About: Correction algorithms   Sponge Permalink

An Entity of Type : owl:Thing, within Data Space : 134.155.108.49:8890 associated with source dataset(s)

The Correction Algorithms is computer code that allows Encom's digitization laser to properly and safely transport a user into the computer world. It is a key plot point in the game TRON 2.0. Spoiler warning: Plot or ending details follow. Thorne's failure meant that fCon had to perform a hostile takeover of ENCOM to acquire the digitization process. They spent a significant portion of the storyline in pursuit of Ma3a. Although fCon agents did eventually capture her and launch their invasion, the protagonist Jet Bradley was able to thwart their plan.

AttributesValues
rdfs:label
  • Correction algorithms
rdfs:comment
  • The Correction Algorithms is computer code that allows Encom's digitization laser to properly and safely transport a user into the computer world. It is a key plot point in the game TRON 2.0. Spoiler warning: Plot or ending details follow. Thorne's failure meant that fCon had to perform a hostile takeover of ENCOM to acquire the digitization process. They spent a significant portion of the storyline in pursuit of Ma3a. Although fCon agents did eventually capture her and launch their invasion, the protagonist Jet Bradley was able to thwart their plan.
dcterms:subject
dbkwik:tron/proper...iPageUsesTemplate
abstract
  • The Correction Algorithms is computer code that allows Encom's digitization laser to properly and safely transport a user into the computer world. It is a key plot point in the game TRON 2.0. Spoiler warning: Plot or ending details follow. In the game it is alluded that the Master Control Program performed the correction algorithms, although this was probably a resource that it commandeered and incorporated into itself. After the MCP's destruction in 1982, Alan Bradley spent his life re-building the algorithms. These algorithms were supposedly so complex, that Alan needed his AI research assistant program, Ma3a, to help with the development. Ma3a also served as the receptacle for the code, and the operating logic for the digitization laser. J.D. Thorne was a corrupt security chief at ENCOM. He tried to sell the secrets of the digitization process to the villainous corporation Future Control Industries. Thorne demonstrated the laser on himself, but without access to Ma3a and the algorithms, he was mutated into a corrupted user inside the computer world. He chose to spread his virus in his own minor bid for power, becoming a very dangerous subplot villain. Thorne's failure meant that fCon had to perform a hostile takeover of ENCOM to acquire the digitization process. They spent a significant portion of the storyline in pursuit of Ma3a. Although fCon agents did eventually capture her and launch their invasion, the protagonist Jet Bradley was able to thwart their plan. The final boss fight against the fCon Monster was the second example of user-digitization without the correction algorithms, merging and mutating the three fCon villains Eva Popoff, Seth Crown, and Esmond Baza.
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software