HOME
*





The Adolescence Of P-1
''The Adolescence of P-1'' is a 1977 science fiction novel by Thomas Joseph Ryan, published by Macmillan Publishing, and in 1984 adapted into a Canadian-made TV film entitled ''Hide and Seek''. It features a hacker who creates an artificial intelligence named P-1, which goes rogue and takes over computers in its desire to survive and seek out its creator. The book questions the value of human life, and what it means to be human. It is one of the first fictional depictions of the nature of a computer virus and how it can spread through a computer system, although predated by John Brunner's ''The Shockwave Rider''. Plot The story starts in 1974 with the protagonist, Gregory Burgess, enrolled at the University of Waterloo in Canada. At the time, Greg is aimless, taking various liberal arts courses and doing just well enough not to get kicked out of school. Everything changes one day when his friends introduce him to the IBM System/360 mainframe and he becomes "hooked", changi ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


The Adolescence Of P-1
''The Adolescence of P-1'' is a 1977 science fiction novel by Thomas Joseph Ryan, published by Macmillan Publishing, and in 1984 adapted into a Canadian-made TV film entitled ''Hide and Seek''. It features a hacker who creates an artificial intelligence named P-1, which goes rogue and takes over computers in its desire to survive and seek out its creator. The book questions the value of human life, and what it means to be human. It is one of the first fictional depictions of the nature of a computer virus and how it can spread through a computer system, although predated by John Brunner's ''The Shockwave Rider''. Plot The story starts in 1974 with the protagonist, Gregory Burgess, enrolled at the University of Waterloo in Canada. At the time, Greg is aimless, taking various liberal arts courses and doing just well enough not to get kicked out of school. Everything changes one day when his friends introduce him to the IBM System/360 mainframe and he becomes "hooked", changi ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Timesharing
In computing, time-sharing is the sharing of a computing resource among many users at the same time by means of multiprogramming and multi-tasking.DEC Timesharing (1965), by Peter Clark, The DEC Professional, Volume 1, Number 1 Its emergence as the prominent model of computing in the 1970s represented a major technological shift in the history of computing. By allowing many users to interact concurrently with a single computer, time-sharing dramatically lowered the cost of providing computing capability, made it possible for individuals and organizations to use a computer without owning one, and promoted the interactive use of computers and the development of new interactive applications. History Batch processing The earliest computers were extremely expensive devices, and very slow in comparison to later models. Machines were typically dedicated to a particular set of tasks and operated by control panels, the operator manually entering small programs via switches in order ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Donald Michie
Donald Michie (; 11 November 1923 – 7 July 2007) was a British researcher in artificial intelligence. During World War II, Michie worked for the Government Code and Cypher School at Bletchley Park, contributing to the effort to solve " Tunny", a German teleprinter cipher. Early life and education Michie was born in Rangoon, Burma. He attended Rugby School and won a scholarship to study classics at Balliol College, Oxford. In early 1943, however, looking for some way to contribute to the war effort, Michie instead attempted to enroll on a Japanese language course in Bedford for intelligence officers. On arrival, it transpired that he had been misinformed, and instead he trained in cryptography, displaying a natural aptitude for the subject. Six weeks later, he was recruited to Bletchley Park and was assigned to the "Testery", a section which tackled a German teleprinter cipher. During his time at Bletchley Park he worked with Alan Turing, Max Newman and Jack Good. Mchie and G ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


The Forbin Project
''Colossus: The Forbin Project'' (also known as ''The Forbin Project'') is a 1970 American science fiction thriller film from Universal Pictures, produced by Stanley Chase, directed by Joseph Sargent, that stars Eric Braeden, Susan Clark, Gordon Pinsent, and William Schallert. Based upon the 1966 science fiction novel ''Colossus'' by Dennis Feltham Jones. The film, about an advanced American defense system, named Colossus, becoming sentient. After being handed full control, Colossus' draconian logic expands on its original nuclear defense directives to assume total control of the world and end all warfare for the good of humankind, despite its creators' orders to stop. Plot Dr. Charles A. Forbin is the chief designer of a secret project, "Colossus", an advanced supercomputer built to control the United States and Allied nuclear weapon systems. Located deep within a mountain and powered by its own nuclear reactor, Colossus is impervious to any attack. After Colossus is fully ac ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




A Logic Named Joe
"A Logic Named Joe" is a science fiction short story by American writer Murray Leinster, first published in the March 1946 issue of ''Astounding Science Fiction''. (The story appeared under Leinster's real name, Will F. Jenkins. That issue of ''Astounding'' also included a story under the Leinster pseudonym called "Adapter".) The story is particularly noteworthy as a prediction of massively networked personal computers and their drawbacks, written at a time when computing was in its infancy. Plot The story's narrator is a "logic repairman" nicknamed Ducky. A "logic" is a computer-like device described as looking "like a vision receiver used to, only it's got keys instead of dials and you punch the keys for what you wanna get". In the story, a logic (whom Ducky later calls Joe) develops some degree of sapience and ambition. Joe proceeds to switch around a few relays in "the tank" (one of a distributed set of central information repositories), and cross-correlate all information ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

AI Takeover
An AI takeover is a hypothetical scenario in which an artificial intelligence (AI) becomes the dominant form of intelligence on Earth, as computer programs or robots effectively take the control of the planet away from the human species. Possible scenarios include replacement of the entire human workforce, takeover by a superintelligent AI, and the popular notion of a robot uprising. Some public figures, such as Stephen Hawking and Elon Musk, have advocated research into precautionary measures to ensure future superintelligent machines remain under human control. Types Automation of the economy The traditional consensus among economists has been that technological progress does not cause long-term unemployment. However, recent innovation in the fields of robotics and artificial intelligence has raised worries that human labor will become obsolete, leaving people in various sectors without jobs to earn a living, leading to an economic crisis. Many small and medium size busi ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Creeper (program)
Creeper was the first computer worm, while Reaper was the first antivirus software, designed to eliminate Creeper. Creeper Creeper was an experimental computer program written by Bob Thomas at BBN in 1971. Its original iteration was designed to move between DEC PDP-10 mainframe computers running the TENEX operating system using the ARPANET, with a later version by Ray Tomlinson designed to copy itself between computers rather than simply move. This self-replicating version of Creeper is generally accepted to be the first computer worm. Creeper was a test created to demonstrate the possibility of a self-replicating computer program that could spread to other computers. The program was not actively malicious software as it caused no damage to data, the only effect being a message it output to the teletype reading "I'M THE CREEPER. CATCH ME IF YOU CAN!"
[...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

BYTE
The byte is a unit of digital information that most commonly consists of eight bits. Historically, the byte was the number of bits used to encode a single character of text in a computer and for this reason it is the smallest addressable unit of memory in many computer architectures. To disambiguate arbitrarily sized bytes from the common 8-bit definition, network protocol documents such as The Internet Protocol () refer to an 8-bit byte as an octet. Those bits in an octet are usually counted with numbering from 0 to 7 or 7 to 0 depending on the bit endianness. The first bit is number 0, making the eighth bit number 7. The size of the byte has historically been hardware-dependent and no definitive standards existed that mandated the size. Sizes from 1 to 48 bits have been used. The six-bit character code was an often-used implementation in early encoding systems, and computers using six-bit and nine-bit bytes were common in the 1960s. These systems often had memory words ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Pig Latin
Pig Latin is a language game or argot in which words in English are altered, usually by adding a fabricated suffix or by moving the onset or initial consonant or consonant cluster of a word to the end of the word and adding a vocalic syllable to create such a suffix. For example, Wikipedia would become Ikipediaway (taking the 'W' and 'ay' to create a suffix). The objective is to conceal the words from others not familiar with the rules. The reference to Latin is a deliberate misnomer; Pig Latin is simply a form of argot or jargon unrelated to Latin, and the name is used for its English connotations as a strange and foreign-sounding language. It is most often used by young children as a fun way to confuse people unfamiliar with Pig Latin. Origins and history Early mentions of pig Latin or hog Latin describe what we would today call dog Latin, a type of parody Latin. Examples of this predate even Shakespeare, whose 1598 play, ''Love's Labour's Lost'', includes a reference to do ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Microwave
Microwave is a form of electromagnetic radiation with wavelengths ranging from about one meter to one millimeter corresponding to frequencies between 300 MHz and 300 GHz respectively. Different sources define different frequency ranges as microwaves; the above broad definition includes both UHF and EHF (millimeter wave) bands. A more common definition in radio-frequency engineering is the range between 1 and 100 GHz (wavelengths between 0.3 m and 3 mm). In all cases, microwaves include the entire SHF band (3 to 30 GHz, or 10 to 1 cm) at minimum. Frequencies in the microwave range are often referred to by their IEEE radar band designations: S, C, X, Ku, K, or Ka band, or by similar NATO or EU designations. The prefix ' in ''microwave'' is not meant to suggest a wavelength in the micrometer range. Rather, it indicates that microwaves are "small" (having shorter wavelengths), compared to the radio waves used prior to microwave te ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Computer Memory
In computing, memory is a device or system that is used to store information for immediate use in a computer or related computer hardware and digital electronic devices. The term ''memory'' is often synonymous with the term ''primary storage'' or '' main memory''. An archaic synonym for memory is store. Computer memory operates at a high speed compared to storage that is slower but less expensive and higher in capacity. Besides storing opened programs, computer memory serves as disk cache and write buffer to improve both reading and writing performance. Operating systems borrow RAM capacity for caching so long as not needed by running software. If needed, contents of the computer memory can be transferred to storage; a common way of doing this is through a memory management technique called ''virtual memory''. Modern memory is implemented as semiconductor memory, where data is stored within memory cells built from MOS transistors and other components on an integrated c ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]