Hydromancerx
C2C Modder
I agree with all except for "Civilian Microbots" I think it should stay as "Bugbots". I think that name should stay.
I agree with all except for "Civilian Microbots" I think it should stay as "Bugbots". I think that name should stay.
@MrAzure:
Could you make the following changes to the Digital Era? Note that most changes are renames and only a few are deletions. Thanks.
I don't agree with renaming Cloning. Why would you need to differentiate basic animal and human cloning?
Because Human cloning presents not only different technological challenges, but also significant societal and cultural issues. Thus, human cloning (or military cloning or what have you) should be a seperate tech.
2) Thinking about this it seesm to me that civic choices should actually effect the RATE at which you are able to research techs! This would be a totally new game mechanic, but what if techs had some sort of category assiociated with them (analogous to the combat classes on units), and civics could modify tech costs according to this category. Thus it would be harder to reserach militray techs while running pacifist etc. (or in this case, to research human cloning while liberal or fundemental or something).
Obviously (2) is a potential idea for the future since it's not a trivial tweak (and has AI implications), but IMO (1) should be a part of what we do now.
I had a similar idea except rather than civics it was based on leadertraits. Thus Aggressive civs could research military techs faster while creative civs could research culture techs faster. Agricultural could research farming techs faster and seafaring civs could research sea techs faster. I have no idea how this could be done but its worth looking into.
If we add a modifier concept for one (traits say) then also adding it elsewhere (civics) should be easy. I like your suggestion of traits however, as a starter, because it has no AI implications really.
Yes, but then you would have to add the expression to every tech. Better have a categorization and then maybe have the expression for the multiplier of the categorization.Couldn't this be done with the Expression System?
Yes, but then you would have to add the expression to every tech. Better have a categorization and then maybe have the expression for the multiplier of the categorization.
One problem: Civics and traits are player specific, techs belong to the team though. In a team game, which player's civics or traits count?
Because Human cloning presents not only different technological challenges, but also significant societal and cultural issues. Thus, human cloning (or military cloning or what have you) should be a seperate tech.
@Vokarya: I still think that we should name the tech Animal Cloning. I agree that Gene Jurisprudence should unlock cloning-related buildings/units. However, I think that my name can still stay. After all, are we all not animals? I think the name Animal Cloning sounds more friendly than simply cloning, but maybe that's just me.
Could you make the following changes to the Digital Era? Note that most changes are renames and only a few are deletions. Thanks.
Cloning -> Animal Cloning
Imaginary Physics -> Advanced Theoretical Physics
Darknet Mercs -> Delete (I don't think we should do this unless we implement a mercenary system)
Terran Battleships -> Dreadnaught Design (We call large tanks Dreadnaughts)
Gen IV Nuclear -> Advanced Fission Power
Flak Cannon -> Delete (Huh? in the Digital Era?)
Superstealth -> Multispectrum Invisibility
DNA Barccode -> Fix Typo
Hive Defenses -> Microbot Defenses
WarClones -> Military Cloning
Whole Brain Emulation -> Delete
Prototype Tanks -> Delete (so close to Dreadnaughts?)
Biogenetic Warfare -> Genetic Warfare
True Autoaim -> Delete
Bugbots -> Civilian Microbots
Virtua Sports -> Fix Typo
Liquid Metals -> Liquid Metal Engineering
Intelligent Pavement -> Delete (By this point not lots of pavement, more maglev)
CodeBank Mercs -> Delete (for the same reason as Darknet Mercs)
Underwater Traffic -> Undersea Travel
Aerial Battleships -> Delete (merge with Warmachines)
Stratospehere Warfare -> Suborbital Aircraft
While the dominion has specialized in taking others ideas and improving on them, we do have several technological advancements that were developed here in our labs
Distributed telecom Networks
all essential telecom functions are widely distributed amongst the nation. there is no central telcom office as all hubs, routers, and switches are remotly adminned from government offices, but can also be accesed directly, or remotely if need be. the whole network can be run from any given hub in case of emergency the current system has a 97% Fault tollerance rating (meaning 97% of all the systems could fail and the government would still be able to effectively operate, although at that fault level civillian service would be inoperative) the telecom system also has double redundancy on all key trunks and all government offices have a direct line to each other government office thus menaing that no one office can be cut off from the others unless that office is totally destroyed
Optical TeleCom Networks
all signals, switches, routers, and government computers are optical based rendering them immune to EMP attacks
also all cables are sheathed and shielded to prevent damage accidental or otherwise
Adaptive Firewalls
a form of low level AI, these programs will autoimatically patch themselves if they are bypassed in any way to that you can never get inthrough the same hole twice. the IW team holds master keys to each firewall and can circumvent them in case of emergency
'Shadow algotithims'
this algorithims are hunt out any unouthorised access and download themselves onto the computers hard drive. they automatically corrupt or erase any confidential/secret data downlaoded onto or passing through the computer. marks the the computer's hardware confuguration, attached media, macadress, and ip adress and writes an identifying code into the lowest level of the harddrive and any attached media. it then sends the data to the IW center where it is logged and stored incase the team decides/needs to take action. the algorithim leves a copy of it's self on the computer, and if the person tries to use the same computer to hack with again, the shadow algorithim will cause the computer to be immeadatly blocked by the adaptive firewall (whgich will alert the IW team who will then try to counter hack the computer), if the hackers still gets around the fire wall, the algorithim will lock the computer down(if the iw team hasnt already counter hacked the computer). if the hacker somehow manages to get around that and has yet to be counter hacked, the algorithim will preform a rezero of the hard drive of the offending computer.
(this algorithim was developed by the IW team and is their personal pride and joy)
Sphinx algorithims
these are used by the IW team as observation tools. before they are planted they are loaded with search criteria. they are then loaded on the target computer, they preform a content search in the background and report back on an encrypted port using what the IW team calls 'nose packets'. the IW team can then preform further searches by sending 'mod packets' with uptated search parameters and specify files that are to be attached with the next 'nose'
"Eight Ball" Offensive algorithim
used in Offensive IW operations. this little string of code just makes life general hell for the other side by forcing reboots at innoppurrtune times, refusing to allow certian keystrokes or commands to opperate, randomly corrupting data, crashing the hard drive and zeroing the hard drive (although with this version of zeroing, the entire drive is overwritten with magic eight ball images alternating with the prediction that you will have a really bad day. this algorithim is complely configurable to target certian files or compurers on a network. the configuration can be changed at any time. this algorithim can be placed at anytime and have an activation code set as well. when not active it looks like a low level system operation
The 'CodeBank'
this is a repository of all known encryption schemes, firewalls, and protection algorithms and how to break them in the fastest possible time. it is also home to the most advanced decryption algorithims in the dominion. the IW team trains by hacking into this server
this is one of the main servers used by the IW team on ops
The 'BlackBook'
this is a list of all the known ip's for all computers in the world. it updates constantly and is searchable.
this computer is a mainfraime in it's own right and handles any ip routing,tracing, lookups or spoofing that may be needed. only black book knows the ip of ULRA
this is one of the main servers used by the IW team on ops
ULRA or Unbelievably Large Raid Array (pronounced ULLRA)
for data storage, the lab mouse uses a hot swapable raid on all government comupters. this means that all files are stored in pieces across the thousands of computers that are at work in every government office across the country.
when ever a computer is removed from the network, the system automatically rebuilds the data that was stored on that drive thus keeping all the documents intact across the network.
also since the ULRA server is the only server that has the full list, it makes hacking any other computer pointless as all you would see is random bits of data. "CodeBank" and "BlackBook" maintain the ips to a split copy of the dirctory that is Quintouple 4096 bit encripted (4098X5) and is impossible to break unless you have both copies and acess to the CodeBank filing system (code bank holds the ip of the file names, black book holds the ip of the file adresses)
both backups sit behind 2 adaptive firewalls each linked to one another. this means that you need to find 4 different ways to bypass the firewallsto acess the backups
ULRA it's self sits behind the 7 most advanced adaptive firewalls in the country all linked together so that 7 different methods must be used to break in. if firewall 5 is overcome, the entire server is encrypted at 4098X5 with the progressive encryption being applied to the top secret data. also, only the BlackBook knows what the ip of ULRA is. all data inbound for ULRA is scanned by a dedicated system in the IW headquarters and then is handed off to BlackBook, which sends it to ULRA on an 4098X3 line. ULRA then splits the directory and sends it out to the backups along dedicated lines
2048X3 and 4098X3 and progressive Encription
these are the high and ultra high encription protocalls that are used for safeguarding government secrets and the IW team the number before the x is the number of bits used in the encryption, and the number after it is how many times it was encrypted. there is a fingerprint at the end of every X3 document that will look something like this: 54894,64984,20070
these indicate the CodeBank file numbers of the encryption protocols used on the document. these protocols are chosen at random. to decrypt the document you must first decrypt the entire document using the last number in the series. this will leave you with a new set of 2 numbers and the document, you then use the end number to decrypt the document and you finally have something readable.
progressive encryption finds the ascii values of the charecters used in the document. it then adds the original value of the 2nd letter to the first, reconverts to charecters and encrypts normaly. this method is time consuming but when combined with the 4098X5 encription on ULRA it becomes all but uncrackable