PropertyValue
rdfs:label
  • Red Queen (DeCandido)
rdfs:comment
  • Red Queen was designed by British software developer Dr. Simon Barr from his Umbrella lab in London. Designed to be adaptable and possessing a level of personality, it was considered to be a decade ahead of any consumer computer. To offer better assistance to researchers, the Red Queen was designed to project the image of Dr. Charles Ashford's daughter Angela as a manifestation of itself for interactivity, utilizing Perrymyk Sounds sound systems for speech. It is unknown if the personality traits were modeled off of Angela Ashford herself, though other Umbrella researchers suspected Barr had created an unfriendly personality to get back at Ashford for having to use his daughter's face. Due to the Red Queen's total access to The Hive's security systems, Lisa Broward and members of Umbrella'
dcterms:subject
dbkwik:resident-evil/property/wikiPageUsesTemplate
dbkwik:residentevil/property/wikiPageUsesTemplate
abstract
  • Red Queen was designed by British software developer Dr. Simon Barr from his Umbrella lab in London. Designed to be adaptable and possessing a level of personality, it was considered to be a decade ahead of any consumer computer. To offer better assistance to researchers, the Red Queen was designed to project the image of Dr. Charles Ashford's daughter Angela as a manifestation of itself for interactivity, utilizing Perrymyk Sounds sound systems for speech. It is unknown if the personality traits were modeled off of Angela Ashford herself, though other Umbrella researchers suspected Barr had created an unfriendly personality to get back at Ashford for having to use his daughter's face. Due to the Red Queen's total access to The Hive's security systems, Lisa Broward and members of Umbrella's Security Division were assigned to prevent any unauthorised alterations of the Red Queen code. In the first two months after the Red Queen's activation, it became an unpopular security system, forcing people to change passwords on a weekly cycle to encourage more complex passwords in order to prevent hacking.