Post History
I've just thought . . . In the opening of "Millennial" I attempted animate inanimate objects. Whilst it may not specifically answer your question it may give you ideas on how to set up a suitable e...
Answer
#3: Attribution notice added
Source: https://writers.stackexchange.com/a/28562 License name: CC BY-SA 3.0 License URL: https://creativecommons.org/licenses/by-sa/3.0/
#2: Initial revision
I've just thought . . . In the opening of "Millennial" I attempted animate inanimate objects. Whilst it may not specifically answer your question it may give you ideas on how to set up a suitable environment. A plethora of CCTV cameras tracked the young woman's brisk progress toward the corner of Main and Third. The nationwide Echelon Plus software performed due diligence but paid the woman no particular attention: Corrine Pearl Radman; 29, credit rating 637, a single white female, ordinary, not a person of interest, insignificant. Wherever the CCTV cameras didn't have line-of-sight, eyes on the subject, the GPS satellite tracked her phone and Wi-Fi Access points recorded the phone's MAC address as she passed by. The Supreme Court had ruled: the fourth amendment applied only to citizens, the right to privacy did not apply to cell phones. Government tracking of electronic devices did not in any way violate the Constitution. Corrine continued her journey, following the flow of human traffic. Inside her pocket the iPhone buzzed and vibrated as responses to her audacious tweet flooded in. Without breaking stride, she cursed, reached into her pocket, located the power button, and switched the phone off. "Leave me the fuck alone." The GPS satellite and the Wi-fi Access Points immediately reported 'loss of signal'. The Echelon Plus software followed protocol and requested discovery via cell tower triangulation. After attempting to locate the subject's device, the cell towers returned a report stating all pings to the specified device had timed-out – communication had failed. Instantly, powerful, multi-processor systems came online and ran facial recognition algorithms. The length of Main Street CCTV cameras swivelled, turned, and scanned in an attempt to relocate the subject. At 08:58 node WS4476 compared the likeness of the subject who had exited South Ferry Station at 08:52 with the subject rapidly approaching Third Street: 99.57% - a match. Subject reacquired: Corrine Pearl Radman; US citizen, 29, credit rating 637, a single white female, ordinary, not a person of interest. STOP! The red man insisted everybody wait at Third Street crosswalk for further instructions. "You're kidding me!" Corrine puffed her cheeks, folded her arms, and waited. "C'mon, c'mon, c'mon!" she mumbled, tapping a foot impatiently on the sidewalk. - I won't bore you with much more but the opening scene (the character walking to work) informs the reader that all devices communicate (the character thinks they conspire against her). Language such as, "The iris scanning terminal of security system informed the HR system that MS Radman had entered the building at 9:03" reinforces the belief that devices and systems communicate. (As the story rolls on it becomes clear that computer systems have agendas. My point is: Once this environment is established communication between computers is treated as as you would do for any character. In a film script there are options as to how their communication is SHOWN. Text on screen is probably favourite for your scenario as it creates the impression: the audience can see the computers' communication but the other characters cannot.