The Powers That Be ([personal profile] powersthatbe) wrote in [community profile] synodiporia_ooc2015-03-29 01:58 pm

The Digital Frontier.

THE DIGITAL FRONTIER
April 5th-May 17th


Welcome to the Grid. Many cycles ago, the Grid was inhabited by Cryptos, a set of programs which lived in isolation, developing their own strange system architecture, rumors of which were the wonder of the Network. But something the Cryptos built took on a life of its own: a digital cancer, a virus which purged the Grid of all recognizable digital life-forms, leaving only ruins and terrifying monsters called Automata. For the good of the Network, the Grid was sealed off, locked away behind many firewalls.

But time went on, and other programs developed more advanced protocols. Curious about the knowledge of the Cryptos, they sent two groups of programs to try and recover any data they could from the Grid. The first group formed The Partition - a secure area, reformatted and isolated from the rest of the Grid by the finest security the Network can offer. The Partition guards all port access to the rest of the Network. If there’s a security risk, the programs there - Defenders - won’t hesitate to purge the whole Grid, no matter what data would be lost.

Outside the Partition, on the edge of the corrupted Waste Lands, are the recovery programs - Miners. They sift the code of the old Grid, looking for valuable data artifacts and reconstructing them, fighting Automata, risking the corrupting of their own data, or even de-resolution, in order to restore what the Cryptos lost.

Every program on the Grid has both Purpose and Priority - a function it’s meant to execute, and the authority to do it. But as the Miners working the Frontier recover more and more code, their Purpose - discovery - and the Defenders’ - protection - come into conflict. And the Defenders have the Priority - their root administrator has Priority 0, where the leader of the Miners has only Priority 1. A program of lower station is unable to deny or resist direct orders from a superior, and that’s where the trouble starts.

The paranoid Defenders have begun to refuse access to the network, except to those programs willing to risk the integrity of their code and show their ability to defend themselves in the ancient Games - lethal gladiatorial combat which tests the parameters of a program to destruction. The Defenders reason that any Miner who can defeat their security could stand firm against Automata intrusions as well… but although this keeps things secure, it also leaves the Miners trapped on the edge of the Waste Lands, and lately, a rebellion has been brewing, low-Priority programs willing to defy authority and take over the Partition themselves. Some say that attitude itself is proof of Automata corruption…

But then, at last, there’s a breakthrough. The Miners have found an intact data structure, unmistakably the system architecture of the Cryptos, hidden beneath loads of random junk data. And when they restored it, they found Cryptos waiting within, waiting in stasis for the chance to reclaim their system for themselves… and another group of programs, mysterious Variables without Purpose or Priority, totally unrecognized by the system. Even the Cryptos aren’t sure what they are…

The Partition claims they’re disguised Automata, and the rebel programs believe the Variables are free algorithms who might be the best hope to liberate the Miners from the Defenders’ restrictions. The future of everything the Miners have worked for hangs in the balance…

Exploration Mechanics | Glossary | Casting Call | Skills | Map | Calendar | Player Resources | Questions | Plotting
detectivewonder: by derogatory (slight frown)

[personal profile] detectivewonder 2015-03-29 09:14 pm (UTC)(link)
Remy is Investigating.

Tim, or for purposes of this jaunt, Drake; will be infiltrating as a Miner who spends most of his time competing on the Games Grid, a Priority 9 program whose original purpose was synchronizing clock functions. i'm going to see if I can make him the Games Celebrity, but if demand is high for that role I will bow out.

Joscelin is a Crypto, part of a counterpart-pair along with Leo, and a Priority 8 security program. Keeping Leonardo secure is his only function.

Souji is a Priority 3 Defender whose purpose is data verification - doublechecking function integrity, being the second factor in two-factor security.
rosewater_path: (excite)

[personal profile] rosewater_path 2015-03-29 09:29 pm (UTC)(link)
Hello, everyone! Greetings, Programs!

Rose is infiltrating (actually, Rose is a native of the Network) - with mod permission, aka this was planned with Matt before she was even brought in, she's the Priority 1 Miner, in charge of organizing and administrating the Frontier (which means she doesn't get out into the field as often as she'd like). She's an onboard logic analyzer driver, which means she's imported heavy excavation equipment, namely a logic analyzer, which probably looks like a huge black and blue backhoe or other construction vehicle... and she drives it.

Because that's hilarious, right?
Edited 2015-03-29 21:30 (UTC)
combattente_auditore: (Default)

[personal profile] combattente_auditore 2015-03-29 09:34 pm (UTC)(link)
Can Investigators get into the Factions or do they have to stay Variables for the Jaunt? If yes on the Factions, what about determining their priority figures?
gitanes: (♘ oh ah oh oh)

[personal profile] gitanes 2015-03-29 09:34 pm (UTC)(link)
lila is infiltrating! a miner, priority 3, a searcher and deeply impressed by the rebel miner. hoping to ally herself with this program, she is working tirelessly to make the wasteland safe for other programs.
shiroganeheir: (thinking)

[personal profile] shiroganeheir 2015-03-29 10:27 pm (UTC)(link)
A plotting question. Are the Programs connected to each other in any way? For example, I know it is a different canon-base, but in Reboot, the characters have family units of a sort. Is there anything similar to that here?
solvethepuzzle: (Determination)

[personal profile] solvethepuzzle 2015-03-29 10:29 pm (UTC)(link)
Hitsugaya is Investigating.

Near will be Infiltrating. I've put in for a couple of potential plot roles for him, so I don't want to get too specific, but. If he doesn't end up with either one, he will be a Priority 3 Defender. Virus-checking/security what-have-you. Identifying potential threats, and the like. I am not tech-savvy enough to be much more specific about anything, honestly.
shiroganeheir: (sweatdrop)

[personal profile] shiroganeheir 2015-03-29 11:15 pm (UTC)(link)
Naoto will be infiltrating. A Priority 6 logic-probe Miner, she is the one who is called when things are getting sticky. She is well-known as the one who goes in when things are complicated to set things right. Sometimes, if things get really sticky, people will bring issues to her, and she'll work on them from wherever she is. She's also good in a fight, and can defend herself well against any attack.

However, things are not well. She has seen Things out there, things that do not fit the way they ought, and it is frustrating, as everything ought have a Purpose and a Function. She's beginning to be uncomfortable with the entire situation, and she has Questions.

She also has a baton that turns into a persona gyrocopter that she uses to get from place to place. It is necessary for the tiny, but powerful program!

I'd love to coordinate with other Infiltrators, if anyone wants to!
Edited 2015-03-30 20:32 (UTC)
combattente_auditore: (Default)

[personal profile] combattente_auditore 2015-03-29 11:57 pm (UTC)(link)
Could you give an example as to how a Variable might be able to join the Defenders?
thirdarrow: (Default)

[personal profile] thirdarrow 2015-03-29 11:57 pm (UTC)(link)
Takakage will be Infiltrating under the name Mintaka, one of the three ORION administrative programs. I signed him up for some plot roles, but in case he doesn't make it, I have an alternative. He didn't make it, so alternative it is.

In this Jaunt, he will be a Priority 2 Miner. As a Miner, he will be a program assigned to oversee the well-being of the other Miners and manage the lower Priority ones and settling disputes. However, he can see that the Miners certainly aren't being treated well, and he isn't happy about it. He will be one of the more 'radical' Miners, but his careful nature and kindness is enough to camouflage that.

He will also have sustained injuries from Automaton attacks and relies on a wheelchair to get around. In less-accessible areas he will use crutches, and is accompanied by a Bit helper.
Edited 2015-04-02 14:28 (UTC)
capital_asset: A Shiba Inu surrounded by red flower petals, photographed from above (Transformation - Antoine)

[personal profile] capital_asset 2015-03-30 12:03 am (UTC)(link)
Minako is Investigating and hoping like hell Mothman can stay out of trouble.

Raidou is a Crypto whose Purpose involves researching ways to subdue, rehabilitate, and/or tame Automata. He is a Priority 4, largely because other Programs do not generally want to be around Automata the way he frequently is. For this Jaunt, he will be going by the appellation IOUHEI: Independent Observational Unit and Holistic Evaluation Interface.

IOUHEI normally relies on functions rather than other Programs for assistance while he's working. I'm still hashing out which function(s) he may have, although the most likely suspects are GDN-Ω (GuarDiaN-Omega), INU-GMI (Intelligent Noncombat Unit - General Medic Instance), or possibly (and rarely) ALICE (Aggressively Lethal Intercept-Class Entity).
Edited 2015-04-02 22:17 (UTC)
leftbehindagain: (inconsequential)

[personal profile] leftbehindagain 2015-03-30 12:38 am (UTC)(link)
Now that I can officially make plans:

Naoki here will be Investigating. How upset he'll be about this depends on what Sleepy decides to do with Kanji, but if both the people he usually turns to when it's time to make plans (the other being Naoto) are unavailable, he's just gonna have to buck up and deal. XD

He can probably be talked into helping explore some of the Waste Land sectors pretty easily - it's better than anything else going on. (Unlike Hanamura, he has no problem admitting when that's his motivation.) Otherwise, it'll depend on what they uncover!

(...dat control panel tho. Puts Rise-chan's scanning to shame!)
Edited 2015-03-30 00:38 (UTC)
stopinthenameofawe: (Melissa [Slight smile])

[personal profile] stopinthenameofawe 2015-03-30 01:17 am (UTC)(link)
Melissa is now the Viral Vector; however, she used to be a Priority 7 Miner who dissected corrupt codes in the isolation of the Parition (which as you can imagine makes Defenders not all that fond of her). She still appears to be that Program, but has an altered Purpose that she will be attempting to carry out, partly done by corrupting other programs. She does have her own agenda (which I will keep quiet for now), but if anyone is interested in joining the ranks of the Automata ping me and we'll see if corrupting them aligns with her goals. (Also her program name is LISA- Lockdown Internal System Application.)

And because I'm crazy, Phillip will also be infiltrating as a Crypto, who is the pseudo-child of Jos and Leo. He's a Priority 9, but he's still in Alpha so he's basically bouncing around between different functions trying to figure out what his programming is. He's in that experimental stage. /shot He will be very curious about all the Variables, though he will be a little bit more reserved than normal because all of these other Programs are new and different. But he will still be making friends because of course he will. His new program name will be PHLP - Philial Lazarus Prototype.
Edited 2015-04-02 23:36 (UTC)

Page 1 of 12