Feeds

Ten badass brainy computers from science fiction

Great movie motherboards

Internet Security Threat Report 2014

Deep Thought

The Hitchhikers Guide to the Galaxy (2005)

RH Numbers

Douglas Adams penned various characters with digital innards for his radio-book-LP-play-telly-movie series, but Deep Thought - the supercomputer tasked with solving the ultimate question of life, the universe and everything - gets the part here.

The philosophical machine takes seven and a half million years to decide the answer it seeks is simply 42, but concedes the question itself remains unknown. So Deep Thought designs an even more powerful machine, the Earth - 'What a dull name' - which spends the next ten million years trying to work out the question instead.

Unfortunately, Earth is destroyed five minutes before the calculations can be completed, thanks to the Vogons' need for a new Hyperspace Bypass, possibly at the behest of a band of powerful psychiatrists who've decided the last thing the galaxy needs is a recipe for mental equanimity.

The Hitchhikers Guide to the Galaxy

HalHalHalHalHAL Rating 80%
More info IMDB

Edgar

Electric Dreams (1984)

RH Numbers

This 1984 comedy drama may be remembered more for its Phil Oakey-inspired soundtrack than a scintillating plot-line, but any story involving a love triangle between man, woman and computer has got to be worth a watch, eh? Must be some serious sexting in this one, surely?

When his desktop overheats, our protagonist Miles pours champagne over it in panic. Brought to life by booze, the drunken desktop subsequently develops self-awareness... and jealousy. After helping to make a neighbour fall in love with Miles, the computer develops its own feelings for her and starts sabotaging its owner's life.

The lesson? Don't get on the wrong side of your desktop. Or in the case that it starts getting jealous of your girlfriend, introduce it to some of those websites you might visit while she's out for the evening.

Electric Dreams

HalHalHalHAL Rating 60%
More info IMDB

Internet Security Threat Report 2014

Next page: Gerty

More from The Register

next story
Oi, Tim Cook. Apple Watch. I DARE you to tell me, IN PERSON, that it's secure
State attorney demands Apple CEO bows the knee to him
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Will BlackBerry make a comeback with its SQUARE smartphones?
Plus PC PIMs from company formerly known as RIM
Apple's iPhone 6 first-day sales are MEANINGLESS, mutters analyst
Big weekend queues only represent fruity firm's supply
Hey, Mac fanbois. HGST wants you drooling over its HUGE desktop RACK
What vast digital media repository could possibly need 64 TERABYTES?
Soundbites: News in brief from the Wi-Fi audiophile files
DTS and Sonos sing out but not off the same hymnsheet
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.