Klaxes Directorate: 3005 - 3010 Research Turn
RESEARCH AREA: PHYSICS AND MATHEMATICS
HIGH PRIORITY RESEARCH (+1 Hand Size, all Subfields)
Computing:
Computational Director: Telthis Jagta
Trait: Innovative (Increased Chance of Rare Technologies)
COMPLETED: QUANTUM COMPUTING
Though the issues of decoherence and sufficiently large qbit reserves remain, our dedicated research into quantum computing has finally produced practical and reliable machines, capable of performing calculations purely electrical devices choke on. Though they remain a specialized piece of technology, their applications to warp navigation and scientific research are significant.
New Module Unlocked:
Mk. 1 Quantum Jump Computer
Size: 5
Qbit Reserve: 5
Qbit Reserve spent per Jump: 1
Minimum Jump Range: 3 Light Years
Multicomputer: Spend 1 Qbit Reserve to boost a Tidewatch roll by +10.
Qbit Refresh Cost: 5 Modules, 1 month. [Shipyard Required]
Polity Benefit: Quantum Computing
Each Grant Cycle, you may force-discard a single technology card. That card is guaranteed to be replaced with a never-drawn technology in the next grant cycle, if one exists for its subfield.
Innovation Cards Decked:
Quantum Keybreaking [Computing]
Adiabatic Quantum Computation [Computing]
PROSPECTIVE TECHNOLOGIES:
Warpslip Hardening:
When jumpships enter Warp, there is a strong electromagnetic pulse. This has so far forced us to do all our unmanned testing within range of radio contact, as the ship's navigational systems must be powered down for the jump to Warp. However, a purpose-built fibre-optic system could allow us to create truly autonomous jumpships.
When completed, unlocks the Mk. 1 Jumpdrone Computer module.
X-Ray Interferometry:
As we reach the level of logistical and technical competence to be able to maintain a permanent presence in orbit, previously infeasible projects (such as orbital x-ray interferometry) have become much more practical. Though the expense of launching multiple large telescopes into orbit would be significant, the ability to gather X-ray emission data across a wide baseline above Klaxis Prime's interfering atmosphere would allow us to resolve much smaller objects in our local area, giving us better detection of small, rocky worlds that might be habitable.
Improves the resolution of our telescope scans. Required optical advances may be applicable to the development of further X-ray technologies.
Adversarial Examples:
The machine learning algorithms that the Lights have traded us, while impressive, are not wholly bug-free. If we are to emulate their feat of artificial intelligence, we need to develop an understanding of how these algorithms 'learn' - and that means we need to understand how they break. Not to mention the practical applications of this research to cyberwarfare.
Clearly of theoretical importance, though specific applications are unknown at this time.
Hierarchical Drone Algorithms: [Dangerous]
While Light drones are individually highly capable, and able to shift form fluidly when they determine a different approach is needed, they ironically have one fatal flaw: they're mass-produced. Every Harvester runs the same algorithms as every other Harvester, and while they do coordinate, they do not self-organize. Like their creators, they're almost overly independent.
It's entirely possible to manage these robots better than the Lights are. Simple allocation of subtasks to workgroups is easy: the concept of "overseer" drones, disparaged by the individualistic Sparks, is not a cultural hurdle for us. The challenge will be bringing to bear our full logistical expertise in order to make a properly global chain of command for all drones.
Improves efficiency of all drone buildings, and unlocks Wonders of globally coordinated robotics.
Quantum-Secure Encryption: [Dangerous]
It's a simple fact: quantum algorithms can break most forms of asymmetric encryption. We have working quantum computers now: the only reason network security isn't already dead is that almost nobody has the budget for specialist keybreaking machines yet. A practically implementable quantum-proof encryption algorithm is going to be a necessity.
If we don't address this issue, the voxnet as we know it might cease to exist. If we do, we might spook the public and draw unwanted attention to this dangerous possibility. Perhaps it's best to let it pass for now.
Sharply improves our network security and cyber-espionage capabilities.
Computing Cards in the Innovation Deck: 7
Never-Drawn Technologies: 5
Hand Size: 5
Select a technology to receive this cycle's Computing grant:
[ ] Quantum-Secure Encryption
[ ] Hierarchical Drone Algorithms
[ ] Adversarial Examples
[ ] X-Ray Interferometry
[ ] Warpslip Hardening