Difference between revisions of "UFO Flight Computer (EU2012)"

From UFOpaedia
Jump to navigation Jump to search
(Move of data from Nav Computer to Flight Computer)
Line 1: Line 1:
Alien Nav Computer
+
{{Ref Open | title = UFO Flight Computer}}[[Image:UFO Flight Computer (EU2012).png|right|300px|UFO Flight Computer]]
 
+
We've had the opportunity to study these devices in a limited fashion. As we discovered, they do contain some form of encrypted alien data. However, they're also completely reliant on an internal power supply, which, when depleted, renders the device inaccessible. The only means we've found to gather information from this equipment is by routing its internal power system through a crudely assembled interface that bypasses any built-in shutdown sequences. However, the alien data itself presented an even greater obstacle, as we're dealing with a programming language that is unlike anything found in our own systems. Fortunately, the research team is quite capable, and we quickly assembled a small group of our best analysts for the task. We've already begun to establish patterns in the alien encryption algorithm, revealing small bits of information that can be integrated into our research.
* FAST (5 days) - this is not the base, unmodified time
+
{{Ref Close | source = XCOM: Enemy Unknown (2012) [[Research (EU2012)|Research]] Archives}} 
* Project Cost: 2 UFO Flight Computer
 
* ''The navigational control systems recovered from the crashed UFO seem to act as both a flight computer and a communications module. Further study may lead to improvements in our ability to detect incoming UFOs.''
 
* Award: UNKNOWN
 
  
 +
==Notes==
 +
<br>
 +
[[Category: Research (EU2012)]]
 
[[Category: Enemy Unknown (2012)]]
 
[[Category: Enemy Unknown (2012)]]

Revision as of 15:45, 10 October 2013

UFO Flight Computer
UFO Flight Computer

We've had the opportunity to study these devices in a limited fashion. As we discovered, they do contain some form of encrypted alien data. However, they're also completely reliant on an internal power supply, which, when depleted, renders the device inaccessible. The only means we've found to gather information from this equipment is by routing its internal power system through a crudely assembled interface that bypasses any built-in shutdown sequences. However, the alien data itself presented an even greater obstacle, as we're dealing with a programming language that is unlike anything found in our own systems. Fortunately, the research team is quite capable, and we quickly assembled a small group of our best analysts for the task. We've already begun to establish patterns in the alien encryption algorithm, revealing small bits of information that can be integrated into our research.

Source: XCOM: Enemy Unknown (2012) Research Archives

Notes