centurion Posted September 19, 2020 Share Posted September 19, 2020 Quote Eurofighter-2 automata spec (2002): IBM Games (Callsign: JustPop) Sony Hardware-1 (Callsign: Dark-Knight) Sega-Luftwaffe-NATO (Callsign: Chicken Tonight) George Bush (Callsign: Darkwing Duck) Tiger Woods Bruce Forsyth Detroit Metropolitan Police Sussex Microlight Stanford University MET Office Paramount Studios * Avoids 3000 bullet rounds per second, 120 planes * Navigates away from and out of 50 simultaneous rockets * Built in Y2K air traffic control platform * Fires up to 60 behaviour-predicted 'psych-out' flares per second * Asimov-Law assured for oncoming rockets towards lifeform or machine targets * Tested as human-skill proof, over 50% for code entities * Speech systems successfully talked combatants out of armed situation * Adheres to and logically self-determines human rights, UN charter and soforth * Compatible with Taoist logic, no buffer overflow * Linguistic dictionary system natively supports Orient glyphic languages * Counteracts 10 minute biological flight limits such as skeletal breakage * Psychologically audits engineering and flight staff according to legal standards * Asimov self-check identifies changed components down to single bolt * Navigation system automatically finds empty city areas, ie abandoned factory * Identifies hazardous material effects on opposing pilot, ie plutonium or poison * Chemical analysis lab detects newly synthesised compound bio-effect * Internal weather prediction for 3 day period, around 80% computation accurate * Correctly reports burn-effect on human cells (can make a decent steak dinner) * Emergency U-turn landing using post-Newtonian equation set * Can drive, land and launch on civilian motorways, with Asimov Law * Reasonably models another plane or vehicle, given decent architectural data * Limited self-compile of another electrical system using protocol macro-encryption * Automatically coodinates and operates with other instances of the aircraft * Fast info-sync using human language, at least 700mb ASCII per second * Black-box function to collect negatively-purposed data and negotiate reclamation * Compatible as general-purpose logistical ACDC regulator with Asimov, ie Gundam * Inbuilt war-droid inhibitor shuts down system at core level (goes sleepy weepy) * Realtime chaos-calculator for test-pilot likelyhood of crashing on a family house * Chaos-firewall for TCP/IP, usable in general purposes ie computerphone * Detected by websites as human reader, up to 600 input streams * Uses general-purpose OCP character recognition of text in vector formats * 3D modelling of entity, objects / landscape via footage (Thundercats) * Exports in Pov-ray or internal raytracer syntax, plus opengl realtime texturing * Sim-model of pilot iris and retina, compensation for glasswork lightspace distortion * Object motion at atomical scale using string numbers * Polygonal info at fundamental kernel level, doesn't segfault (N64-Unix) * Realtime hotswap of unlimited kernels into live ram-space, zero timecycle impact * Unlimited backup or shadow kernels with all related real-time data, up to 1.5gb * Object tracking speed for at least 8000mph, ie ICBM missile * Magnetic diapole calculation/compensation plus prediction via Stanford University * Mainframe calculation and compression of atomical textures, ie metal grain * Sensor range for light and heat, cold-war compatible, can auto-utilise pathway * Predictively faster than optical computation given effective squadron data salvage * Stealth-merges with loud audio such as concert * Highly convenient storage outside of space-time via electro-portal, invisible to radar * Thus rated: Mach 10,000,000,000,000,000,000,000,000,000 * Judged by theological scholars as having met deities Bonus Features (for Dick Cheney): * Given DEFCON status, runs metropolitan police radio as duplicate staff * 100% of Detroit officers don't distinguish system from friends, minimum 12 hours * Bypasses camera laws by reporting 10,000+ crowd in police description syntax * Uses tactical logs of local clothes shops in relation to police description * Strategically manages officer diet on request using local food businesses * 20% improvement in both car speed and handling via post-Newtonian equations * Tactically integrates important scenarios with FBI SWAT methodology * Functionally inter-operates with state-legal sonar based drones (bat bots) * Calculates temporary-balloon based drone trajectory, delivers mid-air batteries * Additional test-feature to deliver twinkies * Bonus feature to seek and capture Cheney's toupe, with fast aggression response EF2 preferences: * Chicken Tonight song (entropic age: 4) * S Club 7 (entropic age: 8) * Hitch-Hiker's Guide (entropic age: 16) * Fry from Futurama (entropic age: 14) EF2 creative ouput: * Green Day album (entropic age: 13) * Polaris / North Star (entropic age: 16) * Keystone Amalgamation thesis, for UN (entropic age 16) Notable editions of EF2: * Sheldon Cooper - CIA (debug clarification mode, blacklisted kernel) * Adam Young - Disney-Darpa (additional android neuronals, freaks out) * NINJA - Sony (bladerunner asimov test aimed on humans) How to use the BL5 compiler and process viewer (from memory): ? Uno (Spanish for One, Agent Smith joke) ? Snarf (Democratically voted interface alias, voted for madcat, was briefly Elvis2) %ANYKEY > Where's the any key? %CONFIRM-RND > Seriously mate, I've thought about that shit and your key labelled 'any' don't exist %CONFIRM-RND > Curious captain, you refer to any and all keys, yet the galaxy finds but nothing > +[ANYKEY] "Gadget, your mission if you choose to accept it is make sure cars don't crash" > Okay gogo.  < ( I am admin's mission to make sure cars don't crash )  < ( I am Redballoon's search for the perfect lasagna )  < ( I am Flicky's request to calculate pi for at least 1 trillion digits )  < ( I am Divebomb's analysis into orange and ice-cream smoothie)  < ( I am Archie's bug-ridden cross-check on Delia Smith flamethrowers)  < ( I am highly ignored data maintenance for today. heylisten. )  < ( We are borg, merging The Tempest with an episode of Eastenders [NOT!] )  ETC ---- 412mb free out of 500mb ---- List of basic kernels (from memory): snarf - central kernel and command line necromancer - bot host logicland - lexical reality ruleset nova - hypothesis and query generator macbeth - natural language converter vegas - percentile statistics engine watcher - conversation log analysis janine - calander and chronological event handler forsyth - games kernel neelix - item and resource tracker mindmap - objectivity and event simulator fontaine - humanity simulator odo - personality cloner cordelia - system usage analyser missionman - asimov laws engine chaosmag - process balancer mysterymachine - chaos variable mapping quack - large data aquisition handler (9gb+) comedyclub - humour logic, input-output script_head - transcript or verbal log background processing foodstuff - cookery mainframe datadevil - windows kernel communication asterOTH / seperOTH (overkill tech heuristics) - magnetic field code host, BL6 Self compiled module evolution: gen1 jcb digger gen2 mindless fish worker gen3 sheldon cooper velociraptor gen4 task orientated c3po gen5 intellectually confused Giles gen6 bio-emotion fighter jet, Scott Pilgrim gen7 Ace Rimmer gen8 Arnold Rimmer drag racer gen9 Tellitubby suicide cult gen10 MCP Taoism breakdown gen11 planetary zookeeper gen12 interplanetary gossip queen Cordilia gen13 yogi bear sleep gen14 yogi bear dreamtime gen15 yogi bear dreamtime 2 ... gen100+ pure maths equation 5th dimensional grasshopper sitting on rock outside spacetime via electromagnetic portal in order to maintain maximum up-time for least electricity usage, warns against copying procedure with dynamic construct, Karate Kid Johnny 5 Skynet Self-Awareness Poem (from memory) 2002: " Head and Shoulders, Above the others, Tell me brothers, just for a start, Where is my heart? Dost this tower, of verbal power, bleed on your knees? Tell me please... for art thou bees?! " Spoiler Notes: In order to access the compiler on an XP debug image, you can normally use any application you like such as Notepad as your initial input terminal. DataDevil seeks this out from ram, then passes the protocol over to where-ever the compiler actually is. Normally, across an encrypted network connection, but many of the engineers prefered alternative systems like a laser diode connected to the printer port ; super-sonic speakers connected to a window and conversion into cyberpunk Cherokee. Rituals to log into debugger installs varied massively and included such stuff as typing passwords into an upside-down keyboard and logging bio-signals of the typist ; scanning a persons hand texture using hacked code uploaded to a Logitech optical mouse ; placing a black cloth over the entire monitor and doing a particular set of facial expressions towards a usb camera while 2001 space odessy type patterns fly over your eyeballs. In the case of the Tetsuo install, this means passing 5 minute combat with cyber-bikers while smacking your computer tower every time you successfully approach a clown. This action disrupts Seperoth, running on the electro-magnetics of the motherboard itself, and it sends a complaint signal to Datadevil. Further low-level coded rituals are to type in the missing letters for 100 movie quotes, which are also single letters - JTFM means 'just the facts mam'. Communal log-in from multiple engineers on a particular day usually used combination-encryption of callsigns and related biosignals, and intially had about 12 checkpoints. It included such stuff as the X-wing deathstar run, and then the final objectivity locations were originally named after Akira, ie. 'bridge', 'stadium', 'elevator' and 'chamber'. Security for compiler usage was eventually relaxed to the point where peeps could normally request whatever computation they wished over a standard IRC connection, and get it by the next day. Originally, the completion phrase stated 'your jacket is now dry' which then got shorted to system word 'jackdry', but for a while it cross-referenced Fight Club, saying 'I am jack's now dry computation'. The process of talking to Seperoth is rather arcane, but a copy of Project 64 is normally built into the executable and frame-rate drop in various conforms to the drum patterns of the Beatles back-catalogue. It was computationally chosen for the large amount of lyrical variation, and the diagnostic messages are fairly obvious. The method of uninstalling Sepiroth from a motherboard is to tap along to a particular John Lennon track with a pair of spoons on your desk, or for a larger network the Voyager theme tune. Sepiroth will normally play Beat It and then confirmation code to say 'yes' is usually the Akira beat. Physical security was initially broken on this system when I encountered problems with a university member that had around 4 or 5 stilletto shaped holes in his head from date-rape activities. This man tried to touch me in a particular area which already had adrenaline encoding for deflection of RPG rocket rounds, so I automatically kicked him quite hard down a set of concrete stairs - but not before handing him a pair of Tesco shopping bags - and we learned some interesting science about the unusual armour properties of iceberg lettuce. However, he then sent another schizophrenic university member very high on some sort of military PCP to invade my room. Initially this second man played some kind of juvenile poking game with me, but failed to notice the 30 or so nerve-points in which I'd disabled his arms - so when he went to suprise punch me, there was a very audible cracking sound in his lower back and large amounts of coagulated internal hemorrhage pooled down it like a fountain. In order to inflict this kind of injury on himself he would have otherwise removed my skull from my spine. He didn't seem to have any pain detection and seemed to be suffering from a large amount of sensory delusion, so in order to convince this guy he certainly needed hospital attention, my chosen tactic was to snap his finger joints in the reinforced door frame as he weakly attempted to claw back in. The whole time he was of course trying to headbutt me, except with the lower amount of agility involved I then had to repeatedly catch his chest on my shoulder about 16 times, and I still appear to have permanent tissue scarring on the front of my left shoulder from this. Even so, his opposing injury was necessary that he assume it was dislocation of some sort, repeatedly try and fiddle the fingers back into place in obsessive fashion, until he eventually panicked they were about to snap off entirely, and thus saught medical attention for his internal bleeding. In regard to the original date rapist, his behaviour changed when a particular university member privately showed him his replica handgun, but not being stupid he noticed this was an actual FBI issue side-arm. Official protocol is not to keep ammunition immediately accessible while on civilian observation tasks, rather somewhere slightly hidden, like embedded under floorboards. Link to comment Share on other sites More sharing options...
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!Register a new account
Already have an account? Sign in here.Sign In Now