Security ... think about it!
Using pieces of disassembled code, API calls, memory addresses and subroutines associated with the bane of a security team's existence, they analyzed the data by frequency, density, and groupings. Algorithms were then developed and the artists mapped the data to the inputs of the algorithms, which then generated virtual, 3D entities.