Feeds

Doctor Who and the Unsatisfactory Five Hole Tape Punch

Early world-dominating computers of the series

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

Stob

This sentence is false...

As soon as I heard about the sponsored Doctor Who-themed parties, I just knew that they would want an article on the early years of Doctor Who IT to include in the special pack. However, since nobody has actually asked me for it yet, you get first dibs.

W.O.T.A.N. for Will Operating Thought ANalogue

Manufacture: English Empirical Electrically Actuated Computers Ltd

Store: 1,200 words of 61-bit 'store' as magnetic core memory, multiple reel-to-reel tape drives of an unusual vertical design, dispensing not only with such decorative niceties like pinch rollers and tension loops but also read/write heads.

W.O.T.A.N. Tape Drive with unusual vertical reel-to-reel layout

W.O.T.A.N. Tape Drive

Coding Language: Bedfordshire Autocode II.

Embedded desire to take over the world: Yes.

I/O: Teletype, 110 cps ie, "faster than Polly" (a secretarial/typing pal-to-be of the Doc's). Could do the football results in its spare time. Also has ponderous 0.3 sps (syllable per second) voice output via a speaker. Oh yes, and thought control, achieved via a broadcast signal.

Function: Not a lot. Supposedly the inventor of the "War Machines", creations which are visually the product of the union of a commercial-size chest freezer and  Metal Mickey. Unconvincing War Machine appendages included a single, faux tank track in the middle (huh?) and a hammer arm that had a curious, feeble, designed-by-a-child look about it.

Most serious flaw: W.O.T.A.N.'s primitive design led to dreadful continuity errors, notoriously treating the principal character as eponymous.


The Robot Receptionist in the lobby of the International Electromatics building

The Robot Receptionist in the lobby of the International Electromatics building

The Robot Receptionist in the lobby of the International Electromatics building

Manufacture: International Electromatics, possibly from a design by the Cybermen of Telos.

The Cybermen have often been notably successful as innovators in IT. Consider for example, proto-Cyberlord Lumic's use of Bluetooth earpieces as a method of hands-free brainwashing. Particularly impressive given their difficulties handling gold, which disadvantages them in the manufacture of printed circuit boards.

Coding Language: ALGOL

Embedded desire to take over the world: No

Store: It does have a reel-to-reel tape drive, but it seemed to use this as an output device to express frustration, twitching its reels irritably.

I/O: Siri-stylee voice I/O, which proves to be its downfall, as it is inadequately protected against code injection. Zoe dictates a fragment of CyberALGOL:

'BEGIN' 'REAL' X;
  SUM(POSITIVE);
  DELETE(SQUARE);
  'BEGIN'
    SUM2[J]
    'INTEGER' COMPUTE;
    'PRINT' OUT, Y ** -X, VARIABLE, 1;
    'GO TO' FINISH;
    ...

One recognises the style: abandoned, half-finished lines, references to more and more globals, use of uninitialised variables, poor choice of names, gratuitous GOTO breaking the block structure, a sense of prevarication to avoid committing oneself - it's the sort of thing one only usually sees when testing Comp Sci graduates during job interviews.

Naturally an astrophysicist of Zoe's intelligence and culture – remember she is from the futuristic 21st century – would never write this sort of thing, even when, as in this case, she is attempting sabotage. The clever part is that this code fragment, as broadcast by the BBC, represents what the machine hears after its voice recognition processing. No wonder the inline compiler responds by shutting down the machine and setting fire to the tape drive.

Functions: (i) Automatic PBX substitute: handles incoming calls by informing the caller that the requested party is unavailable  (ii) Robotic receptionist: handles visitors to the building by denying them access.

Many Doctor Who computers seem unrealistic in their intended purpose or in their execution of their duties; this one perhaps suffers from an excess of dismal realism.

In fact, last year the company introduced the latest version of its core automation package, now with vulnerabilities sorted out, ported to Java, and adapted to the needs of the medical profession. Your dentist uses it. Just last week it sent you an SMS message admonishing you for failing to attend an appointment that you hadn't booked.

Secure remote control for conventional and virtual desktops

More from The Register

next story
Not appy with your Chromebook? Well now it can run Android apps
Google offers beta of tricky OS-inside-OS tech
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
NHS grows a NoSQL backbone and rips out its Oracle Spine
Open source? In the government? Ha ha! What, wait ...?
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.