August 31, 2010

Intruder Approach

A ripple appeared in the orbit as a propulsion command was processed. I was re-arranged into the opposite direction, watching the position index for a focused object translate across the entire width of space that the photon detectors covered. The pico pulses were increasing in intensity when a warning ping went off in the buffer monitoring region. The reply inquiry checked status of the local buffers once again, and the double check confirmed no local urgency.

Loading up a diagnostic inquiry on the aberrant pinger revealed that it had responded to the intercepted waveform from the approaching central network. The rules by which pingers operated were in need of an update, but now was not the time to accomplish such a sweeping change. I put the conversation aside just in time to review a retrieval command that was being queued for the superhighway and the long branch points.

Observing the entire motion command unfold, the command was processed with a high degree of precision and familiarity. The object of retrieval was similar in nature to the softer coverings that were routinely added to the network's outer shell, but with a higher degree of singleton tendrils, and a photonic signature that was several times higher in magnitude than the nominal network coverings. It was then that commands were issued to both long branch points at the same time.

No comments: