OpenLink Software

Usage stats on Counter-Illegal Entry Protocols

 Permalink

an Entity in Data Space: 134.155.108.49:8890

Since 2521, the military operating systems had been standardized for over 70 years, leaving them vulnerable to hacking. There were several incidents, the most prominent being with the destroyer UNSC Persephone, in which the systems were hacked. This prompted Dr. Halsey to create new protocols. The algorithms were based on already existing translation algorithms.

Graph IRICount
http://dbkwik.webdatacommons.org8
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] This material is Open Knowledge Creative Commons License Valid XHTML + RDFa
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 Unported License.
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Copyright © 2009-2012 OpenLink Software