The Wyr Alternative: Trinary Data Usage

From Backstage Lore Wiki
Revision as of 20:43, 5 August 2011 by Vanneth (Talk)

Jump to: navigation, search


Introduction

In the wake of the destruction of the sought-after Trinary Data, it is necessary to explore other avenues of interfacing with Sleeper data systems. The first step to this end is to definitively determine the format that Sleepers encode and process their data.

Experiment Outline

Sleeper data resources will be acquired and studied to determine the format used. They will be interfaced with analyzers, codebreakers, and VR consoles. It will be noted that the objective is not to access the data, but merely to determine the method of coding.

A research team will be deployed to explore and investigate Sleeper anomaly designation:

The team will gather what relics they can and investigate the orientation of the hub to determine the usage of trinary format in Sleeper data routing.

Hypothesis: Sleepers use trinary format to encode and process their data. Positive confirmation of this assertion will give proof of one aspect of Sleeper technology operation.

Research Aims

  • To determine the prevalence of trinary format in Sleeper data storage and routing.
  • To ultimately determine the method of infomorph processing used by Sleepers.

Literature Review

Methodology

Experienced hackers and archaeologists will interface their respective tools (codebreaker, analyzer) with various Sleeper data resources. They will also be interfaced with VR consoles to make an attempt at replicating theorized Sleeper interaction.

The Trinary Hub will be explored using a covert-capable exploratory force escorted by a combat squadron capable of protecting against the reported Sleeper battleship patrols. Databanks will be interfaced by the exploratory force using methods that proved successful in other attempts to determine trinary usage. The exploratory force will also examine the orientation of the structure(s) to determine the significance of other Sleeper locations routing through the hub.

Data Assessment

If methods are successful, the use of trinary format should be apparent in their coding. Further decryption may be required.

Time Frame

  • Acquire Sleeper data resources (complete)
  • Interface with data resources - in progress
  • Determine successful interface
  • Locate Trinary Hub
  • Assemble expedition and investigate - mid August
  • Publish results - late August

Budget

Personal tools
Namespaces

Variants
Actions
Navigation
Tools