definitely be put into use.
But when will it be put into use? In which way it will be put into use is still open to question.
At this time, a young leader wearing glasses asked Wu Hao: "Mr. Wu? Whether it is a smart grenade or a smart bullet? These drones are very dependent on wireless networks."
If the criminals we face are highly intelligent criminals, or there are hackers who are proficient in computer technology among the criminals. So, wouldn’t these criminals be able to crack and control these micro-attack drones and launch attacks on our police? "
Sure enough? After this question was raised, the scene immediately became noisy. While everyone nodded, they couldn't help but start discussing.
Some of the company's staff present also looked at Wu Hao, becoming anxious and worried.
Regarding this issue, Wu Hao was very confident and prepared for it. Then he smiled and nodded and replied: "The risk you mentioned does exist. We have actually taken it into consideration during the research and development process, and have also made special responses to this risk.
First of all, let’s talk about a probability, that is, among all previous criminal cases, how many criminals have our police encountered who are highly intelligent or proficient in hacking technology, and what is the proportion? "
Facing this question raised by Wu Hao, everyone present nodded. Indeed, among these criminals, such people are very few and they can only account for a few cases.
However, this does not seem to be the reason for the emergence of such fatal risks and loopholes. If there are such criminals who specifically use the loopholes of this equipment system to retaliate against the police or commit crimes, then how should we deal with it and what methods are available. Who should bear the consequences of this, and whether they can afford it.
Wu Hao continued: "Secondly, even if there are such criminals, what opportunities and conditions will there be at the scene to launch an intrusion attack on these micro-attack drones or our control system in such a short period of time? And seize control.
In order to ensure safety, our micro attack drones need to be launched by the operator before they can be unlocked. In other words, the other party cannot invade and control our micro attack drone before it is launched.
And after launch, what is the longest time from launch to attack. In such a short period of time, even the world's top hackers are unable to perform the series of actions required to invade, compete for control rights, and control the drone.
The third point is that the security of our intelligent system is very guaranteed. Our smart products and systems have been released and sold for several years, and so far there has not been a single incident of the system being breached.
In terms of system security, we are fully confident, so everyone can rest assured. "