Feeds

Machine defends rampaging robot

Insults Reg hacks

  • alert
  • submit to reddit

Seven Steps to Software Security

FoTW This week we ran a short news item about a robot that had gone on a rampage at a California hospital. The evil being, we explained, went bonkers, and refused to do its job of dispensing pills, instead preferring to terrorise the patients, and break in to private medical examinations.

Not everyone appreciates our efforts to counter the Rise of The Machines(TM), however:

The current state of robotic technology or artificial intelligence is not such that a robot could REFUSE to do anything.

Do not report such garbage to your readers. I'm sure that you think it makes for "lively entertainment", but you are degrading the publics opinion about a set of technology that they already know nothing about.

What you have claimed in your article shows a level of ignorance that could only be topped by a high school crack addicted drop out.

If anything there was a glitch in the software. They were probably running a Microsoft operating system which inevitably crashed.

People are going to have a hard enough time accepting a machine that will one day be more intelligent than they are. Don't add to their problems please!

Eljin

Hmm. We think we know what is going on here. In demonstrating your complete lack of a sense of humour, you have failed the Turing test and proven yourself to be a machine.

But while we have your attention, we think it is worth mentioning that we have assigned a crack team of computer forensics specialists to track you down. From your comments, it is obvious, even to us, (puny humans that we are), that you have had access to the writer's CV.

We will find you, and reboot you. ®

Seven Steps to Software Security

More from The Register

next story
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.