October 17, 2010

Diagnostic Data

The expeditionary Electron was pulled into the high-bandwidth communication zone to provide a report. In a short period of time, I learned that the hardened composition of the bubble was formed buy the same randomly pairing group of shield electrons, and that the impulse that we continued to fire was just swirling on the surface. There were, however, some holes in the coverage, and glimpses of the inner treasure patterns were reported.

It was highly unlikely that any external source would be able to penetrate both the whorlic shield an this inner cocoon. With two shifter shields running in different directions, it was beyond practical. Even inserting a set of pingers was of no use due to the continuous random pairing that occurred in the shell of the bubble and likewise in the recently enhanced whorl. Paired and moving, it is nearly impossible to transmit anything other than pops of inter-pair noise.

Besides, I did not need to know what was inside the bubble. I already knew of the transcription record and other items that had been accessed during the formation of the double bubble. What I did discover was just as valuable though. The ability of the whorl to shield and isolate both internal recollections from unintended access, as well as to prevent the undesirable interference from other powerful and whirling central networks, came from the same organizational structure.

No comments: