Computing & Software
In 1969, the Apollo 11 mission went to the moon with less computing power than a late twentieth century graphing calculator. Pretty much any well-to-do resident of the twenty-third century would be aghast if asked to so much as walk across her hab with that little.
In the past three centuries, computers have been fruitful and multiplied. They are not found just in dedicated computing machines such as hand terminals and workstations; microcomputers can be found in any number of household appliances, packaging, clothing, tools and goods.
Rules for computing can be found on page xxx.
Hardware
No matter how divorced a citizen of the net might be from meatspace, it doesn’t change the fact that every AR enhancement, simspace and piece of software is grounded in the physical machines that do the computing. These machines range from dime-sized micro-computers designed for electronic inventory or simple computations, to grand supercomputers operated by corps or universities.
| Item | Properties | Cost | Availability |
|---|---|---|---|
| Microcomputer | Computer 1, Neg | 10¤ | Uncommon |
| Hand Terminal | Computer 3, Neg | 100¤ | Common |
| Workstation | Computer 5 | 400¤ | Common |
| Mainframe | Computer 7, Big 10 | 2,000¤ | Uncommon |
| Supercomputer | Computer 9, Big 20 | 50,000¤ | Rare |
Microcomputer: Are you tracking an object, calculating basic numbers or broadcasting a message on loop? Do you need only very basic computing and wireless ability? Then a microcomputer is what you’re looking for! This dime-sized computer is capable of basic computations and processing. It has inbuilt wireless access. Due to its size, it has no display or other input or output features, requiring peripherals or wireless communication with another device.
Hand Terminal: The ubiquitous hand terminal is a must-have for anyone! These handheld computers work as video and audio comms. They are capable of IR and wireless connections; have an inbuilt camera, microphone and GPS; play games; do basic calculations; connect to the net; and interface with most common AR implants and glasses. Most also come with both voice and touchscreen controls.
Workstation: For serious computing needs, a workstation computer will excel! These computers are designed to be set on a desk or hung on a wall. They have the serious processing power needed for the most resource intensive games, extended scientific calculations and encryption. They can also serve as a makeshift server if needed. Workstation computers typically come with touchscreen and voice controls, as well as key inputs and sometimes simple biometric input.
Mainframe: Do you have the need for not just sufficient, but vigorous computing? Order a mainframe today! Mainframes are designed to go beyond personal computing needs. They host popular net nodes, serve as the main computers for spaceships, administrate corporate sites and sit on academic campuses. Mainframes are generally large machines, meant to remain wired in place and communicated with through individual workstations or hand terminals. Many have wireless capabilities, but this is often left turned off to take advantage of the superior bandwidth offered by wired connections.
Supercomputer: Some of the best computers that money can buy, supercomputers are typically found only in the most important corporate offices, used in the most computationally intensive academic problems or back the largest of the large net nodes. They are almost always designed to interface with personal hand terminals or workstations rather than with users directly. While supercomputers can be ported around in theory, they require extensive setup before they are operational.
Software
Without software computers are little more than fancy paperweights. Needless to say, a variety of software sees use across the Sol system, from anthropomorphized personal assistants, to a ship’s navigation system.
| Item | Properties | Cost | Availability |
|---|---|---|---|
| Encryption System | Software 3 | 100¤ | Common |
| Encryption System, Pro | Software 5 | 400¤ | Uncommon |
| Encryption System, Deluxe | Software 7 | 2,000¤ | Rare |
| Encryption System, Ultimate | Software 9 | 10,000¤ | Exotic |
| Expert System | Software 5 | 500¤ | Uncommon |
| Personal Assistant | Software 3 | 200¤ | Uncommon |
| Translation Software | Software 3 | 50¤ | Common |
Encryption System: Keep your private life private. Encryption is necessary for any sort of secure transaction using broadcast communication, such as browsing the net or speaking over radio comms. Most computers come with basic built-in encryption methods, but for those who want real security, bolstered encryption software is available. Better encryption packages make your encryption harder to break and your computer security harder to penetrate (see pages xxx and xxx).
Expert System: Know your knowns and your known unknowns! An expert system is software that provides a database of knowledge and useful advice on a given topic. Every expert system is designed to support one skill, or sometimes a specific subfield of a skill. Consulting the database takes one minute. Doing so grants a ⊕ on an immediate, related test.
Personal Assistant: When you need a little bit of help, get a personal assistant! Personal assistant software uses adaptive algorithms to learn the wants, needs, schedule and habits of a particular user, looking up information and making suggestions without prompting. All personal assistant software requires several weeks to adapt to a new user, and most is given a customizable anthropomorphic avatar. This avatar can be projected onto the surrounding environment when viewed through AR. Many personal assistants have adjustable personalities as well.
Translation Software: Don’t let the language barrier be an issue. Translation software provides real time on-the-fly translation between two languages. Every language pairing is its own software. Most translation software is capable of outputting the translation in both speech and text, and often includes the ability to manually enter new vocabulary and idioms.
Peripherals
Computers are great, but they still need methods of input and output. The most common methods are touch screens and voice commands, which are built into most computers, but other specialized peripherals exist.
| Item | Properties | Cost | Availability |
|---|---|---|---|
| AR Glasses | Neg, Worn | 50¤ | Common |
| Biometric Reader | — | 50¤ | Uncommon |
| Data Chip | Neg | 100¤ | Common |
AR Glasses: Join the AR revolution. Join the twenty-third century. AR glasses look a lot like typical glasses, except they project augmented reality (AR) information before the wearer’s eyes. This allows the wearer to read AR tags, access AR data and overlay projections on the world around her. Doing this, however, requires wirelessly interfacing the AR glasses with a computer—typically a hand terminal.
Biometric Reader: For all your secure needs, you can rely on a biometric reader. A biometric reader is used as a secure input device to authenticate the identity of a computer user. Most readers scan fingerprints or retinas, although DNA readers exist as well. Typically they are connected to a host computer, which takes input from the device.
Data Chip: Data chips—for when the net just won’t cut it! Data chips are small silicate chips intended to transfer data physically between computers. They are often used when transferal over the net would be deemed insecure or where no local net is available. A typical chip stores up to Software 5. Larger and smaller versions exist.