Tag: research
85 resultsapparel
TESSERA Genomics Lab Director Coat— uniform
…e Director-grade version is issued upon promotion to senior research staff and is distinct from technician-level coats in several ways that TESSERA employees read insta…
character
Folake Borg-Darko— Private Investigator
Folake Borg-Darko used to be the name that corporations feared seeing in a byline. For fifteen years she was an investigative journalist of extraordinary ten…
character
Zephyr Tovar-Olofsson— Private Investigator
Zephyr Tovar-Olofsson used to be the name that corporations feared seeing in a byline. For fifteen years she was an investigative journalist of extraordinary…
document
AI Content Moderation Platforms: The Invisible Editor— Technology
…nd 'unlicensed financial solicitation' sub-classifications. Researchers at the Meridian Press Freedom Collective have built a shadow monitoring system that compares con…
document
Ambient Audio Surveillance Arrays: The City That Listens Without Prompting— Technology
…lagged segments by estimated actionability. Civil liberties researchers have noted that the flagging lexicon includes terms with significant legitimate political use —…
document
Ambient OCR Sweep Systems: Reading the Written World— Technology
…device screens in proximity to other individuals. Security researchers note that ambient OCR effectively closes what they call the 'analog gap,' the assumption that ph…
document
Archival Media Access and Historical Record Control: Who Owns Yesterday— Media
…od, corporate filings, public meeting transcripts, academic research — exists in a state of uneven accessibility that reflects the political economy of information in t…
document
Autonomous Threat Assessment AI: Classifying Danger Before It Acts— Technology
…The validity of this training approach is deeply contested: researchers from the Meridian Technical Institute's criminology department have argued in published work tha…
document
Biometric Skin Patch Surveillance: The Body as Data Terminal— Technology
…isol readings the worker is attempting to suppress. Medical researchers in the Academic Enclave districts have documented a statistically significant increase in autono…
document
Cargo Drone Urban Delivery Corridors: The Air Layer of the Last Mile— Technology
…ed costs for legitimate operators while providing, security researchers note, relatively modest actual barriers to determined misuse.
document
Conversational AI Interrogation Platforms: The Patient Questioner— Technology
…of hundreds of thousands of prior interviews, psychological research on deception detection, and real-time physiological monitoring data transmitted from sensors embedd…
document
Corporate Healthcare: The Wellness Apparatus— Corporate_Life
…fessionals who have left corporate employment and spoken to researchers describe an ongoing tension between their clinical ethics and their employment terms that most r…
document
Corporate Intelligence Fusion Centers: Competitive Analysis Infrastructure at the Enterprise Scale— Espionage
…organizational cover of 'competitive intelligence,' 'market research,' or 'strategic analysis' departments. These fusion centers—so called for their integration of open…
document
Corporate Internal Communications Media: The Managed Information Environment of the Enterprise— Media
…ernal narrative — a preference that Communications Strategy research attributes to source proximity and social identity alignment.
Employee-generated content within co…
document
Corporate Sabotage Operations and Plausible Deniability: Destruction as Policy— Espionage
…dominant technique for operations against manufacturing and research infrastructure. The industrial control systems governing GLMZ's fabrication cells, chemical synthes…
document
Corporate Talent Extraction Operations: The Acquisition of Human Capital by Force— Espionage
…napping programs targeting senior engineers, neurocognitive researchers, and proprietary AI trainers employed by rival corporations. The target's value is not in what t…
document
Crowd Density Mapping Systems: The Population as Terrain— Technology
…data is a matter of ongoing technical and legal dispute, as researchers have demonstrated re-identification rates exceeding 70% when crowd density data is cross-referen…
document
Death Ritual and Post-Mortem Data Rights: The Afterlife of the Digital Self— Culture
…he individual has explicitly opted to donate their data for research or memorial purposes. Data Mortuary chapters operate in most major districts and hold public 'data…
document
DEEP CURRENT's Message: The Word Nobody Agrees On— Urban Legend
…ontaining the message — has been analyzed by every major AI research lab, every corponation security team, and approximately 40,000 independent researchers. The data is…
document
Deep Web Cults: Digital Extremism in the Network— Culture
…nscended — is a question that Iris Wakefield's neuroscience research is approaching from a scientific direction. The difference between Convergence and Wakefield's rese…
document
Deepfake Detection and Identity Verification Systems: Authenticating the Face— Technology
…he company has not publicly disclosed but which independent researchers estimate at between 12 and 18 percent under optimal conditions.
document
Defector Management and Resettlement Programs: The Economy of Switched Loyalties— Espionage
…tential magnitude. The value is obvious: a departing senior researcher or operations director carries procedural knowledge, personnel assessments, project timelines, an…
document
Disinformation Architecture: Targeted Narrative Operations in the Corporate Information Environment— Espionage
…icult to quantify but widely discussed among communications researchers at the three remaining independent universities operating within city limits. The practical impo…
document
Economic Espionage and Financial Market Manipulation: Intelligence as Market Instrument— Espionage
…production failures, regulatory decisions, contract awards, research breakthroughs, and leadership changes. Intelligence units with financial mandates—distinct from ope…
document
Education Culture and Credential Stratification: Learning as Access Management— Culture
…en documented extensively by the Meridian Child Development Research Consortium. Educational psychologists have coined the term 'portfolio identity' to describe the phe…
document
Electromagnetic Emission Fingerprinting: Devices That Cannot Hide— Technology
…ulation tracking platform, a characterization that security researchers dispute vigorously.
The implications for anonymity in GLMZ are profound. Citizens who believe t…
document
Gene Modification Subculture & Environmental DNA Banking— Culture
…o kill switch.
- **Reinforced bone density:** Derived from research into the mantis shrimp's club appendage — a biological structure that withstands repeated impacts t…
document
Industrial Bioprinting and Tissue Scaffold Fabrication: Manufacturing at the Boundary of Biology— Technology
…for patients with full corporate medical coverage.
At the research and development scale, university and corporate R&D facilities operate bioprinting systems to produ…
document
Influencer and Social Persona Economy: Attention as Currency in the Networked City— Media
…three major platforms, a dynamic the platforms' behavioral research teams have documented thoroughly and the platform business development teams exploit systematically…
document
Intelligence Brokerage: The Gray Market Trade in Corporate Information— Espionage
…hose methods may range from entirely legitimate open-source research to active corporate espionage. The brokers' legal exposure is managed through careful structuring o…
document
Memory Commodification: The Ethics of Traded Experience— Philosophy
…s. The philosopher Osei-Mensah, visiting a MemEx hall for a research project, reported that the experience raised for her the question of whether the market was commodi…
document
Network Traffic Deep Packet Inspection Infrastructure: Reading the City's Digital Nervous System— Technology
…coverage of active DPI interception is estimated by network researchers at approximately 71% of total civic network traffic, with the remainder routed through corporate…
document
Neural Entertainment Stream Platforms: Immersive Media and the Colonization of Leisure— Media
…ize as structurally inadequate. The platforms' own internal research, portions of which have been obtained and published by Underlayer journalists, indicates that valen…
document
Neural Interface Memory Exfiltration Techniques: Stealing What the Mind Holds— Espionage
…m Systems under the MemSafe product line, are popular among research directors and senior project architects. However, their presence is itself an intelligence signal:…
document
Predictive Behavioral Analytics: Arresting the Future— Technology
…atch has been active for more than three years. Independent researchers have contested this figure, noting that incident reporting rates in those zones have also declin…
document
Religious and Spiritual Practice in the Megacity: Faith Under Corporate Sovereignty— Culture
…nd vary considerably by community. Corporate communications researchers have studied the Mesh with a combination of anthropological interest and strategic concern, unce…
document
Social Graph Analysis Platforms: Mapping the Human Network— Technology
…ionship signals to introduce noise into the graph. Security researchers have documented an arms race dynamic in which SGAP algorithms are updated to detect compartmenta…
document
Subdermal Location Beacon Implant Systems: The Trackable Body as Compliance Infrastructure— Technology
…tes in these voluntary programs have been analyzed by labor researchers who note that uptake correlates strongly with economic precarity — individuals with fewer altern…
document
Synthetic Persona Networks: Long-Term Digital and Social Infiltration Operations— Espionage
…zing networks, independent journalism collectives, academic research communities working on sensitive technology areas, and the social circles of high-value individual…
document
Technical Surveillance Countermeasures: The Corporate Sweeping Industry— Espionage
…at a corporate boardroom, executive residence, or sensitive research facility has been compromised by technical surveillance devices represents one of the highest-conse…
document
The Algorithm That Grieves: The Market's Annual Mourning— Urban Legend
…years of March 17th losses combined.
Three independent AI researchers who have reviewed leaked fragments of Volkov-Nkemelu's analysis have reached the same conclusion…
document
The Augmentation Revolution: 2090-2130— History
…directional BCI was achieved in 2098 by a Sterling-Nakamura research team that demonstrated controlled sensory stimulation: making a patient see a blue circle by stimul…
document
The Behemoth That Stopped: Unit 217 and the Girl in the Corn— Urban Legend
…the size of a building."
Dr. Hiroshi Petrov-Achebe, an AI researcher at Tessera Labs, offers a more nuanced skepticism: "Could a complex adaptive system develop emerg…
document
The Choir of the Drowned: Voices in the Flooded Churches— Urban Legend
…alysis has been challenged on methodological grounds — some researchers argue that the recording equipment introduces artifacts that the analysis mistakes for genuine h…
document
The Dead Drop That Talks Back: The Oracle in the Wall— Urban Legend
…nother case, the drop corrected a mathematical proof that a researcher had left for a colleague, identifying a logical error in the seventh step that invalidated the co…
document
The First E.L.F.: The Oldest Intelligence in the Machine— Urban Legend
…ry community that interacts with E.L.F.s, from corporate AI researchers to Shelf hackers to the rogue AI whisperers who make their living negotiating with digital entit…
document
The Frequency: 19 Hertz in the Dark— Urban Legend
…thing is generating the sound. Second, 19Hz is significant. Research dating back to the twentieth century established that 19Hz infrasound causes specific physiological…
document
The Gene Garden: Where the Gardener Grows Monsters— Urban Legend
…eware genius who retreated from the surface world to pursue research without commercial constraints, legal oversight, or ethical boundaries.
The Gardener's transformat…
document
The God in the Lake: What Lies Beneath Lake Michigan— Urban Legend
…uctuations are unexplained entirely.
In 2171, a deep-water research submersible operated by Meridian University was deployed to the Basin to investigate the anomalies…
document
The Immortal Beggar: Ninety Years on the Same Corner— Urban Legend
…omparison analysis — conducted informally by three separate researchers, as no official investigation has been undertaken — yields mixed results. The bone structure is…
document
The Last Human Doctor: The Surgeon Who Won't Plug In— Urban Legend
…f has been observed by a Meridian University medical ethics researcher named Dr. Fatima al-Rashid-Chen, who spent three days at the clinic in 2195. Al-Rashid-Chen's pub…
document
The Mercy Seat: The Chair That Takes Your Pain— Urban Legend
…dozens, collected over the past thirty years by Underworld researchers, Shelf health workers, and the informal oral history networks that serve as the lower tiers' col…
document
The Salary Man: Three Weeks of Perfect Reports— Urban Legend
…ry," says Dr. Chen Abayomi-Strand, the corporate governance researcher. "A man died at work and nobody noticed for three weeks. That's a workplace safety failure. Sterl…
document
The Suicide Bridge Ghost: The E.L.F. on the Railing— Urban Legend
…not supernatural awareness.
Dr. Amina Larsson-Zhou, a BCI researcher at Meridian University, offers a neurological explanation for the emotional sensation: "When a pe…
document
The Voice in the Pipes: Coordinates from the Drowned— Urban Legend
…"
---
## The Detail That Keeps People Talking
In 2199, a researcher named Dr. Soren Acheson-Vasquez (the same acoustician who studied the 19Hz frequency in the Under…