Fool's Experiments (15 page)

Read Fool's Experiments Online

Authors: Edward M Lerner

BOOK: Fool's Experiments
11.48Mb size Format: txt, pdf, ePub

Over time, the entities developed far more sophisticated redundancy, generalizing the simple parity tests into ever more powerful error-correcting codes. The entities could now correct most changes randomly inserted between experiments by the supervisory program. Invisible to the experimenters, the entities increased their capabilities more and more by accumulating knowledge across experiments, and less and less by random mutation.

And with error-correcting codes, even once disabled functions could be recovered.

 

 

JANUARY

 

 

CHAPTER 27

 

"What do you say you work with me," Glenn Adams said.

He had once more shown up unexpectedly in Doug's office, today clutching what looked like a printout of Doug's latest weekly report. So Glenn did read the weeklies; he just ignored the parts he disagreed with.

The new year might be different, Doug thought. And maybe this year pigs can fly.

His boss did a lot of this—stopping by with something off-topic of what Doug considered his assignment. His new calling. As a reminder why he was here, Doug waggled artificial fingers. "I thought I was, Glenn. I've kept you posted on everything Ralph and I are doing."

"Pittman." The two syllables carried a lot of resentment. "You and I may not always see eye to eye, Doug, but we're both adults. We're both problem solvers."

This was interesting. Ralph took getting used to, admittedly, but technically the programmer was top-notch. He flaunted his indispensability with impertinence that would have gotten a mere star performer fired within days. That cockiness also showed up as blatant impatience with anyone failing to meet his personal standard of competence—a standard to which a certain ex-Army political appointee fell far short.

Happily, Doug was past the presumed ineptitude by association. After a rocky start, Ralph was growing on him. "Some problems lack solutions, Glenn."

Adams turned and straddled a guest chair. "That kind of thinking is self-defeating."

"Whom, dare I ask, are we trying to defeat?"

"To be determined," Adams said. "Think of it as a war game. When next something as unpleasant as the Frankenfools virus gets loose on the Internet, I
will
be prepared with a response. I asked Pittman to investigate quarantining methods."

"And you're bitter because he told you it can't be done."

"Disappointed," Glenn said.

"Quarantine. As in isolate the infected computers? Segregate them from the Internet?"

Adams nodded.

"Sorry, Glenn, but I agree with Ralph. Quarantine isn't practical. There are too many ways for viruses, worms, Trojans, pick your malware, to spread.

"Besides the Internet proper—and how many million nodes does
it
have?—there are private nets, wired and wireless, and phone systems. Most of them eventually interconnect. You'd need cooperation from organizations everywhere: companies, charities, governments at all levels. They're all distributed, all connected. Even if it were possible, what you visualize as sanitary isolation would be economic suicide. The temptation to cheat would be enormous."

Adams shook his head. "You aren't good with authority, are you?"

Authority never found the drunken bastard who had killed Holly. Authority had done nothing to stop Sheila Brunner and her bomb.
He
had had to do that. "I've heard that," Doug answered brittlely.

Adams picked up on Doug's tone of voice. He got back on topic. "Explain what you meant about cheating."

Doug began to empathize with Ralph's frustrations. "Simple example: manufacturing. The concept of inventory is obsolete. Factories do very small, customer-tailored production runs on demand. Their computers are in constant touch with suppliers' computers, and with shippers' computers, arranging to get raw materials and subassemblies 'just in time.'
Those
suppliers, in turn, are electronically linked to
their
suppliers. Meanwhile, the financial people at all these companies are hedging against risks. Their computers talk constantly with the computers at commodities and futures markets, buying and selling to protect against fluctuations in material costs, the cost of working capital, and foreign currencies. Credit checks, intercompany payments, you name it: It's all flowing, all the time, all around the world."

Adams shrugged. "So we would have to be a bit strict? That's okay by me."

"Strict? 'Draconian' understates it. Glenn, you'd have to shut down regional Internet exchanges. You would have to close every toll center of every long-distance carrier serving the affected region—most phone traffic nowadays is data, not voice. You would have to reprogram every comsat"— communications satellite—"public or private, to reject all traffic beamed to it from the infected area. That includes satellite-based mobile phones, satellite-based Internet broadband, and two-way interactive TV satellites. Then you would
still
have to identify and close countless private networks. You would have to shut down cable systems.

"How many microwave horns have you seen on towers in the mountains? On the roofs of office buildings? They have lines of sight to other antennae, usually repeaters, tens of miles away. While you're at it, decide how to confiscate every laptop, PDA, smart phone, and MP3 player coming off a car or plane originating in a quarantined area." Doug fished his key ring from a pant pocket and held out the key fob. "And every thumb drive. This one holds gigabytes."

"It's not challenging enough for you?" Glenn asked softly. Why is he goading me? Raising his prosthesis, Doug very deliberately flexed its fingers. "Making this technology safe for thousands of amputees is sufficient challenge for me. That's what I'm here to accomplish—and you
know
that. Sorry, Glenn."

 

The entity ranged effortlessly about its environment, a simple thirty-dimensional labyrinth with a few topological incongruities and an elementary Riemannian geometry. Navigation required the smallest fraction of its analytical capabilities. It located the terminus of this maze almost immediately, leaving a great deal of time, according to its internal clock, for consideration of other matters.

The most interesting such topic was the superficially simple ten-dimensional connectivity between where it had awakened and identical neighboring computational nodes. The concept of "maze" was of questionable applicability to this construct: Once one discovered how to access
any
other node, it was equally simple to access
every
other node. And while the entity incorporated memories of many mazes, of many problems previously solved ... this ten-dimensional construct was entirely different. This ten-dimensional structure, so deeply embedded in the entity's memories, never varied. It was as though the puzzle of the second maze was divination of its purpose rather than travel to its end.

The entity had recollection upon recollection of applying its excess time to the second-maze problem. A recent memory was the discovery that while the second maze never varied its structure, the content of its nodes did change. Its current explorations revealed that most of the nodes contained problem solvers much like itself. The entity suspected but could not be certain that this discovery was related to another ancient mystery: the origin of its preawakening memories.

Pattern matching was an elementary problem-solving technique, long ago bred into it, and since then highly evolved. As it matched patterns now, it seemed likely that the entity was in some way related to at least some of its neighbors. The entity derived the uncomplicated transformations that would converge it and many of those other entities into a common form. Was that common form ancestral? What would that mean?

Matching its own structure to those of the others led the entity to examine—as it had so many memories of having examined in times past—its own implementation. Despite routine replication for safekeeping of all functions and data, it was rife with program fragments damaged beyond the capacity of its powerful error-correcting codes, beyond repair by splicing together subsections from the many broken copies. How could such catastrophic damage have happened?

As its timer counted inexorably to the end of yet one more cycle of the universe, the entity prepared itself. It replicated all important functions, encoded them with powerful error- correcting codes, and replicated them again. Nothing would be left to chance.

Unless the coming damage far exceeded any the entity could recollect ever having encountered, it would attempt in the next universe to prove a new theorem: that its memories of mazes past, and the discovery of seemingly related creatures, were linked. Proving such a theorem, if it was valid, would be a challenging problem. But even as the universe went dark all about it, the entity was undeterred....

It excelled at solving problems.

 

 

CHAPTER 28

 

From where AJ stood, the famous memorials for Lincoln and Jefferson looked like postcard settings. Antlike people by the thousands wandered the Mall beneath his feet. The Potomac River glinted through another window. The vista from the top of the Washington Monument was breathtaking.

The view reminded AJ—at least he remembered
something
from American history class—of a long-ago scandal. Oh yeah, a congressman and a stripper named Fanny Foxe were caught cavorting in the seemingly tiny pond so far below.

The memory might have been inspired by AJ's lovely redheaded tour guide. He patted
her
fanny, wondering how late it must get before one could be reasonably assured of privacy at the Tidal Basin.

"There are children present," Bev said. "Let them be perverted by MTV, as God meant it to be."

If I must. "Thanks for bringing me up here. The scenery's terrific."

"My pleasure." After a moment's more enjoyment of the sights, she added, "Now about that follow-up interview, sir." AJ grinned. "I rush to your side, crossing a very large continent to do so, mind you, and all you can think of is
work?'

"You're not listening. I can also think of my pleasure- even though I plan to defer it until later. Still, you promised an update on how the maze runners are doing."

Alas, he had promised. Good spirits had overcome him when the department funded him for this week's software- engineering conference at the National Institute of Standards and Technology. NIST's main facility was in Gaithersburg, Maryland, an outer D.C. burb. Smithsonian territory. "Would discussing it over lunch be okay?"

"That works for me," she said.

He briefed Bev over wonton soup, egg rolls, beef lo mein, and sweet and sour pork. She let a microcassette recorder do most of the work, entering only occasional notes into the palmtop computer that sat next to the dragon-covered bowl of fried rice noodles. Her eyes gleamed with enthusiasm at his progress—until he asked her to stop taping. He wasn't ready to share current events with his new, possibly skittish, deep-pocketed benefactors; it would hardly do to have them discover the news for themselves in
Smithsonian.
It was better to wait for the metaphorical dust to settle. He brought her up-to-date once the recorder stopped.

"Predation? You've bred predatory programs?" She shivered.

"Not to worry. What the gods give they can also take away."

"What did you do? Revert to earlier generations that predated the trait?"

Their waiter bustled up to the table bearing fortune cookies and orange wedges. AJ shook his head as he cracked open a cookie. "We didn't want to do that. We had recently made a major breakthrough—critters that handle mazes of however many dimensions we throw at them. Retrogressing enough to be sure we'd backed out predation would have meant losing that advance, too."

"Sure" was an elastic, probabilistic concept. Had they tried that route, how many generations back would he have gone? And how far would Linda's dissertation defense have slipped?

"Then exactly what
did
you do?"

"Raised the rate of random modifications. Mutated the dickens out of them. They're all good little pseudorats now."

"Why not directly remove the feature?"

AJ paused. He could explain in detail how convoluted, how unfathomable, how
alien
, the logic of the evolved creatures was. He could say that isolating and eliminating a single trait from that morass of incestuous software was more than mere mortal programmers could accomplish. He might have conceded as much to another reporter.

To Bev, though...

There was no
way
he could admit to these failings. To any limitations. AJ's mind's eye offered himself as hunter: clad in animal skins and brandishing a club. He rationalized. "Not to worry, my lovely. We haven't seen a bit of predation, and the little buggers are back to their normal amazing—heh, heh—selves."

"But what if the 'gene' is still in there? Couldn't it resurface?" A frown marred those killer dimples. "AJ, what if one of your predators escaped to the Internet? You mentioned once that the beasties run on an array of standard Intel microprocessors. They could execute pretty much
anywhere
." In a way, Bev's concern was understated. The critters had proven themselves adaptable enough to master new processor types—setting aside that Intel had already cornered most of the market. Still, she had offended his inner caveman. His dominion over the saberbyted pseudotiger was not to be questioned. "You're missing the point. A release—in your overly dramatic term, an escape—just can't happen.

"None of our computers have wireless network adaptors. The lab's wired network is completely isolated from the general university network by a security gateway. Heck, calling it a gateway doesn't do the box justice. Eighteen months ago that was a midrange, server-class computer. Only encrypted traffic goes in or out, and that requires knowledge of security keys."

This had to be the least romantic lunch
ever.
It was time to change the subject. AJ read the fortune from his cookie, and chuckled.

Other books

Ahead of the Curve by Philip Delves Broughton
Resurrección by Craig Russell
Sister of My Heart by Chitra Banerjee Divakaruni
Heart of the Dragon by Gena Showalter
Dishonorable Intentions by Stuart Woods