Cyteen 99] - The Cyteen Trilogy by C.J. Cherryh
Author:C.J. Cherryh [Cherryh, C.J.]
Language: eng
Format: epub
Published: 0101-01-01T00:00:00+00:00
* * *
ARCHIVES: RUBIN PROJECT: CLASSIFIED CLASS AA
DO NOT COPY WITHOUT COMMITTEE FORM 768
CONTENT: Computer Transcript File #5979 Seq. #28
Emory I/Emory II
* * *
2415: 1/24: 2332
B/1: Hello, Ari.
AE2: Hello.
B/1: Are you alone?
AE2: Florian and Catlin are with me.
B/1: Anyone else?
AE2: No.
B/1: You’re using House input 311. What room are you in?
AE2: My bedroom. In uncle Denys’ apartment.
B/1: This is how this program works, Ari, and excuse me if I use small words: I wrote this without knowing how old you’d be when you logged-on or what year it would be. It’s 2415. The program just pulled that number out of the House computer clock. Your guardian is Denys Nye. The program just accessed your records in the House data bank and found that out, and it can tell you that Denys ordered pasta for lunch today, because it just accessed Denys’ records and found out the answer to that specific question. It knows you’re 9 years old and therefore it’s set a limit on your keycard accesses, so you can’t order Security to arrest anybody or sell 9000 Alpha genesets to Cyteen Station. Remembering what I was like at 9, that seems like a reasonable precaution.
The program has Archived all the routines it had if you were younger or older than 9. It can get them back when your House records match those numbers, and it can continually update its Master according to the current date, by adding numbers. This goes on continually.
Every time you ask a question it gets into all the records your age and your current clearance make available to you, all over the House system, including the library. Those numbers will get larger. When you convince the program you have sufficient understanding, the accesses will get wider. When you convince the program you have reached certain levels of responsibility your access will also get into Security levels and issue orders to other people.
There’s a tape to teach you all the accesses you need right now. Have you had it?
AE2: Yes. I had it today.
B/1: Good. If you’d answered no, it would have cut off and said: log-off and go take that tape before you log-on again. If you make a mistake with your codes, it’ll do that too. A lot of things will work that way. You have to be right: the machine you’re using is linked to the House system, and it will cut you off if you make mistakes. If you make certain mistakes it’ll call Security and that’s not a good thing.
Don’t play jokes with this system, either. And don’t ever lie to it or enter false information. It can get you in a lot of trouble.
Now I will tell you briefly there is a way to lie to the system without causing problems, but you have to put the real information in a file with a sufficiently high Security level. The machine will always read that file when it needs to, but it will also read your lie, and it will give the lie to anyone with a lower Security clearance than you have.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Deep Learning with Python by François Chollet(15897)
The Mikado Method by Ola Ellnestam Daniel Brolund(13160)
Hello! Python by Anthony Briggs(12990)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(12175)
Dependency Injection in .NET by Mark Seemann(12027)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(10799)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(10614)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10536)
Grails in Action by Glen Smith Peter Ledbrook(10095)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(9972)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(9460)
Hit Refresh by Satya Nadella(9040)
Kotlin in Action by Dmitry Jemerov(8687)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8634)
The Kubernetes Operator Framework Book by Michael Dame(8482)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8305)
Robo-Advisor with Python by Aki Ranin(8259)
Practical Computer Architecture with Python and ARM by Alan Clements(8229)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8201)