Legality (show more) |
---|
Standard Ban List 23.09 (latest) |
Standard Ban List 23.08 (active) |
Rotation |
---|
Pre-rotation decklist |
Packs |
---|
Core Set |
What Lies Ahead |
Trace Amount |
Cyber Exodus |
Humanity's Shadow |
Future Proof |
Opening Moves |
Second Thoughts |
Mala Tempora |
True Colors |
Fear and Loathing |
Double Time |
Honor and Profit |
Upstalk |
Card draw simulator |
---|
Odds: 0% – 0% – 0% more
|
Repartition by Cost |
---|
Repartition by Strength |
---|
Derived from | |||
---|---|---|---|
Striving for Perfection (Jinteki Q4 2013 Earnings Call) | 96 | 67 | 23 |
Inspiration for | |||
---|---|---|---|
Striving for Perfection v3 1st Place (FY14 Revised Guidance) | 25 | 22 | 8 |
Perfected rejection v1.0 | 3 | 2 | 8 |
Include in your page (help) |
---|
OPERATOR: Good afternoon, ladies and gentlemen. Welcome to Jinteki's first quarter 2014 Results Conference Cast. This cast is being recorded for replay purposes.
All participants are currently in a listen-only mode. Following the conference, we will conduct a question-and-answer session. At this time, I would like to turn the cast over to Senior Director Toshiyuki Sakai for introductory remarks.
SAKAI: Thank you, operator. Good afternoon, everyone. We announced Jinteki's first quarter results for the 2014 fiscal year after the close of trading today. Our financial results should now be available at our Investor Relations site, as will be the recorded cast for this cast.
Before we dive into our results, we would like to call attention to our recent showing at Gen Con Nationals, where our sysops were able to demonstrate, in a friendly setting, how our latest offerings perform against the most notorious black hat hackers. We were proud to see our security tech go undefeated during the final day, 64-person event. It also dominated, for the most part, the 128-person precursor event. Yesterday, renowned architect Lukas Litzsinger, co-creator of the net's source protocols, ran a field test against our technology and flatlined after we forced him into a series of lose-lose situations.
We believe the results from Nationals and the previous quarter validate the recent infrastructure updates Jinteki has put into place, as well as our controversial partnership with competitor Haas-Bioroid. After studying the results reported by db0's Untrashable trials and our own in-house experiments with variants, we managed to implement an overwhelming number of assets and network infrastructure upgrades, requiring opponents to expend a considerable amount of time and resources to attack our properties, especially with the introduction of Encryption Protocols.
We are pleased to report that our fixed assets that have generated a healthy drip economy for Jinteki in the previous quarter, if not a flood. Thanks to the success of our Sundew efforts, PAD Campaigns, and Mental Health Clinic branches, we dramatically increased revenues year-over-over for the quarter.
This approach is vulnerable to attacks from outside forces -- unlike safe bets with hedge funds or Jinteki's previous lucrative efforts with tiny giraffes -- but protecting these resources with taxing security measures can ward them off until we can deluge our servers with assets and Encryption Protocols. We have also recruited several talented students from Levy University as Interns to recover and re-install lost Sundews, critical upgrades, and even ICE [Intrusion Countermeasures Electronics] cheaply.
It's worth noting that we recently hired the esteemed Jackson Howard to assist with our cloning initiatives. He's been invaluable in not only helping accelerate R&D on economy assets and ICE, but also resurrecting cancelled but promising projects.
I will now turn the cast over to Ms. Tori Hanzo to share the moves we've made this previous quarter to cut our operating costs.
HANZO: Thank you, Senior Director. As you know, Jinteki retired its long-running Junebug bioengineering project last quarter in favor of inexpensive but effective deterrents, such as Shocks, Snares, and Shi.Kyūs. Though we have since suspended these so-called "ambush" disincentives, we continue to employ a Ronin, hostile tech that can serve as a distraction and a potential punishment for careless runners.
Furthermore, we are capitalizing on Hokusai Grids to protect weak points where runners can access, serving as stopgaps until we can install stronger ICE, or adding an extra bite to Sundew servers that our opponents try to access. These facilities are expensive for intruders to disable, and hackers sometimes avoid them completely, expecting them to be safeguarded by Caprice. Her reputation amongst the "runner" community is formidable, and that alone is often more than enough to dissuade them from attacking.
Our Chairman can talk more at length about Caprice.
HIRO: Yes, we recently welcomed Ms. Caprice Nisei back to the fold and integrated her into our countermeasures. We have been able to utilize her uncanny abilities and the detective skills she picked up during her time working with the New Angeles Police Department to block illegal incursions into our servers. For runners who do manage to make it past our defenses and even siphon our funds, we have an agreement with media corporation NBN allowing us to track these criminals when possible to close their accounts.
As our Senior Director noted earlier, we have partnered with Haas-Bioroid for a limited exchange of technology, which includes an agreement to lease the company's Ash bioroid line. Pairing Ms. Nisei with these bioroids forces our opponents to waste a significant amount of credits and time to access any agendas or assets. Taking this into account with our Encryption Protocols, expensive assets that hackers cannot ignore, and work compression advantages, we are able to easily open windows for the company to push through its initiatives.
One of our sysops will now discuss the lengths Jinteki has gone to in order to protect our servers and those initiatives.
MIDORI: Okay, while we tend to install fewer and more porous ICE than some of our competitors, we try to make up for it with adaptable ICE like Chimera, as well as cheap but annoying ICE like Yagura and Pup, which work great to slow down runners looking to get an early advantage on us. We also have some nasty and taxing ICE like Komainu and Tsurugi, which can bleed those hackers dry if they want to make repeated runs on our servers.
Sure, they're not the strongest ICE and susceptible to virus attacks -- unless you count our new Lotus Field tech -- but keep in mind that it costs us nothing to bring them back online if they're taken down, thanks to the Interns we've got working around the clock. The Swordsman ICE we've thrown in is also a mean surprise for any hacker reliant on AI breakers, so long as it's timed to activate when there aren't any Clone Chips, Deus Exes, and Sharpshooters in play. The few ICE we've leased from other companies, HB's Viper and NBN's Tollbooth, fit our goals of taxing runners, whether it's through their time or bank accounts.
I think that's all I had to mention regarding our ICE. I'll hand this back over to our Chairman.
HIRO: Before we get into the Q&A, I'd like to mention that we have some very exciting opportunities ahead of Jinteki. Thanks to our ties to the New Angeles PD -- through Commissioner Dawn and Ms. Caprice Nisei's work there -- as well as the nature of our classified artificial intelligence projects, it's become more difficult and expensive for opponents to steal our work. With developments down the line like our Future Perfect program, we can make it near impossible.
We also have other non-cloning advancements we'll announce in the near future, coming out of our biomedical Harmony Medtech division and our stealth groups at the Tennin Institute. That's not to say we intend to pivot our focus away from cloning, however. Cloning has the potential to replicate perfection. Let me repeat that: cloning has the potential to replicate perfection. Should we aspire to anything less?
With that, I'd like to open the cast to your questions.
9 comments |
---|
18 Aug 2014
SepticPiggy
|
18 Aug 2014
ekayohlee
SAKAI: Ms. Rubeus, we appreciate your concern. You are correct that these procedures often require corporations to have methods in place for tracking potential targets. We previously dedicated resources and ICE toward that goal, but we've since shifted our focus to other priorities. Despite that pivot, our agreement with NBN still benefited Jinteki considerably, as many of the criminals we pursued had been sloppy with keeping their identities secret. In recent months, though, we have found that hackers have been more cautious, and our partnership with NBN hasn't remained as useful as we hoped. For example, at the Nationals event, we found little value in it. As a result, we are currently renegotiating our contract with the media corporation with the hopes of coming to a more profitable arrangement. I know Targeted Marketing plans with NBN are under consideration. Haas-Bioroid also has a strong pitch with its Enhanced Login Protocols. We are keeping our options open. |
18 Aug 2014
tonedef
Jerome Lock: Mr. Hiro, I've long been an investor in this company because I believe it is able to protect my investment better than any other company today. However, I've become concerned with the rise of miscreants who penetrate corporate networks for no other reason than to cause wanton destruction. Though Mr. Howard is renowned for his ability to deter these types of attacks through his sheer tenacity and inexhaustible wellspring of ideas, I'm concerned that even he may not be safe from the antics of these madmen. There are even rumors that these hackers are close to perfecting a means of outsmarting him altogether (though I leave speculation about this supposed 'Source code' to the gullible hysterics). What would you say to investors who see this type of lunacy occurring in other corporate environments, and who predict that this vicious vandalism will only become more common as copycat perpetrators instigate attacks of their own? Are your endeavors safe in the face of increasing onslaughts from volatile malware and aimless rabble rousers? |
19 Aug 2014
Jashay
Henry Swan: Chairman, I cannot help but notice the significant investment in projects regarding Fetal AI systems. Whilst these have been reported as capable of defending themselves from network incursions, they also represent a significant drain on company time and resources. Do you feel that in this instance the company's interests would be better served by swifter projects which yield the same nominal rewards? The Braintrust initiative, for example, whilst lacking in fringe benefits, is far easier to attain. The Nissei project would surely be worthy of consideration, too, as once operational its capabilities are formidable. As a final suggestion, recent breakthroughs in medical health are getting similar results for increasingly reduced expenditure. |
19 Aug 2014
ekayohlee
HIRO: We have kept these miscreants you refer to under close watch, Mr. Locke, so please know that we do not take your worries lightly. Thus far, they have not proven themselves to be as threatening as more organized hackers, but we understand that these terrorists -- because they are terrorists in the digital space -- are rapidly evolving, developing techniques to destroy our important work while also finding new sources to fund their attacks. We expect new developments we have in place in building Hostile Infrastructure, as will our advancements in Industrial Genomics, will deter these kind of attacks. We also intend to take advantage of our Port Anson Grid on the Moon to dissuade the scouting runs these miscreants often make to test our defenses. MIDORI: Mr. Chairman, I'd like to add that we are already in a good position to deflect these destructive runs, even while we wait for those developments to come online. Thanks to the toll our ICE takes on runners' rigs, along with Caprice's help making sure their efforts are wasted, these G00ru wannabes often can't afford to attack our servers more than a few times. |
19 Aug 2014
ekayohlee
SAKAI: Please note that we are not at liberty to discuss our artificial intelligence systems with any specificity due to our agreements with various governments. We also emphasize that describing the subjects of our AI projects as "Fetal" is inappropriate if not slanderous, as they are neither human or technically alive. HIRO: To answer your question, it's true there are other programs that would lead to faster results and likely bolster our defenses against future attacks. Please understand, though, that replicating perfection is not a process we can rush or expect to complete with minimal protection. Jinteki's primary goal at almost all times is to achieve the Future Perfect. Quite often that means sacrificing a less important project, appeasing hackers but setting them back enough to allow us opportunities to reach our true objectives. We must play the long game. HANZO: I would like to point out that our AI projects, Hokusai Grids, and ICE -- Komainus, Pups, Tsurugis, and what have you -- all work in tandem to slow down runners who think they can access our servers without consequence, if not stop them dead in their tracks. Mr. Jackson joined in the fun during our Nationals showcase a few times, ruining hackers' attempts to catalog our R&D efforts, instead ending their day with an unexpected AI project. |
24 Aug 2014
umbralAeronaut
Asada Gōryū: Ohayō gozaimasu, Honored Chairman. As some of you may know, it has fallen to me the un-earned honor of representing our European branch office, sometimes informally known as "The House". My apologies for the time lag of transmissions, our Enhanced Login Protocols have induced an additional, slight time dilation effect to the standard intercontinental bandwidth considerations. While the Board may of course see our full quarterly report via the standard routing, I would like to highlight certain of our public findings on the Cast at this time. First of all, it is this office's highest recommendation that the Board and our offices back home consider deepening our relationship with Haas-Bioroid. We feel that our report will show that our partnership with NBN on such initiatives as the Tollbooth network gating protocol are ultimately losing ground to the advanced economic attacks of a new crop of cyber-terrorists. Instead we offer the alternative high-level network presence of bioroids such as the Heimdall and Viktor line, proven remarkably effective in conjunction with our world-renowned server protection and distribution technologies. We likewise have reservations regarding ongoing contracts with the New Angeles PD which again seek to employ largely economic countermeasures against cyber-criminals who have long proven shockingly resilient to such strategies. It is this office's findings that doubling-down our efforts on the venerable Nisei Mk. 2 cloning line is the preferable alternative. Due to the public nature of this Cast I shall skirt the details on a second, likewise highly successful security initiative that our 'House' has employed, but suffice it to say that our office is proud to bear the nickname granted by the network intruders we have turned aside... those who remained to speak of our successes, at any rate. By employing recently-licensed HB server access denial technology, our Enhanced Login Protocols have greatly increased our early margins and allowed us much more freedom to develop these strategies unhindered. Where partnership with the the NAPD would leave Jinteki with a purely reactive defense that serves little help to further our core initiatives, our in-'House' measures have proven themselves to provide lasting countermeasures and further shrink the margin for error allowed to network intruders. Analysis of our strengths and continued testing indicate to this office that a renewed focus on the core principles of our unique and industry-leading network defense grid will lead us to ever higher reaches of success. Those principles, I would submit to the audience, include aggressiveness in the development of our initiatives, vigilance over our networks, and adaptability to change. We cannot bend to the conventional insights of other companies who lack our advantages, there lies the path to a regression of our successes. As ever, we respect the Chair's wisdom and final judgement in these matters and wish to congratulate the Home Office on their results in the Nationals. Shitsurei shimasu, Honored Chairman. |
26 Aug 2014
Nushura
Nakajima: as a spokesman for the Jinteki Division in Japan, let me say that several members (including myself) have been tracking your success with most interest. Such high achievements are certainly not a trivial issue. Strange though it may seem, the Tokyo competition is not as fierce as in North America. Thus, let me start by congratulating you and your team for such outstanding results. Now, off to the questions: Midori-san, recently I have seen a trend of hackers that install a strange virus whose main purpose is weakening and destroying ICE. Indeed, I see that you have adopted the powerful Lotus Field which is certainly going to be a deterrent to that strategy, but do you feel that this is enough? I somehow feel that even with the help of interns and Jackson Howard the hackers will have an easy time going through most of the countermeasures you selected. Hanzo-san, I also have similar concerns in the lack of any kind of ambushes. What prevents the competition to check all of the assets that reach the table? Indeed, it will be costly in both time and credits, but I somehow feel that it once the hackers are aware of this, it will be hard to sneak one of our projects before we can complete it. Again we would like to congratulate Sakai-dono for his success, and invite him for a tour of the japanese installations whenever he wishes. Yoroshiku onegai shimasu |
26 Aug 2014
SlySquid
SlySquid from BadPuBlicity: Loved the conference and the food was great! what was that? Anywho, have you put any thought or have any plans to remove the 'traps" altogether...? |
Regina Rubeus: As an average citizen concerned with corporate direction, such a transparent explanation of your corporate strategy will certainly prove helpful when considering the Replicating Perfection division in the future. However, I did note a possible discrepancy that I would ask to be cleared up. Mr. Sakai, you mentioned an arrangement with the ever present NBN corporation to find and close the private accounts of a citizen. In my experien…I mean, to my knowledge, NBN requires you to have tagged that activist before attempting such a procedure, and I see no planning for the identification of any revolutionary, but rather a system designed to fry the brain of any trespasser. Is your agreement really just in place to deal with some cyborg mobster who wishes to siphon corporate funds or is there something you aren't telling us?