Chapter 116

After talking about the permissions of the system, I have to talk about the cloud service of the mecha. Any machine or software with an operating system can have a cloud server, and the meaning of this server is to store some user data. If it is For mobile phones, the stored cloud data must be some users' photos or text messages or contacts in the address book, or some software downloaded from the mall.But mechs and mobile phones are different. The purpose of mobile phones is to communicate. To put it bluntly, games are also a kind of communication. However, the communication of text messages is the exchange of words, and the communication of games is the exchange of game data. What about the photos in the mobile phone? , It is also a kind of communication. Before the photo is sent out, it is a communication with oneself, and after the photo is sent out, it is a communication with others.But mechas are different. The purpose of mechas is not for communication. The purpose of mechas is to simulate various human behaviors, so that mechas can complete the simulation of various human activities or use mechas to replace artificial intelligence. Do some dangerous actions, such as manually moving rocks, especially when moving large rocks, is there a relatively large risk? At this time, if you use mechas to carry rocks, then the risk of moving large rocks to the human body is ok It is also possible to drop to a very low level, to a negligible level.Not only can mechas be used to complete some actions that are more dangerous to humans, but also mechas can be used to replace humans to achieve various difficult activities, such as exploring places like tropical rainforests, because there are many Poisonous snakes and the like, so if you wear mechas, you can form a 360-degree all-round protection for yourself without dead ends. It can be said that you are in an invincible position. It is very convenient and very socially meaningful.

Moreover, the mecha can not only simulate human behavior instead of humans to avoid some more dangerous activities, but also can be used as a car.For example, the mecha is designed to have two movement modes, one movement mode is the simulation of human beings, and the other movement mode is the simulation of the posture of the car.The movement mode is different from the operation mode. The operation mode refers to the way the user of the mech controls the mech, for example, through mechanical buttons or through 3D scanning to copy the action. This is the way the operator realizes the control The means of the mecha, and the movement mode of the mecha refers to how the mecha moves, that is to say, what the mecha imitates to carry out activities. If the mecha simulates various human behaviors, then the movement mode of the mecha is the simulation For human beings, if the mecha simulates the posture of a car, then the mecha at this time is simulating the movement mode of the car.

The control mode of the mecha is different from the movement mode of the mecha, so this must be clearly distinguished.

Let’s talk about the cloud service unit of mecha. The main purpose of mecha’s cloud service is to save various preferences of users, or the various settings of hi users. The principle is the same as that of computers and the models of mobile phones Similarly, mech users can design their favorite mecha operation scheme according to their own preferences. At this time, mecha users can save the entire mecha preference settings, that is to say, save all settings Save them all, and then record this saved preference setting with a file name, such as "Scheme 1". It takes time to check the personal preference settings. At this time, you only need to drag the pre-saved plan 1 to the startup folder of the mech. When the mecha starts up again, this pre-saved plan 1 It can work when the mech's system is turned on like a system process, and add various parameters in plan 1 saved in advance to each process of the system, which can be regarded as completing the user's preference setting.

If you don’t set the personal preferences of mecha users by saving the scheme, you can also learn from computers. An operating system is called a mecha here, and a mecha can be controlled by many people. However, each person’s preference setting is It is different, so each user of the mecha can be given a user name and password, and each user of the mecha can log in to the mecha according to his user name and password, and the preference settings in each mecha user are different. In the same way, the multiple uses of the mech can be realized in this way.

However, the drawbacks for many users of the mecha are that it is necessary to re-modify the program design of the system, because the programming design of the mecha at the beginning is that when the mecha is restarted, the user's preference settings will be restored, that is, like in Internet cafes. Just like a computer, once the mech is restarted, all the various files of the previous operator will be deleted, leaving only the initial files, and all the user's data will disappear.If you want to assign user permissions to the mecha, that is to say, let the mecha be like a computer. Whoever logs in will log in with his account and password. After logging in, because the login account is different, the files or software in it are Not the same, this is equivalent to completing the segmentation of user data. Different users use the same machine but because the account names are different, the data inside is also different.Therefore, if you want to give the mech multiple user permissions, the program design of the mecha needs to be changed. It is necessary to change the program design that restores when it is restarted, so that the user's data will not be restored after restarting, so that It is also possible, but this requires a redesign of the program.

Moreover, the model of giving mechas to multiple users is flawed. If the mecha purchased by the user is stolen, the person who stole the mecha can use the BUG of the mecha that can be operated by multiple users and add their own Username and password, even stolen mechas can be used in this way, the security of this is undoubtedly much lower, and it is not conducive to protecting the rights and interests of mecha buyers, so this model has great flaws of.

Of course, there are flaws in the model where one mecha has multiple users, but this kind of flaw can be blocked relatively easily, but Liu Yun does not intend to do this, mainly because such a design is not necessary at all, because the mecha One user is enough.The most important thing is that if the mecha becomes popular in the future, it needs to be bound with the user. To put it bluntly, it is similar to car management. After the user purchases the mecha, he must immediately perform the binding operation. Pass it on to someone else.

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like