Feeds

Making MACH 1: Can we build a cranial computer today?

How SF gets it right by getting it (mostly) wrong

Top three mobile application threats

The Modern MACH Man

So there we have it: the ultimate in wearable computing, a compact, subcutaneous computer able to communicate by speech. This being the modern age, of course it would have wireless links too - cellular for range and ubiquity - for interrogating remote databases plus GPS to keep our secret agent on track to his destination and to find the quickest escape route. Again, all this is possible now: we have the technology, we have the capability.

The question is, of course, whether our man would need it at all. The very technology that would allow a computer to be miniaturised and embossed on a secret agent’s skull as per the original MACH 1 is already there in his hand: it’s his phone.

Give him a hands-free headset and a feed from base, and he can be continually aided by humans at home who can monitor his progress using military grade GPS tech and, at least while he’s outdoors, satellite-mounted cameras. Modern agents don’t need to undergo expensive surgery to get real-time data feeds - just a trip to a local Carphone Warehouse.

2000AD Prog 1 MACH 1

Don't always do what your computer tells you
Image © Rebellion A/S

That’s the trouble with looking ahead an wondering how technology might evolve. Writers often get the broad thrust right - as Pat Mills did, anticipating the miniaturisation of advanced compute power - but when it comes to details they are usually out by miles. They’re interested in what we can’t do now but would like to. But they forget that it’s the technologies we discovered but didn’t know what they might make possible that change the world.

Take the microprocessor. Integrating circuits is one thing, and a necessary step toward the greater miniaturisation of electronics, but using the technique to create a programmable logic device that, at first, was less powerful than any computer of the time... well, no wonder Intel, back in the 1960s when the first microprocessors were being created, thought its future lay in memory chips. Even if the company could have foreseen the personal computer revolution, and perhaps made the logical leap off the desktop and into users’ hands, would it have conceived a world just 50 years hence when people own laptops, desktops, tablets and smartphones, all of them general purpose computing devices?

Pat Mills at least envisaged an interesting new form-factor: the cranium. Of course, he created MACH 1 to entertain ten-year-old boys, not forecast the future. John Probe’s computer ally is a plot device first, prediction second, and an unintentional one at that. Post World War II science-fiction is rarely deliberately predictive. Any fiction set in the future is going to make implicit predictions about what technology humans will be using at that time, but it’s important not to forget that these ‘forecasts’ are first and foremost tools to help tell a story.

Whether forecast

Think about Star Trek, perhaps the most enduring example of SF widely believed to be intentionally predictive, especially by Americans working in the technology industry, most of whom seem to be Trekkies. The show’s Communicator is held by some to be a mobile phone prototype, but it’s really just a futuristic walkie-talkie. There’s no indication everyone in the Federation or beyond possesses such a device and uses it not only to talk to people over great distances but to read the news, play games, to navigate on foot, to tell other folk what they’re currently doing, and to take pictures. Star Trek: The Next Generation may have miniaturised the Communicator into a badge, but it’s still just a voice device, not a smartphone.

Not to pick on Trek - few novels, comics, films or TV series forecast what mobile phones have become and their impact on today’s society let alone tomorrow’s. Those that hinted at widespread phone use didn’t see text messaging coming or - despite the Sony Walkman - that we’d be downloading music to them. Most SF authors who got wind of the internet in the 1970s and 1980s didn’t suggest we’d be turning to it on mobile devices for daily news and telling World+Dog in 140 characters or less what we’re doing at any given moment. There is no Twitter, no Facebook in William Gibson’s early novels, for instance.

Just like MACH 1’s cranial computer, it’s easy to come up with ‘impossible now, possible sometime’ technologies, but rather harder to work out whether they’ll find a use - and even more to spot other technologies that make them redundant. ®

You can read 2000AD every week digitally on its iPad app.

Combat fraud and increase customer satisfaction

More from The Register

next story
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.