“Good morning, all. I trust that you are refreshed and ready to tackle this new assignment. Of course, as other pressing matters arise from customers we will decide if any of you need to break away for those issues. Otherwise, I would like you all to focus on this assignment,” began Otto.
Quip offered, in non-typical seriousness, “Otto, I have shown both Jacob and Petra my current modifications to our Immersive Collaborative Associative Binary Override Deterministic, or ICABOD, system. The enhancement made with facial recognition as well as some enhancements Jacob made for handling rapid review of the Big Data collected dovetailed well with the updated next generation encryption from Petra. It seems to be performing well with these additions, and Jacob will continue to modify as things are processed to continually improve. I believe this will be key to not only gathering and classifying the information by the sources and owners, but also for the modeling of where each of the leaders in using these technologies are at present and what their plans are.”
“Good,” Otto replied as he smiled and then continued, “So, we all seem to be on the same page, which is important.”
Jacob suggested, “In looking at each of the aspects of potential application of nanotechnology, the use of locating people rather than objects seems to be the focus. Problems to overcome that seem most obvious include: how to easily maintain power, how to be used with a person, and how to avoid falling into the wrong hands or effectively hiding. At least I believe these would be initial critical category questions.”
Petra chimed in, “All of this development would be ripe for stealing by different entities if they think one group is ahead of another. The encryption would be extensive by any group to help avoid information theft. At this point, given enough time, we can open any file and create the needed encryption keys.
“Toward that end, I have been doing surveillance on several of the most easily identified targets for military and non-military development. So far the feedback is meager, but the content is fairly rich from sources in the U.S., England, Middle East factions, and China.”
“If those are the targets at present, then I will start tracking all the money sources for each of these primary players,” Wolfgang offered. “As other players are added, we can expand the financial aspects.”
Otto grinned and declared, “It is so nice not to have to provide assignments since you each know where you can provide the most help. I suspect we will begin receiving other requests from these entities as they are hitting walls in developing or deploying the newer technology. We also need to determine if England is working independently, or augmenting efforts for the United States.”
Click Follow to receive emails when this author adds content on Bublish