"Phew, am I halfway through my 20s now?"

My heart is full of sincerity because I want to give up 2003 in just a few days. The scenery outside my office has an awkward feeling of winter.

In fact, LA is not that cold in winter. I don't know if someone fell into the abyss.

Like this year, they climbed nearly 20 degrees during the day, but at night they had to wear padded jumpers to go for a walk below 10 degrees.

Fall is called the man's season, and I get to ride the autumn twice. Today, the weather here is similar to the autumn weather in Korea.

In 2003, there were many thick things. There is a 'Smart Power Grid' business that started early in the new year.

Contrary to considerable technical skills and confidence, the reaction of most states and federal governments was subtle, except for California, where it was necessary to solve the power problem that fell at the back of its feet immediately. I admit what is necessary, but there is nothing urgent.

Fortunately, with hundreds of years of fireworks coming to Europe, we were able to welcome new electricity. So I was busy all summer. It was the same when I came back to the United States. With tens of millions of households powering down, the smart power grid has received a new glow.

Already a system supply agreement with New York and Massachusetts, and many other places have additional contracts in force with the New Year budget. Executives are trying to stamp the contract before the heat of the blackout cools down. Earn when you earn.

Libya is in agreement with the United States, so once travel restrictions are lifted, economic sanctions will also be released in February.

Originally, these important problems usually take more than 6 months to make an internal decision, but this time the situation was different.

Separate from the United States, European countries have lifted ties and lifted economic sanctions. The rush of time, of course, meant that only their own companies were excluded from Libyan specialties.

So the U.S. government decided to open a path for enterprises to Libya with the freedom of travel and follow up.

Of course, I was told by Director Lizzie to take a step ahead of everyone else, but at least I decided to build a cooperative relationship with the American companies.

The current president is from Texas, home to the US oil business, and other companies in this area are also quite wearable. Although I'm not related to Republicans such as Director Lizzie and Paulson, I don't have to scrape and build a booth with other companies that are so close to Democrats that I don't have to go deeper into the faction. You have to give away something for a while.

Perhaps the biggest and most sensitive was the Homeland Security project. The NSA was established with a fairly broad proposition to protect the United States' mainland from online terrorists.

Johnston Group took part in this business by assisting Lizzie, who is the Director of the Invitation, but has already taken a step deeper.

The business is a double-edged knife, but it doesn't miss the opportunity to become 'sticky' friends with Director Lizzie.

Johnston Group just needed a leash with the government to do satellite and energy business, and Director Lizzie has a wide berth in the field.

The business itself was enormous, and it was worth the risk of having a huge budget put in place over the years.

Increasing enemy threats are expected to increase annually during wars in Afghanistan and Iraq. It's a project that doesn't know how many billion dollars it's going to cost eventually.

$20 billion for the first year, $38 billion for 2003, and roughly the same budget for the next year, surpassing $100 billion in the next three years. All of that money was given to Director Lizzie.

I plan to lead the installation and operation of various security systems in 'Magnum Security' away from Johnstone Consulting, with the overall planning and system design assisted by Johnstone consulting and the group's key personnel.

The name of the subsidiary is missing 'Johnstone' and 'Magnum' is probably due to external imagery. Being too close to the government creates dislikes rather than affection for the public. This is a later stone.

Most people probably don't even know what Magnum Security is or even have a company like that. When the newspaper introduces itself, it says, "Magnum Security," rather than "a subsidiary of Johnstone Group."

Since last summer, the system design started by key personnel led by Thomas has already been over 90% complete.

Named the 'National Total Defense System Network', the system is currently busy implementing the central system for the brain.

At the heart of the central system is how quickly we store and analyze large amounts of data and extract the information we need.

Data analysis is commonly referred to as' data warehousing. 'It is a widespread technology, such as identifying customer propensity based on sales materials and marketing.

It's a skill that everyone uses, but it's not enough for everyone. Solution developers, such as Oracle, IBM, and HP, have only been heating up the development of computer systems and integration packages, and general businesses are only dependent on their use and general operation.

The data warehousing department of a large company, if only three or four servers had five or six employees, would be great. Marketing material extraction is sufficient. Of course, there are places that specialize in that. It's a flea if you run.

But what about the Johnstones?

We are already in the top position beyond the monologue, but no one knows it yet.

The majority of servers, aside from the amount and quality of analysts, cannot be played. And there are many years of experience. In the case of the Department of Homeland Security, data analysis is only used to prevent terrorism, but it is not that difficult for us. Of course, there are a lot of new fields of data that will require research into them.

That doesn't mean we're going to share our knowledge. It is a core program of the government, so even if you are in charge of operations, you have to disclose the 'source code'.

I instructed her to program me to find flashing data at a slightly better level than others, but that was not enough.

Thomas' intentional focus on the core engines.) 'I gave up my intentions in secret that it would complicate things, and I agreed implicitly. In information teams, there are usually quite a few programmers who write code that they never understand after a few days. Of course, Thomas is also a good' teaser '.

'By the way, what's he doing now?'

I have an idea. As I was busy with Jennifer's pregnancy, staying for a long time in Korea, and coming back to the United States for Christmas and meetings, I wasn't properly briefed by Thomas.

Although I received regular reports from Miller, who is in charge of consulting, and Tober, who is the new president of Magnum Security, it would have been different if I had listened to Thomas directly. I made a phone call, but I'm also guarding the place at the end of the year.

"John, did you call me?"

Thomas walks into my office, and it looks like he's been frizzy for days.

"Are you sleeping well?"

It was good to work hard, but I was a little worried about my health. I know it's early, but I've been living like this for five years. Of course, I brought some good things for my body in Korea this time.

"Haha, it's still okay. The team's all the same."

Rather, Thomas looks worried when I tell him to rest. Seeing that, I remembered a TV show I had just seen in Korea.

[Clear, stop playing and get some air.]

[Just a little more, it's almost over.]

You've been here for three days. I can't get up!]

[Ahhhh, just look at me once.]

It was a program I saw while touching, and I don't know exactly what it was, but it was a story of a mother who was worried about her son's game addiction. Thomas isn't a game either, but he's obsessed with something similar. When I tell him to rest, his mouth twitches.

In the evening, I forced him to come to my house and eat. Otherwise, he'll be stuck in his office all year.

"I want to hear firsthand how the NSA system is doing. You're not doing anything stupid, are you?"

"That? You're doing great. Hahaha."

Thomas scratches his head with a fabulous smile. I've been frozen and frozen with him for a long time, and I know him very well. And I get this weird feeling on his face and on his gesture, "I've got something to hide. '.'

"Thomas! I know you better than anyone. Confess quickly."

"Ugh, no. I don't have to hide it..."

Thomas takes a quick breath from the horse I stabbed. He was really hiding something. He told me what he hid in my backbone over and over again, but he didn't hide it on purpose, and he just couldn't say it because he was afraid that his plans would be blocked by me.

In designing the central system, the information team led by Thomas played a key role. Besides, I know Thomas is my best friend, so I'm sure his words played a big role. You've asked a thief to design your house.

Thomas had to listen to the absurd sound of the design of a 'backdoor’, also known as a ‘back hole’, which allowed him to secretly access the system. It took the first design period of three months, but it actually took two months to create a backdoor algorithm that nobody would notice enough about.

Whereas governmental systems rely largely on supercomputers such as IBM, the project applied decentralized technology to connect large numbers of small and medium-sized computers and to enable control centers to operate in the event of an emergency.

With 20,000 small and medium-sized computers running instead of one supercomputer, it was as beneficial to Thomas' design as it was. The flexibility of the design has increased greatly.

In other words, the flexibility of the design means that the method of hiding the back hole has expanded exponentially.

"What! I did something so important without my permission. Ugh!"

"I'm sorry. John, you've been so busy. And it's been a long time in Europe and Korea, and it's hard to talk on the phone. I think it belongs to a secret..."

As expected, he needed proper surveillance. When I spoke up because I did something wrong, I made up a big excuse, but it's actually not very wrong.

And from the first moment I started working on this project, it was more wrong of me not to follow up that I was busy. I just let it loose without a rope around my cat's neck. It's the owner's fault.The cat was just faithful to his instincts.

'Maybe my mind was different...'

Yes, Thomas and his group first assumed a leading role in the project. Maybe there was a wish in my mind that he wanted to. I can't lead the Johnstone Group myself.

"What are you going to do if you get caught? Are you crazy?"

"John! Don't worry about it. I'm the only one who knows this. It's just a reflection of the know-how that's been accumulated in the design this time. The rest of the team doesn't know how it works."

Thomas argues that no one knows. He said he only knew himself, but I believed him because he was so secretive.

"But don't you think it's strange that someone would look at the blueprints?"

"Don't worry. Not only does that not show up on the blueprints, do you think I've made such a mess of it? I'm naming him Thomas, and Einstein will never know if he wakes up in his grave again!"

Thomas is suddenly excited by my point. He raises his voice in his name, including Einstein. Is that how confident you are?

"You could go wrong. Of course I won't let you get away with it, but you have to be careful."

"Don't worry. I'm thinking the same thing. I could have designed it in about a week, but this time I worked really hard. Heave-ho."

Thomas quickly nods and confidently describes his work. But the back hole is connected to Controller X.

'Integrated defense systems' that have focused more than 30% of the system design on the back door from the start. Thinking about that future, I pulled a little goal.

Customs, airports and major facilities in the United States were prioritized for surveillance and analysis. Phones and the Internet are also very likely to be added here. Moreover, it can be expected that the range will gradually expand to remote surveillance cameras and wireless communications.

Once development has progressed beyond a certain level, the use is entirely up to the government and the political authorities. We cannot be involved in what the target is going to be, but we can expect that everyone will gradually increase their coverage.

And that's the system that Thomas is in front of me.

We have serious doubts about the safety of the United States. '

You don't know what I'm thinking, but it's Thomas laughing. My smile was a little hollow.

Artwork Reviews

Even this weekend, I was delayed by working for the company. Instead, I got a day off tomorrow, so I could use one.