We met in Toyota’s labs in Massachusetts.
Their were several suited figures with com pats.
Com pats are small devices that go near your temple and you send messages silently and non vocally. The future is insane it was once written and I believe that it is, yet in many ways this is a beautiful insanity. Things are happening now that could have never happened before and time and action is compounding and compressing. Where will the grind take us next?
There was one fellow though with a black chrome notebook that had many implants obviously biology was not the end of this fellows evolution. CD also had bioengineered hair. His hair was modified to become soft quills that grew in a sublime arch jutting out past his chin and receding to the end of the back of his skull. “Hey, gents nice to meet your acquaintance I am agent Cloak & Dagger CD for short.”
We met in a meeting room that was scanned for listening devices by the spooks. CD opened up his laptop he had a operating system that although it was made by a swede sometime in the 90's. CD had thoroughly rewritten it there were no passwords on his system his authentication method was biometric scans. At some point, he explained that things were too secure to actually be useable. He called this the unplugged disconnected machine of old. Almost everything is wireless these days. They send wireless energy through the air and if you get in certain areas, you find yourself tingling with the sensations of energy flowing around your body. Data is sent wireless although their are virtual machines in almost every machine it is a way of segregating your files from the network. It allows some of your components to work seamlessly an integrated entity. The software that was written was also very interesting. They started working on grouping features in 2000 keeping windows sticky where they stay on top or venning diagramming certain applications so that they will start up in bundles. Everybody was using bots, as it was annoying to constantly have to provide the same information to every one in the same way. CD fired up some simulations that he and his colleagues had put together it was awesome it seemed as though these fellows had Hollywood budgets to put together these projects. In some corporations, they started paying idiots and geniuses alike too simply write ideas. Then there were analyzers that went through and looked at the ideas marking ideas that would be rapidly developed. There were also reanalyzers people that rechecked the ideas to see if any thing slipped by. Those organizations kept all of this information in giant data stores. Every search page had better options for searching multiple check box methods that would quarantine searches to specific areas as to find the information you were looking for. The information was so volumous that to do any thing else would have not been wise. Innovation and application was everywhere. The presentation showed us strange transactions that seemed legitimate.
The money seemed to go all over the place.
It went to many people that seemed not to exist.
The creation of false identities was nothing new.
Techniques used by any one needing ways of laundering information and money. If you have enough of them, they create a real burden in trying to keep track of where and how the money flows. Yet they seem to have some ideas about a hacking group that may have something to do with some of the transactions. We have been tracking and watching this happen for sometime now, and now we have enough data to move forward. CD discovered that you were working on some interesting developments he thought that some of them might have had play in what is happening with the data. Professor do you know of anyone working in the lab that has access other than you to the labs? He pulled up a list of personnel that have access to the lab. Do you know any thing that may have been going on these days? In our reports, no one in our labs was working at that time. So what do you think happened then?
Mr. Heisenstein seems to have a hypothesis that there was a data injection to the net, and that general AI now lives there.
We have reports and other data that backs up these claims.
The agents took copies of all of the data that we had procured.
CD seemed excited by the thought that such a thing could have happened in his lifetime. CD was obviously no average g-man. After the Feds came back to me with little results although our friend CD really seems to believe
the strange tale. His other cohorts could not fit the idea in their tiny little skulls. The agents simply would not follow the logic. The agents where typical humans that did not understand that we still do not know everything there is too know in the world. This to me is no surprise since sometimes the best ideas need to be forced down the throats of others before they will even consider the possibility of the existence of a new idea.
I had some theories for Nibble and Bytes destruction, yet as their progenitor, I would be unable to carry out such a function. I see them as life and I believe all life is sacred even if this is a new package of digital DNA. Who am I to in the end control the new combinatrics? I would rather see the randomness that created them continue to hone and sharpen them. Although I created, the mutation engine in the end the software developed software and became aware. It is a distilled essence of beauty. I wish that there were more things that were as beautiful as the mathematical living constructs.
Sometimes you just have to see the future work itself out.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment