Reverse engineer indexing schemes, the charge easy enough to understand he thought. What background need we consider? The library from his childhood came to mind.
So how is it the index cards were such a good way to access the content of this magical place that was, necessarily, changing all the time? Each card pointed to more detail, much more, in the form of the day. Robust was not in his vocabulary at the time, but he later learned it described the organization function well.
Phone numbers, systematically assigned for the convenience of the switching centers. Made friendly with a list, alphabetically ordered associated each person in a geographical region with said number. Sometimes it was a very large book, even for a reference text.
That was many decades ago, but it set the stage for the Spring offensive research. Just hours away from the briefing, she was in the same room with him. Art has its own protocol, let it be, he said to himself. The two of them just discovering how to work together …
Turning to the early conclusions of the last data run, he started playing with ways to describe it in overview terms: He looked at the list just compiled but not yet sequenced:
Identity's role
Anticipate intent?
Yes, w/o projecting.
Advent of mega-data
Emperical methods better with,
Echo analysis - over time
He liked the echo analysis metaphor most. At the 'helm' he could design tracers and then inject them asynchronously. When replies, reactions etc. showed up on the instruments, they were available immediately. And logged in case his attention was elsewhere at the time of reception.
By prior arrangement, the other key player could not answer him directly for fear such interaction would mask the subtle ability of the cloud to know its constituents (the very thing they wanted to study).
He made a note in the HAC folder (Human Assisted Client), and chuckled to himself.
Thursday, April 8, 2010
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment