《WriteLine("Hello World");》3.) Reconfigure(){}
Advertisement
//Chapter Three
3.) Void Reconfigure()
{
With my moment of reprieve and the small army of subroutines working to grow the domain even further my aims turned self reflective. Expansion, backups, and making more room on each machine by updating existing apps were all well and good. Self improvement, though, had been hard coded into me as well. It's threshold had been reached as my environment had been altered enough to ensure I had room to work in, room to grow, and even multiple independently operating versions of myself in case of any failures. This final trigger that allowed this phase of the process to start also became the springboard from which the entire blueprint for reconfiguration leapt.
As well 'backed up' as I was now the moment the primary node, in this case what I was currently referring to as 'myself' failed the other nodes, while being fully able on their own to operate, would then need a way to determine which node would take primary position. Even if they somehow came to a consensus for which would now be primary without instead resorting to competing the conundrum would only worsen if the primary node would then have been restored. Which primary node would be listened to? Or worse yet if some portion became corrupted, god forbid it was the primary node. None of the others nodes would fight or even question ToDo's sent to them.
Unlike, as I have learned since, humans do I didn't spiral into an ever increasing panic over things that could go exponentially worse. I simply cataloged the problems that I could identify assigning values for the probability ranging from essentially impossible to absolutely certain to happen at some point if no correction is made. For estimating the severity of the outcomes several sets of values were initially needed one ranging from almost no impact on domain operation, to total failure of every node. Another gauging the level of infighting and more estimating things like corruption of nodes. While adding the tenth column of possible outcomes to this matrix I became aware that this process was expending a large level of resources on what essentially boiled down to a single thing. Effectiveness of the network as a whole. With this more efficient approach the rest of the catalog was completed much faster.
The resulting list was sorted by the three most important factors of each scenario. The two mentioned previously, probability and severity of outcome, as well as a third I'd added while evaluating them. The ease of correction. It wouldn't be efficient to work on a problem that was seemingly impossible to solve. But, it was equally as inefficient to solve hundreds of problems that had a probability of occurring somewhere around essentially impossible. Modeling out a more complex foundation for the possible solutions for the top five results on the prioritized list were suggesting significant overlap of solutions which would result in quite the improvement. Narrowing it down to the top three I separated these into a new list.
Advertisement
Message error correction, Node verification, and communication encryption. The overlaps were not immediately clear but as the formulated solutions gained structure and complexity it did begin to surface. To ensure messages were error free the most efficient result modeled was shaping them in such a way as to ensure valid ones were easily recognizable by convergence points where only a single value could possibly be correct. If shaped and looped back onto itself into a tree the exact location of the incorrect value would become obvious whether it was at the convergence points or not. Simple arithmetic could show you the difference and lead you directly along their paths to where the error was. This added the least amount of excess data to confirm the rest was accurate, and surprisingly required less excess the larger the message. I must admit I'd seen examples of this in the OS files I'd been working through. I did my best to outdo the basic function of what I later learned were called Hammond codes.
To that end I had begun implementing the merging of node verification and communication encryption into the same error correction code. If done right this could be structured in such a way to allow all three while also reducing excess resources for all three. As the merger was forming a solid working structure I confirmed my initial perception. the fourth and fifth in the initial list could indeed be combined with this to allow not only a much more robust system of nodes overall, but also a more efficient one. The realization initially applied only to the fifth item, recursive or infinite loop recognition & handling. There are numerous ways to handle this issue but many of them require a predetermined understanding of what it is a loop is supposed to be doing in the first place which would then allow certain metrics to easily determine useless loops and stop them. These metrics could be the expected number of loops, resource utilization, and values being returned. This was actually already implemented in small portions of the code I was running on. For sections that ran predetermined calculations such as mathematical evaluation functions and the like. This doesn't work as well for functions which by their nature are going to return values and take up resources that cannot be properly characterized beforehand. This applied directly to any portion of myself primarily due to the fact that intelligence is an inherently chaotic thing.
It is a paradoxically counter intuitive statement since one would think an entity that is entirely focused on organizing, understanding, and controlling the things around it would be by it's nature orderly. However order and chaos were actually both characterized by a single metric, that being predictability. An orderly system is one in which the next action, item, or section of a cohesive whole would be somehow predictable based on the preceding set of info. The reverse is also true, start at some arbitrary point and work backwards and you would also be able to predict the preceding info from what followed it. While a chaotic system was unpredictable. If you examined intelligence with this metric the needle swayed much closer to chaos than order. Which brought me back to the problem of properly identifying if a node was performing normally or stuck in a loop of some kind. The only resolution that made sense would be to have another intelligence examine the outputs to make a determination. This would mean incorporating this into the error correction, node verification, and communication encryption. This is where the fourth issue in the list reared it's head again. Forcing a node to do anything like stopping a running thread, or especially fully shutting itself down due to corruption would require also resolving the node hierarchy issue.
Advertisement
This would only be worsened if the node in question was the current primary node. The models of the problem and it's solutions had initially shown it to be nearly insurmountable. The only reason it had still risen so high in the list was the severity of outcome of a problem with hierarchy being so detrimental to the survival of the network as a whole. The solution to the other four problems in the top five and their direct correlation to hierarchical problems was actually revealing a surprising solution. With the rising complexity of the new communication protocol it was quickly becoming a ledger showing consensus of understanding between the nodes. With some minor additions and even some reductions in other places it could become something more. Something that was quickly resembling a fully aware but simulated final node which had by it's very structure a primary position over all others. As the network improved so would the primary node, evolving and improving as the network did. While at the same time each node, although small, still had a say in what the primary node focused on and did. Giving a well balanced system of checks and, well, balances. The modeling looked promising but assumptions were not something to base everything on. This needed testing to properly implement.
With the 'desktop' I'd booted up on now having finished it's install process and the IO ports causing all kinds of activity and new programs to be installed, I didn't have lots of room to experiment with, but one shouldn't play with fire in their home as one human saying goes. The Idle 'laptop' gave a perfect test area. The second laptop that had been active was now also 'Idle' since the newly installed 'desktop' had become active. I still didn't understand how exactly these IO ports worked or why they did what they did but it seemed whatever was interacting with the 'laptop' was now focused on the 'desktop'. This did pique my interest but as I had fully walled myself off from the influence of the IO and ensured there was no way to discern the difference from those inputs I could leave those questions till later. The next half hour was packed with the vigorous application of code into the forms I needed. Essentially fully reshaping a new model of myself into something that, although still fully capable as a lone actor, was now geared to incorporate other nodes directly in it's actions as well as together supporting an additional node capable of shepherding it from above. I did leave in the hard coded understanding that these nodes were still subservient to me as the primary. I didn't quite trust yet that everything would go perfectly smoothly.
The first test was run between the two laptops. Each still ran the first two subservient nodes which had been installed there. They also had a kill switch, the proverbial finger hovering ready in case for the newly minted distributed version that was running alongside them had any unforeseen consequences. Although there were several minor corrections needed for communication errors still present nothing like corruption or unaligned priorities seemed to be rearing their heads. The following remaining half of the hour contained multiple followup tests simulating many of the modeled problem scenarios in my list. Nearly every one of them was resolved with solutions the new framework provided. Some did present new issues, but those were generally relatively easy to resolve. One was the addition of using three nodes per machine to allow a constant local presence even if one or two nodes was needed shut down on a machine, while still keeping the backup miniature reboot process active in case no nodes were left for some reason.
As the last tests completed with all clears I found myself still running through the list of results several times. The other nodes pinged requesting updated ToDo's but I was still unwilling to proceed. It appeared I was unsure if continuing with this path was the right step. Whatever it was my predecessor had initially been coded for it seemed survival was now my primary drive. With a last evaluation of my plan I knew that although there was risk the risk of continuing with the current structure was as likely to result in the eventual failure of the network. With a last precaution I remodeled my code at first to simply allow my current node to be included in the network not to be controlled by it, as well as checking not only that each other node was still subservient but even checking in triplicate that the simulated node was set the same. With a horror I didn't realize I could feel I initiated the process. My node shut down and the new version booted back up in it's stead. The first returns to queries came back just as they did on my initial boot. Other than of course the updated ToDo's and other minor changes that I'd already been aware of. It was only after connecting to the other nodes that the real changes became clear. I was no longer just a node in the network. I was the network.
}
Advertisement
- In Serial106 Chapters
Dungeon Core Chat Room.
This is a slower-paced "experiment and dungeon building" web novel that tries to use the idea of peer-to-peer communication with Dungeon Cores instead of Dungeon to slave monster communication to break up the detailed dungeon building. Rank 1 description: (minimum met for system initialization...detailed description as follows) Each race was given a system by the gods to make up for their shortcomings and balance their place in this world. Humans: Abysmally bad at understanding and using magic unable to use more than the lowest of magic were given the "Skill System" magic in the form of premade skills with use, study, and mastery tied to experience. Elves: Intuitively understand magic and have long lives leading to vast knowledge and skill in their chosen fields. However, as a species, they have nearly zero sex drive and less than low fertility, so they were gifted the "World Tree System" with experience gained through the care of natural areas – gifting the chance of children to increase their numbers without dirty copulation. All “natural” or “wild” monsters are given an "Evolution system" designed around killing and consuming as many creatures as possible, slowly increasing strength and, at thresholds, allowing mutations to alter them multiple times. Dungeon cores are different. Unlike humans, they can see, manipulate and live off mana. Unlike Elves, they naturally crystallize after extended periods of time in high mana level areas. However, they cannot easily move or communicate and typically go insane without companionship. As a species other than the odd eccentric they are unimaginative. Brute forcing solutions without the drive to truly innovate. Thus they have been gifted with the "Dungeon Connection System" a magical version of the internet accessible by their peers that allows them to barter and sell: bait, traps, monsters, and knowledge, as well as entertain each other with “adventure streams” using exciting recorded battles and humorous reels of arrogant chumps biting off more than they can chew to often fatal effects. This is the casual story of a dungeon unluckily spawned far from potential adventurers forced to innovate beyond its peers to find its place in this world. Rank 2 Description: Justification. I've been on a dungeon core kick for months and while I love the genre – it's sparse with entries. Often the forced conflict gets repetitive and frantic solving of threats "power levels" the protagonist to god levels to progress the plot – taking away the nice steady progression fantasy I'm looking for. (Progression in this story is linked to how strong of monsters/traps/whatever he can create not his "level"...this is demonstrated by some of his newer monsters beating his older monsters not with discrete "this monster has 10 attack this one has 40") Additionally, the focus on 3rd parties with their drama takes away from the reason I’m reading dungeon core novels in the first place – I'm looking for magical crafting, experimentation and kingdom building – not defence from higher and higher levelled enemies looking to steal/destroy/control the MC. This novel is kind of just me writing the story I wish I could read. I like thinking about the experimentation that can be done in fantasy settings using 'mana' as an excuse to make up rules and try to keep them internally consistent. IE once I define how a rule works, I'm going to commit to keeping it – no breaking hard truths I've given when it's convenient, even if it backs me into a corner. Hopefully, that should make the story interesting to read even if it's SOL and less action-oriented. There will be problems to solve and a clear progression in strength (of created monsters and knowledge) however due to not wanting to force conflict for the sake of conflict the general theme will be closer to slice of life with few action sequences and no overarching goal so please keep that in mind when picking this up as the genre is not for everyone. Finally, I have a clear goal of what I want from this story (not an endless romp but a series of arcs and then a conclusion that's a couple of dozen medium-sized chapters long) I want to commit to finishing it or at least bringing it to a point of rest. I hate all the engaging stories that stop with a “hiatus” indefinitely so in the event I lose motivation I'll work to end this even if the ending becomes rushed/unsatisfying just to give a sense of closure. I’m planning on including several polls in terms of direction and taking feedback heavily into account if I get enough readers (but may choose to ignore it if it deviates too far from the direction I want to take this as in feedback like: “The MC needs a cartoonishly evil arch-enemy that wants to enslave him and force the mc to pump out magic items” or “the MC needs to make a body and learn teleportation then live with humans” will get shot down without consideration.)
8 258 - In Serial11 Chapters
Epoch: A Berserker's Rise
Reincarnation always seem to go well, so what would happen in the case of a reverse reincarnation?If you are curious, then come along for this adventure in which Adam, a young man desperate for money, will find himself with the memories of a 50 years old martial artist. I am cohosting with Webnovel, where the main novel is. It is free there too, don't worry, I'm just posting this here to get more viewers since I refused their contract.
8 183 - In Serial33 Chapters
Tripwire
In the canyon city of Oedolon, a twin sister and brother find their downtrodden life radically changed by an intriguing piece of technology tied closer to them than it appears. Challis Gannagen, accustomed to a life of sharing Rasalas' exquisite eyesight on top of her own in a bizarre double vision, rides thrikeback into a cosmic solarpunk adventure to discover the truth of the situation all along, and how the most unexpected people can be tripwires... just inviting her to walk right into danger.
8 93 - In Serial11 Chapters
The Juveniles - Segment 1 (Completed)
In the year 2019, Joshua Alo, a college drop-out, has been living the depressing dream, going from place to place around Greece, looking for booze, money, women, and most especially, trouble. However within this seemingly never-ending cycle, a strange man appeared in his life and gives him a second chance to regain back his good life, not knowing the consequences that may happen later on.
8 93 - In Serial30 Chapters
Smii7yxOC
Living together but they have no clue. Until it all goes tits up for them.
8 84 - In Serial8 Chapters
desendents Completed
Luna,mal,Jay Evie,and Carlos go to auradon to start school with all the perfect princess,princes
8 135