C2C - Transhuman Era

@MrAzure:

Could you make the following changes to the Digital Era? Note that most changes are renames and only a few are deletions. Thanks.

I don't agree with renaming Cloning. Why would you need to differentiate basic animal and human cloning?
 
I don't agree with renaming Cloning. Why would you need to differentiate basic animal and human cloning?

Because Human cloning presents not only different technological challenges, but also significant societal and cultural issues. Thus, human cloning (or military cloning or what have you) should be a seperate tech.
 
Because Human cloning presents not only different technological challenges, but also significant societal and cultural issues. Thus, human cloning (or military cloning or what have you) should be a seperate tech.

Which raises some interesting questions:

1) Any actual USE of human cloning has ethical issues that should be influenced by civic choices. IMO that means units involving cloning should need an enabling building (clone factory if you like!), and that buildin should be disabled in some civics and/or have happyness or instability penalties in others.

2) Thinking about this it seesm to me that civic choices should actually effect the RATE at which you are able to research techs! This would be a totally new game mechanic, but what if techs had some sort of category assiociated with them (analogous to the combat classes on units), and civics could modify tech costs according to this category. Thus it would be harder to reserach militray techs while running pacifist etc. (or in this case, to research human cloning while liberal or fundemental or something).

Obviously (2) is a potential idea for the future since it's not a trivial tweak (and has AI implications), but IMO (1) should be a part of what we do now.
 
2) Thinking about this it seesm to me that civic choices should actually effect the RATE at which you are able to research techs! This would be a totally new game mechanic, but what if techs had some sort of category assiociated with them (analogous to the combat classes on units), and civics could modify tech costs according to this category. Thus it would be harder to reserach militray techs while running pacifist etc. (or in this case, to research human cloning while liberal or fundemental or something).

Obviously (2) is a potential idea for the future since it's not a trivial tweak (and has AI implications), but IMO (1) should be a part of what we do now.

I had a similar idea except rather than civics it was based on leadertraits. Thus Aggressive civs could research military techs faster while creative civs could research culture techs faster. Agricultural could research farming techs faster and seafaring civs could research sea techs faster. I have no idea how this could be done but its worth looking into.
 
I had a similar idea except rather than civics it was based on leadertraits. Thus Aggressive civs could research military techs faster while creative civs could research culture techs faster. Agricultural could research farming techs faster and seafaring civs could research sea techs faster. I have no idea how this could be done but its worth looking into.

If we add a modifier concept for one (traits say) then also adding it elsewhere (civics) should be easy. I like your suggestion of traits however, as a starter, because it has no AI implications really.
 
If we add a modifier concept for one (traits say) then also adding it elsewhere (civics) should be easy. I like your suggestion of traits however, as a starter, because it has no AI implications really.

Couldn't this be done with the Expression System?
 
Couldn't this be done with the Expression System?
Yes, but then you would have to add the expression to every tech. Better have a categorization and then maybe have the expression for the multiplier of the categorization.

One problem: Civics and traits are player specific, techs belong to the team though. In a team game, which player's civics or traits count?
 
Yes, but then you would have to add the expression to every tech. Better have a categorization and then maybe have the expression for the multiplier of the categorization.

One problem: Civics and traits are player specific, techs belong to the team though. In a team game, which player's civics or traits count?

Have it act as a modifier on the science commerce, not the tech cost (even though it's dependent on the tech being researched). That way, wiin a team, it's the player's commerce contribution to the overall science output of the team that is changed, and it works both within a larger team or alone.
 
Because Human cloning presents not only different technological challenges, but also significant societal and cultural issues. Thus, human cloning (or military cloning or what have you) should be a seperate tech.

What technological challenges are you referring to? It doesn't seem to me that there is much difference between cloning a human and cloning another mammal, which is what the Cloning tech is.

For the cultural and societal issues, I can agree with that. I think that should be a technology of Cloning Ethics, which to me would be the difference between "Can you do this?" and "Will you do this?" Alternatively, Gene Jurisprudence could handle that, or one could feed into the other.

In any case, I do not support changing Cloning to Animal Cloning just to make that differentiation - I think we make tech names too long for the sake of accuracy. I would prefer leaving Cloning alone as the base line technology, and then if you must, have a Human Cloning technology. (The name Commercial Whaling leaves an incredibly foul taste in my mouth just thinking about it, and I have a modmod to change it, along with a bunch of other tech names that I don't care for.)
 
@Vokarya: I still think that we should name the tech Animal Cloning. I agree that Gene Jurisprudence should unlock cloning-related buildings/units. However, I think that my name can still stay. After all, are we all not animals? I think the name Animal Cloning sounds more friendly than simply cloning, but maybe that's just me.
 
@Vokarya: I still think that we should name the tech Animal Cloning. I agree that Gene Jurisprudence should unlock cloning-related buildings/units. However, I think that my name can still stay. After all, are we all not animals? I think the name Animal Cloning sounds more friendly than simply cloning, but maybe that's just me.

I really disagree. I think tech names should be kept as short as possible. You see "friendly", I see "clunky".
 
Will make the changes in green.


Could you make the following changes to the Digital Era? Note that most changes are renames and only a few are deletions. Thanks.



Cloning -> Animal Cloning
Imaginary Physics -> Advanced Theoretical Physics
Darknet Mercs -> Delete (I don't think we should do this unless we implement a mercenary system)
Terran Battleships -> Dreadnaught Design (We call large tanks Dreadnaughts)
Gen IV Nuclear -> Advanced Fission Power
Flak Cannon -> Delete (Huh? in the Digital Era?)
Superstealth -> Multispectrum Invisibility
DNA Barccode -> Fix Typo
Hive Defenses -> Microbot Defenses
WarClones -> Military Cloning
Whole Brain Emulation -> Delete
Prototype Tanks -> Delete (so close to Dreadnaughts?)
Biogenetic Warfare -> Genetic Warfare
True Autoaim -> Delete
Bugbots -> Civilian Microbots
Virtua Sports -> Fix Typo
Liquid Metals -> Liquid Metal Engineering

Intelligent Pavement -> Delete (By this point not lots of pavement, more maglev)
CodeBank Mercs -> Delete (for the same reason as Darknet Mercs)
Underwater Traffic -> Undersea Travel
Aerial Battleships -> Delete (merge with Warmachines)
Stratospehere Warfare -> Suborbital Aircraft



............
 
I don't have any problem with descriptive tech names where differentiation is desirable. For example, I like the term 'Commercial Whaling' because eskimo hunters have been whaling forever but the Commercial Whaling was a rather large industrial effort that inspired a great many inventions, both from the industrial application of whale byproducts but the weapons development and maritime nautical advancements that were inspired in the effort to bring in more whales. Sadly, it also led to the devastation of a population on earth of creatures far more valuable than human.
 
About cloning

its not about just about animals, or cloning organisms from the Animilia kingdom.

Cellular doesnt not mean animal
organism does not mean animal.

-Molecular cloning
-Cellular cloning
-Organism cloning
-Horticultural cloning
-Parthenogenesis
-Reptile cloning
- fish cloning

Dolly the Sheep was a blastocyst, a simple form of cloning compared to what we will see the future.

Dolly, was the first mammal to have been successfully cloned from an adult cell. Dolly was formed by taking a cell from the udder of her biological mother. Her embryo was created by taking the cell and inserting it into a sheep ovum. The embryo was then placed inside a female sheep that went through a normal pregnancy.
 
Bandit/Tief line upgrades to:
Darknet Hacker-------------->Codebank Hacker------->Orbital Pirates-->???

Similiar to bandits they are hackers for hire. The new Espionage units of the Digital Era. They are discovered by Firewalls and Algorithms, (like Dogs can discover Thiefs).

The brainstorming is still in alpha stage. Digital Era is about cyberwarfare, and Thiefs should upgrade to hackers.


While the dominion has specialized in taking others ideas and improving on them, we do have several technological advancements that were developed here in our labs

Distributed telecom Networks
all essential telecom functions are widely distributed amongst the nation. there is no central telcom office as all hubs, routers, and switches are remotly adminned from government offices, but can also be accesed directly, or remotely if need be. the whole network can be run from any given hub in case of emergency the current system has a 97% Fault tollerance rating (meaning 97% of all the systems could fail and the government would still be able to effectively operate, although at that fault level civillian service would be inoperative) the telecom system also has double redundancy on all key trunks and all government offices have a direct line to each other government office thus menaing that no one office can be cut off from the others unless that office is totally destroyed

Optical TeleCom Networks
all signals, switches, routers, and government computers are optical based rendering them immune to EMP attacks
also all cables are sheathed and shielded to prevent damage accidental or otherwise

Adaptive Firewalls
a form of low level AI, these programs will autoimatically patch themselves if they are bypassed in any way to that you can never get inthrough the same hole twice. the IW team holds master keys to each firewall and can circumvent them in case of emergency

'Shadow algotithims'
this algorithims are hunt out any unouthorised access and download themselves onto the computers hard drive. they automatically corrupt or erase any confidential/secret data downlaoded onto or passing through the computer. marks the the computer's hardware confuguration, attached media, macadress, and ip adress and writes an identifying code into the lowest level of the harddrive and any attached media. it then sends the data to the IW center where it is logged and stored incase the team decides/needs to take action. the algorithim leves a copy of it's self on the computer, and if the person tries to use the same computer to hack with again, the shadow algorithim will cause the computer to be immeadatly blocked by the adaptive firewall (whgich will alert the IW team who will then try to counter hack the computer), if the hackers still gets around the fire wall, the algorithim will lock the computer down(if the iw team hasnt already counter hacked the computer). if the hacker somehow manages to get around that and has yet to be counter hacked, the algorithim will preform a rezero of the hard drive of the offending computer.
(this algorithim was developed by the IW team and is their personal pride and joy)

Sphinx algorithims
these are used by the IW team as observation tools. before they are planted they are loaded with search criteria. they are then loaded on the target computer, they preform a content search in the background and report back on an encrypted port using what the IW team calls 'nose packets'. the IW team can then preform further searches by sending 'mod packets' with uptated search parameters and specify files that are to be attached with the next 'nose'

"Eight Ball" Offensive algorithim
used in Offensive IW operations. this little string of code just makes life general hell for the other side by forcing reboots at innoppurrtune times, refusing to allow certian keystrokes or commands to opperate, randomly corrupting data, crashing the hard drive and zeroing the hard drive (although with this version of zeroing, the entire drive is overwritten with magic eight ball images alternating with the prediction that you will have a really bad day. this algorithim is complely configurable to target certian files or compurers on a network. the configuration can be changed at any time. this algorithim can be placed at anytime and have an activation code set as well. when not active it looks like a low level system operation

The 'CodeBank'

this is a repository of all known encryption schemes, firewalls, and protection algorithms and how to break them in the fastest possible time. it is also home to the most advanced decryption algorithims in the dominion. the IW team trains by hacking into this server

this is one of the main servers used by the IW team on ops

The 'BlackBook'

this is a list of all the known ip's for all computers in the world. it updates constantly and is searchable.
this computer is a mainfraime in it's own right and handles any ip routing,tracing, lookups or spoofing that may be needed. only black book knows the ip of ULRA

this is one of the main servers used by the IW team on ops

ULRA or Unbelievably Large Raid Array (pronounced ULLRA)
for data storage, the lab mouse uses a hot swapable raid on all government comupters. this means that all files are stored in pieces across the thousands of computers that are at work in every government office across the country.
when ever a computer is removed from the network, the system automatically rebuilds the data that was stored on that drive thus keeping all the documents intact across the network.
also since the ULRA server is the only server that has the full list, it makes hacking any other computer pointless as all you would see is random bits of data. "CodeBank" and "BlackBook" maintain the ips to a split copy of the dirctory that is Quintouple 4096 bit encripted (4098X5) and is impossible to break unless you have both copies and acess to the CodeBank filing system (code bank holds the ip of the file names, black book holds the ip of the file adresses)
both backups sit behind 2 adaptive firewalls each linked to one another. this means that you need to find 4 different ways to bypass the firewallsto acess the backups

ULRA it's self sits behind the 7 most advanced adaptive firewalls in the country all linked together so that 7 different methods must be used to break in. if firewall 5 is overcome, the entire server is encrypted at 4098X5 with the progressive encryption being applied to the top secret data. also, only the BlackBook knows what the ip of ULRA is. all data inbound for ULRA is scanned by a dedicated system in the IW headquarters and then is handed off to BlackBook, which sends it to ULRA on an 4098X3 line. ULRA then splits the directory and sends it out to the backups along dedicated lines

2048X3 and 4098X3 and progressive Encription
these are the high and ultra high encription protocalls that are used for safeguarding government secrets and the IW team the number before the x is the number of bits used in the encryption, and the number after it is how many times it was encrypted. there is a fingerprint at the end of every X3 document that will look something like this: 54894,64984,20070
these indicate the CodeBank file numbers of the encryption protocols used on the document. these protocols are chosen at random. to decrypt the document you must first decrypt the entire document using the last number in the series. this will leave you with a new set of 2 numbers and the document, you then use the end number to decrypt the document and you finally have something readable.

progressive encryption finds the ascii values of the charecters used in the document. it then adds the original value of the 2nd letter to the first, reconverts to charecters and encrypts normaly. this method is time consuming but when combined with the 4098X5 encription on ULRA it becomes all but uncrackable
 
Back
Top Bottom