IRIS

/* this page needs a lot of work and is under construction */

The Integrated Runtime & Interface System (I.R.I.S.)is the White Wolves' fully-networked, global, semi-sentient artificial super-intelligence (SSASI). IRIS is far-and-away the most powerful computer system in the world.

IRIS is tasked with a majority of operations, including security, energy production and handling, internal and external communications and data handling. Her most predominant feature is her natural voice interface, bearing the voice of a British female, modelled after northerner, Jenna Coleman.

IRIS features her own behaviour and psuedo-emotions and, as a machine, is fearless. She will question anybody in their actions, even Jack, and will put herself into the most dangerous situations to complete her mission.

The IRIS Kernel has been valued at approximately five billion dollars.

Hardware
IRIS is powered by an incredibly set of supercomputers and servers IRIS has the most powerful super-computer in the world, which boasts over half a million processing cores, nineteen terabytes of memory, a further one hundred and seventy-two terabytes of VRAM as well as a ten exabyte data centre. This power is utilised through an internal and external network, reaching speeds of up to ten terabits per second
 * Processors:

System Components

 * Central Clock
 * Logic I
 * Logic II
 * Mathematical I
 * Mathematical II
 * Mathematical III
 * Graphical I
 * Scientific Simulation I
 * Scientific Simulation II

Roles & functions
IRIS is designed to handle anything and everything both on the base and off it.

Integration
Nearly all White Wolves systems, including portable devices, have some form of IRIS integration.

Counter-cyber-warfare
The White Wolves have never been the victim of a cyber-attack, due to the near-impenetrable security of IRIS. IRIS can follow users through VPN's, tunnels and Tor circuits, and will often deploy herself within a cookie or any other packet of data to gain access to, and information of an attacker's system. From here, she has free reign to read any and all fingerprinters and system information and report that back to the White Wolves, this includes personal and geographical data as well as files and their contents.

When deployed on a computer, IRIS can even install her own OS, format internal and external drives and lock the system from the user. She can also communicate directly to them, via text on the screen or her voice interface. If the target is in the United Kingdom, IRIS can inform the Territorial Police Force to take action.

It is estimated that it takes IRIS just 4.8 seconds to read personal and system information from a computer and send it back to her mainframe.

Publicly shared power
In 2001, the White Wolves opened up portions of IRIS' computing power to other institutions, at first this was limited to scientific institutions but was later expanded in 2004 to include other fields such as meteorology and cybersecurity. Nevertheless, the bulk of IRIS' 'public power' is still used for medical and genomic research, such as vaccine development. It is estimated that IRIS helped cut the development time of the COVID-19 vaccines down by 3 months.

AIM Upgrades
In 2005, IRIS was put under an Annual Improvement Map (AIM) upgrade plan, which seeks to improve her processing power, intelligence or human-interface on a yearly basis.

Thanks to AIM, in 2019, IRIS became the world's first exascale computer.

Public Tests
Since her inception, IRIS has been in the public eye, much like Deep Blue before her, when word of her incredible processing power and reaction times was released to the public, people started calling to see it, in response, the White Wolves let IRIS loose on multiple popular video games, including the following

Chess
As a simple first test, IRIS followed in Deep Blue's footsteps and challenged the reigning champion of the time, Vladimir Kramnik, whom she beat in four consecutive rounds.

Tetris
Her next test was a logical thinking exercise, hosted in the classic Tetris video game, where she attained the max possible score of 999,999.

WipEout HD
The public now decided they wanted to see a more difficult challenge for IRIS. The White Wolves decided that she would run the Zone Mode, an incrementally speed-increasing challenge mode, for as long as she could. On the surface, this seemed easy for the AI to complete, she had perfectly handled Mach 35+ vessels in real life, however, factors such as input lag and hardware and software limitations could push her back.

She proceeded to reach 2,147,483,647 km/h (equivalent to Mach 1,739,134) in the game, the highest possible speed, at which point, the game crashed. The first 200 zones were perfect, meaning she didn't touch the track walls once, the later laps incurred some damage.

Fears
IRIS has been feared since her global network activation, as she is so powerful.

Compute Chip
The compute chip features four White Wolves 300-core processors, the 2.1 GHz ZX-300MCP, and four gigabytes of DDR4 SDRAM.

Compute Card
The compute card is made up of two compute chips, giving it eight processors and eight gigabytes of RAM. The card also holds two gigabytes of extra RAM for itself. The compute card is the only field replaceable unit in the system.

Node Card
The node card is made up of 32 compute cards, and has 256 processors and 256 gigabytes of RAM. Each node card also holds an extra 16 gigabytes of RAM for itself.

Cabinet
Each cabinet in the system holds 1024 node cards, meaning they contain 262,144 processors and 262 terabytes of RAM. Cabinets also use 128 GB for themselves.

System
The entire system consists of 64 cabinets. In all, the IRIS mainframe uses 16,777,216 processors (5,033,164,800 cores, 10,569,646,800 GHz) and 16,777,216 gigabytes (16.7 PB) of RAM.

Data System
Accompanying the processing power of IRIS is her data centre. A collection of hard drives and solid state drives totalling 22 exabytes (or 22 billion gigabytes).

Installation
As new IRIS and IRIS enabled systems are set-up, they are given a secure GUID (e.g. 1B669D9C-CE60-4C98-81F9-9FB796D708E3). During the installation process, the GUID is hard-coded into the system, and added the encrypted GUID database on IRIS.

Connecting
As a device attempts to connect to IRIS, their GUID is compared to the database of verified GUIDs. However, if they fail ten attempts in a row, they are disallowed from trying again for 24 hours.

Penetration Testing System
When the 32-digit GUID security system was installed, a sister-system was also developed which would systemically attempt to crack the protection. By using a portion of IRIS' power against herself, the system aims to find any matching GUIDs.

In an attempt to maximise the possibility that the system will crack the security, the PTS can try 760 potential codes per second, and is exempt from the 24-hour timeout, a total of 65,664,000 attempts every day. Since it's introduction on 23rd June 1984, the system has tried 852,056,064,000 codes, but has yet to find a matching code. Despite running for over 35 years, it has only attempted thirteen ten-undecillionths of the potential codes.

To this day, the system uses the original user interface developed in 1983 for UNOS.

Attacks
An estimated 350 attacks are attempted daily on IRIS and her system array. 98% of these attacks are stopped at the GUID verification step, while the remaining 2% are handled by IRIS personally.

The most common approach employed by attackers is the brute-force method. This method involves attempting randomly generated keys in the hope that one will be correct. While common, it is extremely inefficient, since there are sixty-three quindecillion different combinations. Even a computer capable of processing 1000 combinations per second (which is faster than IRIS) would take up to two duodecillion years to exhaust all possibilities, disregarding the ten attempt limit.

Another common offensive vector is the Direct Denial-of-Service attack, or DDoS. Attacks of up to 700 GB have been directed at IRIS in an attempt to knock her offline. However, since the headers of the packets of data don't contain a valid GUID, they never reach IRIS, and fall short at the verification step. In theory, these attacks can be of an infinite size, but they will still fail in their aim if they lack a correct GUID.

Among the attackers, IP addresses and geo-tags have been discovered that link to the governments of the UK, USA and Russia, as well as various militaries and scientific institutes.

Components
As a unified system, IRIS has many different components for many different tasks:
 * Core Clock
 * Archive
 * Data Handling
 * Image Ghosting
 * Super Synergy System (S3)
 * Extranet
 * Intranet
 * Telephony
 * Security
 * Nuclear Energy
 * Energy
 * Meteorological
 * Encryption/Decryption
 * Human Medicine & Genetics
 * Astronomy
 * Scientific Research
 * Scientific Simulation
 * Mathematical