Jump to content

Meihua'a Daily


Horo the Wise Wolf

Recommended Posts

"Your words and thoughts in these times of mourning are greatly appreciated.", Princess Lanying would send as a reply to Québec.

[hr]



640px-Roadrunner_supercomputer_HiRes.jpg

Government-Sponsored Computer that can Divide by Zero


In a surprise unveiling, Government Systems Researchers claimed the development of an architecture "capable of dividing by zero". Beyond the simple gratification in mathematical research, the system itself is said to have numerous advantages of those in traditional systems, in both speed (provided by the "streamlined architecture") and security (thanks to the "lack of mathematical exceptions").

The system itself works by simply defining the results of such zero-based functions (similar to the origin of complex numbers), but the changes brought by this move are said to be numerous, and largely to the overall benefit of the computer.

The military has been rumoured to have invested heavily in this breakthrough, and has announced that they plan to immediately adopt these systems, though they will not be available for commercial or private use. Edited by Horo the Wise Wolf
Link to comment
Share on other sites

CLASSIFIED
 


qdPmOEa.jpg

The Order of the Sacred Rose



Newly formed is the Princess' Royal Guard - The Order of the Sacred Rose. Both Ceremonial and Elite, it serves as her shield, as the military is her sword. Devout and divine fervour guide them in their routine with Prioress Celestine as their vanguard and herald. Whilst their main role is the protection of the Princess, their duties also extend to other members of the Royal Family, and some members of Government.

[hr]

vSb8nVc.jpg

Military Augmentation

Today marks the creation of SYSINT - the military unit responsible for all computer-related development, research and application. All existing projects will be moved into its jurisdiction, with the hope of creating a more centralised, well-defined structure to safeguard the realm. Edited by Horo the Wise Wolf
Link to comment
Share on other sites

CLASSIFIED





8NJRtdJ.jpg

The Military Complex Refurbishment Program


In order to facilitate and strengthen the Realm's defences, all three branches of the Meihua'a Armed Forces have commissioned and begun renovating and moving bases. Steering away from the traditional defence standard of merely attempting to intercept attacks, this would make key Military facilities more secure and able to operate longer in the event of an attack.

The most overt move taken would be to simple disguise, camouflage and hide bases of all kinds - submarine pens would be many metres underwater in hardened enclaves, Air Force Bases would be hidden away, and made to look like storage farms, alongside Army and Naval bases. Alongside these upgrades, the bases themselves would receive more static and mobile defences - AESA, passive radar, missile launchers and jamming arrays would all be deployed to all bases to further increase survivability.

Alongside this, Z/YANG would update their own strategic doctrine - launching observation satellites to monitor and take stock of military movements globally, alongside a new facet: at least a third of the Meihua'a Submarine inventory must be at sea at any given time, and would largely remain dormant in home waters.

Furthermore, all international movements of any nation's military would be analysed within Command itself, and Military Readiness would be heightened accordingly.

[hr]

M8aQYrg.jpg

Project Completion


The Blueline Project (development of an anti-electrical infrastructure warhead) has been completed, bearing the fruits of success. The D-FJ-1 (nicknamed the "Blueline", after the Project) is highly effective at crippling and disabling electrical power infrastructure, thus making it highly valued, strategically. It will see deployment as an available munition type in all Military bases, and can work with all current delivery systems. Edited by Horo the Wise Wolf
Link to comment
Share on other sites

ubY3ahe.jpg

加冕很金制


Preparations for the Coronation finally complete, the most grandiose of events had been meticulously planned for the occasion; it would be a truly grand ceremony, but a simple one. Men and Women of the Realm had had their attendance confirmed, as had the Holy Few who would be there to confirm and shape the passing. Foreign dignitaries (no more than two) from Tianxia, Laurentienne and Euphaia would be invited to attend, and they would be seated amongst the Men and Women of the Realm. Those from other nations would be allowed to petition for attendance too, if such was desired.

Participants outfit in Traditional Garb, it would take place in the such-named "Divine Palace", which had been prepared for the occasion itself. Guards would be stationed outside of the area for simple protection, whilst the Sacred Rose would continue to do their part in the Coronation, but with a new name and responsibilities to bear.
Link to comment
Share on other sites

  • 3 weeks later...
CLASSIFIED


oIQ0oun.jpg


The jamming warhead, D-DZ-2 has entered service within the Meihua'a military. Designed for high-speed high-range travel, they emit electromagnetic radiation to interfere with and disrupt enemy radar. Equipped with advanced on-board systems and their own payload, they can also target and destroy ground facilities with impunity, and possess dumb systems to allow them to "communicate" and sync with other Meihua'a missiles.
Link to comment
Share on other sites

  • 2 weeks later...
CLASSIFIED


49hsJut.jpg


Designed for use in MANPADS and as a short-range high-speed missile, the F-MK-1 Dawnflower (晓花) is a highly versatile and modifiable missile and launcher. They can be specced for infra-red, radar or Anti-radar guidance and loaded with smaller dart submunitions. The darts themselves are laser guided and the fastest section of the missile (Mach 3.8) - the missile itself travels the bulk of the flight, before firing the darts at the target with a small amount of computer assistance to ensure they follow a reasonable trajectory.

Alongside this are the F-MK-2 Moonseeker (月探索) and F-MK-3 Starseeker (星探索) as a longer range anti-air missile. Both designed to be fired from dedicated launch platforms (such as ships or AA-systems), they provide a solution to high-ceiling aircraft that cannot be met by the Dawnflower. They are designed for high-manoeuvrability high-speed tasks, done at Mach 3.5 and 4.5 respectively. Using Radar and Inertial guidance, they are the highly accurate and deadly. Edited by Horo the Wise Wolf
Link to comment
Share on other sites

ciWutPF.jpg

The Rehabilitation Act


Instituted today in prions nationwide has been the move to make a stronger effort at the rehabilitation of criminals, rather than simply punishment. Prisons will be equipped with "hobby areas", where those serving time can find new things to enjoy, or hone their skills for future employment. Any proceeds from these endeavours will be ringfenced to be put back into the "Rehabilitation Pot", where further upgrades to the Act will be financed from.

This is coming alongside a general move to increase the quality of life for prisoners, after the much-publicised murder of one inmate last year. Whilst sweeping improvements have been made throughout most facets of life, it has been stated that "The idea of punishment and a harsh sentence still stands; criminal offences will not become a free ticket to a life of luxury and rest, something which many fringe groups seem to enjoy alluding to.".
Link to comment
Share on other sites

  • 4 weeks later...

Not public

 

With the devastation caused to Québec and its economy, as well as post-war difficulties, industries would look abroad for possible opportunities elsewhere. Especially, this would be the case for heavy industry, which would be hit more than most others by restrictions, lack of demand and the threat of going out of business.

 

One of the days after the war in North America had ended, a new entity, named Floralia Industries Ltd., would be applied for incorporation, the request  posed by a Madame Amélie Planchard. Attached would be documents lining out the planned company structure, with Madame Planchard as first Director, the planned objective, which was to engage in business with legal goods including, but not necessarily limited to heavy industrial products, the current shareholders, which seemed to be Madame Planchard (17%), Madame Georgette Lemare (25%), the Association d'Industrie chimique de Québec (5%), CNV (4%) and a list of about three dozen people who owned less than 3% each.

Link to comment
Share on other sites

  • 4 weeks later...
Not Public

Following the success of *Emilia in general Government operations, a new system has been commissioned (named *Delphi) for use in military-weapons systems, with the following (classified) features:
  • Highly streamlined subsystems that eliminate software overheads with better hardware (e.g. more memory, in favour of paging and segmentation);
  • Thinned down kernel, by only implementing API elements that are needed - no functions will exist that are not used by applications;
    • High-levels of API abstraction, so that applications do not use kernel services non-optimally;
    • CISC, custom-built for the kernel and its instructions.
  • Compilers written specifically for the hardware/*Delphi to be used, to achieve the best speed optimisation;
    • Largely done by removing jumps in favour of monolithic code, though some memory optimisations will still be carried out, for register-level speed increases;
    • Language-based protection, as opposed to hardware, to improve runtime performance of applications.
  • Bespoke networking protocol to link *Delphi-based systems together;
    • Network systems would utilise a tree hierarchy, from the individual weapons at the bottom and their handlers higher and higher up. Systems would generally only convene with parent systems, though higher priority calls can be routed to parents further up the hierarchy;
    • Ability to flexibly shift and distribute parent responsibility, in cases where children become non-operable.
  • Minimal levels of system vulnerability to external threats, with systems such as bespoke network protocols, zero external device driver support, and application verification on startup to determine its origin.
and the following (classified) hardware implementation:
  • Parental systems built as a cluster with a:
    • Superscalar (MIMD) hub, as the centralised system.
    • Array systems, for processing environmental input;
  • EPIC architecture;
    • Utilisation of Chaining, to allow systems to make intermediate decisions at events before all computation is complete;
    • Expanded out-of-order execution, where unused processor units are used for future instructions that can be computed at that time, on top of existing parallelisation.
  • Use of NVRAM as secondary storage.
Edited by Horo the Wise Wolf
Link to comment
Share on other sites

  • 3 weeks later...

Internet quality of service set to "dramatically increase"


In what was seen as a sudden move by many, the Accelerator Faction nationalised all national ISPs into one large conglomerate. Not only that, they announced the creation of a unified internet backbone designed specifically with the nation in mind.

Said to provide maximum speed and bandwidth nationally by placing networks into a strict binary tree hierarchy, the networks will be formed based on their geographical location, and each will have two child networks before terminating at the lowest node. The root network is the only one that connects with the networks of the outside world. To facilitate speedy response time, bespoke DNS servers (and a root server) have been created and network indexing to augment domestic traffic.

With significant money having already been invested into the move, end users are expected to have speeds averaging at approximately 6.5MB/s for global connections, with a speed of at least 175MB/s for domestic connections. Edited by Horo the Wise Wolf
Link to comment
Share on other sites

  • 3 weeks later...
Not Public

After extensive testing of the security and throughput provided by *Delphi, the following changes have been put into place:
  • All systems designed to receive connections and data have their actual systems centre abstracted, in favour of smaller, distributed systems that were the first checkpoint for incoming data. Not only would these systems be able to service some requests independently (albeit a small amount), but they would provide an extra level of security and balance traffic for the main systems themselves.
    • The extra security provided would largely be in the form of identifying, and thereby only processing, data from trusted sources, to mitigate potential cyber-warfare against the system. Mitigation would largely be provided with Bogon filtering and MAC limiting;
    • Further security would be provided in an independent, offensive suite that would be tasked with targeting and attacking hostile systems believed to be attempting to interfere with Meihua'a systems.
Civilian and public parts of Meihua'a internet infrastructure would receive similar upgrades, though with the exclusion of MAC limiting and offensive capabilities.
Link to comment
Share on other sites

UyfYrwz.jpg

Pressure Groups push for anti-extraction legislation


Citing the Accelerator claims towards Green policies, pressure groups have begun pushing for legislation to limit oil and gas extraction in the nation. Stating that "the availability of oil and gas is a disincentive towards seeking greener power generation", their demands come in the form of limiting the amount that can be extracted in a yearly basis.

The Prime Minister, however, strongly rebuked the claims and made it clear that he would not implement such legislation. Saying that such a move would "merely increase the cost of business rather than incentivise green energy", he also alluded to possible subsidies aimed at helping businesses pay for their own energy solutions.
Link to comment
Share on other sites

DMoFPpk.jpg


With the Huá hǎijūn finally fully stocked, troops trained, and combat ready, the time had come for the traditional naming ceremony of the ships. Each ship would have a bottle of champagne broken on it by Princess Lanying, would would then bless the ship and send it on its way.

The names of the ships are as follows:

Formidable-class:
NWD (Nǚwáng de, 女王的) Yuánjī (元姬)
NWD Língqǐ (玲綺)

Visby-class:
NWD Méiguī (玫瑰)
NWD Bǎihé (百合)
NWD Xiāngxuě (香雪)
NWD Línglán (鈴蘭)
NWD Zhī (栀)
NWD Mòlì (茉莉)
NWD Shuǐxiān (水仙)
NWD Xiùqiú (繡球)
NWD Sháoyào (芍药)
NWD Zǐluó (紫羅)
NWD Júshǔ (菊屬)
NWD Lánkē (蘭科)
NWD Shuǐyù (水芋)
NWD Cùjiāng (酢漿)
NWD Lián (莲)
NWD Làjú (蜡菊)

Sōryū-class
NWD Shělēi (舍勒)
NWD Chìtóng (赤瞳)
NWD Qièqiàn (切茜)
NWD Bùlán (布蘭)

Endurance-class:
NWD Qīnghuā (清花)
Link to comment
Share on other sites

empty-classroom.jpg

Change of curriculum


With the ever-growing need for skilled labour and increased job competition worldwide, educational reforms are being put in place to change the secondary school curriculum to, at minimum, cover the following subjects:
  • Biology
  • Chemistry
  • Chinese (Language)
  • Computing
  • Economics
  • English
  • History
  • Map Painting & Political Science
  • Maths
  • P.E.
  • Physics
The Minister of Education, Ru Jian, has stated that he feels that "the changes will give our youth a much-needed flexibility when seeking future education and employment", and that the curriculum would "teach them core and critical skills from a young age that will be beneficial for years to come.". Whilst some private schools have shown dissatisfaction with the forced subjects, it is also important to note that students are free to choose other subjects on top of these. These changes come alongside changes to ZZGs (中资格), though no further changes to any qualifications are expected.
Link to comment
Share on other sites

Private

Aiming to further increase security in military networks, data that is rarely accessed/unlikely to be needed urgently will be removed from the network proper in favour of standalone encrypted storage. This will include things such as classified documents, source code, and architectural information, and provide an additional level of complexity for any would-be attackers. To further prevent possible attacks, an intrusion detection system is has been drafted to monitor and observe network activity and determine whether or not a potential attack is being carried out. It will be given a few months of training (in both the real world and ideal scenarios) so that it can build an accurate model of typical network usage. It will be able to:
  • operate with little human interaction;
  • continue incrementally learning throughout day-to-day operations;
  • provide a high accuracy in detection with few false positives (<1%);
  • operate normally in high bandwidth areas with little impact on network throughput and latency.
The system as a whole will analyse the payloads of incoming data to the network and comparing them to statistical models (utilising a Simplified Mahalanobis Distance for accurate yet low-cost comparisons) to determine whether or not certain network behaviour is anomalous, and thereby a security issue. Alongside this, the packet headers would be taken into account - if misformatted, from a strange OS, or from a strange location (atypical to the model), then those intrusions would also be flagged. Edited by Horo the Wise Wolf
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...