Feeds

Aliens: coming to a house near you soon

Screensaver could identify extraterrestrials any day now

  • alert
  • submit to reddit

New hybrid storage solutions

Home users can now help in the search for intelligent alien lifeforms by downloading a screensaver here that uses their PC’s spare capacity to analyse signals from outer space for signs of extraterrestrial intelligence. Since the project's launch earlier this week, over a quarter of a million users are now desperately seeking Klingons in their spare time, so far contributing a staggering 528.25 years of computing resource to the mega project. And some interesting statistics on just what computers are out there -- and how well they perform -- are thrown up by the research. Not surprisingly, x86 architecture tops the list with over 500,000 batches of data despatched for processing so far. The average Intel box takes an average of 35 hours to analyse each chunk of data, although these systems obviously include legendary under-performers such as the 8086, the original Celeron and anything made by Cyrix. Next most popular is the PowerPC which handles the Dalek data in a mere 23 hours, closely followed by SunSPARC which analyses the alien artefacts in just 16 Earth hours. Alphas (from the dead planet Digitalia) take a mere ten galactic time units (although just how may homes boast an EV5 is open to discussion). More worryingly, some well-known processors appear to have disappeared into a black hole. PA Risc systems have been sent more than 3000 batches of data, none of which have returned. RS/6000s (lots of them in use in semi-detached houses in the Neasden area, no doubt) have been sent 4000 bundles of alien transmissions, but none have come back. MIPS processors have gobbled up over 10,000 sets of data to no discernable effect, while one saddo with a 680x0-based system has also failed to calculate anything. But perhaps the most concerning result is from an 'unknown' CPU which has received one load of data to which there has been no reply. Perhaps this mystery system could be an early prototype of the legendary Merced processor from the Pentium IV system, just to the left of Andromeda. Drink long and prosper, as the inhabitants of the planet Vulture say. ® Register Factoid 2001: No aliens supply news to ZDNet UK. In fact, no one supplies news to ZDNet UK. Scary, huh?

The next step in data security

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.