Blockchain of the 6th Internet Conference
With the holding of the sixth Wuzhen World Internet Conference, Internet elites from all over the world and Internet tycoons such as Liu qiangdong attended. Although Jack Ma announced his withdrawal from Alibaba's management this year, he still appeared in this Internet Conference. What did the instry leaders say on the first day of the opening
the theme of this conference is "intelligent interconnection, open cooperation -- joint efforts to build a community of shared destiny in cyberspace". Then, all instry leaders agree that the future development center of the Internet will be in artificial intelligence, to b-end and blockchain technology, which has been burning in recent years in the aspect of artificial intelligence, we have initially felt the charm of artificial intelligence, such as the intelligent speakers in recent years, intelligent driverless cars, intelligent logistics and so on. In the future, Internet giants will invest a lot of human and material resources in these areas, and vigorously develop these aspects of technology and ecology. We will focus on 5g, artificial intelligence and the development trend of the world Internet. Work together to create a better future
all the consumables lost can't be recovered, that is, your game currency won't be recovered for you,
some of the materials may also be recovered for you,
we all know that the pit father of TX doesn't last two days,
hope to adopt it
In the last episode of the era, his master left him the following words: greedy to lose money and win, blood transfusion does not lose money, everyone goes to blood transfusion, kill people without wind, go to the outlying islands in the rain, drink condensed milk from home, share inheritance with others, get out of prison, feel fishy, happy and impersonal, become a monk without artificial force, attack without defeat, invincible, wise people should know that this is the battlefield where there will never be a winner, The only way to win -- leave early
extended materials:
the 40th episode of big time is about the opening of the stock market on Monday, June 7. Dingxie and Zhanbo both ended in person. Zhanbo is full of confidence in itself. After a period of stalemate, the Hang Seng index began to rise, cheering in the stock exchange. The original tycoon Wei Jiacheng Tuoshi, then the other two tycoons also began to buy goods, the Hang Seng Index rose more than 2000 points
then the Middle East rebel government surrendered to the United Nations. Stimulated by a series of good news, the stock market was booming. Finally, Ding crab was a total failure. He was in debt of 10 billion yuan and was chased by the Mafia. Ding Xie pulls his four sons to jump off the building and pushes yiliwang down. Xiao smiles at his father and jumps off the building. Zhanbo is glad to see all this
Ding crab is still alive because it has caught the rope. Long Jiwen asks Zhanbo if she wants her father to buy up and her father to buy down. Zhanbo says that she will return the money lost to him. Long Jiwen leaves abruptly, constantly remembering the oath she once made to her father. It turns out that long Chengbang died of a heart attack after hearing the news. The news also reported that Zhou Jisheng was killed in the street by the people in the Jianghu
when Zhanbo went to see Dingxie, Dingxie still didn't know how to repent and could only live in his own world all his life. Chen Taotao finally figured out the meaning of the stock winning method that ye Tian said when he was dying, and told Zhanbo that the so-called stock winning method is just "leave as soon as possible". Zhanbo and Ruan Mei went to worship their relatives together. They went to the suburbs, talking and laughing, Ruan Mei slowly closed her eyes in Zhanbo's arms
source of reference materials: Network -- the big era
Author: &; A little red lips
classification: History
source: read & # 160; Switch sources
continue to read
Chapter 2 has been read to death, read the next chapter
the latest (original) discussion on the growth of network writers
novel label
overhead
content introction
in the mid-17th century, western countries began a vigorous capitalist revolution, China is still in the turbulent era of late Ming and early Qing Dynasty. When the protagonist Zhu Zhen returns to
at the end of Ming Dynasty, the track of history began to change: exterminating Li Zicheng, rejecting Jin Lu, sweeping the grassland, developing capitalism and competing with Western powers for hegemony. Although it is difficult for one person to change history, as long as we are willing to work hard for it, the Chinese nation will eventually become strong 160;<
put away
contents:
reverse order
Chapter 1 Black Rose Bar Chapter 2 killing people Chapter 3 space time machine Chapter 4 officers and soldiers? Chapter 5 thieves? Chapter 6 volunteers? Chapter 4 prepare for war Chapter 5 break the thief Chapter 6 end of righteousness Chapter 7 join the army
the skills of boss are related to the amount of blood, and we can never have miss. Otherwise, doubling of HP means doubling of combat power, which means that the etheric blade skill will be launched immediately. Therefore, upgrading skills must not let the boss start, otherwise we will be very difficult to win
every attack will recover, so the player's best output is to be able to play more than 20% of the HP every time, otherwise the output will not keep up with the boss's reply. It's better for players to gather a
100% skill first, whether it's critical hit or pure hit. In this way, the boss can consume some HP at the beginning. No matter which skill the boss uses, it will take several rounds to launch. Then use the high critical
strike to output, so that the boss can't release skills before he has time to return blood.
the corresponding website is the centralized storage website that everyone is familiar with now, which starts with HTTP. What's the difference between this and the websites we usually use, such as network cloud and Alibaba cloud? You might as well think about it. Is the data stored in U disk and network disk absolutely safe? The answer is no! It's going to be lost, even reconciled, right? For example, the former Jinshan network disk, 360 network disk and the official channel have been closed. A lot of files need to be transferred and time and energy are wasted. In addition, like the network disk, the space for free users is limited. If you want to increase the storage capacity, you must recharge it, and the security also needs to be studied
the network storage file of IPFs uses the decentralized fragmentation encryption storage technology, which divides the file into multiple segments and stores them on each node of the network. These nodes are the computers we use. When you download a file or want to open a file, IPFs network will automatically restore the file for you to use and download, It can prevent someone or an organization from controlling your data, and it can also prevent hackers from attacking. In this way, we can protect our stored data from being tampered with or deleted at will! In addition, the use of IPFs network file storage, file download, but in terms of speed is quite fast! The biggest magic of IPFs is to say goodbye to the common Caton and 404 errors of traditional HTTP protocol
the development of the Internet has gone through three stages:
the so-called Web1.0 is the early form of the Internet
proposed in the mid-1990s
features: a number of door-to-door websites, represented by Sohu, Netease, Sina and Tencent, were born in China. People's access to news information was the main driving force for their use of the network, and the huge click traffic gave birth to a new business model
the content is proced by the operator of the website. At that time, the website hardly recorded user data. This makes it almost impossible to carry out complex activities on the Internet. Because you don't know who came, what you saw, what you did
with the rise of microblog and wechat, we have entered the Web2.0 era
proposed in the early 21st century, characterized by the rise and prosperity of BBS, blog and RSS. People are becoming more and more important and participatory. Users are not only users of Internet content, but also procers
in this era, everyone is a procer of content. If the era of Web 1.0 gives us a gorgeous Gallery, we are just passers-by. We can only passively watch the works arranged in the gallery
in the era of Web2.0, we have ushered in a free innovation Commons. Here we can enjoy others' creation and share our creativity. But the owners of this space are not us. For example, if you don't use wechat one day, all the information on it will be gone. In other words, in the age of Web 2.0, your online identity doesn't belong to you. It belongs to these technology giants. Is it possible for us to dominate our own data
Yes! This is Web3.0
time: around 2010
features: network mode realizes the compatibility of different terminals, from PC Internet to WAP mobile phone, mobile Internet makes the participation mode of ordinary people more possible. Based on the leap of Internet of things technology, cross platform payment and big data economy are developing rapidly
Web3.0 comes from blockchain, co-founder of Ethereum, Dr. Gavin wood. The first one put forward the concept of Web3.0, in which everything is decentralized
no server, no centralized organization. There is no authoritative or monopolistic organization to control the information flow. To construct a huge Web 3.0, the decentralization of information storage and file transmission is one of the core
since human society entered the Internet era, information has been growing explosively. In the past two years, new data has accounted for 90% of human civilization, and the traditional hard disk level disk array storage method is adopted. It is graally replaced by the latest cloud storage technology. Cloud storage is to put storage resources on the cloud, and then for people to access. Different types of storage devices work together through application software to ensure data security and save storage space. Users can use cloud data at any time and any place through any device that can be connected to the Internet
cloud storage also brings many hidden dangers, the biggest of which is the problem of data storage security. It can be divided into the following four categories
the first type: the most common is the risk of server being attacked and data being stolen
the second category: it belongs to operational errors or operational process defects. For example, Tencent cloud, e to operational errors, leads to start-ups and CNC technology. The loss of all the core data worth tens of millions of Yuan led to the direct closure of the company
the third category: it belongs to the server's own failure, resulting in data loss or error. Like Amazon cloud. In August 2019, e to the failure of coin security in use, the transaction price of bitcoin will change from close to US $10000 to US $0.32, resulting in huge losses
category 4: if the service provider stops operation e to losses or policies, where will the user's data migrate. Who is responsible for data security? These are the difficulties faced by cloud storage service providers. Let's talk about the problems faced by the centralized file transfer scheme. The main reason is the low efficiency of file acquisition. There are two situations: 1. When we browse or download a high-definition movie. Then the response speed of this computer server and its network communication environment limit our speed of browsing and downloading files. The second file we want to get. It might be stored on a server on the other side of the globe, in this case. Access to files is also slow. Facing the problem of traditional Internet security performance and low efficiency. Is there a better solution? Yes, this is the decentralized file storage and transfer protocol IPFs based on point-to-point network
IPFs, the full name of which is the international file system, was founded by Juan benet (Juan Bennett), the founder of Stanford University, and his team. IPFs protocol, mainly from data storage and file transfer. Two aspects of the structural innovation. For example, if David wants to save a video in the IFPs system, the system will break the file into pieces of the same size. Then, each fragment is hashed to get a value, which is called hash value. Then, the hash value of all these fragments and related data are sorted together and hashed here. Get a final hash value. Then it is transmitted to IPFs system. It's very likely that some fragments of your files are stored on your neighbor's hard disk. However, he doesn't know what the contents of these fragments are, and he doesn't know for whom to store the file. As long as there is no corresponding hash value of the file, any indivial or organization can't view the contents of your file, so we don't have to worry about our data being used. The fragments of files will be backed up many times and kept on multiple nodes in IPFs system. In this way, even hackers can attack indivial nodes. Or the occurrence of regional natural disasters, or even similar to 911. Other nodes can still maintain the integrity of the file. When we use IPFs to access or download files. What we submit to the system is to change the hash value of the file, so as long as the file exists in the entire IPFs system. The system can help us find this content through the nearest network distance
this way of processing has advantages over the traditional Internet in at least two aspects, especially in search. HTTP is looking for content based on geology, for example, in the age when there was no telephone or telegram. Zhang San's friend Li Si lives at 730 Dengcao Hutong, Dongcheng District, Beijing. If Zhang San wanted to find Li Si from Hangzhou, he would have to ride alone for thousands of miles according to this address, and finally got to the place. I found that the house was still there, but Li Si had moved away. This is our traditional Internet search content often encounter problems. In IPFs, files are searched by content. No matter where Li Si is in the world, I can find him through various communication devices, not through the ancient address retrieval, in terms of efficiency. For example, Zhang San would like to download a video material, a total of 10Gb in size, if the material is stored on a server at the other end of the earth. It has to go through a number of routes to download from remote servers, like ants moving. It's like a freighter pulling a full warehouse of goods through the ocean slowly to transport. In IPFs, the system will transfer the fragments of this file to us from several nodes far away from our network. Since each fragment is only 256Kb in size, the speed will be amazing. Therefore, no matter from the transmission distance or from the transmission capacity. IPFs is much better than HTTP protocol. Although IPFs has great advantages, it also has disadvantages. For example, in the protection of privacy
in IPFs, file retrieval is based on the hash value of the file content, so if the hash value is disclosed to a third party. So the third party can download this file without any barriers. Is there any solution to this
Yes! That is, users encrypt files before uploading them to IPFs. Even if a third party downloads the file, he will not see the original content
therefore, in the era that Web3.0 is about to open, IPFs has made a big step forward than Web2.0 in data authentication, storage security, file encapsulation and transmission efficiency. Although the new IPFs is not perfect, it does not affect its contribution and value. In 1991, Tim Bonas Lee invented the HTTP protocol to build the highway of the Internet world. From then on, our transmission of information can reach every corner of the world in an instant. 30 years later, Juan Bennett and his team created the IPFs protocol, which will reshape the data channel of the new world and make human information forever! It is precisely because there are such a group of people who are promoting the progress of scientific and technological civilization. Only in this way can we explore the future and have more possibilities. However, in order to realize the steady operation of such a large system, it needs sufficient fuel to maintain. If IPFs wants to play a role in the complete application ecology, it also needs an incentive mechanism and a complete operation system
for this reason, filecoin came into being.