And if the programmer is running the simulation in debug mode, they can pause it at anytime, change something, and resume running it. A door for the entrance of miracles, eh?
Tired of Chrome, Firefox, Internet Explorer or Edge? Check out these 10 alternatives!
- Intel has whittled down the i7’s 4 cores to only 2;
- All my graphic processing tools support multiple cores/hyperthreads;
- And I’m planning someday to move to a camera with 24 or 36 megapixels, which will make working with panoramas really processor intensive
Someone please buy me one when it comes out, OK?
NOTE: This is not the “IT” mentioned in the previous post. THAT is still coming. IT IS COMING IT IS COMING!
Hollywood IT is what you see in movies. What Hollywood scriptwriters and directors think is Information Technology. The only connection between Hollywood IT and real IT is they both use the word “computer”.
Here’s some Hollywood IT: Any password for a hypersecure system can be guessed in only 2 tries. Even though such systems don’t allow their users to use easily-guessed passwords like the user’s first name, somehow the user’s password is their first name. Failing that, all you need to do is type OVERRIDE and you’re in.
But here’s an example that pertains to the real world.
When we saw the most recent Bourne movie, a whistleblower stole a flash drive of super-secret information from the CIA. It held 3D animations, video, full documentation, plans, scans of all project reports, etc, all about the project that produced Bourne and the other assassins. Maybe a gigabyte total?
Once plugged into a computer, a virus on the drive notified the CIA that someone was reading the flash drive. Worse: Sharing the files with someone else. This Must Be Stopped or we’ll be un-CYAed, bringing about The End of the Free World.
In the movie, the CIA’s computer whiz hacker remotely finds a hackable smartphone near the laptop, somehow uses that to hack the laptop, and starts erasing the flash drive. (Why didn’t they just use the laptop’s wifi connection that the virus used to report in the first place? Eludes me.)
A few minutes later, it was done. I presume to full government disk wiping standards. Not just sequentially translated through 256 random languages on Google Translate into unreadable gibberish.
(Technical note: Encryption via Google Translate cannot be cracked. But you may find the output in the instruction manual for that cheap MP3 player you picked up at a garage sale.)
A real world situation
When I see something that still works, my first few reactions are: “It still works. Someone else could use it.” (Actually, that’s my second reaction. My first reaction is: “How can I still use it?” I’m that sort of person. I HATE throwing away things that still work. Or could be fixed. Explains the junk I’ve collected.)
So when I recently replaced a 1TB hard drive with a 2TB drive, I found it very difficult to apply the Sacred Hammer of Divine Data Destruction to it. That would be sacrilegious.
Coming up this Saturday at the monthly Hawaii Fiction Writers group meeting, at Aina Haina Library. For info about time & location, see the HFW website!