Alright, this is something that came up in the discussion of the IES systems:
How the do the computers, particularly the megasystems like PANTHEON and the interNEP, operate, on the basic level? What's their file structure, their hierarchy, their strengths and weaknesses. How can they be hacked, how are they protected from hacking.
The RP appears to be in a position where we have two or more major player-controlled powers who at some point are likely to try and hack their opponent's system. When that finally rolls around, we need to know how to handle it.
Now, I know only generalities of the computer systems that we might be working with in the system, and I have no idea of how the various factions approach computer sciences. This is just an issue I've seen that needs to be addressed. I'll do some research on the subject, but I'm an archaeologist, not a computer engineer.
How the do the computers, particularly the megasystems like PANTHEON and the interNEP, operate, on the basic level? What's their file structure, their hierarchy, their strengths and weaknesses. How can they be hacked, how are they protected from hacking.
The RP appears to be in a position where we have two or more major player-controlled powers who at some point are likely to try and hack their opponent's system. When that finally rolls around, we need to know how to handle it.
Now, I know only generalities of the computer systems that we might be working with in the system, and I have no idea of how the various factions approach computer sciences. This is just an issue I've seen that needs to be addressed. I'll do some research on the subject, but I'm an archaeologist, not a computer engineer.