Book Read Free

The Computers of Star Trek

Page 16

by Lois H. Gresh

Light and virtual reality programming

  Local area networks (LANs)

  LOC units

  Locutus

  Logic

  Logic Theorist

  Luke Skywalker

  M—5 incident

  Magnetic bubble matter

  Main Computer System (figure)

  Main processing core

  figure

  and keyboard and speech commands

  “Masks” (TNG)

  “Matter of Time, A” (TNG)

  McCarthy, John

  McCoy, Leonard, Dr.

  and antidote for aging disease

  as an emotional humanist

  and Spock’s brain

  and subcutaneous transponders

  and tricorder

  Medicine

  Memory

  “Meridian” (DS9)

  Micron junction links

  Microprocessors

  Millenium Falcon

  Miniature subspace field generators (MSFG)

  Minsky, Marvin

  Minuet

  “Miri” (TOS)

  Mistrust of computer technology

  Monitoring of conversations

  Moore, Gordon

  Moore’s Law

  Moriarty, Dr.

  and sentience

  “Most Toys, The” (TNG)

  Music, and human versus android capabilities

  “Naked Now, The” (TNG)

  “Naked Now, The” (TOS)

  “Naked Time, The” (TOS)

  Nanites

  and medical science

  Nanocommunicators, injected

  Nanoprocessor

  definition of

  Nanotechnology

  and the Borg

  and encryption

  and the Federation

  Navigation

  Networking design, of Enterprise computer

  Neurons

  and analog behavior

  artificial

  and the brain

  and connection weights

  Neuroprocessors

  “Neutral Zone, The” (TNG)

  Newell, Allen

  Next Generation, The

  computer of, architecture of

  generational difference in

  Nomad

  NVisage

  Object-oriented programming (OOP)

  O’Brien, Chief Operations Officer Miles

  and bomb explosion

  and computer malfunction

  and fixing of chips

  and overriding of DS9 computer

  shrinking to enter computer console

  O’Brien, Keiko

  ODN. See Optical Data Network (ODN)

  Odo, Security Officer

  Offenhouse, Ralph

  “Offspring, The” (TNG)

  Ogihara, Mitsu

  Ohm, Georg Simon

  Ohm’s Law

  “Omnilingual” (Piper)

  “11001001” (TNG)

  “One Little Ship” (DS9)

  Operating systems

  Operation Desert Storm

  Operations per second (OPS)

  Optical computers

  Optical Data Network (ODN)

  compared to Internet

  compared to LCARS

  and Distributed Processing Network, figure

  Optical isolinear chips

  physical size of

  Optical Translator Clusters

  Optitek

  Original Series, The (TOS)

  computers as primitive

  and differences in later series

  and mistrust of computer technology

  and use of first and second generation computers

  “Outrageous Okona, The” (TNG)

  Overall Ship Computer System (figure)

  PADDs. See Personal Access Display Devices

  “Paradise Lost” (DS9)

  Paris, Lieutenant Tom

  “Patterns of Force” (TOS)

  Paxans

  “Peak Performance” (TNG)

  Pentium chip

  Personal Access Display Devices (PADDs)

  Personal Computers (PC)

  Phaser beams

  Phoneme

  Photolithography

  Physics of Star Trek, The (Krauss)

  Picard, Jean-Luc, Captain

  and Data

  and Dixon Hill

  kidnapping of

  and killing of Borgs

  and Locutus

  and use of Holodeck

  “Piece of the Action, A” (TOS)

  Piper, H. Beam

  Plagues

  Plaques

  Positronic brain

  Power, computer, growth of

  “Power Play” (TNG)

  Pretty Good Privacy (PGP)

  Privacy issues

  and encryption

  and holosuites

  and security

  Processing modules (of main processing core). See Core elements (of main processing core)

  Programming languages

  Proto Snippet

  Psi 2000

  Psychic power

  Pulaski, Dr.

  Q (superbeing)

  Quadritronic optical subprocessor (QOS)

  “Quality of Life, The” (TNG)

  Quark

  and the holodeck

  and holosuites

  “Quest, The” (DS9)

  “Q Who?” (TNG)

  R2D2

  Rachelis

  RAM

  Rand, Yeoman

  Rationality and computers

  Ray, Animesh

  Raymond, Clair

  Red Squad

  Repairs, to computers

  Replicator technology

  “Return of the Archons, The” (TOS)

  Riker, William, Commander

  Rivest, Ron

  R’Mor, Telek

  Robots

  in industry

  and MIT

  and music

  and NASA

  “Rocks and Shoals” (DS9)

  Roddenberry, Gene

  Rom

  Romulans

  Roykerk, Jackson

  RSA Data Security, Inc.

  Russell, Dr. Toby

  “Sacrifice of Angels” (DS9)

  Sarek, Ambassador

  “Schizoid Man, The” (TNG)

  Schneider, Bruce

  “Scorpion” (VGR)

  Scott, Chief Engineer Montgomery

  “Second Chances” (TNG)

  Security

  and cyberwar

  and encryption

  suggested system of

  weakness of

  Servo machines

  Seska

  Sevrin,* Dr.

  “Shadowplay” (DS9)

  Shakey (robot)

  Shells, Mary

  “Ship in a Bottle” (TNG)

  Sigma Draconis

  Silicon

  Simon, Herbert

  Singh, Khan Noonien

  Sisko, Captain Benjamin

  and bomb explosion

  and Dominion blockade

  Smart-Shirts

  Snare

  Sojourner

  Solo, Han

  Soong, Noonien

  Sound recognition

  Space, vastness of

  “Space Seed” (TOS)

  “Space War” (Ley)

  Species 8472

  and DNA computers

  Speed of Enterprise computer

  Spock, Mr.

  and androids(n5)

  and logical approach to life

  and Nomad

  and top-down artificial intelligence

  “Spock’s Brain” (TOS)

  Spot

  Starfleet command, information transfer to

  Starfleet ship computers, and personal privacy

  Star Trek: Generations

  Star Trek: The Next Generation—Technical Manual (Sternach and Okuda)

  and Core Elements

  and Core Memory

  and de
scription of Enterprise computer

  and holodecks

  and isolinear optical chips

  and PADDs

  and Universal Translator

  Star Trek Encyclopedia

  Star Trek VI: The Undiscovered Country (n)

  Star Wars

  Stricom Project

  Subspace boundry layer

  Symmetric Self-Electro-Optic Effect

  Tainer, Dr. Juliana

  Tares, Simon

  Tate, Bill

  Technical Manual. See Star Trek: The Next Generation—Technical Manual

  “Time’s Arrow” (TNG)

  “Time to Stand, A” (DS9)

  “Tin Man” (TNG)

  Top-down artificial intelligence

  limitations of

  table

  Translators, universal

  Transporter

  biofilter of

  malfunctions of

  technology of

  “Trials and Tribblations” (DS9)

  Tricorders

  Troi, Deanna

  Trojan-horse computer warfare

  Tsiolkovksy (science vessel)

  Turing, Alan

  “Turnabout Intruder” (TOS)

  Tuvok, Tactical/Security Officer

  “Twisted” (VGR)

  “Ultimate Computer, The” (TOS)

  Undiscovered Country, The

  United States Navy and use of computers for artillery

  Universal translators

  “Unnatural Selection” (TNG)

  Vaal

  Verne, Jules

  Virtual reality

  and immersion in worlds

  on-screen

  Virtual Reality Modeling Language (VRML 2.0)

  Viruses

  Vision

  Voyager

  breaking of encryption codes of

  and changes from earlier shows

  computer of, architecture of

  and contact with Romulan science vessel

  and importance of its computer

  Vulcans

  War

  on computer battlefront

  computer controlled

  and human element

  See also Cyberwar

  Warp speed

  measurements in

  Watt’s Law

  “Way to Eden, The,”

  Wells, H.G.

  “What Are Little Girls Made Of?” (TOS) (n5)

  “Whom Gods Destroy” (TOS)

  Wiener, Norbert

  “Wolf in the Fold” (TOS)

  Worf, Lieutenant Commander

  Alexander, son of

  and computer malfunctions

  and nanotechnology

  Worm, computer

  “Worst Case Scenario” (VGR)

  Yadera

  Zadeh, Lofti

  Zimmerman, Dr.

  a This is standard practice for engineers and programmers. To create hardware, we start with a general design, and draw our vision as a high-level engineering schematic. Then we break the schematic into components, and draw a more detailed blueprint for each one. We continue to subdivide the design into smaller components and to draw more detailed blueprints. Eventually, we have a roadmap to the entire system, from the outer skins and the chassis to the circuits. To create software, we do the same thing. First we write a general design that defines the main software modules (for example, one for financial accounting, another for accounts payable, and so forth). Then we break each module into components and describe such items as input, output, pointers, public or private, main tasks, required files, relationships among modules. The detailed design explicitly states how records are created, sorted, archived, deleted, and shipped over the network. It defines how each software function will be coded.

  b Not a great use of dual processors, but for now, we’re keeping things simple. The dual processors come in handy during 3D graphics rendering.

  c A phoneme is an individual speech sound, for example the “p” in “pat.” Although the correspondence isn’t exact, phonemes are, roughly speaking, the “atoms” of speech.

  d The Lego company, in conjunction with MIT, introduced a Robotics Invention System in October of 1998. Children can now build fully functional robots equipped with sight, touch, temperature, and light sensors.

  e To isolate the problems, Geordi and Data crawl through a Jeffries tube and use a device resembling an old AM radio with blinking lights, plus a miniscreen. But even more fun is the movie, Star Trek VI: The Undiscovered Country, in which the ship has a huge kitchen complete with dozens of cooks, all making turkeys, biscuits, and mashed potatoes. Using pots and pans! Where are the replicators?

  f This also implies that each chip supplies 4,375 kiloquads of memory (630,000 kiloquads per module) / (144 chips/module).

  g Actually, these security problems are just one system of a general ineptitude. Considering how many times landing parties are infected by exotic diseases that they then bring back to the Enterprise, it’s amazing the crew has survived at all. No more astonishing than the fact that many off-world colonies suffer from plagues that always require serums stored on far-distant planets. We won’t even ask why the colonies in peril never send a subspace message asking for the replicator data necessary for the needed serum!

  h Pretty Good Privacy, discussed later in this chapter.

  i If for each kilometer, we are one millimeter off, then we’re off approximately 4 x 1010 meters, or 4 x 107 kilometers—in very approximate terms, 40 million kilometers.

  j This raises the interesting question of why a ship capable of warp speed would need a cloaking device. If the signals detected by sensors travel at the speed of light, you’d never detect a ship approaching at warp speed until it was well past. FTL speed serves as its own cloak. Most ships wisely use cloaking devices when traveling at impulse speed, well below light speed.

  k A digital signal has two discrete voltage levels. An analog signal varies continuously between minimum and maximum voltages.

  l Actually, if you think trig is fun when you first learn it, you’ll probably remember trig forever. It’s not practice that makes us perfect, it’s enjoyment. This factor makes us wonder how our neural pathways are really strengthened. If we like a particular subject—say, organic chemistry—we tend to remember the material easily without intense study and repetition. So how do our neural pathways strengthen and become accustomed to excitement patterns? And how could we possibly reproduce such an occurrence (such as feeling that organic chemistry is fun but calculus is not) in a creature such as Data?

  m In our near-future technothriller The Termination Node (Del Rey Books, January 1999), genetically constructed digital alife creatures steal fifty billion dollars through the Internet.

  n We can’t think of Shakey as an “it” any more than we can think of Data as an “it.” A bias of computer people, perhaps. The monster machine on which this chapter’s being typed began its shaky life as a “he,” a computer version of Frankenstein (with Wolfie, based on The Wolfman, sitting by the opposite wall). As the monster calmed down and behaved in a more appropriate manner, it somehow became a “she.” Go figure. ‘According to traditional science fiction, Data isn’t really an android but a sentient robot. Androids are generally considered to be artificial biological beings created in growth vats, much like clones. A number of 1950s science fiction novels deal with the dilemma of whether androids deserve to be considered human. The late SF writer Philip K. Dick used the terms android and robot interchangeably, and the scriptwriters of TNG seem to have followed his lead. “The term positronic brain is a tribute to Isaac Asimov, who first used the term in a series of short stories about robots written in the early 1940s. Asimov freely admitted in numerous interviews that he used the term positronic because it sounded good.

  o Oddly enough, when Data’s “mother” visits him, nobody notices that she’s also an android. Even Data is fooled for a long time. Unlike Data, his android mother has a feedback processor that sends out a false bi
osignal, fooling everyone into believing she’s human. Even more strange is that she never knew she was an android. Soong designed her to shut down if she ever learned the truth.

  p In the original series, Kirk and crew encounter androids in such adventures as “What Are Little Girls Made Of?” and “I, Mudd.” But these androids are always the results of alien super-science, and they lack independent intelligence. They are robotic drones, controlled by central computers. “To function as they do,” Spock tells us, “each android mind must be one component of a mass brain linked to a central locus.” In the Kirk episodes, of course, the androids have perfect human female anatomy and wear harem-type outfits. They obey male orders and often express fascination when Captain Kirk attempts to seduce them.

  q All the androids, except of course Juliana, were built in Dr. Soong’s image. ‘Data initially establishes contact with the nanites using the ship’s computer. On Data’s computer screen, we see the nanite’s language as pink and yellow binary. It’s interesting that the nanites easily penetrate Data’s body, enter his “nerve circuitry,” and interface with his verbal program—that is, speak English through Data’s lips. Amazing! And certainly in return for the gift of an entire planet on which to live and flourish, we’d think the nanites might easily be persuaded to give Data the blueprints of his own brain.

  r Estimates vary about the number of neurons in our brain. But we have a lot. A slug brain, by contrast, has approximately 20,000 neurons, yet is a sufficiently interesting neural net for major computer-science research studies.

  s There are also spectacular interactive rides at amusement parks, which rely on motion machines and synthetic actors to create an illusion of reality (such as the Star Tours ride at Disneyworld and the Jurassic Park ride at Universal Studios). ‘Even the recreation of Seska who plagues Tom Paris and Tuvok in “Worst Case Scenario” (VGR), is merely a holodeck simulation of the real person, and basically follows a narrow set of commands—torment then kill the two crewmembers. “It’s possible to beam real guns and weapons into the holodeck, but that doesn’t seem to happen in this episode. (In any case, it’s unlikely that the Enterprise weapons locker would have a few 1930s Tommy guns and perhaps a musket or two stashed behind the phaser rifles.)

  Copyright © 1999 by Lois H. Gresh and Robert Weinberg.

 

‹ Prev