July 15, 2010

Target Spread

While we had the ability to seed any area of the central network with pingers and monitor the activity there, we concentrated our efforts in the region that was linked to the compression-relaxation receivers and generator, and the related regions of the central network. It was here that the nebulous and willowy patterns that seemed to guide and move the network activity brushed up against these regions and spun patterns toward the generator.

Conversely, as signals were processed along the receiver chain, these same regions would illicit the similar whispy patterns that whirled and circulated across the broadest areas of the central network. It was here that our injection experiments occured during random time, and the first thing that we tagged were the interfolded set of regions that responded to the 26 special symbols as well as the 10 counting symbols.

While it was true that the larger communication tokens that were represented by groups of the special symbols, we observed that these larger tokens had their own independent regions that could excite the symbolic processor, converting the token into a sequence of individual symbols. It was into these complex processing nodes that we started the process of cataloging and tagging with trained pingers. It was amazing how those 26 special symbols served to index and collate access to the array of symbols that were thusly composed.

No comments: