About: Iconian software transmission   Sponge Permalink

An Entity of Type : owl:Thing, within Data Space : 134.155.108.49:8890 associated with source dataset(s)

The Iconian software transmission was an information transfer developed by the ancient Iconian civilization. The software used a small probe that uploaded a program into the target's computer system. Once there, the program began rewriting the software of the destination computer. If the recipient was not Iconian, it began to cause malfunctions, eventually reaching catastrophic systems failure. The purpose of this transmission was never discovered.

AttributesValues
rdfs:label
  • Iconian software transmission
rdfs:comment
  • The Iconian software transmission was an information transfer developed by the ancient Iconian civilization. The software used a small probe that uploaded a program into the target's computer system. Once there, the program began rewriting the software of the destination computer. If the recipient was not Iconian, it began to cause malfunctions, eventually reaching catastrophic systems failure. The purpose of this transmission was never discovered.
dcterms:subject
dbkwik:memory-alph...iPageUsesTemplate
abstract
  • The Iconian software transmission was an information transfer developed by the ancient Iconian civilization. The software used a small probe that uploaded a program into the target's computer system. Once there, the program began rewriting the software of the destination computer. If the recipient was not Iconian, it began to cause malfunctions, eventually reaching catastrophic systems failure. The purpose of this transmission was never discovered. In 2365, the USS Yamato discovered the Iconian homeworld in the Romulan Neutral Zone and was subsequently infected by the Iconian probe. The Yamato was later destroyed by the program when it caused an uncontrolled release of antimatter into the Yamato's warp core. The program spread to both the USS Enterprise-D and the Haakona when they downloaded the Yamato's logs. Enterprise Chief Engineer Geordi La Forge discovered that the program could be purged by shutting down all ship's systems, erasing the infected areas, and then rebooting from the computer core's protected memory. This technique was discovered when Lieutenant Commander Data, an android who had also been infected by the program, appeared to die, but awakened moments later as his systems had automatically restored his programming to normal. (TNG: "Contagion" )
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software