Feeds

Captain Cyborg: Computers are alive, like bats or cows

'I'm like Yuri Gagarin, me,' says moggy-chipping prof

Beginner's guide to SSL certificates

Consummate attention-seeker Kevin Warwick has admitted to snooping on the public in a previous life. Warwick made the creepy confession on Radio 4, recalling an earlier job as a GPO engineer:

"I remember taking ten different calls and plugging them all together; one call would continue, the other nine would listen in. Then I'd patch everything back again."

In a 30-minute interview with Michael Buerk, Warwick compared his cat-chipping operation a decade ago to Yuri Gagarin's first space flight. They were both scientific pioneers.

Warwick's 1998 book predicting that humanity would become enslaved to cyborgs didn't seem to impress presenter Buerk.

"Isn't this gloriously self-publicising scaremongering? It seems frankly laughable," wonders Buerk.

Warwick disagreed, and said that the internet showed how "we've committed our lives to machines".

"But there's a difference between being dependent, and machines performing autonomously?" asked Buerk.

"Get with it Michael, you are programmed genetically," the great man explained. "Then you learn. A lot of machines now actually learn and adapt too."

But they still can't tell the difference between sarcasm and irony - and neither, it seems, can Warwick. ®

Bootnote

We note that Professor Warwick's Wikipedia entry has been the subject of vigorous edit wars - perhaps proof that the robots are out in force - with the result that his entry was miraculously cleansed of the chief accusation against him. The following passage has been removed:

"Warwick's tendency to court the media has led some of his critics to accuse him of concentrating on publicity at the cost of research, grossly exaggerating the importance and implications of his "experiments". For example, the Society for the Study of Artificial Intelligence and the Simulation of Behaviour complained to the organisers of the 2000 Christmas Lectures about their choice of Kevin Warwick, prior to his appearance. They claimed that "he is not a spokesman for our subject and allowing him influence through the Christmas lectures is a danger to the public perception of science."

How curious.

Six years ago Warwick was invited to be one of Twelve Wise Men who choose which projects get public research funding.

Related Link

BBC iPlayer - The Choice, Professor Kevin Warwick

Internet Security Threat Report 2014

More from The Register

next story
Antarctic ice THICKER than first feared – penguin-bot boffins
Robo-sub scans freezing waters, rocks warming models
Your PHONE is slowly KILLING YOU
Doctors find new Digitillnesses - 'text neck' and 'telepressure'
SEX BEAST SEALS may be egging each other on to ATTACK PENGUINS
Boffin: 'I think the behaviour is increasing in frequency'
Reuse the Force, Luke: SpaceX's Elon Musk reveals X-WING designs
And a floating carrier for recyclable rockets
The next big thing in medical science: POO TRANSPLANTS
Your brother's gonna die, kid, unless we can give him your, well ...
NASA launches new climate model at SC14
75 days of supercomputing later ...
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.