I assigned the next serialization token to a local pinger and sent an increment command over to the storage elements. Inserting the pinger into the newly forming pattern was necessary since the small inversion of transcription was far too deep to be easily seen. Electronic uniqueness was a far quicker means of identification. It just took a local receiver to get good bandwidth and fast response, and I needed to link this copy with the others, so the construction crew was called.
Realizing that I was on the active front of the central network where new patterns could be formed both freely and from previous experience, I scanned into the unconnected regions into which the central network was constantly expanding, to discover that there were often pre-connected blocks that were tweaked and arranged rather than building them from new. It was not until they were connected together that they contained information, and it was the random ability for these interconnections to occur and weakly link together that had me most intrigued.
Another sequence of pulses and patterns arrived via the central network, and a new layer of connections were being assembled and connected to the previously tagged pattern. At one point, a pair of connected blocks were selected, dragging a large number of randomly connected blocks with it. As the connection pulse whipped through the collection, a number of connections were fused together and the remainder were severed, expelling the unused blocks into the component cloud to possibly form other weak connections or other combinations.
September 17, 2010
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment