Font
Large
Medium
Small
Night
PrevPage Index    Favorite Next

Chapter 1846 Delivering food(2/2)

In fact, Xiaohu is assisted by a supercomputing unit, and it only takes about half a day to achieve this goal.

But it said that it wanted to hide its clumsiness so as not to attract the attention of the empire.

And it believes that with these three days as a buffer, it can wait for another burst of the other party's artificial intelligence.

It is looking forward to the other party's performance and hopes to gain more.

Its plan did not take the gains and losses of the imperial military into consideration.

However, Qu Jianlei expressed support for this.

It's not that he thinks the military's losses are unimportant, but he always believes that everyone should pay the price for their own knowledge.

Moreover, the military is so large and has a complete set of strict systems, and it also has various conveniences in terms of policy.

In this case, facing the possible outbreak of artificial intelligence chaos, if the military does not have emergency response measures, it will really deserve it.

Facts have also proved that the imperial military is really not that crotch-stretching.

After learning that a regiment-level ship of our own had been invaded, they suddenly launched an attack on the Digital Phantom, and the alliance theater immediately came up with countermeasures.

Including but not limited to automatic to manual changes, temporary replacement of control systems, orderly isolation of various sub-control systems, etc.

Those warships that were about to enter the battle were urgently stopped.

The military has even divided all warships into groups and contrasted them through different groups to accumulate experience in dealing with artificial intelligence.

This emergency is a bad thing, but with such a response, it can also be regarded as a practical test and condition screening.

Three days later, Bentley carried the latest memory to the regiment-level ship that invaded his own side.

There are not only detection devices in the memory, but also new firewalls and anti-intrusion systems.
Chapter completed!
PrevPage Index    Favorite Next