Feeds

Ten badass brainy computers from science fiction

Great movie motherboards

The Power of One Infographic

Computers used to be our loyal servants. But slowly and surely, we've let them control us. I used to believe these machines had the ability to positively change the world, but after the 56K modem invented Dubstep in the 1990s, I've been somewhat sceptical. So have film makers.

Boost a PC with a new processor these days and results speak for themselves. Skip forward a decade or so and apparently the computers will too. And if supercomputer Watson is able to thrash us at Jeopardy already, who knows what the future has in store? Perhaps Tinsel Town's fictional predictions will ring true... increase the bytes a bit too far - badum tish - and laptops could take over the world.

Here's a look at ten films in which a computer takes top billing. Let us know if you think we've missed any crucial inclusions.

Here's one for you already. We've excluded The Matrix because it doesn't really fit. While there are plenty of self-aware machines in the film, the mainframe itself is more of an unconscious software environment.

Alpha 60

Alphaville (1965)

RH Numbers

This French black-and-white classic features a dictatorial computer, Alpha 60, which outlaws free thought and bans all forms of creative expression in the city of Alphaville. While most movies with computer characters assume consciousness breeds emotion, the sentient system here fails to understand it and interrogates those who show feelings before executing them in punishment.

I think the Alphaville interpretation of a computer consciousness hits the nail on the head. Even the most powerful of machines would struggle to comprehend the illogicality of human emotion, and just as we've seen throughout history, when an entity with power believes their way is the only rational approach, muscles are flexed and mortality is inevitable. See, it doesn't matter whether machines fail to get the emotional drive started... let them become aware of themselves and we're stuffed.

Alphaville

HalHalHalHalHAL Rating 80%
More info IMDB

Colossus

Colossus: The Forbin Project (1970)

RH Numbers

When Charles Forbin builds an advanced supercomputer - aka Colossus - as a means to safely control the United States' nuclear weapons arsenal, did anyone expect it not to go rogue and take over the world?

Yes, after colluding with its Russian equivalent and evolving of its own accord, that's exactly what Colossus does, eventually forcing Forbin into captivity so it can keep watch of its creator at all times.

A predictable battle ensues between man and machine, as humans try to re-establish control, and Colossus tries to convince us that freedom is merely an illusion. Those of you unfamiliar with the 1970 film should watch it quickly before the rumoured remake - featuring Hollywood's protector of the Earth, Will Smith - hits cinema screens in the near future. God forbin.

Colossus: The Forbin project

HalHalHalHalHalHAL Rating 90%
More info IMDB

Top three mobile application threats

Next page: Deep Thought

More from The Register

next story
NEW Raspberry Pi B+, NOW with - count them - FOUR USB ports
Composite vid socket binned as GPIO sprouts new pins
Child diagnosed as allergic to iPad
Apple's fondleslab is the tablet dermatitis sufferers won't want to take
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
For Lenovo US, 8-inch Windows tablets are DEAD – long live 8-inch Windows tablets
Reports it's killing off smaller slabs are greatly exaggerated
Seventh-gen SPARC silicon will accelerate Oracle databases
Uncle Larry's mutually-optimised stack to become clearer in August
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.