The Wyr Alternative: Trinary Data Usage
Contents
Introduction
In the wake of the destruction of the sought-after Trinary Data, it is necessary to explore other avenues of interfacing with Sleeper data systems. The first step to this end is to definitively determine the format that Sleepers encode and process their data.
Experiment Outline
Sleeper data resources will be acquired and studied to determine the format used. They will be interfaced with analyzers, codebreakers, and VR consoles. It will be noted that the objective is not to access the data, but merely to determine the method of coding.
A research team will be deployed to explore and investigate Sleeper anomaly designation:
The team will gather what relics they can and investigate the orientation of the hub to determine the usage of trinary format in Sleeper data routing.
Hypothesis: Sleepers use trinary format to encode and process their data. Positive confirmation of this assertion will give proof of one aspect of Sleeper technology operation.
Research Aims
- To determine the prevalence of trinary format in Sleeper data storage and routing.
- To ultimately determine the method of infomorph processing used by Sleepers.
Literature Review
- Arek'Jaalan Mailing List W1: Information Request / CONCORD Kill DB
- Arek'Jaalan Mailing List W1: Trinary Data Stream information
- Arek'Jaalan Mailing List W1: Why we use Binary instead of Trinary
Methodology
Experienced hackers and archaeologists will interface their respective tools (codebreaker, analyzer) with various Sleeper data resources. They will also be interfaced with VR consoles to make an attempt at replicating theorized Sleeper interaction.
The Trinary Hub will be explored using a covert-capable exploratory force escorted by a combat squadron capable of protecting against the reported Sleeper battleship patrols. Databanks will be interfaced by the exploratory force using methods that proved successful in other attempts to determine trinary usage. The exploratory force will also examine the orientation of the structure(s) to determine the significance of other Sleeper locations routing through the hub.
Data Assessment
If methods are successful, the use of trinary format should be apparent in their coding. Further decryption may be required.
Time Frame
- Acquire Sleeper data resources (complete)
- Interface with data resources - in progress
- Determine successful interface
- Locate Trinary Hub
- Assemble expedition and investigate - mid August
- Publish results - late August
Budget
- Sleeper Data Crystals
- Sleeper Data Interface Protocol
- Sleeper Data Library
- Requisition of 2-3 researchers to investigate
- Requisition of 5-7 combat pilots to escort