“Good morning, all. I trust that you are refreshed and ready to tackle this new assignment. Of course, as other pressing matters arise from customers we will decide if any of you need to break away for those issues. Otherwise, I would like you all to focus on this assignment,” began Otto.
Quip offered, in non-typical seriousness, “Otto, I have shown both Jacob and Petra my current modifications to our Immersive Collaborative Associative Binary Override Deterministic, or ICABOD, system. The enhancement made with facial recognition as well as some enhancements Jacob made for handling rapid review of the Big Data collected dovetailed well with the updated next generation encryption from Petra. It seems to be performing well with these additions, and Jacob will continue to modify as things are processed to continually improve. I believe this will be key to not only gathering and classifying the information by the sources and owners, but also for the modeling of where each of the leaders in using these technologies are at present and what their plans are.”
“Good,” Otto replied as he smiled and then continued, “So, we all seem to be on the same page, which is important.”
Jacob suggested, “In looking at each of the aspects of potential application of nanotechnology, the use of locating people rather than objects seems to be the focus. Problems to overcome that seem most obvious include: how to easily maintain power, how to be used with a person, and how to avoid falling into the wrong hands or effectively hiding. At least I believe these would be initial critical category questions.”
Petra chimed in, “All of this development would be ripe for stealing by different entities if they think one group is ahead of another. The encryption would be extensive by any group to help avoid information theft. At this point, given enough time, we can open any file and create the needed encryption keys.
Click Follow to receive emails when this author adds content on Bublish