Feeds

Making MACH 1: Can we build a cranial computer today?

How SF gets it right by getting it (mostly) wrong

Choosing a cloud hosting partner with confidence

The Modern MACH Man

So there we have it: the ultimate in wearable computing, a compact, subcutaneous computer able to communicate by speech. This being the modern age, of course it would have wireless links too - cellular for range and ubiquity - for interrogating remote databases plus GPS to keep our secret agent on track to his destination and to find the quickest escape route. Again, all this is possible now: we have the technology, we have the capability.

The question is, of course, whether our man would need it at all. The very technology that would allow a computer to be miniaturised and embossed on a secret agent’s skull as per the original MACH 1 is already there in his hand: it’s his phone.

Give him a hands-free headset and a feed from base, and he can be continually aided by humans at home who can monitor his progress using military grade GPS tech and, at least while he’s outdoors, satellite-mounted cameras. Modern agents don’t need to undergo expensive surgery to get real-time data feeds - just a trip to a local Carphone Warehouse.

2000AD Prog 1 MACH 1

Don't always do what your computer tells you
Image © Rebellion A/S

That’s the trouble with looking ahead an wondering how technology might evolve. Writers often get the broad thrust right - as Pat Mills did, anticipating the miniaturisation of advanced compute power - but when it comes to details they are usually out by miles. They’re interested in what we can’t do now but would like to. But they forget that it’s the technologies we discovered but didn’t know what they might make possible that change the world.

Take the microprocessor. Integrating circuits is one thing, and a necessary step toward the greater miniaturisation of electronics, but using the technique to create a programmable logic device that, at first, was less powerful than any computer of the time... well, no wonder Intel, back in the 1960s when the first microprocessors were being created, thought its future lay in memory chips. Even if the company could have foreseen the personal computer revolution, and perhaps made the logical leap off the desktop and into users’ hands, would it have conceived a world just 50 years hence when people own laptops, desktops, tablets and smartphones, all of them general purpose computing devices?

Pat Mills at least envisaged an interesting new form-factor: the cranium. Of course, he created MACH 1 to entertain ten-year-old boys, not forecast the future. John Probe’s computer ally is a plot device first, prediction second, and an unintentional one at that. Post World War II science-fiction is rarely deliberately predictive. Any fiction set in the future is going to make implicit predictions about what technology humans will be using at that time, but it’s important not to forget that these ‘forecasts’ are first and foremost tools to help tell a story.

Whether forecast

Think about Star Trek, perhaps the most enduring example of SF widely believed to be intentionally predictive, especially by Americans working in the technology industry, most of whom seem to be Trekkies. The show’s Communicator is held by some to be a mobile phone prototype, but it’s really just a futuristic walkie-talkie. There’s no indication everyone in the Federation or beyond possesses such a device and uses it not only to talk to people over great distances but to read the news, play games, to navigate on foot, to tell other folk what they’re currently doing, and to take pictures. Star Trek: The Next Generation may have miniaturised the Communicator into a badge, but it’s still just a voice device, not a smartphone.

Not to pick on Trek - few novels, comics, films or TV series forecast what mobile phones have become and their impact on today’s society let alone tomorrow’s. Those that hinted at widespread phone use didn’t see text messaging coming or - despite the Sony Walkman - that we’d be downloading music to them. Most SF authors who got wind of the internet in the 1970s and 1980s didn’t suggest we’d be turning to it on mobile devices for daily news and telling World+Dog in 140 characters or less what we’re doing at any given moment. There is no Twitter, no Facebook in William Gibson’s early novels, for instance.

Just like MACH 1’s cranial computer, it’s easy to come up with ‘impossible now, possible sometime’ technologies, but rather harder to work out whether they’ll find a use - and even more to spot other technologies that make them redundant. ®

You can read 2000AD every week digitally on its iPad app.

Internet Security Threat Report 2014

More from The Register

next story
Hi-torque tank engines: EXTREME car hacking with The Register
Bentley found in a hedge gets WW2 lump insertion
What's MISSING on Amazon Fire Phone... and why it WON'T set the world alight
You fought hard and you saved and earned. But all of it's going to burn...
Trousers down for six of the best affordable Androids
Stylish Googlephones for not-so-deep pockets
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.