Post by Calanria on May 19, 2012 10:14:36 GMT -5
BREAKING NEWS
SATURDAY – In an event that has rocked the technological world, twenty-three employees of EMCON Technology have disappeared without a trace.
In an experiment with the company’s new digitization technology designed to transport physical objects throughout the world by converting the objects into data and streaming them through a network, the scientists accidentally got caught on the digitization platform when the system suddenly booted up and digitized the entire crew.
“I don’t know what to say,” said Sylvia Sonntag, CEO of EMCON. “There was really no explanation for the event.”
Mrs. Sonntag informed the press that investigation into the event had procured little evidence, but they were able to discern that all but five of the employees had been fully rezzed into the environment. The unlucky five had their progress halted by a malicious program that has embedded itself into the system, dubbed the “Infiltrator.”
“Our investigation shows that this individual has replaced the five individuals with himself and four CLU (Codified Lycanthrope Utility) programs,” continued Mrs. Sonntag. “It seems that whoever is controlling the Infiltrator is intent on halting all progress in this company. What’s interesting is the Infiltrator is remaining separate from the CLU program entity; the CLU’s are not aware of the Infiltrator at all.”
Evidently, there is a way for the scientists to escape their codified world; however, there is little that they can do whilst being hunted by the Infiltrator and the CLU’s. “There is an access terminal somewhere on the Grid, where the scientists currently reside in their rezzed state,” said Mrs. Sonntag. “All hope is not lost. Our deepest regrets and sincerest apologies go out to the families of the individuals involved.”
The low hum of an o’erpassing Recognizer awakened one of our availed heroes. Groaning, the Admin stood up amongst the comrades still dazed from the shock of being digitized.
Thinking quickly, the Admin called up a virtual terminal and ran a diagnostic on the transfer. Frak… five of us didn’t make it, the Admin thought with a sinking heart, And it looks like we’ve got six malicious programs in our midst. Too bad we’ve all been rezzed with the same faceplates and we’re running on a limited network; otherwise, I’d be able to determine who the baddies are.
As the other Users (and the Infiltrator and the CLU’s) woke from their idle state, the Admin revealed the information learned, careful not to give away his/her identity. The other programs did little to hide their shock. “So how do we get out of here?” one of the programs asked. “There should be an access terminal somewhere on the Grid which we can use to safely transmit our data back into the physical world,” another said. “Scans show that this terminal is scores of millicycles away, even if we were to use light-cycles to travel,” the Admin divulged.
Another program steps forward. “We’re avoiding an important topic: what to do with the situation we find ourselves in where five of us are out to get the good guys?”
One of the more silent programs at the back answers: “We can’t trust each other, but we’ve gotta find our way to the access terminal somehow. We’re not sure what the other guy’s intentions are, but we all know one thing: the sooner we get to the access terminal, the better. After all, having five of our group as the enemy may very well be the least dangerous thing on this Grid; who knows what’s out there?”
After little discussion, the group comes to a consensus: getting to the access terminal is the top priority. The group takes off on their light-cycles, careful to keep their data disks at the ready in warning to the other programs as to the folly of pulling something during the wake state. All the while, the programs communicate as to who among them is most likely a CLU or the dreaded Infiltrator.
Welcome to the Grid.
SATURDAY – In an event that has rocked the technological world, twenty-three employees of EMCON Technology have disappeared without a trace.
In an experiment with the company’s new digitization technology designed to transport physical objects throughout the world by converting the objects into data and streaming them through a network, the scientists accidentally got caught on the digitization platform when the system suddenly booted up and digitized the entire crew.
“I don’t know what to say,” said Sylvia Sonntag, CEO of EMCON. “There was really no explanation for the event.”
Mrs. Sonntag informed the press that investigation into the event had procured little evidence, but they were able to discern that all but five of the employees had been fully rezzed into the environment. The unlucky five had their progress halted by a malicious program that has embedded itself into the system, dubbed the “Infiltrator.”
“Our investigation shows that this individual has replaced the five individuals with himself and four CLU (Codified Lycanthrope Utility) programs,” continued Mrs. Sonntag. “It seems that whoever is controlling the Infiltrator is intent on halting all progress in this company. What’s interesting is the Infiltrator is remaining separate from the CLU program entity; the CLU’s are not aware of the Infiltrator at all.”
Evidently, there is a way for the scientists to escape their codified world; however, there is little that they can do whilst being hunted by the Infiltrator and the CLU’s. “There is an access terminal somewhere on the Grid, where the scientists currently reside in their rezzed state,” said Mrs. Sonntag. “All hope is not lost. Our deepest regrets and sincerest apologies go out to the families of the individuals involved.”
The low hum of an o’erpassing Recognizer awakened one of our availed heroes. Groaning, the Admin stood up amongst the comrades still dazed from the shock of being digitized.
Thinking quickly, the Admin called up a virtual terminal and ran a diagnostic on the transfer. Frak… five of us didn’t make it, the Admin thought with a sinking heart, And it looks like we’ve got six malicious programs in our midst. Too bad we’ve all been rezzed with the same faceplates and we’re running on a limited network; otherwise, I’d be able to determine who the baddies are.
As the other Users (and the Infiltrator and the CLU’s) woke from their idle state, the Admin revealed the information learned, careful not to give away his/her identity. The other programs did little to hide their shock. “So how do we get out of here?” one of the programs asked. “There should be an access terminal somewhere on the Grid which we can use to safely transmit our data back into the physical world,” another said. “Scans show that this terminal is scores of millicycles away, even if we were to use light-cycles to travel,” the Admin divulged.
Another program steps forward. “We’re avoiding an important topic: what to do with the situation we find ourselves in where five of us are out to get the good guys?”
One of the more silent programs at the back answers: “We can’t trust each other, but we’ve gotta find our way to the access terminal somehow. We’re not sure what the other guy’s intentions are, but we all know one thing: the sooner we get to the access terminal, the better. After all, having five of our group as the enemy may very well be the least dangerous thing on this Grid; who knows what’s out there?”
After little discussion, the group comes to a consensus: getting to the access terminal is the top priority. The group takes off on their light-cycles, careful to keep their data disks at the ready in warning to the other programs as to the folly of pulling something during the wake state. All the while, the programs communicate as to who among them is most likely a CLU or the dreaded Infiltrator.
Welcome to the Grid.