Image | Description |
![]() |
As this multi-use analyzer has both fully integrated archaeology and hacking systems, it can be used to both analyze ancient ruins and bypass electronic security systems. Whilst comparatively weaker than its more specialized counterparts, its combined functionality provides the user with an increased flexibility when it comes to fitting. Note: Due to recently discovered branch prediction vulnerabilities in certain Upwell Consortium Recursive Computing Modules this analyzer may also be used to collect sensitive information concerning reinforcement periods of Upwell Structures. |
|
|
|
|
Group | Name | Access Difficulty | Range | CPU | Powergrid |
Tech I |
Data Analyzer I | 5 % | 5,000 m | 20 tf | 1 MW |
Tech II |
Data Analyzer II | 7 % | 6,000 m | 25 tf | 1 MW |
Storyline |
Ligature Integrated Analyzer | 5 % | 5,000 m | 25 tf | 1 MW |
Storyline |
Purloined Sansha Data Analyzer | 5 % | 10,000 m | - | - |
Storyline |
Zeugma Integrated Analyzer | 7 % | 6,000 m | 30 tf | 1 MW |
Limited Time |
Frostline 'Clavicula' Integrated Analyzer | 6 % | 6,000 m | 25 tf | 1 MW |
Manufacturing
|
Recycling Output
|
Other |
||
Attribute Name | Display Name | Value |
radius | 500 |